Sciweavers

ISSA
2008
13 years 6 months ago
The IP Protection of Electronic Databases: Copyright or Copywrong?
The protection of the intellectual investments embodied in databases is of the utmost importance. Technological innovation has rendered databases vulnerable to unauthorised access...
Tana Pistorius
ISSA
2008
13 years 6 months ago
UML Modelling of Digital Forensic Process Models (DFPMs)
Michal Köhn, Jan H. P. Eloff, Martin S. Olivi...
ISSA
2008
13 years 6 months ago
Towards a Framework for a Network Warfare Capability
Information warfare has surfaced as an emerging concept that affects not only military institutions but ordinary organisations as well. Information warfare in itself consists of v...
Namosha Veerasamy, Jan H. P. Eloff
ISSA
2008
13 years 6 months ago
Immune System Based Intrusion Detection System
The threats and intrusions in IT systems can basically be compared to human diseases with the difference that the human body has an effective way to deal with them, what still nee...
Christoph Ehret, Ulrich Ultes-Nitsche
ISSA
2008
13 years 6 months ago
The Information Security of a Bluetooth-Enabled Handheld Device
Bluetooth connectivity allows workers to access information anywhere, including both personal and corporate information. Software and applications have been specifically developed...
Frankie Tvrz, Marijke Coetzee
ISSA
2008
13 years 6 months ago
The Impact of Information Security Awareness Training on Information Security Behaviour: The Case for Further Research
Information Security awareness initiatives are seen as critical to any information security programme. But, how do we determine the effectiveness of these awareness initiatives? W...
Tony Stephanou, Rabelani Dagada