- Access Control and Trust
- Privacy, Security, and Data Protection
- Information and Cyber Security
- Mobile Learning in Education
- Internet Traffic Analysis and Secure E-voting
- Security and Verification in Computing
- Business Process Modeling and Analysis
- Cryptography and Data Security
- Innovative Teaching and Learning Methods
- Network Security and Intrusion Detection
- Software Engineering Techniques and Practices
- ICT in Developing Communities
- IPv6, Mobility, Handover, Networks, Security
- Advanced Malware Detection Techniques
- Service-Oriented Architecture and Web Services
- Speech Recognition and Synthesis
- Impact of Technology on Adolescents
- Speech and Audio Processing
- Cloud Data Security Solutions
- Information Technology Governance and Strategy
- Digital Communication and Language
- Music and Audio Processing
- Open Education and E-Learning
- Social Media and Politics
- Knowledge Management and Sharing
Nelson Mandela University
2014-2023
Port Elizabeth Provincial Hospital
2004
IEEE Computer Society
2000-2001
Separation of duty, as a security principle, has its primary objective the prevention fraud and errors. This is achieved by disseminating tasks associated privileges for specific business process among multiple users. principle demonstrated in traditional example separation duty found requirement two signatures on check. Previous work requirements often explored implementations based role-based access control (RBAC) principles. These are concerned with constraining associations between RBAC...
Abstract Material property dependence on the OH−/Zn2+ molar ratio of precursor was investigated by varying amount NaOH during synthesis ZnO. It necessary to control water content and temperature mixture ensure reproducibility. observed that structural properties, particle size, photoluminescence intensity wavelength maximum were influenced precursor. The XRD spectra for ZnO nanoparticles show entire peaks corresponding various planes wurtzite ZnO, indicating a single phase. UV measurements...
Due to the correspondence between role abstraction in Role-based Access Control (RBAC) and notion of organizational positions, it seems easy construct hierarchies. This is, however, a misconception. paper argues that, order reflect functional requirements, hierarchy becomes very complex. In bid simplify design hierarchies suitable for expression access control requirements workflow systems, proposes "typed" hierarchy. is specific type. The associations different types roles are limited by...
Workflow systems are often associated with business process re‐engineering (BPR). This paper argues that the functional access control requirements in workflow rooted scope of a BPR project. A framework for is developed. The suggests existing role‐based mechanisms can be used as foundation systems. separates administration‐time and run‐time aspects. Key areas must investigated to meet imposed by on services identified.
Background: The urgency to enforce the Protection of Personal Information (POPI) Act is building up within South Africa, triggered by appointment Regulator for POPI on 01 December 2016. However, data management practitioners, absence a practical guideline how legally process personal information employees, customers or other juristic persons in line with poses day-to-day technical challenge, especially those embarking maiden journey comply Act.Objectives: objective this article explore and...
Smart meter implementation is still in its infancy many African countries, including South Africa. This evident from the fact that most research studies are either Eurocentric or American-centric. Hence, this aimed to identify consumer-centric factors for planning considerations of smart meters We used various behavioural theoretical models found literature potential relevant study. Based on quantitatively gathered data (n = 705), a structural equation model (SEM) was evaluate identified...
Dr MathTM is a mobile, online tutoring system where learners can use MXitTM on their mobile phones to receive help with mathematics homework from volunteer tutors. These conversations between and Math are held in MXit lingo. lingo heavily abbreviated, English-like language that evolving users of communicate using MXit. The project has been running since January 2007 uses tutors who mostly university students readily understand However, due the large number simultaneous often involved...
There are a number of considerations before one can commence with establishing Computer Security Incident Response Team (CSIRT). This paper presents the results structured literature review investigating business requirements for CSIRT. That is, identifies those things that must be in place prior to commencing actual establishment process. These include characterising CSIRT environment, funding, constituency, authority and legal considerations. Firstly, we identified authoritative...
Although there are numerous guides available for establishing a computer security incident response capability, appears to be no underlying management model that brings them all together. This paper aims address the problem by developing Computer Security Incident Response Team (CSIRT). A design science-based approach has been selected overall project. However, current reports on first three activities in science research: identifying problem, listing solution objectives, and designing...
Research on internet users reports a gap between reported privacy concerns and observed behavior. This has also been social networking sites like Facebook MySpace. current study explores the extent of this by examining individual components. Unlike previous studies that have explored versus behavior, claimed information disclosure disclosure. A questionnaire was used to examine observations public profiles were conducted actual The shows there is disclosure, in case concern However, act more...