- Information and Cyber Security
- Advanced Malware Detection Techniques
- Privacy, Security, and Data Protection
- Software Engineering Techniques and Practices
- Security and Verification in Computing
- Cybercrime and Law Enforcement Studies
- Network Security and Intrusion Detection
- User Authentication and Security Systems
- Teaching and Learning Programming
- Digital and Cyber Forensics
- Cybersecurity and Cyber Warfare Studies
- Big Data and Business Intelligence
- Impact of Technology on Adolescents
- Software Engineering Research
- Online Learning and Analytics
- Information Technology Governance and Strategy
- Experimental Learning in Engineering
- Distributed and Parallel Computing Systems
- Spam and Phishing Detection
- Data Quality and Management
- Elder Abuse and Neglect
- Educational Research and Analysis
- Research in Social Sciences
- ICT in Developing Communities
- Information Architecture and Usability
Nelson Mandela University
2015-2024
It is within highly integrated technology environments that information security becoming a focal point for designing, developing and deploying software applications. Ensuring high level of trust in the quality these applications crucial to their ultimate success. Information has therefore become core requirement applications, driven by need protect critical assets build preserve widespread computing. The aim this paper provide guidance designers developers defining set guidelines secure...
With the rapid advancement of technologies in era Industry 4.0, inter-connected nature operations and systems is introducing a rapidly changing landscape digitized connected systems.Cybercrime considered as possibly greatest threat to worldwide, therefore there exists large drive engineering include cybersecurity design, development maintenance smart cyber-physical systems.Traditionally, space was responsibility Information Technology (IT) professionals, where greater IT infrastructure...
Purpose – The purpose of this paper is to propose a framework address the problem that email users are not well-informed or assisted by their clients in identifying possible phishing attacks, thereby putting personal information at risk. This therefore addresses human weakness (i.e. user’s lack knowledge attacks which causes them fall victim such attacks) as well software related issue visually assisting and guiding through user interface. Design/methodology/approach A literature study was...
Cyber security threats are on the rise as use of personally owned devices increasing within higher education institutions. This is due to rapid adoption Bring Your Own Device (BYOD) trend. In 2014, 92% students used laptops globally for academic purposes, 44% tablets, and 68% smart phones. addition, 89% institutions in United States Kingdom allow students, faculty non-academic staff access their network using mobile devices. A great concern that although BYOD widely accepted institutions,...
Purpose The purpose of this paper is to argue that information security should be regarded as a critical cross‐field outcome (CCFO). This could assist in narrowing the evident “information gap” currently exists undergraduate technology/information systems/computer science (IT/IS/CS) curricula at South African universities. Design/methodology/approach briefly reviews existing literature relating outcomes‐based education Africa with specific focus on CCFOs. A review was also carried out...
Background: The urgency to enforce the Protection of Personal Information (POPI) Act is building up within South Africa, triggered by appointment Regulator for POPI on 01 December 2016. However, data management practitioners, absence a practical guideline how legally process personal information employees, customers or other juristic persons in line with poses day-to-day technical challenge, especially those embarking maiden journey comply Act.Objectives: objective this article explore and...
The South African national government is forging ahead with digitalisation plans to enhance socioeconomic growth in the country. However, accompanied by detrimental cybersecurity risks that may potentially exacerbate vulnerability of National Critical Information Infrastructure (NCII) Africa cyber-attacks. Therefore, envisaged benefits be offset increased risk on NCII Through a theoretical literature review, this study aims investigate and identify it poses Africa, from policy perspective. A...