Loading [MathJax]/extensions/MathMenu.js
Mariki Eloff - IEEE Xplore Author Profile

Scheduled Maintenance: On Tuesday, May 20, IEEE Xplore will undergo scheduled maintenance from 1:00-5:00 PM ET (6:00-10:00 PM UTC). During this time, there may be intermittent impact on performance. We apologize for any inconvenience.

Showing 1-13 of 13 results

Filter Results

Show

Results

It is currently almost impossible for students enrolled at an open distance learning institution to obtain their study materials, communicate with lecturers or engage in any other teaching and learning processes without the use of computers and the Internet. This paper investigates and reports on the time taken and level of difficulty experienced by students with disabilities and students without ...Show More
The main objective of this paper is to report on perceptions of online banking custodians with regard to the development of secure and usable online banking applications. The paper also reports on the impact of online banking users' behaviour in fostering a secure online environment. Using an exploratory study, the paper discuss findings based on empirical interview data from six participants. The...Show More
Intrusion detection systems (IDSs) are an important component of information security. The challenge with current versions has be en the high numb er of fa lse positive and f alse negative alerts they generate. The aim of this paper is the analysis of current intrusion detection systems and the Common Intrusion Detection Framework (CIDF) model for any weaknesses through a detailed literature revie...Show More
Communication is no longer restricted to areas with telecommunication network infrastructure due to the introduction of wireless mobile Ad-hoc Network (MANET) that makes it possible to communicate anytime anywhere, without the support of a pre-existing network infrastructure. Unfortunately, MANET comes with unique features which are neither common to the conventional wired networks nor the cellula...Show More
The main objective of this paper is to investigate the factors that influence users' adoption and acceptance of online banking in South Africa, based on 324 respondents' current perceptions of the service. This paper reports empirical findings of an exploratory study in South Africa. The findings confirm security risk as main concern, while convenience ranks as the main benefit for using online ba...Show More
The Protection of Personal Information (PoPI) Act was created to promote the constitutional right to privacy in South Africa by safeguarding personal identifiable information (PII). This Act respects the right to privacy of customers and employees and also acknowledges the need for businesses to collect and use personal information[1]. Having this type of legislation in place is without a doubt ve...Show More
Cloud lntrastructures are vulnerable to serious data leakage threats. Tenants with conflicting interests, residing on a shared cloud infrastructure, can potentially view the data of other potentially conflicting tenants' by means of inter-VM attacks. This paper discusses an innovative solution to overcome this data leakage problem by proposing the requirements for a so-called Conflict-Based Alloca...Show More
ISSA2014 is the annual conference for the information security community that continues on the successful recipe established in 2001. The 2014 conference was held under the auspices of the University of Johannesburg Academy for Computer Science and Software Engineering, the University of South Africa School of Computing and the University of Pretoria Department of Computer Science.Show More
Wireless MANET presents new security problems in comparison to the conventional wired and wireless networks, as it is more vulnerable to malicious attacks due to its unique features. The MANET routing protocols require that the mobile nodes that form such temporal network cooperate with each other to achieve the desired routing purpose for the exchange of information amongst the participating node...Show More
Digital Data Collection in South Africa is continuously evolving as technology and infrastructural networks gain momentum with respect to its development. In-field data collection is critical for any national government department who is mandated to supply the country and the international community with official data. The paper aims to illustrate the methods used by Statistics South Africa (Stats...Show More
Social networking sites are a popular medium of interaction and communication. Social networking sites provide the ability to run applications and games to test users' knowledge. The popularity of social networks makes it an ideal tool through which awareness can be created on existing and emerging security threats. This paper proposes an interactive game hosted by social networking sites with the...Show More
Cloud computing has elevated IT to newer limits by offering the market environment data storage and capacity with flexible scalable computing processing power to match elastic demand and supply, whilst reducing capital expenditure. However the opportunity cost of the successful implementation of Cloud computing is to effectively manage the security in the cloud applications. Security consciousness...Show More