Browsing by Author "Eloff, Jan H.P."

Browsing by Author "Eloff, Jan H.P."

Sort by: Order: Results:

  • Coetzee, Marijke; Eloff, Jan H.P. (Emerald, 2005)
    Purpose – To define a framework for access control for virtual applications, enabled through web services technologies. The framework supports the loosely coupled manner in which web services are shared between partners. ...
  • Padayachee, Keshnee; Eloff, Jan H.P. (Elsevier, 2009)
    Access controls are difficult to implement and evidently deficient under certain conditions. Traditional controls offer no protection for unclassified information, such as a telephone list of employees that is unrestricted, ...
  • Islami, Lejla; Fischer-Hubner, Simone; Hammond, Eunice Naa Korkoi; Eloff, Jan H.P. (Springer, 2021-04)
    While privacy-enhancing solutions for car-to-car communication are increasingly researched, end user aspects of such solutions have not been in the focus. In this paper, we present a qualitative study with 16 car drivers ...
  • Dlamini, Moses Thandokuhle; Eloff, Jan H.P.; Venter, H.S. (Hein); Eloff, Mariki M. (Wiley, 2022-01)
    For businesses to benefit from the many opportunities of cloud computing, they must first address a number of security challenges, such as the potential leakage of confidential data to unintended third parties. An inter-VM ...
  • Mbona, Innocent; Eloff, Jan H.P. (Oxford University Press, 2023)
    Users of online social network (OSN) platforms, e.g. Twitter, are not always humans, and social bots (referred to as bots) are highly prevalent. State-of-the-art research demonstrates that bots can be broadly categorized ...
  • Van der Walt, Estee; Eloff, Jan H.P.; Grobler, Jacomine (Elsevier, 2018-09)
    Social media platforms allow billions of individuals to share their thoughts, likes and dislikes in real-time, without any censorship. This freedom, however, comes at a cyber-security risk. Cyber threats are more difficult ...
  • Mbona, Innocent; Eloff, Jan H.P. (Institute of Electrical and Electronics Engineers, 2022-06-29)
    Recently, network intrusion attacks, particularly new unknown attacks referred to as zero-day attacks, have become a global phenomenon. Zero-day network intrusion attacks constitute a frequent cybersecurity threat, as they ...
  • Dlamini, Moses Thandokuhle; Venter, H.S. (Hein); Eloff, Jan H.P.; Eloff, Mariki (University of Borås, 2020-12)
    INTRODUCTION: Digital deception is a double-edged sword used by both blackhats and whitehats in cybersecurity. A status quo review of the reintroduction of digital deception can reveal challenges and initiatives and show ...
  • Ngejane, C.H. (Hombakazi); Eloff, Jan H.P.; Sefara, T.J.; Marivate, Vukosi (Elsevier, 2021-03)
    Chat-logs are informative digital footprints available on Social Media Platforms (SMPs). With the rise of cybercrimes targeting children, chat-logs can be used to discover and flag harmful behaviour for the attention of ...
  • Padayachee, Keshnee; Eloff, Jan H.P. (Computer Society of South Africa, 2012-06)
    This paper explores the effectiveness of usage control deterrents. Usage control enables finer-grained control over the usage of objects than do traditional access control models. Deterrent controls are intended to ...
  • Mbona, Innocent; Eloff, Jan H.P. (Elsevier, 2022-01)
    The increased amount of high-dimensional imbalanced data in online social networks challenges existing feature selection methods. Although feature selection methods such as principal component analysis (PCA) are effective ...
  • Bihina Bella, M.A. (Madeleine Adrienne); Eloff, Jan H.P.; Olivier, Martin S. (Elsevier, 2009)
    This paper proposes an original architecture for a fraud management system (FMS) for convergent. Nextgeneration networks (NGNs), which are based on the Internet protocol (IP). The architecture has the potential to satisfy ...
  • Van der Walt, Estee; Eloff, Jan H.P. (Emerald, 2019-09)
    PURPOSE : This paper aims to describe requirements for a model that can assist in identity deception detection (IDD) on social media platforms (SMPs). The model that was discovered demonstrates the usefulness of the ...
  • Dlamini, Moses Thandokuhle; Eloff, Jan H.P.; Eloff, M.M. (Elsevier, 2009)
    Information security has evolved from addressing minor and harmless security breaches to managing those with a huge impact on organisations’ economic growth. This paper investigates the evolution of information security; ...
  • Da Veiga, A.; Martins, Nico; Eloff, Jan H.P. (College of Economic and Management Sciences, University of South Africa, 2007-04)
    Organisations need to ensure that the interaction among people, as well as between people and information technology (IT) systems, contributes to the protection of information assets. Organisations therefore need to assess ...
  • Kohn, Michael Donovan; Eloff, M.M.; Eloff, Jan H.P. (Elsevier, 2013-10)
    Digital forensics is an established research and application field. Various process models exist describing the steps and processes to follow during digital forensic investigations. During such investigations, it is not ...
  • Bella, M.A. Bihina; Eloff, Jan H.P. (Elsevier, 2016-02)
    Digital forensics has been proposed as a methodology for doing root-cause analysis of major software failures for quite a while. Despite this, similar software failures still occur repeatedly. A reason for this is the ...
  • Ngassam, Ernest Ketcha; Ntawanga, Felix; Eloff, Jan H.P. (International Center for Information Technology and Development, 2013-04)
    The need to introduce technologies in rural areas so as to capacitate communities towards overcoming various socio-economic challenges remains a priority in emerging economies. We rely on the foregoing for the investigation ...
  • Malan, Katherine M.; Eloff, Jan H.P.; De Bruin, J.A. (Jhani) (Computer Society of South Africa, 2018-07-10)
    Usability of software is a crucial aspect of successful applications and could give one application a competitive edge over another. Eye tracking is a popular approach to usability evaluation, but is time consuming and ...
  • Lo, Johnny Li-Chang; Bishop, Judith; Eloff, Jan H.P. (Elsevier, 2008-10)
    Short Message Service is usually used to transport unclassified information, but with the rise of mobile commerce it has become an integral tool for conducting business. However, SMS does not guarantee confidentiality and ...