Browsing Research Articles (Computer Science) by UP Author "Eloff, Jan H.P."

Browsing Research Articles (Computer Science) by UP Author "Eloff, Jan H.P."

Sort by: Order: Results:

  • Coetzee, Marijke; Eloff, Jan H.P. (Emerald, 2005)
    Purpose – To define a framework for access control for virtual applications, enabled through web services technologies. The framework supports the loosely coupled manner in which web services are shared between partners. ...
  • Padayachee, Keshnee; Eloff, Jan H.P. (Elsevier, 2009)
    Access controls are difficult to implement and evidently deficient under certain conditions. Traditional controls offer no protection for unclassified information, such as a telephone list of employees that is unrestricted, ...
  • Islami, Lejla; Fischer-Hubner, Simone; Hammond, Eunice Naa Korkoi; Eloff, Jan H.P. (Springer, 2021-04)
    While privacy-enhancing solutions for car-to-car communication are increasingly researched, end user aspects of such solutions have not been in the focus. In this paper, we present a qualitative study with 16 car drivers ...
  • Van der Walt, Estee; Eloff, Jan H.P.; Grobler, Jacomine (Elsevier, 2018-09)
    Social media platforms allow billions of individuals to share their thoughts, likes and dislikes in real-time, without any censorship. This freedom, however, comes at a cyber-security risk. Cyber threats are more difficult ...
  • Ngejane, C.H. (Hombakazi); Eloff, Jan H.P.; Sefara, T.J.; Marivate, Vukosi (Elsevier, 2021-03)
    Chat-logs are informative digital footprints available on Social Media Platforms (SMPs). With the rise of cybercrimes targeting children, chat-logs can be used to discover and flag harmful behaviour for the attention of ...
  • Padayachee, Keshnee; Eloff, Jan H.P. (Computer Society of South Africa, 2012-06)
    This paper explores the effectiveness of usage control deterrents. Usage control enables finer-grained control over the usage of objects than do traditional access control models. Deterrent controls are intended to ...
  • Mbona, Innocent; Eloff, Jan H.P. (Elsevier, 2022-01)
    The increased amount of high-dimensional imbalanced data in online social networks challenges existing feature selection methods. Although feature selection methods such as principal component analysis (PCA) are effective ...
  • Bihina Bella, M.A. (Madeleine Adrienne); Eloff, Jan H.P.; Olivier, Martin S. (Elsevier, 2009)
    This paper proposes an original architecture for a fraud management system (FMS) for convergent. Nextgeneration networks (NGNs), which are based on the Internet protocol (IP). The architecture has the potential to satisfy ...
  • Van der Walt, Estee; Eloff, Jan H.P. (Emerald, 2019-09)
    PURPOSE : This paper aims to describe requirements for a model that can assist in identity deception detection (IDD) on social media platforms (SMPs). The model that was discovered demonstrates the usefulness of the ...
  • Dlamini, Moses Thandokuhle; Eloff, Jan H.P.; Eloff, M.M. (Elsevier, 2009)
    Information security has evolved from addressing minor and harmless security breaches to managing those with a huge impact on organisations’ economic growth. This paper investigates the evolution of information security; ...
  • Da Veiga, A.; Martins, Nico; Eloff, Jan H.P. (College of Economic and Management Sciences, University of South Africa, 2007-04)
    Organisations need to ensure that the interaction among people, as well as between people and information technology (IT) systems, contributes to the protection of information assets. Organisations therefore need to assess ...
  • Kohn, Michael Donovan; Eloff, M.M.; Eloff, Jan H.P. (Elsevier, 2013-10)
    Digital forensics is an established research and application field. Various process models exist describing the steps and processes to follow during digital forensic investigations. During such investigations, it is not ...
  • Bella, M.A. Bihina; Eloff, Jan H.P. (Elsevier, 2016-02)
    Digital forensics has been proposed as a methodology for doing root-cause analysis of major software failures for quite a while. Despite this, similar software failures still occur repeatedly. A reason for this is the ...
  • Ngassam, Ernest Ketcha; Ntawanga, Felix; Eloff, Jan H.P. (International Center for Information Technology and Development, 2013-04)
    The need to introduce technologies in rural areas so as to capacitate communities towards overcoming various socio-economic challenges remains a priority in emerging economies. We rely on the foregoing for the investigation ...
  • Malan, Katherine M.; Eloff, Jan H.P.; De Bruin, J.A. (Jhani) (Computer Society of South Africa, 2018-07-10)
    Usability of software is a crucial aspect of successful applications and could give one application a competitive edge over another. Eye tracking is a popular approach to usability evaluation, but is time consuming and ...
  • Lo, Johnny Li-Chang; Bishop, Judith; Eloff, Jan H.P. (Elsevier, 2008-10)
    Short Message Service is usually used to transport unclassified information, but with the rise of mobile commerce it has become an integral tool for conducting business. However, SMS does not guarantee confidentiality and ...
  • Izadinia, Vafa Dario; Kourie, Derrick G.; Eloff, Jan H.P. (Elsevier, 2006)
    Operating System fingerprinting is a reconnaissance method which can be used by attackers or forensic investigators. It identifies a system's identity by observing its responses to targeted probes, or by listening on a ...
  • Fei, B.K.L. (Bennie Kar Leung); Eloff, Jan H.P.; Olivier, Martin S.; Venter, H.S. (Hein) (Elsevier, 2006-10)
    The dramatic increase in crime relating to the Internet and computers has caused a growing need for digital forensics. Digital forensic tools have been developed to assist investigators in conducting a proper investigation ...
  • Olivier, Martin S.; Eloff, Jan H.P.; Venter, H.S. (Hein); Botes, Mariette E. (Computer Society of South Africa, 2011-07)
    Donor funds are available for treatment of many diseases such as HIV. However, privacy constraints make it hard for donor organisations to verify that they have not sponsored the same patient twice | or sponsored a patient ...
  • Van der Walt, Estee; Eloff, Jan H.P. (Institute of Electrical and Electronics Engineers, 2018)
    There is a growing number of people who hold accounts on social media platforms (SMPs) but hide their identity for malicious purposes. Unfortunately, very little research has been done to date to detect fake identities ...