Browsing Theses and Dissertations (University of Pretoria) by Supervisor "Eloff, Jan H.P."

Browsing Theses and Dissertations (University of Pretoria) by Supervisor "Eloff, Jan H.P."

Sort by: Order: Results:

  • Kenyon, David Leicester (University of Pretoria, 2018)
    Insurance fraud costs South Africa (and the global insurance industry) billions of Rands. Insurance claims fraud, which involves over-inflating claim amounts or fabricating a loss to result in a claim settlement, makes up ...
  • Li, Yun Lillian (University of Pretoria, 2008-08-12)
    Computer vulnerabilities are design flaws, implementation or configuration errors that provide a means of exploiting a system or network that would not be available otherwise. The recent growth in the number of vulnerability ...
  • Padayachee, Keshnee (University of Pretoria, 2010-09-16)
    With the advent of agile programming, lightweight software processes are being favoured over the highly formalised approaches of the 80s and 90s, where the emphasis is on "people, not processes". Likewise, access control ...
  • De Bruin, Jhani Adre (University of Pretoria, 2014)
    Usability is a critical aspect of the success of any application. It can be the deciding factor for which an application is chosen and can have a dramatic effect on the productivity of users. Eye tracking has been ...
  • Loock, Marianne (University of Pretoria, 2012)
    Organisations that seek a competitive advantage cannot afford to compromise their brand reputation or expose it to disrepute. When employees leek information, it is not only the breach of confidentiality that is a problem, ...
  • Dlamini, Moses Thandokuhle (University of Pretoria, 2020)
    The increasing number of reports on data leakage incidents increasingly erodes the already low consumer confidence in cloud services. Hence, some organisations are still hesitant to fully trust the cloud with their ...
  • Da Veiga, Adele (University of Pretoria, 2009-04-24)
    The manner in which employees perceive and interact (behave) with controls implemented to protect information assets is one of the main threats to the protection of such assets and the effective use of information security ...
  • Fei, B.K.L. (Bennie Kar Leung) (University of Pretoria, 2007-07-09)
    As digital crimes have risen, so has the need for digital forensics. Numerous state-of-the-art tools have been developed to assist digital investigators conduct proper investigations into digital crimes. However, digital ...
  • Dlamini, Moses Thandokuhle (University of Pretoria, 2010-09-20)
    In the year 2008, world markets suffered a huge economic crisis. The extent of the economic crisis has been so severe and has had a global impact. As a contingency strategy, governments of wealthy nations have resorted to ...
  • Wojcik, Marika (University of Pretoria, 2008-08-05)
    The rapid growth of the Internet has resulted in the desperate need for alternative ways to keep electronic transactions secure while at the same time allowing entities that do not know each other to interact. This has, ...
  • Izadinia, Vafa Dario (University of Pretoria, 2005)
    Operating System fingerprinting is a reconnaissance method used by Whitehats and Blackhats alike. Current techniques for fingerprinting do not take into account tunneling protocols, such as IPSec, SSL/TLS, and SSH, which ...
  • Van der Walt, Estée (University of Pretoria, 2018)
    Whenever they interact on big data platforms such as social media, humans run the risk of being targeted by other malicious individuals. The protection of these humans is problematic, even though cyber-attack events have ...
  • Kohn, Michael Donovan (University of Pretoria, 2012)
    The Information and Communications Technology (ICT) environment constitutes an integral part of our daily lives. Individual computer users and large corporate companies are increasingly dependent on services provided by ...
  • Odendaal, Maria Elizabeth (University of Pretoria, 2012-06-26)
    Even before software engineering was formally defined as a discipline, software projects were notorious for being behind schedule and over budget. The resulting software systems were also often described as unreliable. ...
  • Michael, Antonia (University of Pretoria, 2020)
    In recent years, there has been a significant increase in insider threats within organisations and these have caused massive losses and damages. Due to the fact that email communications are a crucial part of the modern-day ...
  • Bihina Bella, Madeleine (University of Pretoria, 2014)
    The increasing complexity of software applications can lead to operational failures that have disastrous consequences. In order to prevent the recurrence of such failures, a thorough post-mortem investigation is required ...
  • Thulo, Motlatsi Isaac (University of Pretoria, 2019)
    The rapidly increasing dependency on use of clouds results in Cloud Service Providers (CSPs) having to deal with high cloud services demands. To meet these demands, CSPs take advantage of virtualization technology to provide ...
  • Adigun, Emmanuel Ayowole (University of Pretoria, 2011-09-21)
    Trust plays an important role in our daily life, both implicitly and explicitly. Our decisions are based on our estimation of how trustworthy a person is or how reliable a service is. Consequently, there has been a rise ...
  • Abdullah, Hanifa (University of Pretoria, 2006-10-12)
    Every environment is susceptible to risks and Wireless Local Area Networks (WLANs) based on the Institute of Electrical and Electronics Engineers (IEEE) 802.11 standard are no exception. The most apparent risk of WLANs is ...
  • Coetzee, Marijke (University of Pretoria, 2008-07-15)
    Today, organisations that seek a competitive advantage are adopting virtual infrastructures that share and manage computing resources. The trend is towards implementing collaborating applications that are supported by web ...