School of Computing

Security4U

The Security4U research group conducts research in information security ranging from the management and governance of information security to technical state of the art research. Research projects include biometrics using harmonic voice control, security in network protocols, cyber security awareness, data privacy and the Protection of Personal Information Act, information security culture, security in cloud computing and digital forensics. The group supervises a number of post graduate students working on these and other information security related topics.

Our research projects for 2017 relates to:

  • Supervision of master and doctorate students in cyber security awareness, data privacy and networks
  • A Protection of Personal Information Act experiment as part of a honours module
  • A journal writing retreat in June
  • A panel discussion at the Information Security South Africa (ISSA2016) conference in August
  • Collaboration projects with industry partners

Active members of this group:

  • Elmarie Kritzinger
  • Dorothy Scholtz
  • Adele Da Veiga
  • Omobayo Esan
  • Marianne Loock
  • Elisha Ochola
  • H Abdullah
  • Motlhabane Maboe
  • Portia Buthelezi
  • Mathias Mujinga

  • Publications

    This page is not necessarily up to date.

    JOURNAL PUBLICATION/S

    Mujinga, M; Eloff, MM; Kroeze, JH (2018)
    System Usability Scale Evaluation Of Online Banking Service: A South African Study
    South African Journal of Science
    (114) 3/4
    pp 50-57

    Da Veiga, A (2018)
    An Information Privacy Culture Instrument To Measure Consumer Privacy Expectations And Confidence
    Information and Computer Security
    (26) 3
    pp 338-364

    Abidoye, PA; Ochola, E.O.; Obagbuwa, IC (2018)
    A Multipath Routing In Wireless Sensor Networks Using An Ant Colony Optimization Technique
    International Journal of Information Technology
    pp accepted for publication, Springer Nature Switzerland AG

    Da Veiga, A (2018)
    An Approach To Information Security Culture Change Combining Adkar And The Isca Questionnaire To Aid Transition To The Desired Culture
    Information and Computer Security
    (26) 5
    pp 584-612

    Kritzinger, E; Loock, M; Mwim, E.N (2018)
    Cyber Safety Awareness And Culture Planning In South Africa
    Lecture Notes Computer Science
    (11161)

    Amankwa E; Loock, M; Kritzinger, E (2018)
    Establishing Information Security Policy Compliance Culture In Organizations
    Information & Computer Security
    (26) 4
    pp 420 - 436

    Abidoye, PA; Ochola, E.O. (2018)
    Denial Of Service Attacks In Wireless Sensor Networks With Proposed Countermeasures
    Advances in Intelligent Systems and Computing
    (738)
    pp 185-191

    Govender SG; Loock, M; Kritzinger, E (2018)
    Enhancing Information Security Culture To Reduce Information Security Cost: A Proposed Framework
    Lecture Notes in Computer Science: Cyberspace Safety and Security
    (LNCS11161)
    pp 281 - 290

    Da Veiga, A; Martins N. (2017)
    Defining And Identifying Dominant Information Security Cultures And Subcultures
    Computers & Security (Elsevier Journal)
    (70) 2017
    pp 72-94

    Ochola, E.O.; L.F. Mejaele; M.M. Eloff; J.A. van der Poll (2017)
    Manet Reactive Routing Protocols Node Mobility Variation Effect In Analysing The Impact Of Black Hole Attack
    SAIEE Africa Research Journal (Transactions of the South African Institute of Electrical Engineers)
    (108) 2
    pp 80-91

    Da Veiga, A; Swarts, P. (2017)
    Personal Informaton And Regulatory Requirements For Direct Marketing: A South African Insurance Industry Experiment
    Africa Research Journal - Research Journal of the South African Institute of Electrical Engineers
    (108) 2
    pp 56-70

    van Staden, WJC; van der Poel, E (2017)
    Using Automated Keyword Extraction To Facilitate Team Discovery In A Digital Forensic Investigation Of Electronic Communication
    SAIEE African Research Journal (Awarded best paper SAIEE ARJ 2017)
    (1991-1696: 108) 2
    pp 45 -- 55

    Da Veiga, A (2016)
    Comparing The Information Security Culture Of Employees Who Had Read The Information Security Policy And Those Who Had Not: Illustrated Through An Empirical Study
    Information & Computer Security - Emerald Journal
    (24) 22

    Kritzinger, E (2016)
    Short-term Initiatives For Enhancing Cyber-safety Within South African Schools
    South African Computer Journal
    (28) 1
    pp Online

    Da Veiga, A; Martins, N (2015)
    Improving The Information Security Culture Through Monitoring And Implementation Actions Illustrated Through A Case Study
    Computers & Security
    (49) 2015
    pp 162-176

    Da Veiga, A; Martins N (2015)
    Information Security Culture And Information Protection Culture: A Validated Assessment Instrument
    Computer Law & Security Review
    (31) 2015
    pp 243-256

    Martins, N.; Da Veiga, A (2015)
    Factorial Invariance Of An Information Security Culture Assessment Instrument For Multinational Organisations With Operations Across Data Protection Jurisdictions
    Journal of Governance and Regulation
    (4) 4
    pp 47-58

    Da Veiga, A; J.H.P Eloff (2010)
    A Framework And Assessment Instrument For Information Security Culture
    Computers and Security
    (29) 2010
    pp 196-207

    Da Veiga, A; J.H.P Eloff ; N. Martins (2007)
    Information Security Culture – Validation Of An Assessment Instrument
    Southern African Business Review
    (11) 1
    pp 146-166

    Da Veiga, A; J.H.P. Eloff (2007)
    Information Security Governance Framework
    Information Systems Management
    (24)
    pp 361–372




    Govender; Loock, M; Kritzinger, E Enhancing Information Security Culture To Reduce Information Security Cost: A Proposed Framework
    Lecture Notes Computer Science
    (11161)

    Govender; Loock, M; Kritzinger, E Enhancing Information Security Culture To Reduce Information Security Cost: A Proposed Framework
    Lecture Notes Computer Science
    (11161)







    PEER REVIEWED CONFERENCE PROCEEDING PUBLICATION/S

    Quintin White; van Staden, WJC (2019)
    South African Android Applications, Their Security Permissions And Compliance With The Protection Of Personal Information Act.
    14th International Conference on Cyber Warfare and Security
    Stellenbosch

    van Staden, WJC (2019)
    Time-line Visualisation Of Keywords
    Fifteenth Annual IFIP WG 11.9 International Conference on Digital Forensics
    Orlando, Florida, USA

    Gangire, Y; Da Veiga, A; Herselman, M (2019)
    A Conceptual Model Of Information Security Compliant Behaviour Based On The Self-determination Theory
    Information Communication Technology and Society Conference (ICTAS2019)
    Durban
    IEEE
    pp 1-10

    Gangire, Y; Da Veiga, A; Herselman, M (2019)
    A Conceptual Model Of Information Security Compliant Behaviour Based On The Self-determination Theory
    Information Communication Technology and Society Conference (ICTAS2019)
    Durban
    IEEE
    pp 1-10

    Swartz, P.; Da Veiga, A; Martins, N. (2019)
    A Conceptual Privacy Governance Framework
    Information Communication Technology and Society COnference (ICTAS2019)
    Durban
    IEEE
    pp 1-10

    Lejaka, T.; Da Veiga, A; Loock, M. (2019)
    Towards Cyber Security Awareness For Small, Medium And Micro Enterprises In South Africa
    Information Communication Technology and Society Conference (ICTAS2019)
    Durban
    IEEE
    pp 1-10

    Da Veiga, A (2018)
    An Online Information Privacy Culture - A Framework And Validated Instrument To Measure Consumer Expectations And Confidence
    2018 Conference on Information Communications Technology and Society (ICTAS)
    Durban, South Africa
    IEEE
    pp 221-226

    Abidoye, PA; Ochola, E.O. (2018)
    Denial Of Service Attacks In Wireless Sensor Networks With Proposed Countermeasures
    15th International Conference on Information Technology : New Generations (ITNG 2018)
    Las Vegas, Nevada, USA
    Springer International Publishing AG
    pp 185-191

    Abdullah, H (2018)
    A Structural And Navigational Method For Integrated Organisational Information Privacy Protection
    International Conference on Advances in Big Data, Computing and Data Communication Systems (icABCD 2018)
    Durban, South Africa
    978-1-5386-3059-4

    Da Veiga, A; Vorster, SR; Li F. ; Clarke N. ; (2018)
    A Comparison Of Compliance With Data Privacy Requirements In Two Countries - A Case Study In South-africa And The United Kingdom
    Twenty-Sixth European Conference on Information Systems (ECIS2018)
    Portsmouth,UK
    AIS e-library
    pp Paper 86, 1-16

    Maboe, MJ; Eloff M; Schoeman, M A (2018)
    The Role Of Accessibility And Usability In Bridging The Digital Divide For Students With Disabilities In An E-learning Environment
    SAICSIT
    Nelson Mandela University, Port Elizabeth
    ACM

    Maboe, MJ (2018)
    The Usefulness Of Administering Patient Health Records Electronically At Community Clinics In Potchefstroom, South Africa
    IEEE Open Innovations
    Wits University, Johannesburg
    978-1-5386-5318-0
    pp www.africaopen.org

    Fogwell, TE; Ochola, E.O. (2018)
    A Comparison Of Ad Hoc On-demand Distance Vector And Dynamic Source Routing Under Attack By Black Hole Nodes In An Ns-3 Simulation
    Proceedings of the 3 rd International Conference on The Internet, Cyber Security and Information Systems
    UB conference Centre, Gaborone, Botswana
    ISBN 978-99968-2-0-033-5
    pp 1-11

    Mujinga, M; Eloff, MM; Kroeze, JH (2017)
    A Socio-technical Approach To Information Security
    Proceedings of the 23rd Americas Conference on Information Systems (AMCIS 2017)
    Boston, USA
    978-0-9966831-4-2

    Maboe, MJ; Abatan, OK (2017)
    The Feasibility Of Managing Electronic Patient Health Records (ephrs): The Case Of Public Clinics In Potchefstroom, South Africa
    i-Society 2017
    Dublin, Ireland
    i-Society
    pp 128-134

    Da Veiga, A (2017)
    An Information Privacy Culture Index Framework And Instrument To Measure Privacy Perceptions Across Nations: Results Of An Empirical Study
    International Symposium on Human Aspects of Information Security & Assurance (HAISA 2017)
    Adelaide
    Plymouth University
    pp 188-201

    Da Veiga, A (2017)
    The Influence Of Data Protection Regulation On The Information Security Culture Of An Organisation - A Case Study Comparing Legislation And Offices Across Jurisdictions
    International Symposium on Human Aspects of Information Security & Assurance (HAISA 2017)
    Adeliade, Australia
    Plymouth University
    pp 65-79

    Nadasen, N; Pilkington, CL; Da Veiga, A (2016)
    Personal Information Value Chains In The South African Insurance Industry – An Experiment.
    Proceedings of the International Conference on Information Resources Management (Conf-IRM 2016)
    Cape Town
    978-0-473-35594-4
    pp Paper 52

    Da Veiga, A (2016)
    A Cybersecurity Culture Research Philosophy And Approach To Develop A Valid And Reliable Measuring Instrument
    IEEE Science and Information Conference 2016
    UK, London
    978-1-4673-8460-5

    Mujinga, M; Eloff, MM; Kroeze, JH (2016)
    Online Banking Users’ Perceptions In South Africa: An Exploratory Empirical Study
    Proceedings of the IST-Africa Conference
    Durban, South Africa
    978-1-905824-54-0

    AJIGIOA (2016)
    A Review Of Information Systems Development In Developing Countries
    10th European Conference on Information Management and Evaluation (ECISM)
    Evora, Portugal
    2048-8912/
    pp 10

    Govender S; Kritzinger, E; Loock, M (2016)
    The Influence Of National Culture Oninformation Security Culture
    IST-Africa 2016 Conference Proceedings
    Durban, South Africa
    978-1-905824-54-0

    Tait, B.L.; Gaffoor A (2016)
    The Application Of Web Services For Real Time Charging In Mobile Networks
    2016 30th International Conference on Advanced Information Networking and Applications
    Crans-Montana, Switzerland
    978-1-5090-1857-4/16 / IEEE
    pp 6

    Swartz P. ; Da Veiga, A (2016)
    Popi Act - Opt-in And Opt-out Compliance From A Data Value Chain Perspective: A South African Insurance Industry Experiment
    Information Security South Africa (ISSA2016), 17-18 Aug 2016
    Johannesburg, SA
    978-1-5090-2473-8
    pp 9-17

    Mahopo, B; Abdullah, H; Mujinga, M (2015)
    A Formal Qualitative Risk Management Approach For It Security
    ISSA 2015:14th International Information Security for South Africa Conference
    54 on Bath, Rosebank, Johannesburg
    ISBN: 978-1-4799-7754-3

    Da Veiga, A (2015)
    The Influence Of Information Security Policies On Information Security Culture: Illustrated Through A Case Study
    Human Aspects of Information Security and Assurance (HAISA 2015)
    Lesvos
    Plymouth University
    pp 22-33

    Martins, N ; Da Veiga, A (2015)
    An Information Security Culture Model Validated With Structural Equation Modelling
    Human Aspects of Information Security and Assurance (HAISA 2015)
    Lesvos
    Plymouth University
    pp 11-21

    Da Veiga, A (2015)
    An Information Security Training And Awareness Approach (istaap) To Instil An Information Security-postive Culture
    Human Aspects of Information Security and Assurance (HAISA 2015)
    Lesvos
    Pymouth University
    pp 95-107

    Da Veiga, A; Martins N. (2014)
    Information Security Culture: A Comparative Analysis
    8th European Conference on Information Management and Evaluation (ECIME)
    Ghent
    978‐1‐910309‐41‐4
    pp 49-57

    Martins N. ; Da Veiga, A (2014)
    The Value Of Using A Validated Information Security Culture
    8th European Conference on Information Management and Evaluation (ECIME)
    Ghent
    978‐1‐910309‐41‐4
    pp 146-154

    Buthelezi , MP; Mujinga, M (2013)
    Security Aspects Of Online Teaching And Learning: An Odl Case Study
    ICEE/ICIT Conference
    Cape Town
    ISBN: 978-0-9922041-3-6
    pp 232-241

    Mujinga, M; Eloff, MM; Kroeze, JH (2013)
    Towards A Heuristic Model For Usable And Secure Online Banking
    Proceedings of the 24th Australasian Conference on Information Systems (ACIS)
    Melbourne, Australia
    978-0-9924495-0-6/ACIS
    pp 11

    Mujinga, M (2013)
    Privacy And Legal Issues In Cloud Computing - The Smme Position In South Africa
    Proceedings of the 11th Australian Information Security Management Conference
    Perth, Australia
    978-0-7298-0710-4
    pp 48-59

    Mujinga, M; Chipangura, B (2011)
    Cloud Computing Issues In Developing Economies
    9th Australian Information Security Management Conference
    SECAU, Perth, Western Australia
    ISBN: ISBN 978-0-7298-0698-5
    pp 196-203

    Labuschagne, WA; Eloff, MM; Veerasamy, N ; Leenen, L ; Mujinga, M (2011)
    Design Of A Cyber Security Awareness Campaign For Internet Café Users In Rural Area
    Proceedings of IST-Africa 2011
    Gaborone, Botswana
    978-1-905824-34-2






    CONFERENCE PRESENTATION/S

    MJ Maboe; M Eloff; M Schoeman; OK Abatan (2018)
    The Experience Of Students With Disabilities At An Open Distance E-learning Institution (accepted)
    ICEL 2018
    Cpae Peninsula University of Technology, Cape Town

    BOOKS/CHAPTERS

    Da Veiga, A Organisational Diagnoses - Tools and applications for practitioners and researchers: Chapter 12 - Ethical and privacy considerations for research
    2017
    Knowledge Resources
    Johannesburg
    pp 273-297
    ISBN: 9781869227050