School of Computing

Security4U

The Security4U research group conducts research in information security ranging from the management and governance of information security to technical state of the art research. Research projects include biometrics using harmonic voice control, security in network protocols, cyber security awareness, data privacy and the Protection of Personal Information Act, information security culture, security in cloud computing and digital forensics. The group supervises a number of post graduate students working on these and other information security related topics.

Our research projects for 2017 relates to:

  • Supervision of master and doctorate students in cyber security awareness, data privacy and networks
  • A Protection of Personal Information Act experiment as part of a honours module
  • A journal writing retreat in June
  • A panel discussion at the Information Security South Africa (ISSA2016) conference in August
  • Collaboration projects with industry partners

Active members of this group:

  • Elmarie Kritzinger
  • Dorothy Scholtz
  • Adele Da Veiga
  • Omobayo Esan
  • Marianne Loock
  • Elisha Ochola
  • H Abdullah
  • Motlhabane Maboe

  • Publications

    This page is not necessarily up to date.

    JOURNAL PUBLICATION/S

    Da Veiga, A; Martins N.. (2017)
    Defining And Identifying Dominant Information Security Cultures And Subcultures
    Computers & Security (Elsevier Journal)
    (70) 2017
    pp 72-94

    Ochola, E.O.; L.F. Mejaele; M.M. Eloff; J.A. van der Poll. (2017)
    Manet Reactive Routing Protocols Node Mobility Variation Effect In Analysing The Impact Of Black Hole Attack
    SAIEE Africa Research Journal (Transactions of the South African Institute of Electrical Engineers)
    (108) 2
    pp 80-91

    Da Veiga, A; Swarts, P.. (2017)
    Personal Informaton And Regulatory Requirements For Direct Marketing: A South African Insurance Industry Experiment
    Africa Research Journal - Research Journal of the South African Institute of Electrical Engineers
    (108) 2
    pp 56-70

    van Staden, WJC; van der Poel, E. (2017)
    Using Automated Keyword Extraction To Facilitate Team Discovery In A Digital Forensic Investigation Of Electronic Communication
    SAIEE African Research Journal
    (1991-1696: 108) 2
    pp 45 -- 55

    Da Veiga, A. (2016)
    Comparing The Information Security Culture Of Employees Who Had Read The Information Security Policy And Those Who Had Not: Illustrated Through An Empirical Study
    Information & Computer Security - Emerald Journal
    (24) 22

    Kritzinger, E. (2016)
    Short-term Initiatives For Enhancing Cyber-safety Within South African Schools
    South African Computer Journal
    (28) 1
    pp Online

    Da Veiga, A; Martins, N . (2015)
    Improving The Information Security Culture Through Monitoring And Implementation Actions Illustrated Through A Case Study
    Computers & Security
    (49) 2015
    pp 162-176

    Da Veiga, A; Martins N . (2015)
    Information Security Culture And Information Protection Culture: A Validated Assessment Instrument
    Computer Law & Security Review
    (31) 2015
    pp 243-256

    Martins, N.; Da Veiga, A. (2015)
    Factorial Invariance Of An Information Security Culture Assessment Instrument For Multinational Organisations With Operations Across Data Protection Jurisdictions
    Journal of Governance and Regulation
    (4) 4
    pp 47-58

    Da Veiga, A; J.H.P Eloff . (2010)
    A Framework And Assessment Instrument For Information Security Culture
    Computers and Security
    (29) 2010
    pp 196-207

    Da Veiga, A; J.H.P Eloff ; N. Martins . (2007)
    Information Security Culture – Validation Of An Assessment Instrument
    Southern African Business Review
    (11) 1
    pp 146-166

    Da Veiga, A; J.H.P. Eloff . (2007)
    Information Security Governance Framework
    Information Systems Management
    (24)
    pp 361–372

    PEER REVIEWED CONFERENCE PROCEEDING PUBLICATION/S

    Mujinga, M; Eloff, MM; Kroeze, JH. (2017)
    A Socio-technical Approach To Information Security
    Proceedings of the 23rd Americas Conference on Information Systems (AMCIS 2017)
    Boston, USA
    978-0-9966831-4-2

    Da Veiga, A. (2017)
    An Information Privacy Culture Index Framework And Instrument To Measure Privacy Perceptions Across Nations: Results Of An Empirical Study
    International Symposium on Human Aspects of Information Security & Assurance (HAISA 2017)
    Adelaide
    TBA
    pp TBA

    Da Veiga, A. (2017)
    The Influence Of Data Protection Regulation On The Information Security Culture Of An Organisation - A Case Study Comparing Legislation And Offices Across Jurisdictions
    International Symposium on Human Aspects of Information Security & Assurance (HAISA 2017)
    Adeliade, Australia
    TBA
    pp TBA

    Nadasen, N; Pilkington, CL; Da Veiga, A. (2016)
    Personal Information Value Chains In The South African Insurance Industry – An Experiment.
    Proceedings of the International Conference on Information Resources Management (Conf-IRM 2016)
    Cape Town
    978-0-473-35594-4
    pp Paper 52

    Da Veiga, A. (2016)
    A Cybersecurity Culture Research Philosophy And Approach To Develop A Valid And Reliable Measuring Instrument
    IEEE Science and Information Conference 2016
    UK, London
    978-1-4673-8460-5

    Mujinga, M; Eloff, MM; Kroeze, JH. (2016)
    Online Banking Users’ Perceptions In South Africa: An Exploratory Empirical Study
    Proceedings of the IST-Africa Conference
    Durban, South Africa
    978-1-905824-54-0

    AJIGIOA. (2016)
    A Review Of Information Systems Development In Developing Countries
    10th European Conference on Information Management and Evaluation (ECISM)
    Evora, Portugal
    2048-8912/
    pp 10

    Govender S; Kritzinger, E; Loock, M. (2016)
    The Influence Of National Culture Oninformation Security Culture
    IST-Africa 2016 Conference Proceedings
    Durban, South Africa
    978-1-905824-54-0

    Tait, B.L.; Gaffoor A . (2016)
    The Application Of Web Services For Real Time Charging In Mobile Networks
    2016 30th International Conference on Advanced Information Networking and Applications
    Crans-Montana, Switzerland
    978-1-5090-1857-4/16 / IEEE
    pp 6

    Swartz P. ; Da Veiga, A. (2016)
    Popi Act - Opt-in And Opt-out Compliance From A Data Value Chain Perspective: A South African Insurance Industry Experiment
    Information Security South Africa (ISSA2016), 17-18 Aug 2016
    Johannesburg, SA
    978-1-5090-2473-8
    pp 9-17

    Mahopo, B; Abdullah, H; Mujinga, M. (2015)
    A Formal Qualitative Risk Management Approach For It Security
    ISSA 2015:14th International Information Security for South Africa Conference
    54 on Bath, Rosebank, Johannesburg
    ISBN: 978-1-4799-7754-3

    Da Veiga, A. (2015)
    The Influence Of Information Security Policies On Information Security Culture: Illustrated Through A Case Study
    Human Aspects of Information Security and Assurance (HAISA 2015)
    Lesvos
    9781841023885
    pp 22-33

    Martins, N ; Da Veiga, A. (2015)
    An Information Security Culture Model Validated With Structural Equation Modelling
    Human Aspects of Information Security and Assurance (HAISA 2015)
    Lesvos
    9781841023885
    pp 11-21

    Da Veiga, A. (2015)
    An Information Security Training And Awareness Approach (istaap) To Instil An Information Security-postive Culture
    Human Aspects of Information Security and Assurance (HAISA 2015)
    Lesvos
    9781841023885
    pp 95-107

    Da Veiga, A; Martins N. . (2014)
    Information Security Culture: A Comparative Analysis
    8th European Conference on Information Management and Evaluation (ECIME)
    Ghent
    978‐1‐910309‐41‐4
    pp 49-57

    Martins N. ; Da Veiga, A. (2014)
    The Value Of Using A Validated Information Security Culture
    8th European Conference on Information Management and Evaluation (ECIME)
    Ghent
    978‐1‐910309‐41‐4
    pp 146-154

    Buthelezi , MP; Mujinga, M. (2013)
    Security Aspects Of Online Teaching And Learning: An Odl Case Study
    ICEE/ICIT Conference
    Cape Town
    ISBN: 978-0-9922041-3-6
    pp 232-241

    Mujinga, M; Eloff, MM; Kroeze, JH. (2013)
    Towards A Heuristic Model For Usable And Secure Online Banking
    Proceedings of the 24th Australasian Conference on Information Systems (ACIS)
    Melbourne, Australia
    978-0-9924495-0-6/ACIS
    pp 11

    .

    .


    BOOKS/CHAPTERS

    Da Veiga, A. Organisational Diagnoses - Tools and applications for practitioners and researchers: Chapter 12 - Ethical and privacy considerations for research
    2017
    Knowledge Resources
    Johannesburg
    pp 273-297
    ISBN: 9781869227050