000 04578nam a22006735i 4500
001 978-3-030-43276-8
003 DE-He213
005 20240423125142.0
007 cr nn 008mamaa
008 200307s2020 sz | s |||| 0|eng d
020 _a9783030432768
_9978-3-030-43276-8
024 7 _a10.1007/978-3-030-43276-8
_2doi
050 4 _aQA268
072 7 _aGPJ
_2bicssc
072 7 _aURY
_2bicssc
072 7 _aCOM083000
_2bisacsh
072 7 _aGPJ
_2thema
072 7 _aURY
_2thema
082 0 4 _a005.824
_223
245 1 0 _aInformation and Cyber Security
_h[electronic resource] :
_b18th International Conference, ISSA 2019, Johannesburg, South Africa, August 15, 2019, Proceedings /
_cedited by Hein Venter, Marianne Loock, Marijke Coetzee, Mariki Eloff, Jan Eloff.
250 _a1st ed. 2020.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2020.
300 _aXVI, 173 p. 44 illus., 32 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aCommunications in Computer and Information Science,
_x1865-0937 ;
_v1166
505 0 _aInformation Security Cost Reduction through Social Means -- A Management Decision Support System for Evaluating Information Security Behaviour -- An Aviation Sector CSIRT for Sub-Saharan Africa -- PAUDIT: A Distributed Data Architecture for Fitness Data -- Threats and Vulnerabilities Affecting Fitness Wearables: Security and Privacy Theoretical Analysis -- A Conceptual Model for Consent Management in South African e-Health Systems for Privacy Preservation -- Federation of Services from Autonomous Domains with Heterogeneous Access Control Models -- Security Aspects Related to an Empirical Study into the Impact of Digital Transformation via Unified Communication and Collaboration Technologies on the Productivity and Innovation of a Global Automotive Enterprise -- A Descriptive Review and Classification of Organizational Information Security Awareness Research -- Theorising Information Security Policy Violations -- An Institutional Trust Perspectiveof Cloud Adoption Among SMEs in South Africa -- Data Privacy Compliance Benefits for Organisations – A Cyber-physical Systems and Internet of Things Study.
520 _aThis book constitutes the refereed proceedings of the 18th International Conference on Information Security, ISSA 2019, held in Johannesburg, South Africa, in August 2019. The 12 revised full papers presented were carefully reviewed and selected from 35 submissions. The papers are dealing with topics such as authentication; access control; digital (cyber) forensics; cyber security; mobile and wireless security; privacy-preserving protocols; authorization; trust frameworks; security requirements; formal security models; malware and its mitigation; intrusion detection systems; social engineering; operating systems security; browser security; denial-of-service attacks; vulnerability management; file system security; firewalls; Web protocol security; digital rights management; distributed systems security.
650 0 _aCryptography.
650 0 _aData encryption (Computer science).
650 0 _aComputer networks .
650 0 _aComputers.
650 0 _aSoftware engineering.
650 0 _aCoding theory.
650 0 _aInformation theory.
650 1 4 _aCryptology.
650 2 4 _aComputer Communication Networks.
650 2 4 _aComputing Milieux.
650 2 4 _aSoftware Engineering.
650 2 4 _aCoding and Information Theory.
700 1 _aVenter, Hein.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aLoock, Marianne.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aCoetzee, Marijke.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aEloff, Mariki.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aEloff, Jan.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783030432751
776 0 8 _iPrinted edition:
_z9783030432775
830 0 _aCommunications in Computer and Information Science,
_x1865-0937 ;
_v1166
856 4 0 _uhttps://doi.org/10.1007/978-3-030-43276-8
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
942 _cSPRINGER
999 _c174817
_d174817