Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mobile Ad-hoc Network Security Challenges Under AODV Routing Protocol., , and . INC, page 113-122. University of Plymouth, (2012)The role of accessibility and usability in bridging the digital divide for students with disabilities in an e-learning environment., , and . SAICSIT, page 222-228. ACM, (2018)The effects of the PoPI Act on small and medium enterprises in South Africa., , and . ISSA, page 1-8. IEEE, (2015)Ethical and Legal Issues Involved in the Pro-active Collection of Personal Information with the Aim of Reducing Online Disclosure., , and . HCC, volume 474 of IFIP Advances in Information and Communication Technology, page 72-85. Springer, (2016)Information Security: Process Evaluation and Product Evaluation., and . SEC, volume 175 of IFIP Conference Proceedings, page 11-18. Kluwer, (2000)Information Security Management System: Processes and Products., and . SEC, volume 250 of IFIP Conference Proceedings, page 193-204. Kluwer, (2003)Human Computer Interaction: An Information Security Perspectives., and . SEC, volume 214 of IFIP Conference Proceedings, page 535-546. Kluwer, (2002)Introduction., , , and . ISSA, page 1. IEEE, (2015)Analysis of students with and without disabilities in an e-learning setting., , and . SAICSIT, page 29:1-29:7. ACM, (2019)The Management of Cloud Computing Security., , and . ISSA, ISSA, Pretoria, South Africa, (2010)