Sciweavers

52 search results - page 3 / 11
» issa 2008
Sort
View
ISSA
2008
13 years 10 months ago
Spam Construction Trends
This paper replicates and extends Observed Trends in Spam Construction Techniques: A Case Study of Spam Evolution. A corpus of 169,274 spam email was collected over a period of fi...
Barry Irwin, Blake Friedman
ISSA
2008
13 years 10 months ago
The Use of File Timestamps in Digital Forensics
Digital evidence is not well perceived by the human senses. Crucial pieces of digital evidence may simply be missed by investigators as the forensic significance of seemingly unim...
Renico Koen, Martin S. Olivier
ISSA
2008
13 years 10 months ago
Password Management: Empirical Results from a RSA and USA Study
"The state of information security as a whole is a disaster, a train wreck". This view is given by Forte and Power (2007) describing the state of information security to...
Hennie A. Kruger, Tjaart Steyn, Lynette Drevin, Da...
ISSA
2008
13 years 10 months ago
Bloom's Taxonomy for Information Security Education
The importance of educating organizational end users about their roles and responsibilities towards information security is widely acknowledged. However, many current user educati...
Johan Van Niekerk, Rossouw von Solms
ISSA
2004
13 years 10 months ago
A Comparative Study Of Standards And Practices Related To Information Security Management
The need for Information Security in organisations, regardless of their type and size, is being addressed by emerging standards and recommended best practices. The various standar...
Evangelos D. Frangopoulos