Mariki M. Eloff

Orcid: 0000-0001-8997-7931

Affiliations:
  • University of South Africa, Pretoria, South Africa


According to our database1, Mariki M. Eloff authored at least 38 papers between 2000 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
CBAC4C: conflict-based VM isolation control for cloud computing.
Int. Trans. Oper. Res., 2022

2019
Towards a framework for online information security applications development: A socio-technical approach.
South Afr. Comput. J., 2019

Analysis of students with and without disabilities in an e-learning setting.
Proceedings of the South African Institute of Computer Scientists and Information Technologists, 2019

Comparison of students using electronic learning website of University of South Africa.
Proceedings of the Conference on Information Communications Technology and Society, 2019

2018
The role of accessibility and usability in bridging the digital divide for students with disabilities in an e-learning environment.
Proceedings of the Annual Conference of the South African Institute of Computer Scientists and Information Technologists, 2018

2017
Towards the development of an effective intrusion detection model.
Proceedings of the 2017 Information Security for South Africa, 2017

A Socio-Technical Approach to Information Security.
Proceedings of the 23rd Americas Conference on Information Systems, 2017

2016
Ethical and Legal Issues Involved in the Pro-active Collection of Personal Information with the Aim of Reducing Online Disclosure.
Proceedings of the Technology and Intimacy: Choice or Coercion, 2016

Securing Cloud Computing's Blind-spots using Strong and Risk-based MFA.
Proceedings of the CONF-IRM 2016, 2016

2015
Introduction.
Proceedings of the 2015 Information Security for South Africa, 2015

The effects of the PoPI Act on small and medium enterprises in South Africa.
Proceedings of the 2015 Information Security for South Africa, 2015

2014
CBAC4C: Conflict Based Allocation Control for Cloud.
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, 2014

Human Aspects of Information Assurance: A Questionnaire-based Quantitative Approach to Assessment.
Proceedings of the Eighth International Symposium on Human Aspects of Information Security & Assurance, 2014

2013
Psychosocial risks: Can their effects on the security of information systems really be ignored?
Inf. Manag. Comput. Secur., 2013

Integrated digital forensic process model.
Comput. Secur., 2013

The failure of watchdog schemes in MANET security: a case of an intelligent black-hole.
Proceedings of the 2013 South African Institute for Computer Scientists and Information Technologists, 2013

Democratic detection of malicious behaviour in MANET: A voting process.
Proceedings of the 2013 Information Security for South Africa, 2013

Towards a Heuristic Model for Usable and Secure Online Banking.
Proceedings of the Australasian Conference on Information Systems, 2013

2012
Mobile Ad-hoc Network Security Challenges Under AODV Routing Protocol.
Proceedings of the Ninth International Network Conference (INC 2012), 2012

The Dark Side of Web 2.0.
Proceedings of the ICT Critical Infrastructures and Society, 2012

2011
A Review of Black Hole attack on AODV Routing in MANET.
Proceedings of the Information Security South Africa Conference 2011, 2011

A Budget Model for Information Security.
Proceedings of the 5th International Symposium on Human Aspects of Information Security and Assurance, 2011

Secure Digital Data Collection in household surveys.
Proceedings of the AFRICON 2011, 2011

2010
The Management of Cloud Computing Security.
Proceedings of the Information Security South Africa Conference 2010, 2010

Biometrics as an Agent to Reduce Fraud in the Micro Lending Industry in South Africa.
Proceedings of the Information Security South Africa Conference 2010, 2010

2009
Information security: The moving target.
Comput. Secur., 2009

BC3I - Towards Requirements Specification for Preparing an Information Security Budget.
Proceedings of the Information Security South Africa Conference 2009, 2009

Too Many Laws But Very Little Progress! Is South African Highly Acclaimed Information Security Legislation Redundant?
Proceedings of the Information Security South Africa Conference 2009, 2009

2008
Social Aspects of Information Security.
Proceedings of the ISSA 2008 Innovative Minds Conference, 2008

2006
Denial-of-Service & Distributed Denial-of-Service on The Internet.
Proceedings of the ISSA 2006 from Insight to Foresight Conference, 2006

2005
Secure Authentication combined with Anonymity: The end of an oxymoron?
Proceedings of the ISSA 2005 New Knowledge Today Conference, 29 June, 2005

2004
Accessible Computer Interaction for People with Disabilities: The Case of Quadriplegics.
Proceedings of the ICEIS 2004, 2004

2003
Agents, security and ethics: a framework for analysis.
South Afr. Comput. J., 2003

Information Security Management System: Processes and Products.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003

2002
Human Computer Interaction: An Information Security Perspectives.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002

2000
Information Security Management: An Approach to Combine Process Certification And Product Evaluation.
Comput. Secur., 2000

Information Security Management: A Hierarchical Framework for Various Approaches.
Comput. Secur., 2000

Information Security: Process Evaluation and Product Evaluation.
Proceedings of the Information Security for Global Information Infrastructures, 2000


  Loading...