Seguir
Wynand JC van Staden
Wynand JC van Staden
University of South Africa
Dirección de correo verificada de wvs.za.net - Página principal
Título
Citado por
Citado por
Año
Using purpose lattices to facilitate customisation of privacy agreements
W Van Staden, MS Olivier
Trust, Privacy and Security in Digital Business: 4th International …, 2007
162007
Protecting third party privacy in digital forensic investigations
W Van Staden
Advances in Digital Forensics IX: 9th IFIP WG 11.9 International Conference …, 2013
122013
Purpose organisation
W van Staden, MS Olivier
Proceedings of the fifth annual Information Security South Africa (ISSA …, 2005
112005
Errors made by students when designing finite automata
I Sanders, C Pilkington, W Van Staden
44th Annual SACLA Conference 44, 110-118, 2015
92015
On compound purposes and compound reasons for enabling privacy
WJS Van Staden, MS Olivier
Graz University of Technology, 2011
72011
A survey of trust issues constraining the growth of Identity Management-as-a-Service (IdMaaS)
N Mpofu, WJ Van Staden
2014 Information Security for South Africa, 1-6, 2014
62014
SQL's Revoke with a View on Privacy
WJC Van Staden, MS Olivier
Proceedings of the 2007 annual research conference of the South African …, 2007
62007
Using automated keyword extraction to facilitate team discovery in a digital forensic investigation of electronic communications
WJC van Staden, E van der Poel
SAIEE Africa Research Journal 108 (2), 45-55, 2017
52017
Extending SQL to allow the active usage of purposes
W Van Staden, MS Olivier
International Conference on Trust, Privacy and Security in Digital Business …, 2006
42006
Team formation in digital forensics
WJC van Staden, E van der Poel
2016 Information Security for South Africa (ISSA), 91-97, 2016
32016
Evaluating the Severity of Trust to Identity- Management-as-a-Service
N Mpofu, WJC Van Staden
Information Security for South Africa, 83--89, 2017
22017
Unsolicited Short Message Service marketing: A preliminary investigation into individual acceptance, perceptions of content, and privacy concerns
WJC van Staden
2015 Information Security for South Africa (ISSA), 1-7, 2015
22015
An investigation into reducing third party privacy breaches during the investigation of cybercrime
WJC Van Staden
SAIEE Africa Research Journal 106 (2), 74-82, 2015
22015
Third party privacy and the investigation of cybercrime
WJ Van Staden
Advances in Digital Forensics IX, 2013
22013
The use of a virtual machine as an access control mechanism in a relational database management system.
WCJ van Staden
PQDT-Global, 2003
22003
TEST-DRIVEN DEVELOPMENT AS A FORM OF IPSATIVE FEEDBACK IN AN ODL ENVIRONMENT
WJC van Staden, MCL Pilkington, C Pilkington
Proceedings of the First Unisa International ODL conference, 2012
12012
Protecting Personal Data Within a South African Organisation
M Singh, C Pilkington, W van Staden
International Information Security Conference, 50-64, 2020
2020
Timeline Visualization of Keywords
W Van Staden
Advances in Digital Forensics XV: 15th IFIP WG 11.9 International Conference …, 2019
2019
South African Android Applications, Their Security Permissions and Compliance With the Protection of Personal Information Act
Q White, W van Staden
International Conference on Cyber Warfare and Security, 492-XV, 2019
2019
A model for compound purposes and reasons as a privacy enhancing technology in a relational database
WJC Van Staden
2011
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20