This book constitutes the refereed post-conference proceedings of the 23rd International Conference on Information Security, ISSA 2024, held in Gqeberha, South Africa, during December 2-3, 2024.
The 21 full papers presented were carefully reviewed and selected from 55 submissions. The papers focus on topics such as Cyber security; Information Security; Network Security; Computer Security; Digital Forensics; Botnets; Security in Cloud Computing; ChatBot security; Insider Threats; NIDS; GANs and Malware; Privacy; Cyber security Education; Cyber security & AI; Digital Forensics & AI.
Edited by:
Hein Venter, Mariki Eloff, Jan Eloff, Reinhardt Botha, Marianne Loock Imprint: Springer Nature Switzerland AG Country of Publication: Switzerland Dimensions:
Height: 235mm,
Width: 155mm,
ISBN:9783032096593 ISBN 10: 3032096596 Series:Communications in Computer and Information Science Pages: 218 Publication Date:16 November 2025 Audience:
College/higher education
,
Further / Higher Education
Format:Paperback Publisher's Status: Active
.- A Rapid Review Cybersecurity Strategic Analysis Framework: The Case of Higher Education Institutions. .- Privacy and Legal Implications Regarding the Processing of Honeypot Data. .- Social Network Graphs in Email Forensics: Analysis of a Personal Email Dataset. .- Smoke Signals: Analysing and Decoding Quiet Quitting and Burnout Among Cybersecurity Professionals. .- Solving the Privacy and Security Challenge using ZKP: Its Positive Impact on the Economy. .- Biometric authentication: Stress as a factor in keystroke dynamics. .- Profiling Prominent Ransomware Threat Actors. .- Trust Requirements and Mechanisms in Peer-to-Peer Energy Markets. .- Contextual Factors influencing the Cybersecurity Commitment of Government Institutions in Developing Countries. .- Digital Forensic Investigation and Linguistic Analysis of Cybercrime: A Systematic Review. .- Conceptual Model for Taxation and Regulatory Governance among South African Crypto Asset Holders. .- Countering mobile application threats through a structured threat modelling approach. .- Enhancing Forensic Readiness through an Integrated Approach to Fraud Risk Management throughout the Digital Transformation Lifecycle. .- Guidance for the Creation of Management and Cost Accounting Computerized Infor mation Systems: Assurance of Information Integrity and Flexibility. .- A chatbot LLM based access control mechanism. .- Factors influencing Sensitive Data Protection practices in South African public schools. .- Changes in Observed Internet Background Radiation Traffic in the 155/8 netblock. .- Using artificial intelligence techniques to standardize and automated generation of digital forensic reports. .- Exploring the Cybersecurity-Resilience Gap: An Analysis of Student Attitudes and Behaviors in Higher Education. .- A Decentralized E-voting System Using Blockchain. .- Lacking Balance? Assessing the Content and Coverage of Cyber Security Degrees.