Exploring privacy risks in information networks is analysing the dangers and hazards that are related to personal information about users of a network. It is about investigating the dynamics and complexities of a setting where humans are served by technology in order to exploit the network for their own good. In the information network, malicious activities are motivated by commercial factors in that the attacks to privacy are happening, not in the name of national security, but in the name of the free market together with technological advancements. Based on the assumption of Machiavellian Intelligence, we have modelled our analyses by way of concepts such as Arms Race, Tragedy of the Commons, and the Red Queen effect. In a number of exper...
On the Internet, digitally active small and medium sized enterprises (SME) face numerous security ri...
A significant portion of the modern internet is funded by commercial return from customised content ...
PhD (Computer Sciences), North-West University, Potchefstroom Campus, 2016Information security has b...
In an increasingly networked world, where new technologies and applications are rapidly introduced i...
As computers are increasingly more integrated into our daily lives, we need aiding mechanisms for se...
In this paper, we discuss various types of spyware programs, their behaviour, how they typically inf...
As computers are increasingly more integrated into our daily lives, we need aiding mechanisms for ...
Personal privacy is affected by the occurrence of adware and spyware in peer-topeer tools. In an exp...
Abstract Personal privacy is affected by the occurrence of adware and spyware in peer-topeer tools. ...
In recent years, large-scale computer networks have become an essential aspect of our daily computin...
With the rapid development of social networking and micro blogging service, large quantities of user...
The digital environment is facing changes and threats from different factors. Digitalisation seeks t...
Abuse and harm to individuals, through harassment and bullying, coexist with Identity Theft as crimi...
With an increasingly digitally connected society comes complexity, uncertainty, and risk. Network mo...
The advent of the participatory Web and social network applications has changed our communication be...
On the Internet, digitally active small and medium sized enterprises (SME) face numerous security ri...
A significant portion of the modern internet is funded by commercial return from customised content ...
PhD (Computer Sciences), North-West University, Potchefstroom Campus, 2016Information security has b...
In an increasingly networked world, where new technologies and applications are rapidly introduced i...
As computers are increasingly more integrated into our daily lives, we need aiding mechanisms for se...
In this paper, we discuss various types of spyware programs, their behaviour, how they typically inf...
As computers are increasingly more integrated into our daily lives, we need aiding mechanisms for ...
Personal privacy is affected by the occurrence of adware and spyware in peer-topeer tools. In an exp...
Abstract Personal privacy is affected by the occurrence of adware and spyware in peer-topeer tools. ...
In recent years, large-scale computer networks have become an essential aspect of our daily computin...
With the rapid development of social networking and micro blogging service, large quantities of user...
The digital environment is facing changes and threats from different factors. Digitalisation seeks t...
Abuse and harm to individuals, through harassment and bullying, coexist with Identity Theft as crimi...
With an increasingly digitally connected society comes complexity, uncertainty, and risk. Network mo...
The advent of the participatory Web and social network applications has changed our communication be...
On the Internet, digitally active small and medium sized enterprises (SME) face numerous security ri...
A significant portion of the modern internet is funded by commercial return from customised content ...
PhD (Computer Sciences), North-West University, Potchefstroom Campus, 2016Information security has b...