Using purpose lattices to facilitate customisation of privacy agreements W Van Staden, MS Olivier Trust, Privacy and Security in Digital Business: 4th International …, 2007 | 16 | 2007 |
Protecting third party privacy in digital forensic investigations W Van Staden Advances in Digital Forensics IX: 9th IFIP WG 11.9 International Conference …, 2013 | 13 | 2013 |
Purpose organisation W van Staden, MS Olivier Proceedings of the fifth annual Information Security South Africa (ISSA …, 2005 | 11 | 2005 |
Errors made by students when designing finite automata I Sanders, C Pilkington, W Van Staden 44th Annual SACLA Conference 44, 110-118, 2015 | 9 | 2015 |
On compound purposes and compound reasons for enabling privacy WJS Van Staden, MS Olivier Graz University of Technology, 2011 | 7 | 2011 |
A survey of trust issues constraining the growth of Identity Management-as-a-Service (IdMaaS) N Mpofu, WJ Van Staden 2014 Information Security for South Africa, 1-6, 2014 | 6 | 2014 |
SQL's Revoke with a View on Privacy WJC Van Staden, MS Olivier Proceedings of the 2007 annual research conference of the South African …, 2007 | 6 | 2007 |
Using automated keyword extraction to facilitate team discovery in a digital forensic investigation of electronic communications WJC van Staden, E van der Poel SAIEE Africa Research Journal 108 (2), 45-55, 2017 | 5 | 2017 |
Team formation in digital forensics WJC van Staden, E van der Poel 2016 Information Security for South Africa (ISSA), 91-97, 2016 | 3 | 2016 |
Extending SQL to allow the active usage of purposes W Van Staden, MS Olivier International Conference on Trust, Privacy and Security in Digital Business …, 2006 | 3 | 2006 |
Evaluating the Severity of Trust to Identity- Management-as-a-Service N Mpofu, WJC Van Staden Information Security for South Africa, 83--89, 2017 | 2 | 2017 |
Unsolicited Short Message Service marketing: A preliminary investigation into individual acceptance, perceptions of content, and privacy concerns WJC van Staden 2015 Information Security for South Africa (ISSA), 1-7, 2015 | 2 | 2015 |
An investigation into reducing third party privacy breaches during the investigation of cybercrime WJC Van Staden SAIEE Africa Research Journal 106 (2), 74-82, 2015 | 2 | 2015 |
Third party privacy and the investigation of cybercrime WJ Van Staden Advances in Digital Forensics IX, 2013 | 2 | 2013 |
The use of a virtual machine as an access control mechanism in a relational database management system. WCJ van Staden PQDT-Global, 2003 | 2 | 2003 |
TEST-DRIVEN DEVELOPMENT AS A FORM OF IPSATIVE FEEDBACK IN AN ODL ENVIRONMENT WJC van Staden, MCL Pilkington, C Pilkington Proceedings of the First Unisa International ODL conference, 2012 | 1 | 2012 |
Protecting Personal Data Within a South African Organisation M Singh, C Pilkington, W van Staden International Information Security Conference, 50-64, 2020 | | 2020 |
Timeline Visualization of Keywords W Van Staden Advances in Digital Forensics XV: 15th IFIP WG 11.9 International Conference …, 2019 | | 2019 |
South African Android Applications, Their Security Permissions and Compliance With the Protection of Personal Information Act Q White, W van Staden International Conference on Cyber Warfare and Security, 492-XV, 2019 | | 2019 |
A model for compound purposes and reasons as a privacy enhancing technology in a relational database WJC Van Staden | | 2011 |