Wynand JC van Staden
Wynand JC van Staden
University of South Africa
Verified email at wvs.za.net - Homepage
Title
Cited by
Cited by
Year
Using purpose lattices to facilitate customisation of privacy agreements
W Van Staden, MS Olivier
International Conference on Trust, Privacy and Security in Digital Business …, 2007
162007
Purpose organisation
W van Staden, MS Olivier
Proceedings of the fifth annual Information Security South Africa (ISSA …, 2005
112005
Protecting third party privacy in digital forensic investigations
W van Staden
IFIP International Conference on Digital Forensics, 19-31, 2013
92013
Errors made by students when designing finite automata
I Sanders, C Pilkington, W Van Staden
44th Annual SACLA Conference 44, 110-118, 2015
72015
On compound purposes and compound reasons for enabling privacy
WJS Van Staden, MS Olivier
Graz University of Technology, 2011
72011
SQL's Revoke with a View on Privacy
WJC Van Staden, MS Olivier
Proceedings of the 2007 annual research conference of the South African …, 2007
62007
A survey of trust issues constraining the growth of Identity Management-as-a-Service (IdMaaS)
N Mpofu, WJ Van Staden
2014 Information Security for South Africa, 1-6, 2014
52014
Extending SQL to allow the active usage of purposes
W Van Staden, MS Olivier
International Conference on Trust, Privacy and Security in Digital Business …, 2006
32006
Third party privacy and the investigation of cybercrime
WJ Van Staden
Advances in Digital Forensics IX, 2013
22013
The use of a virtual machine as an access control mechanism in a relational database management system
WJC Van Staden
Rand Afrikaans University, 2003
22003
Using automated keyword extraction to facilitate team discovery in a digital forensic investigation of electronic communications
WJC van Staden, E van der Poel
SAIEE Africa Research Journal 108 (2), 45-55, 2017
12017
Team formation in digital forensics
WJC van Staden, E van der Poel
2016 Information Security for South Africa (ISSA), 91-97, 2016
12016
Unsolicited Short Message Service marketing: A preliminary investigation into individual acceptance, perceptions of content, and privacy concerns
WJC van Staden
2015 Information Security for South Africa (ISSA), 1-7, 2015
12015
An investigation into reducing third party privacy breaches during the investigation of cybercrime
WJC Van Staden
SAIEE Africa Research Journal 106 (2), 74-82, 2015
12015
Test-driven development as a form of Ipsative feedback in an ODL environment
WJC Van Staden, CL Pilkington
12012
Protecting Personal Data Within a South African Organisation
M Singh, C Pilkington, W van Staden
International Information Security Conference, 50-64, 2020
2020
Timeline Visualization of Keywords
W van Staden
IFIP International Conference on Digital Forensics, 239-252, 2019
2019
South African Android Applications, Their Security Permissions and Compliance With the Protection of Personal Information Act
Q White, W van Staden
International Conference on Cyber Warfare and Security, 492-XV, 2019
2019
Evaluating the Severity of Trust to Identity- Management-as-a-Service
N Mpofu, WJC Van Staden
Information Security for South Africa, 83--89, 2017
2017
A model for compound purposes and reasons as a privacy enhancing technology in a relational database
WJC Van Staden
2011
The system can't perform the operation now. Try again later.
Articles 1–20