Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Adrie Stander is active.

Publication


Featured researches published by Adrie Stander.


Journal of Global Information Management | 2004

The Impact of National Environment on the Adoption of Internet Banking: Comparing Singapore and South Africa

Irwin Brown; Rudi Hoppe; Pauline Mugera; Paul Newman; Adrie Stander

The widespread diffusion of the Internet globally has prompted most retail banks to offer Internet banking services. A recent study in Singapore identified attitudinal and perceived behavioural control factors as having an influence on consumer adoption of Internet banking. It is expected that the national environment will also impact this process. The aim of this study therefore was to replicate the Singapore study in South Africa, compare the results between the two countries and explain differences in adoption process in terms of the national environment. The results confirm that attitudinal and perceived behavioural control factors influence adoption in South Africa as in Singapore, but with differences in the number of determinants, and the degree of influence of certain determinants. These differences were explained in terms of three environmental dimensions-socio-economic conditions, the state of Internet diffusion and government ICT policies respectively.


information security for south africa | 2010

A Digital Forensic Readiness framework for South African SME's

David Barske; Adrie Stander; Jason Jordaan

In this digital age, most business is conducted electronically. This contemporary paradigm creates openings for potentially harmful unanticipated information security incidents of both a criminal or civil nature, with the potential to cause considerable direct and indirect damage to smaller businesses. Electronic evidence is fundamental to the successful handling of such incidents. If an organisation does not prepare proactively for such incidents it is highly likely that important relevant digital evidence will not be available. Not being able to respond effectively could be extremely damaging to smaller companies, as they are unable to absorb losses as easily as larger organisations. In order to prepare smaller businesses for incidents of this nature, the implementation of Digital Forensic Readiness policies and procedures is necessitated. Numerous varying factors such as the perceived high cost, as well as the current lack of forensic skills, make the implementation of Digital Forensic Readiness appear difficult if not infeasible for smaller organisations. In order to solve this problem it is necessary to develop a scalable and flexible framework for the implementation of Digital Forensic Readiness based on the individual risk profile of a small to medium enterprise (SME). This paper aims to determine, from literature, the concepts of Digital Forensic Readiness and how they apply to SMEs. Based on the findings, the aspects of Digital Forensics and organisational characteristics that should be included in such a framework is highlighted.


InSITE 2015: Informing Science + IT Education Conferences: USA | 2015

Exploring the Impact of Cyber Incivility in the Workplace

Jacques Ophoff; Thabiso Machaka; Adrie Stander

The world is an interconnected global village due to the increasing adoption and reliance on technology, but an ugly side of the increased usage of technology has come to light. The issue of harassment and abuse on the internet has led to relatively new issues such as cyber harassment, cyber incivility and cyberbullying. A case study was conducted within two faculties at the University of Cape Town (UCT). The research objectives were: to find out how staff members in a workplace have experienced cyber incivility, to find out what effects cyber incivility has on employees, to find out what the motivations are for staff participation in cyber incivility, and to find out what policies a workplace should have in place in order to deal with cyber incivility. The data collected shows that there have been occurrences of cyber harassment and cyber incivility among staff members at UCT. The following effects were found to be consistent with cyber harassment and cyber incivility: decrease in productivity and a toxic working environment. On an individual basis: anger, negative feelings and feelings of inferiority, feeling demotivated, feelings of fear and intimidation, feeling emotional and upset, irritation, loss of self-esteem, stress and wasted time.


Issues in Informing Science and Information Technology | 2007

The Need for and Contents of a Course in Forensic Information Systems & Computer Science at the University of Cape Town

Adrie Stander; Kevin A. Johnston

This paper aims to investigate the need for and contents of a course in forensic Information Systems and Computer Science at UCT. In order to do this, the reader is introduced to computer crime and shown how the forensic process of identifying, preserving, recovering, analyzing, and documenting computer data supposedly used in crimes committed using computers is helping in investigating and solving these types of crime. An actual forensic approach known as the End-toEnd Digital Investigation is also discussed.


Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec) | 2012

Investigating the accuracy of base station information for estimating cellphone location

Liam Smit; Adrie Stander; Jacques Ophoff

An important feature of cellphones is that their location can be determined. As long as the cellphone is powered on, the location of the cellphone can always be traced to at least the cell from which it is receiving, or last received, signal from the cellular network. Such, network based, methods of estimating the location of a cellphone is useful in cases where the cellphone user is unable or unwilling to reveal his or her location. This paper investigates the accuracy of using base station information for estimating the location of cellphones. Through quantitative data analysis large variations between the best and worst accuracy of recorded base station locations are exposed. Thus, depending on the requirements, base station locations may or may not be accurate enough for a particular application.


international conference on information security | 2015

eDiscovery in South Africa and the challenges it faces

Kevin Hughes; Adrie Stander; Val Hooper

eDiscovery is a relatively recent development in the legal discovery system. However, little is known about the adoption of the practice in South Africa, and the challenges faced in its uptake. An exploratory study was undertaken to determine the status and challenges of eDiscovery in South Africa. Qualitative interviews were conducted with ten eDiscovery practitioners and it was ascertained that the uptake of eDiscovery is still low and that the major challenges lie in the lack of knowledge and education amongst the lawyers and their clients; the costs and expenses involved; organisational issues, such as preparedness; and issues surrounding the responsibility for the collection of evidence, and allocation of costs. These issues were further examined and underlying themes and implications discussed.


information security for south africa | 2009

A Survey of Computer Crime and Security in South Africa.

Adrie Stander; A. Dunnet; J. Rizzo


international conference on information security | 2014

Anti-Forensic Tool Use and Their Impact on Digital Forensic Investigations: A South African Perspective

Jean-Paul Van Belle; Richard de Beer; Adrie Stander


Archive | 2014

ITIL adoption in South African: A Capability Maturity view

Alastair Bovim; Kevin A. Johnston; Salah Kabanda; Maureen Tanner; Adrie Stander


Computing information technology | 2003

Using usability factors to predict the e-commerce user experience

Adrie Stander; Nata van der Merwe

Collaboration


Dive into the Adrie Stander's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Irwin Brown

University of Cape Town

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Paul Newman

University of Cape Town

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Rudi Hoppe

University of Cape Town

View shared research outputs
Top Co-Authors

Avatar

David Barske

University of Cape Town

View shared research outputs
Researchain Logo
Decentralizing Knowledge