Review of Cyber Security and Policy Implementation within South African Health Institutions


The evolution in digital technologies and the Internet, in particular, has had a profound effect on the way healthcare institutions operate, assist patients, and manage personal healthcare data. In the same vein, various healthcare systems, particularly Electronic Health Information Technology (EHIT), present new opportunities for different healthcare institutions. As the exposure to and use of the Internet in the health sector continue to increase, so have the opportunities and benefits offered to applicable stakeholders. However, threats to the security, privacy, availability, and integrity of healthcare data and systems have also increased. 

International Humanitarian Law and its Applicability to the South African Cyber Environment


Although International Humanitarian Law (IHL) is considered applicable to all forms of warfare including future warfare, it does not regulate cyberwarfare in its current form. The South African government has introduced the National Cybersecurity Policy Framework and the Cybercrimes Bill in addition to existing Information Communications Technology legislation. However, the areas of jus in bello (just war) and jus ad bellum (the right to go to war) have not been sufficiently addressed regarding cyberwarfare. This paper seeks to explore the interaction between cyberattacks and IHL and its applicability to the South African cyber environment with an overview of South Africa’s cybersecurity posture and framework within a global context.

The Relevance of South African Legislation on Social Media as a Strategic Disaster and Crisis Communications Tool


Disruptive justice is believed to be an irreconcilable element with the rule of law, which only establishes the rule to govern society in context. With the emergence and influence of social media, it has become evident that citizens within a country have the ability and enabling technologies to mobilise the masses and influence governments and organizations.

Analysis of Data Recovered from Computer Disks released for Resale by Organisations


Public and private sector organisations frequently use computer storage media to hold information relating to their business or services, their employees and customers. Private individuals make use of personal computers in their home and frequently store personal information relating to both themselves and their families.  This raises questions about privacy and the need to dispose of data thoroughly and securely. Most organisations and individuals are probably blissfully unaware of what actually happens to the storage media in the form of the hard disk drives that are fitted into the computers, after they have disposed of old equipment.

Global and National Take on State Information Warfare


Information power has a crucial effect on success and because today information is mostly stored in digital form, attempts to establish information supremacy have logically migrated into cyberspace. Information warfare, which first developed in the military and political sphere, has become, due to recent technological developments, extremely aggressive and widespread, and is now used as a tool to achieve goals in all societal spheres. Leading countries even integrate this technique into their national policies and strategies for achieving their political goals. Transference of information warfare into cyberspace has led to the combining of two of the most dangerous and least investigated forms of criminality – cybercrime and organized crime – so the dilemma how to protect ourselves from them is now even greater. The international community has been avoiding this issue and information warfare is totally neglected. The absence of legislation and the will to bring order to this area has created a situation in which anyone can use cybercrime techniques to gain information power. This paper presents the authors’ opinion on the nature of information warfare, its steady migration into cyberspace and its exponential growth. The analysis of the current normative acts at national and international levels and our overview of the developments in leading countries illuminate the present state of affairs in this field.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.















Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.


Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455