Publications
![Icon to Musoni chapter African Data Laws and Protection Icon to Musoni chapter African Data Laws and Protection](/media/wits-university/faculties-and-schools/humanities/research-entities/link/images/news-photos-amp-images/African-Data-Protection-Laws-400x400.png)
The Digitalised Terrorism Ecology: A Systems Perspective
![](/media/wits-university/faculties-and-schools/humanities/research-entities/link/images/misc-images/binary-2032158__340-square-340x340.jpg)
The Digitalised Terrorism Ecology: A Systems Perspective
![](/media/wits-university/faculties-and-schools/humanities/research-entities/link/images/news-photos-amp-images/AJIC-23-Cover-401x401.png)
Conceptual Design of a Cybersecurity Resilience Maturity Measurement Framework
![AJIC Issue 20 Icon AJIC Issue 20 Icon](/media/wits-university/faculties-and-schools/humanities/research-entities/link/images/news-photos-amp-images/AJIC-20-Cover-400x400.png)
AJIC Journal's Focus Section on Cybersecurity
![](/media/wits-university/faculties-and-schools/humanities/research-entities/link/images/misc-images/finger-2081169__340-square-200x200.jpg)
Personal Data Privacy and Security
![](/media/wits-university/faculties-and-schools/humanities/research-entities/link/images/misc-images/wlan-2088660__340-square-340x340.jpg)
Cyber Warfare: African Research Must Address Emerging Reality
![](/media/wits-university/faculties-and-schools/humanities/research-entities/link/images/misc-images/network-1823366__340-square-1-200x200.jpg)
Governance of Cybersecurity – The Case of South Africa
![](/media/wits-university/faculties-and-schools/humanities/research-entities/link/images/news-photos-amp-images/AJIC-18-Cover-401x401.png)
Cyber Warfare: African Research Must Address Emerging Reality
A research article by By LINK Research Associate Dr Uche Mbanaso.