Folgen
Rossouw Von Solms
Rossouw Von Solms
Nelson Mandela University
Bestätigte E-Mail-Adresse bei nmmu.ac.za
Titel
Zitiert von
Zitiert von
Jahr
From information security to cyber security
R Von Solms, J Van Niekerk
computers & security 38, 97-102, 2013
15272013
Towards information security behavioural compliance
C Vroom, R Von Solms
Computers & security 23 (3), 191-198, 2004
7402004
Information security policy compliance model in organizations
NS Safa, R Von Solms, S Furnell
computers & security 56, 70-82, 2016
6672016
Information security conscious care behaviour formation in organizations
NS Safa, M Sookhak, R Von Solms, S Furnell, NA Ghani, T Herawan
Computers & Security 53, 65-78, 2015
5102015
The 10 deadly sins of information security management
B Von Solms, R Von Solms
Computers & security 23 (5), 371-376, 2004
5002004
Information security culture: A management perspective
JF Van Niekerk, R Von Solms
Computers & security 29 (4), 476-486, 2010
4662010
Information security awareness: educating your users effectively
ME Thomson, R von Solms
Information management & computer security 6 (4), 167-173, 1998
4441998
A framework for the governance of information security
S Posthumus, R Von Solms
Computers & security 23 (8), 638-646, 2004
4142004
An information security knowledge sharing model in organizations
NS Safa, R Von Solms
Computers in Human Behavior 57, 442-451, 2016
3622016
From policies to culture
R Von Solms, B Von Solms
Computers & security 23 (4), 275-279, 2004
3162004
Management of risk in the information age
M Gerber, R Von Solms
Computers & security 24 (1), 16-30, 2005
2992005
Cultivating an organizational information security culture
KL Thomson, R Von Solms, L Louw
Computer fraud & security 2006 (10), 7-11, 2006
2782006
Phishing for phishing awareness
K Jansson, R von Solms
Behaviour & information technology 32 (6), 584-593, 2013
2302013
Information security management: why standards are important
R Von Solms
Information Management & Computer Security 7 (1), 50-58, 1999
2171999
From risk analysis to security requirements
M Gerber, R Von Solms
Computers & Security 20 (7), 577-584, 2001
201*2001
Cybersecurity and information security–what goes where?
B Von Solms, R Von Solms
Information & Computer Security 26 (1), 2-9, 2018
1952018
A cyclic approach to business continuity planning
J Botha, R Von Solms
Information Management & Computer Security 12 (4), 328-337, 2004
1822004
Information security obedience: a definition
KL Thomson, R Von Solms
Computers & Security 24 (1), 69-75, 2005
1722005
Information Security Governance: a model based on the direct–control cycle
R Von Solms, SHB von Solms
Computers & security 25 (6), 408-412, 2006
1672006
Motivation and opportunity based model to reduce information security insider threats in organisations
NS Safa, C Maple, T Watson, R Von Solms
Journal of information security and applications 40, 247-257, 2018
1632018
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20