Folgen
M M Eloff
M M Eloff
Bestätigte E-Mail-Adresse bei unisa.ac.za
Titel
Zitiert von
Zitiert von
Jahr
The management of security in cloud computing
S Ramgovind, MM Eloff, E Smith
2010 Information Security for South Africa, 1-7, 2010
6802010
Information security: The moving target
MT Dlamini, JHP Eloff, MM Eloff
Computers & security 28 (3-4), 189-198, 2009
2582009
Integrated digital forensic process model
MD Kohn, MM Eloff, JHP Eloff
Computers & Security 38, 103-115, 2013
2322013
Information security management: a new paradigm
JHP Eloff, M Eloff
Proceedings of the 2003 annual research conference of the South African …, 2003
1942003
Information security architecture
JHP Eloff, MM Eloff
Computer Fraud & Security 2005 (11), 10-16, 2005
1752005
Information security management: a hierarchical framework for various approaches
MM Eloff, SH von Solms
Computers & Security 19 (3), 243-256, 2000
1482000
Accommodating soft skills in software project management
A Sukhoo, A Barnard, MM Eloff, JA Van der Poll, M Motah
Issues in Informing Science and Information Technology 2, 691-704, 2005
1372005
Information security management: an approach to combine process certification and product evaluation
MM Eloff, SH Von Solms
Computers & Security 19 (8), 698-709, 2000
1262000
System usability scale evaluation of online banking services: A South African study
M Mujinga, MM Eloff, JH Kroeze
South African journal of science 114 (3-4), 1-8, 2018
532018
Design of cyber security awareness game utilizing a social media framework
WA Labuschagne, I Burke, N Veerasamy, MM Eloff
2011 Information Security for South Africa, 1-9, 2011
492011
Internet of people, things and services-the convergence of security, trust and privacy
JHP Eloff, MM Eloff, MT Dlamini, MP Zielinski
3rd CompanionAble Workshop – IoPTS, 02 December 2009, Novotel Brussels, 2009
432009
Internet of things: emerging and future scenarios from an information security perspective
MT Dlamini, MM Eloff, JHP Eloff
Southern Africa Telecommunication Networks and Applications Conference, 2009
372009
Manet reactive routing protocols node mobility variation effect in analysing the impact of black hole attack
EO Ochola, LF Mejaele, MM Eloff, JA Van Der Poll
SAIEE Africa Research Journal 108 (2), 80-92, 2017
352017
A high-level comparison between the South African protection of personal information act and international data protection laws
J Botha, MM Grobler, J Hahn, M Eloff
ICMLG2017 5th International Conference on Management Leadership and …, 2017
342017
Psychosocial risks: Can their effects on the security of information systems really be ignored?
ED Frangopoulos, MM Eloff, LM Venter
Information Management & Computer Security 21 (1), 53-65, 2013
342013
Psychosocial Risks: can their effects on the Security of Information Systems really be ignored?.
ED Frangopoulos, MM Eloff, LM Venter
6th International Symposium on Human Aspects of Information Security …, 2012
342012
A sustainable information security framework for e-Government–case of Tanzania
CK Wangwe, MM Eloff, L Venter
Technological and Economic Development of Economy 18 (1), 117-131, 2012
332012
An evolutionary software project management maturity model for Mauritius.
A Sukhoo, A Barnard, MM Eloff, JA Van Der Poll
Interdisciplinary Journal of Information, Knowledge & Management 2, 2007
312007
The Effects of the PoPI Act on Small and Medium Enterprises in South Africa,
J Botha, MM Eloff, I Swart
Proceedings of the 2015 Information Security South Africa (ISSA 2015 …, 2015
262015
An assessment of software project management maturity in Mauritius
A Sukhoo, A Barnard, JA Van der Poll, MM Eloff
Issues in Informing Science and Information Technology 2, 671-690, 2006
262006
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20