Les Labuschagne

Orcid: 0000-0003-3953-3034

According to our database1, Les Labuschagne authored at least 19 papers between 1993 and 2013.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2013
Cognitive Approaches for Digital Forensic Readiness Planning.
Proceedings of the Advances in Digital Forensics IX, 2013

2012
A conceptual model for digital forensic readiness.
Proceedings of the 2012 Information Security for South Africa, 2012

2006
A new comparison framework for information security risk analysis methodologies.
South Afr. Comput. J., 2006

The Peculium Model: Information Security Risk Management for the South African SMME.
Proceedings of the ISSA 2006 from Insight to Foresight Conference, 2006

2005
A conceptual model for enterprise resource planning (ERP).
Inf. Manag. Comput. Security, 2005

A security framework for an ERP system.
Proceedings of the ISSA 2005 New Knowledge Today Conference, 29 June, 2005

A new framework for bridging the gap between IT Service Management and IT Governance from a security perspective.
Proceedings of the ISSA 2005 New Knowledge Today Conference, 29 June, 2005

A Framework for Information Security Risk Management Communication.
Proceedings of the ISSA 2005 New Knowledge Today Conference, 29 June, 2005

2003
Security and human computer interfaces.
Comput. Secur., 2003

2001
Web Asssurance: Information Security Management for e-commerce.
Proceedings of the Advances in Information Security Management & Small Systems Security, 2001

E-Commerce Strategy Formulation.
Proceedings of the Towards The E-Society: E-Commerce, 2001

2000
Electronic commerce: the information-security challenge.
Inf. Manag. Comput. Secur., 2000

A Framework for Electronic Commerce Security.
Proceedings of the Information Security for Global Information Infrastructures, 2000

1999
Real-time Risk Analysis on the Internet: a prototype.
Proceedings of the Information Security Management & Small Systems Security, IFIP TC11 WG11.1/WG11.2 Seventh Annual Working Conference on Information Security Management & Small Systems Security, September 30, 1999

1998
Real-time risk analysis using Java concepts.
Inf. Manag. Comput. Secur., 1998

The use of real-time risk analysis to enable dynamic activation of countermeasures.
Comput. Secur., 1998

1997
Improved system-access control using complementary technologies.
Comput. Secur., 1997

1996
Activating dynamic counter measures to reduce risk.
Proceedings of the Information Systems Security, 1996

1993
A comparative framework for risk analysis methods.
Comput. Secur., 1993


  Loading...