Mariki M. Eloff
Orcid: 0000-0001-8997-7931Affiliations:
- University of South Africa, Pretoria, South Africa
According to our database1,
Mariki M. Eloff
authored at least 38 papers
between 2000 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2022
Int. Trans. Oper. Res., 2022
2019
Towards a framework for online information security applications development: A socio-technical approach.
South Afr. Comput. J., 2019
Proceedings of the South African Institute of Computer Scientists and Information Technologists, 2019
Comparison of students using electronic learning website of University of South Africa.
Proceedings of the Conference on Information Communications Technology and Society, 2019
2018
The role of accessibility and usability in bridging the digital divide for students with disabilities in an e-learning environment.
Proceedings of the Annual Conference of the South African Institute of Computer Scientists and Information Technologists, 2018
2017
Proceedings of the 2017 Information Security for South Africa, 2017
Proceedings of the 23rd Americas Conference on Information Systems, 2017
2016
Ethical and Legal Issues Involved in the Pro-active Collection of Personal Information with the Aim of Reducing Online Disclosure.
Proceedings of the Technology and Intimacy: Choice or Coercion, 2016
Proceedings of the CONF-IRM 2016, 2016
2015
Proceedings of the 2015 Information Security for South Africa, 2015
2014
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, 2014
Human Aspects of Information Assurance: A Questionnaire-based Quantitative Approach to Assessment.
Proceedings of the Eighth International Symposium on Human Aspects of Information Security & Assurance, 2014
2013
Psychosocial risks: Can their effects on the security of information systems really be ignored?
Inf. Manag. Comput. Secur., 2013
The failure of watchdog schemes in MANET security: a case of an intelligent black-hole.
Proceedings of the 2013 South African Institute for Computer Scientists and Information Technologists, 2013
Proceedings of the 2013 Information Security for South Africa, 2013
Proceedings of the Australasian Conference on Information Systems, 2013
2012
Proceedings of the Ninth International Network Conference (INC 2012), 2012
Proceedings of the ICT Critical Infrastructures and Society, 2012
2011
Proceedings of the Information Security South Africa Conference 2011, 2011
Proceedings of the 5th International Symposium on Human Aspects of Information Security and Assurance, 2011
Proceedings of the AFRICON 2011, 2011
2010
Proceedings of the Information Security South Africa Conference 2010, 2010
Biometrics as an Agent to Reduce Fraud in the Micro Lending Industry in South Africa.
Proceedings of the Information Security South Africa Conference 2010, 2010
2009
BC3I - Towards Requirements Specification for Preparing an Information Security Budget.
Proceedings of the Information Security South Africa Conference 2009, 2009
Too Many Laws But Very Little Progress! Is South African Highly Acclaimed Information Security Legislation Redundant?
Proceedings of the Information Security South Africa Conference 2009, 2009
2008
Proceedings of the ISSA 2008 Innovative Minds Conference, 2008
2006
Proceedings of the ISSA 2006 from Insight to Foresight Conference, 2006
2005
Proceedings of the ISSA 2005 New Knowledge Today Conference, 29 June, 2005
2004
Accessible Computer Interaction for People with Disabilities: The Case of Quadriplegics.
Proceedings of the ICEIS 2004, 2004
2003
Information Security Management System: Processes and Products.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003
2002
Human Computer Interaction: An Information Security Perspectives.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002
2000
Information Security Management: An Approach to Combine Process Certification And Product Evaluation.
Comput. Secur., 2000
Comput. Secur., 2000
Information Security: Process Evaluation and Product Evaluation.
Proceedings of the Information Security for Global Information Infrastructures, 2000