Rossouw von Solms
Orcid: 0000-0002-9860-2346Affiliations:
- Nelson Mandela University, Port Elizabeth, South Africa
According to our database1,
Rossouw von Solms
authored at least 112 papers
between 1993 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2022
Inf. Comput. Secur., 2022
2021
A Feasibility Study Towards E-processing Supply Chain Management Transactions in South African Municipalities.
Proceedings of Sixth International Congress on Information and Communication Technology, 2021
2019
Devising a strategy for IT governance implementation in municipalities. A case study of South Africa.
Electron. J. Inf. Syst. Dev. Ctries., 2019
2018
Motivation and opportunity based model to reduce information security insider threats in organisations.
J. Inf. Secur. Appl., 2018
Social Networking: A Tool for Effective Cybersecurity Education in Cyber-Driven Financial Transactions.
Proceedings of the Twelfth International Symposium on Human Aspects of Information Security & Assurance, 2018
2017
Inf. Comput. Secur., 2017
Inf. Comput. Secur., 2017
An ICT Strategy for the Sustainable Development of the Tourism Sector in a Developing Country: A Case Study of Zimbabwe.
Electron. J. Inf. Syst. Dev. Ctries., 2017
Electron. J. Inf. Syst. Dev. Ctries., 2017
Proceedings of the Information Security Education for a Global Digital Society, 2017
2016
Comput. Hum. Behav., 2016
Proceedings of the 2016 Information Security for South Africa, 2016
2015
Building Technology Trust in a Rural Agricultural e-Marketplace: A User Requirements Perspective.
Electron. J. Inf. Syst. Dev. Ctries., 2015
Comput. Secur., 2015
Proceedings of the 2015 Information Security for South Africa, 2015
Proceedings of the 48th Hawaii International Conference on System Sciences, 2015
Proceedings of the Ninth International Symposium on Human Aspects of Information Security & Assurance, 2015
2014
South Afr. Comput. J., 2014
Information Security Assurance Model (ISAM) for an Examination Paper Preparation Process.
Proceedings of the 2014 Information Security for South Africa, 2014
Proceedings of the 2014 Information Security for South Africa, 2014
Proceedings of the 2014 Information Security for South Africa, 2014
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014
Proceedings of the Eighth International Symposium on Human Aspects of Information Security & Assurance, 2014
2013
A software gateway to affordable and effective Information Security Governance in SMMEs.
Proceedings of the 2013 Information Security for South Africa, 2013
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013
Proceedings of the European Information Security Multi-Conference (EISMC 2013), 2013
2012
J. Univers. Comput. Sci., 2012
Proceedings of the 6th International Symposium on Human Aspects of Information Security and Assurance, 2012
SecSDM: A usable tool to support IT undergraduate students in secure software development.
Proceedings of the 6th International Symposium on Human Aspects of Information Security and Assurance, 2012
Proceedings of the e-Infrastructure and e-Services for Developing Countries, 2012
Proceedings of the e-Infrastructure and e-Services for Developing Countries, 2012
Proceedings of the e-Infrastructure and e-Services for Developing Countries, 2012
2011
Int. J. Inf. Technol. Syst. Approach, 2011
Proceedings of the Information Security South Africa Conference 2011, 2011
Guidelines for the creation of brain compatible cyber security educational material in Moodle 2.0.
Proceedings of the Information Security South Africa Conference 2011, 2011
A web-based information security governance toolbox for small-to-medium enterprises in Southern Africa.
Proceedings of the Information Security South Africa Conference 2011, 2011
Proceedings of the Information Assurance and Security Education and Training, 2011
2010
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010
Sweetening the medicine: educating users about information security by means of game play.
Proceedings of the 2010 Annual Conference of the South African Institute of Computer Scientists and Information Technologists, 2010
Proceedings of the South African Information Security Multi-Conference, 2010
An Integrative Approach to Information Security Education: A South African Perspective.
Proceedings of the South African Information Security Multi-Conference, 2010
Proceedings of the South African Information Security Multi-Conference, 2010
2009
Proceedings of the Information Security South Africa Conference 2009, 2009
Proceedings of the Information Security South Africa Conference 2009, 2009
Proceedings of the Information Assurance and Security Education and Training, 2009
A Risk-Based Approach to Formalise Information Security Requirements for Software Development.
Proceedings of the Information Assurance and Security Education and Training, 2009
2008
Comput. Secur., 2008
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008
Proceedings of the 2008 Annual Conference of the South African Institute of Computer Scientists and Information Technologists on IT Research in Developing Countries, 2008
Proceedings of the ISSA 2008 Innovative Minds Conference, 2008
2007
Utilizing fuzzy logic and neural networks for effective, preventative intrusion detection in a wireless environment.
Proceedings of the 2007 Annual Conference of the South African Institute of Computer Scientists and Information Technologists on IT Research in Developing Countries, 2007
Proceedings of the Fifth World Conference on Information Security Education, 2007
2006
Comput. Secur., 2006
Proceedings of the Security and Privacy in Dynamic Environments, 2006
Proceedings of the ISSA 2006 from Insight to Foresight Conference, 2006
Proceedings of the ISSA 2006 from Insight to Foresight Conference, 2006
2005
Real-time information integrity = system integrity + data integrity + continuous assurances.
Comput. Secur., 2005
A holistic framework for the fostering of an information security sub-culture in organizations.
Proceedings of the ISSA 2005 New Knowledge Today Conference, 29 June, 2005
Proceedings of the ISSA 2005 New Knowledge Today Conference, 29 June, 2005
2004
Proceedings of the Security Management, Integrity, and Internal Control in Information Systems, 2004
Proceedings of the Security Management, Integrity, and Internal Control in Information Systems, 2004
Proceedings of the Information Security Management, Education and Privacy, 2004
Proceedings of the Information Security Management, Education and Privacy, 2004
2003
Comput. Secur., 2003
Comput. Secur., 2003
Information Security: Auditing the Behaviour of the Employee.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003
Integrating Information Security into Corporate Governance.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003
2002
The information security management toolbox - taking the pain out of security management.
Inf. Manag. Comput. Secur., 2002
The utilization of trend analysis in the effective monitoring of information security. Part 2: the model.
Inf. Manag. Comput. Secur., 2002
A Practical Approach to Information Security Awareness in the Organization.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002
The Effective Implementation of Information Security in Organizations.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002
2001
The utilization of trend analysis in the effective monitoring of information security. Part 1: the concept.
Inf. Manag. Comput. Secur., 2001
2000
A Formalized Approach to the Effective Selection and Evaluation of Information Security Control.
Comput. Secur., 2000
From Trusted Information Security Controls to a Trusted Information Security Environment.
Proceedings of the Information Security for Global Information Infrastructures, 2000
1999
Inf. Manag. Comput. Secur., 1999
The Effective Utilization of Audit Logs in Information Security Management.
Proceedings of the Information Security Management & Small Systems Security, IFIP TC11 WG11.1/WG11.2 Seventh Annual Working Conference on Information Security Management & Small Systems Security, September 30, 1999
1998
Inf. Manag. Comput. Secur., 1998
Information security management (3): the Code of Practice for Information Security Management (BS 7799).
Inf. Manag. Comput. Secur., 1998
Information security management (2): guidelines to the management of information technology security (GMITS).
Inf. Manag. Comput. Secur., 1998
Inf. Manag. Comput. Secur., 1998
Inf. Manag. Comput. Secur., 1998
1997
Can security baselines replace risk analysis?
Proceedings of the Information Security in Research and Business, 1997
1996
A business approach to effective information technology risk analysis and management.
Inf. Manag. Comput. Secur., 1996
1994
1993
A Process Approach to Information Security Management.
Proceedings of the Computer Security, 1993