Rossouw von Solms

Orcid: 0000-0002-9860-2346

Affiliations:
  • Nelson Mandela University, Port Elizabeth, South Africa


According to our database1, Rossouw von Solms authored at least 112 papers between 1993 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Utility indicator for emotion detection in a speaker authentication system.
Inf. Comput. Secur., 2022

2021
A Feasibility Study Towards E-processing Supply Chain Management Transactions in South African Municipalities.
Proceedings of Sixth International Congress on Information and Communication Technology, 2021

2019
Devising a strategy for IT governance implementation in municipalities. A case study of South Africa.
Electron. J. Inf. Syst. Dev. Ctries., 2019

2018
Motivation and opportunity based model to reduce information security insider threats in organisations.
J. Inf. Secur. Appl., 2018

Cybersecurity and information security - what goes where?
Inf. Comput. Secur., 2018

Social Networking: A Tool for Effective Cybersecurity Education in Cyber-Driven Financial Transactions.
Proceedings of the Twelfth International Symposium on Human Aspects of Information Security & Assurance, 2018

2017
Cloud computing assurance - a review of literature guidance.
Inf. Comput. Secur., 2017

A general morphological analysis: delineating a cyber-security culture.
Inf. Comput. Secur., 2017

An ICT Strategy for the Sustainable Development of the Tourism Sector in a Developing Country: A Case Study of Zimbabwe.
Electron. J. Inf. Syst. Dev. Ctries., 2017

A Strategy for a Cybersecurity Culture: A South African Perspective.
Electron. J. Inf. Syst. Dev. Ctries., 2017

Cybersecurity Culture: An Ill-Defined Problem.
Proceedings of the Information Security Education for a Global Digital Society, 2017

2016
Publish or Perish - But where?
South Afr. Comput. J., 2016

Information security policy compliance model in organizations.
Comput. Secur., 2016

An information security knowledge sharing model in organizations.
Comput. Hum. Behav., 2016

A framework towards governing "Bring Your Own Device in SMMEs".
Proceedings of the 2016 Information Security for South Africa, 2016

2015
IT Security for SCADA: A Position Paper.
Int. J. Cyber Warf. Terror., 2015

Building Technology Trust in a Rural Agricultural e-Marketplace: A User Requirements Perspective.
Electron. J. Inf. Syst. Dev. Ctries., 2015

Information security conscious care behaviour formation in organizations.
Comput. Secur., 2015

Biometric identification: Are we ethically ready?
Proceedings of the 2015 Information Security for South Africa, 2015

Towards a Cybernetics-Based Communication Framework for IT Governance.
Proceedings of the 48th Hawaii International Conference on System Sciences, 2015

An Ontology for a National Cyber-Security Culture Environment.
Proceedings of the Ninth International Symposium on Human Aspects of Information Security & Assurance, 2015

2014
A conceptual framework for cyber-security awareness and education in SA.
South Afr. Comput. J., 2014

Information Security Assurance Model (ISAM) for an Examination Paper Preparation Process.
Proceedings of the 2014 Information Security for South Africa, 2014

Combatting phishing: A holistic human approach.
Proceedings of the 2014 Information Security for South Africa, 2014

The murky waters of IT governance.
Proceedings of the 2014 Information Security for South Africa, 2014

The Board and CIO: The IT Alignment Challenge.
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014

Towards Cyber Safety Education in Primary Schools in Africa.
Proceedings of the Eighth International Symposium on Human Aspects of Information Security & Assurance, 2014

2013
From information security to cyber security.
Comput. Secur., 2013

Phishing for phishing awareness.
Behav. Inf. Technol., 2013

A software gateway to affordable and effective Information Security Governance in SMMEs.
Proceedings of the 2013 Information Security for South Africa, 2013

A framework for assuring the conformance of cloud-based email.
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013

Using Theories and Best Practices to Bridge the Phishing Gap.
Proceedings of the European Information Security Multi-Conference (EISMC 2013), 2013

2012
Information Security Service Culture - Information Security for End-users.
J. Univers. Comput. Sci., 2012

Ethical Guidelines for Cyber-related Services Aimed at the Younger Generations.
Proceedings of the 6th International Symposium on Human Aspects of Information Security and Assurance, 2012

SecSDM: A usable tool to support IT undergraduate students in secure software development.
Proceedings of the 6th International Symposium on Human Aspects of Information Security and Assurance, 2012

Cyber Security Education in Developing Countries: A South African Perspective.
Proceedings of the e-Infrastructure and e-Services for Developing Countries, 2012

Electronic Communication: Stay Connected.
Proceedings of the e-Infrastructure and e-Services for Developing Countries, 2012

A Model for Information Security Governance in Developing Countries.
Proceedings of the e-Infrastructure and e-Services for Developing Countries, 2012

2011
How can secure software be trusted?
South Afr. Comput. J., 2011

Preventative Actions for Enhancing Online Protection and Privacy.
Int. J. Inf. Technol. Syst. Approach, 2011

Towards the Human Information Security Firewall.
Int. J. Cyber Warf. Terror., 2011

Information Security Governance control through comprehensive policy architectures.
Proceedings of the Information Security South Africa Conference 2011, 2011

Guidelines for the creation of brain compatible cyber security educational material in Moodle 2.0.
Proceedings of the Information Security South Africa Conference 2011, 2011

A web-based information security governance toolbox for small-to-medium enterprises in Southern Africa.
Proceedings of the Information Security South Africa Conference 2011, 2011

An Enterprise Anti-phishing Framework.
Proceedings of the Information Assurance and Security Education and Training, 2011

2010
Information Security Education in South Africa.
Inf. Manag. Comput. Secur., 2010

Information security culture: A management perspective.
Comput. Secur., 2010

Research Methodologies in Information Security Research: The Road Ahead.
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010

Sweetening the medicine: educating users about information security by means of game play.
Proceedings of the 2010 Annual Conference of the South African Institute of Computer Scientists and Information Technologists, 2010

Social Engineering: Towards A Holistic Solution.
Proceedings of the South African Information Security Multi-Conference, 2010

An Integrative Approach to Information Security Education: A South African Perspective.
Proceedings of the South African Information Security Multi-Conference, 2010

The Wild Wide West of Social Networking.
Proceedings of the South African Information Security Multi-Conference, 2010

2009
Concealing the Medicine: Information Security Education through Game Play.
Proceedings of the Information Security South Africa Conference 2009, 2009

Phishing: How an Organization can Protect Itself.
Proceedings of the Information Security South Africa Conference 2009, 2009

Using Bloom's Taxonomy for Information Security Education.
Proceedings of the Information Assurance and Security Education and Training, 2009

A Risk-Based Approach to Formalise Information Security Requirements for Software Development.
Proceedings of the Information Assurance and Security Education and Training, 2009

2008
Information security requirements - Interpreting the legal aspects.
Comput. Secur., 2008

Agency Theory: Can it be Used to Strengthen IT Governance?.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

Guidelines for secure software development.
Proceedings of the 2008 Annual Conference of the South African Institute of Computer Scientists and Information Technologists on IT Research in Developing Countries, 2008

Bloom's Taxonomy for Information Security Education.
Proceedings of the ISSA 2008 Innovative Minds Conference, 2008

2007
Utilizing fuzzy logic and neural networks for effective, preventative intrusion detection in a wireless environment.
Proceedings of the 2007 Annual Conference of the South African Institute of Computer Scientists and Information Technologists on IT Research in Developing Countries, 2007

SecSDM: A Model for Integrating Security into the Software Development Life Cycle.
Proceedings of the Fifth World Conference on Information Security Education, 2007

2006
Information security governance: Due care.
Comput. Secur., 2006

Information Security Governance: A model based on the Direct-Control Cycle.
Comput. Secur., 2006

Continuous auditing technologies and models: A discussion.
Comput. Secur., 2006

Trust: An Element of Information Security.
Proceedings of the Security and Privacy in Dynamic Environments, 2006

The Organisational Information Security Profile - A Tool to Assist The Board.
Proceedings of the ISSA 2006 from Insight to Foresight Conference, 2006

Understanding Information Security Culture: A Conceptual Framework.
Proceedings of the ISSA 2006 from Insight to Foresight Conference, 2006

2005
Information security obedience: a definition.
Comput. Secur., 2005

From information security to ... business security?
Comput. Secur., 2005

Management of risk in the information age.
Comput. Secur., 2005

Real-time information integrity = system integrity + data integrity + continuous assurances.
Comput. Secur., 2005

A holistic framework for the fostering of an information security sub-culture in organizations.
Proceedings of the ISSA 2005 New Knowledge Today Conference, 29 June, 2005

The Proliferation of Wireless Devices and its Role in Corporate Governance.
Proceedings of the ISSA 2005 New Knowledge Today Conference, 29 June, 2005

2004
A cyclic approach to business continuity planning.
Inf. Manag. Comput. Secur., 2004

Towards information security behavioural compliance.
Comput. Secur., 2004

The 10 deadly sins of information security management.
Comput. Secur., 2004

From policies to culture.
Comput. Secur., 2004

A framework for the governance of information security.
Comput. Secur., 2004

Information Security Governance - A Re-Definition.
Proceedings of the Security Management, Integrity, and Internal Control in Information Systems, 2004

A Responsibility Framework for Information Security.
Proceedings of the Security Management, Integrity, and Internal Control in Information Systems, 2004

Towards Corporate Information Security Obedience.
Proceedings of the Information Security Management, Education and Privacy, 2004

Corporate Information Security Education: Is Outcomes Based Education the Solution?
Proceedings of the Information Security Management, Education and Privacy, 2004

2003
A model for deriving information security control attribute profiles.
Comput. Secur., 2003

Utilising fuzzy logic and trend analysis for effective intrusion detection.
Comput. Secur., 2003

Information Security: Auditing the Behaviour of the Employee.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003

Integrating Information Security into Corporate Governance.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003

2002
The information security management toolbox - taking the pain out of security management.
Inf. Manag. Comput. Secur., 2002

The utilization of trend analysis in the effective monitoring of information security. Part 2: the model.
Inf. Manag. Comput. Secur., 2002

A Practical Approach to Information Security Awareness in the Organization.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002

The Effective Implementation of Information Security in Organizations.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002

2001
Formalizing information security requirements.
Inf. Manag. Comput. Secur., 2001

The utilization of trend analysis in the effective monitoring of information security. Part 1: the concept.
Inf. Manag. Comput. Secur., 2001

Incremental Information Security Certification.
Comput. Secur., 2001

From Risk Analysis to Security Requirements.
Comput. Secur., 2001

2000
A Formalized Approach to the Effective Selection and Evaluation of Information Security Control.
Comput. Secur., 2000

From Trusted Information Security Controls to a Trusted Information Security Environment.
Proceedings of the Information Security for Global Information Infrastructures, 2000

1999
Information security management: why standards are important.
Inf. Manag. Comput. Secur., 1999

The Effective Utilization of Audit Logs in Information Security Management.
Proceedings of the Information Security Management & Small Systems Security, IFIP TC11 WG11.1/WG11.2 Seventh Annual Working Conference on Information Security Management & Small Systems Security, September 30, 1999

1998
Information security awareness: educating your users effectively.
Inf. Manag. Comput. Secur., 1998

Information security management (3): the Code of Practice for Information Security Management (BS 7799).
Inf. Manag. Comput. Secur., 1998

Information security management (2): guidelines to the management of information technology security (GMITS).
Inf. Manag. Comput. Secur., 1998

Information security management (1): why information security is so important.
Inf. Manag. Comput. Secur., 1998

The evaluation and certification of information security against BS 7799.
Inf. Manag. Comput. Secur., 1998

1997
Driving safely on the information superhighway.
Inf. Manag. Comput. Secur., 1997

Can security baselines replace risk analysis?
Proceedings of the Information Security in Research and Business, 1997

1996
A business approach to effective information technology risk analysis and management.
Inf. Manag. Comput. Secur., 1996

Information security management: The second generation.
Comput. Secur., 1996

1994
A framework for information security evaluation.
Inf. Manag., 1994

1993
A Model for Information Security Management.
Inf. Manag. Comput. Secur., 1993

A Tool for Information Security Management.
Inf. Manag. Comput. Secur., 1993

A Process Approach to Information Security Management.
Proceedings of the Computer Security, 1993


  Loading...