-
1
-
-
0007551808
-
Managing and controlling computer misuse
-
Dhillon, G. (1999), “Managing and controlling computer misuse”, Information Management & Computer Security, Vol. 7 No. 4, pp. 171-5.
-
(1999)
Information Management & Computer Security
, vol.7
, Issue.4
, pp. 171-175
-
-
Dhillon, G.1
-
2
-
-
34447503284
-
Assessing the security perceptions of personal internet users
-
Furnell, S.M., Bryant, P. and Phippen, A.D. (2007), “Assessing the security perceptions of personal internet users”, Computers and Security, Vol. 26 No. 5, pp. 410-417.
-
(2007)
Computers and Security
, vol.26
, Issue.5
, pp. 410-417
-
-
Furnell, S.M.1
Bryant, P.2
Phippen, A.D.3
-
3
-
-
84926192795
-
The use of an information security vocabulary test to assess information security awareness – an exploratory study
-
Centre for Security, Communications & Network Research, University of Plymouth Plymouth
-
Kruger, H.A., Drevin, L. and Steyn, T. (2010), “The use of an information security vocabulary test to assess information security awareness – an exploratory study”, in Ed. Clarke, N., Ed. Furnell, S. and Ed. von Solms, R. (Eds), Proceedings of the South African Information Security Multi-Conference, Port Elizabeth, South Africa 17-18 May, Centre for Security, Communications & Network Research, University of Plymouth, Plymouth.
-
(2010)
Proceedings of the South African Information Security Multi-Conference, Port Elizabeth, South Africa 17-18 May
-
-
Kruger, H.A.1
Drevin, L.2
Steyn, T.3
Clarke, N.4
Furnell, S.5
von Solms, R.6
-
4
-
-
84992965982
-
A role-based security awareness model for South African hospitals
-
Maseti, O. and Pottas, D. (2006), “A role-based security awareness model for South African hospitals”, Proceedings of the 6th Annual Information Security South Africa Conference, Sandton, South Africa, 5-7 July.
-
(2006)
Proceedings of the 6th Annual Information Security South Africa Conference, Sandton, South Africa, 5-7 July
-
-
Maseti, O.1
Pottas, D.2
-
5
-
-
33847681999
-
-
International Association for the Evaluation of Educational Achievement (IEA), Boston college Boston, MA
-
Mullis, I.V.S., Martin, M.O. and Foy, P. (2005), IEA's TIMMS 2003, International Report on Achievement in the Mathematics Cognitive Domains, International Association for the Evaluation of Educational Achievement (IEA), Boston college, Boston, MA.
-
(2005)
IEA's TIMMS 2003, International Report on Achievement in the Mathematics Cognitive Domains
-
-
Mullis, I.V.S.1
Martin, M.O.2
Foy, P.3
-
7
-
-
0004198635
-
-
4th ed. Prentice-Hall Upper Saddle River, NJ
-
Pfleeger, C.P. and Pfleeger, S.L. (2007), Security in Computing, 4th ed., Prentice-Hall, Upper Saddle River, NJ.
-
(2007)
Security in Computing
-
-
Pfleeger, C.P.1
Pfleeger, S.L.2
-
8
-
-
78049400376
-
Information security breaches survey
-
Price WaterhouseCoopers Technical report, available at: (accessed 25 November 2009).
-
Price WaterhouseCoopers (2008), “Information security breaches survey”, Technical report, available at: www.security-survey.gov.uk (accessed 25 November 2009).
-
(2008)
-
-
-
11
-
-
84993018537
-
SANS
-
SANS Institute Info Sec Reading Room Bethesda, MA
-
SANS (2005), E-mail Security Threats, SANS Institute Info Sec Reading Room, Bethesda, MA.
-
(2005)
E-mail Security Threats
-
-
-
12
-
-
33747019602
-
Information security culture – from analysis to change
-
Schlienger, T. and Teufel, S. (2003), “Information security culture – from analysis to change”, South African Computer Journal, Vol. 31, pp. 46-52.
-
(2003)
South African Computer Journal
, vol.31
, pp. 46-52
-
-
Schlienger, T.1
Teufel, S.2
-
14
-
-
78650334288
-
Aanpassing van die studie oriëntasievraelys in Wiskunde vir gebruik in die intermediêre fase
-
PhD dissertation North-West University Potchefstroom
-
van der Walt, M.S. (2008), “Aanpassing van die studie oriëntasievraelys in Wiskunde vir gebruik in die intermediêre fase”, PhD dissertation, North-West University, Potchefstroom.
-
(2008)
-
-
van der Walt, M.S.1
-
15
-
-
78049460970
-
A mathematics vocabulary questionnaire for use in the intermediate phase
-
van der Walt, M.S., Maree, K. and Ellis, S. (2008), “A mathematics vocabulary questionnaire for use in the intermediate phase”, South African Journal of Education, No. 28, pp. 489-504.
-
(2008)
South African Journal of Education
, Issue.28
, pp. 489-504
-
-
van der Walt, M.S.1
Maree, K.2
Ellis, S.3
-
16
-
-
78650400797
-
Establishing an information security culture in organizations: an outcomes based education approach
-
M dissertation Nelson Mandela Metropolitan University Port Elizabeth
-
van Niekerk, J.F. (2005), “Establishing an information security culture in organizations: an outcomes based education approach”, M dissertation, Nelson Mandela Metropolitan University, Port Elizabeth.
-
(2005)
-
-
van Niekerk, J.F.1
-
17
-
-
84902481869
-
Corporate information security education: is outcomes based education the solution?
-
paper presented at the 10th IFIP WG11.1 Annual Working Conference on Information Security Management World Computer Congress (WCC) Toulouse
-
van Niekerk, J.F. and von Solms, R. (2004), “Corporate information security education: is outcomes based education the solution?”, paper presented at the 10th IFIP WG11.1 Annual Working Conference on Information Security Management, World Computer Congress (WCC), Toulouse.
-
(2004)
-
-
van Niekerk, J.F.1
von Solms, R.2
-
18
-
-
0011586156
-
Information security management (3): the code of practice for information security management (BS7799)
-
von Solms, R. (1998), “Information security management (3): the code of practice for information security management (BS7799)”, Information Management & Computer Security, Vol. 6 No. 5, pp. 224-5.
-
(1998)
Information Management & Computer Security
, vol.6
, Issue.5
, pp. 224-225
-
-
von Solms, R.1
|