-
1
-
-
0034140983
-
A Formalized Approach to the Effective Selection and Evaluation of Information Security Controls
-
Barnard, L., Von Solms, R. (2000). A Formalized Approach to the Effective Selection and Evaluation of Information Security Controls. Computers and Security, 19(2): pp. 185-194.
-
(2000)
Computers and Security
, vol.19
, Issue.2
, pp. 185-194
-
-
Barnard, L.1
von Solms, R.2
-
3
-
-
0007551808
-
Managing and controlling computer misuse
-
Dhillon, G. (1999) Managing and controlling computer misuse, Information Management & Computer Security, 7 (4), pp. 171-175.
-
(1999)
Information Management & Computer Security
, vol.7
, Issue.4
, pp. 171-175
-
-
Dhillon, G.1
-
4
-
-
13444312998
-
-
Department of Education (DOE), Department of Education., Available at
-
Department of Education (DOE). (2001) Draft Revised National Curriculum Statement: Technology Learning Area. Department of Education. Available at: http://education.pwv.gov.za/DoE_Sites/Curriculum/New_2005/draft_revised_national_curriculu.htm
-
(2001)
Draft Revised National Curriculum Statement: Technology Learning Area
-
-
-
5
-
-
0003418012
-
-
New York, New York: SIGS Books & Multimedia Guidelines to the Management of Information Technology Security (GMITS). (1995). Part 1, ISO/IEC, JTC 1, SC27, WG 1
-
Fingar, P. (1996). The blueprint for business objects. New York, New York: SIGS Books & Multimedia Guidelines to the Management of Information Technology Security (GMITS). (1995). Part 1, ISO/IEC, JTC 1, SC27, WG 1.
-
(1996)
The Blueprint For Business Objects
-
-
Fingar, P.1
-
6
-
-
84900591280
-
The Web and distance learning:What is appropriate and what is not
-
ITiCSE Working Group on the Web and Distance Learning
-
ITiCSE Working Group on the Web and Distance Learning (1997). The Web and distance learning:what is appropriate and what is not. ITiCSE'97 Working Group Reports and Supplemental Proceedings, pp. 27-37.
-
(1997)
ITiCSE'97 Working Group Reports and Supplemental Proceedings
, pp. 27-37
-
-
-
7
-
-
33847770271
-
-
Unpublished manuscript, University of Newcastle, Faculty of Education. [WWW document]. URL, Sited 20 August 2003
-
Killen, R. (2000). Outcomes-Based education: Principles and Possibilities. Unpublished manuscript, University of Newcastle, Faculty of Education. [WWW document]. URL http://www.schools.nt.edu.au/curricbr/cf/outcomefocus/killen_paper.pdf. Sited 20 August 2003.
-
(2000)
Outcomes-Based Education: Principles and Possibilities
-
-
Killen, R.1
-
10
-
-
84908665492
-
Assessing Information Security Culture
-
Martins, A., Eloff, J.H.P. (2002) Assessing Information Security Culture. ISSA 2002, Muldersdrift, South Africa, 10-12 July 2002.
-
-
-
Martins, A.1
Eloff, J.H.P.2
-
12
-
-
6744258985
-
-
National Institute of Standards and Technology (NIST), NIST Special Publication 800-16. U.S. Government Printing Office, Washington
-
National Institute of Standards and Technology (NIST). (1998). Information Technology Security Training Requirements: A Role- and Performance-Based Model. NIST Special Publication 800-16. U.S. Government Printing Office, Washington.
-
(1998)
Information Technology Security Training Requirements: A Role- and Performance-Based Model
-
-
-
13
-
-
0033745439
-
Implementing Information Security In the 21st Century - Do You Have the Balancing Factors?
-
Elsevier Science Ltd
-
Nosworthy, J. D. (2000) Implementing Information Security In the 21st Century - Do You Have the Balancing Factors? Computer & Security (19), pp. 337-347. Elsevier Science Ltd.
-
(2000)
Computer & Security
, Issue.19
, pp. 337-347
-
-
Nosworthy, J.D.1
-
17
-
-
0013049553
-
-
South African Qualifications Authority (SAQA), Retrieved on 10 September 2003 from URL
-
South African Qualifications Authority (SAQA) (2000). The National Qualifications Framework and Curriculum Development. Retrieved on 10 September 2003 from URL http://www.saqa.org.za
-
(2000)
The National Qualifications Framework and Curriculum Development
-
-
-
18
-
-
77955673648
-
Information Security Culture - From Analysis to Change
-
9-11 July 2003, Sandton, South Africa
-
Schlienger, T., Teufel, S. (2003) Information Security Culture - From Analysis to Change. Proceedings of the 3rd Annual Information Security South Africa Conference, 9-11 July 2003, Sandton, South Africa, pp. 183-196.
-
(2003)
Proceedings of the 3rd Annual Information Security South Africa Conference
, pp. 183-196
-
-
Schlienger, T.1
Teufel, S.2
-
20
-
-
53049103906
-
Five Dimensions of Information Security Awareness
-
June 2001
-
Siponen, M.T. (2001). Five Dimensions of Information Security Awareness. Computers and Society, June 2001. Pp. 24-29.
-
(2001)
Computers and Society
, pp. 24-29
-
-
Siponen, M.T.1
-
23
-
-
22544461830
-
Education in Information Security
-
October-December 2000
-
Tripathi, A. (2000) Education in Information Security. IEEE Concurrency, October-December 2000, pp. 4-8.
-
(2000)
IEEE Concurrency
, pp. 4-8
-
-
Tripathi, A.1
-
24
-
-
0004020198
-
-
United States of America. John Wiley & Sons, inc
-
Turban, E., Mclean, E., Wetherbe, J. (2002). Information technology for management: Transforming business in the digital economy (3rd Ed).United States of America. John Wiley & Sons, inc.
-
(2002)
Information Technology For Management: Transforming Business In the Digital Economy (3rd Ed)
-
-
Turban, E.1
McLean, E.2
Wetherbe, J.3
-
25
-
-
84902481869
-
Establishing an Information Security Culture in Organisations: An Outcomes Based Education Approach
-
9-11 July 2003, Sandton, South Africa
-
Van Niekerk, J., Von Solms, R. (2003). Establishing an Information Security Culture in Organisations: An Outcomes Based Education Approach. Proceedings of the 3rd Annual Information Security South Africa Conference, 9-11 July 2003, Sandton, South Africa, pp. 3-12.
-
(2003)
Proceedings of the 3rd Annual Information Security South Africa Conference
, pp. 3-12
-
-
van Niekerk, J.1
von Solms, R.2
-
26
-
-
0033657872
-
Information Security - The Third Wave?
-
Von Solms, B. (2000) Information Security - The Third Wave? Computers & Security, 19 (7), pp. 615-620.
-
(2000)
Computers & Security
, vol.19
, Issue.7
, pp. 615-620
-
-
von Solms, B.1
-
27
-
-
0001897127
-
Information Security Management: Why standards are important
-
Von Solms, R. (1999) Information Security Management: why standards are important. Information Management & Computer Security, 7 (1), pp. 50-57.
-
(1999)
Information Management & Computer Security
, vol.7
, Issue.1
, pp. 50-57
-
-
von Solms, R.1
-
29
-
-
33744787989
-
Policies alone do not constitute a sufficient awareness effort
-
December 1997
-
Wood, C.C. (1997) Policies alone do not constitute a sufficient awareness effort. Computer Fraud & Security, December 1997, pp. 14-19.
-
(1997)
Computer Fraud & Security
, pp. 14-19
-
-
Wood, C.C.1
|