![]() |
| 1996 | ||
|---|---|---|
| 5 | EE | Sharon Halliday, Karin P. Badenhorst, Rossouw von Solms: A business approach to effective information technology risk analysis and management. Inf. Manag. Comput. Security 4(1): 19-31 (1996) |
| 1994 | ||
| 4 | EE | Karin P. Badenhorst, Jan H. P. Eloff: TOPM: a formal approach to the optimization of information technology risk management. Computers & Security 13(5): 411-435 (1994) |
| 1993 | ||
| 3 | EE | Jan H. P. Eloff, Les Labuschagne, Karin P. Badenhorst: A comparative framework for risk analysis methods. Computers & Security 12(6): 597-603 (1993) |
| 1990 | ||
| 2 | EE | Karin P. Badenhorst, Jan H. P. Eloff: Computer security methodology: Risk analysis and project definition. Computers & Security 9(4): 339-346 (1990) |
| 1989 | ||
| 1 | EE | Karin P. Badenhorst, Jan H. P. Eloff: Framework of a methodology for the life cycle of computer security in an organization. Computers & Security 8(5): 433-442 (1989) |
| 1 | Jan H. P. Eloff | [1] [2] [3] [4] |
| 2 | Sharon Halliday | [5] |
| 3 | Les Labuschagne | [3] |
| 4 | Rossouw von Solms | [5] |