dblp.uni-trier.dewww.uni-trier.de

Karin P. Badenhorst

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

1996
5EESharon Halliday, Karin P. Badenhorst, Rossouw von Solms: A business approach to effective information technology risk analysis and management. Inf. Manag. Comput. Security 4(1): 19-31 (1996)
1994
4EEKarin P. Badenhorst, Jan H. P. Eloff: TOPM: a formal approach to the optimization of information technology risk management. Computers & Security 13(5): 411-435 (1994)
1993
3EEJan H. P. Eloff, Les Labuschagne, Karin P. Badenhorst: A comparative framework for risk analysis methods. Computers & Security 12(6): 597-603 (1993)
1990
2EEKarin P. Badenhorst, Jan H. P. Eloff: Computer security methodology: Risk analysis and project definition. Computers & Security 9(4): 339-346 (1990)
1989
1EEKarin P. Badenhorst, Jan H. P. Eloff: Framework of a methodology for the life cycle of computer security in an organization. Computers & Security 8(5): 433-442 (1989)

Coauthor Index

1Jan H. P. Eloff [1] [2] [3] [4]
2Sharon Halliday [5]
3Les Labuschagne [3]
4Rossouw von Solms [5]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)