1996 | ||
---|---|---|
5 | EE | Sharon Halliday, Karin P. Badenhorst, Rossouw von Solms: A business approach to effective information technology risk analysis and management. Inf. Manag. Comput. Security 4(1): 19-31 (1996) |
1994 | ||
4 | EE | Karin P. Badenhorst, Jan H. P. Eloff: TOPM: a formal approach to the optimization of information technology risk management. Computers & Security 13(5): 411-435 (1994) |
1993 | ||
3 | EE | Jan H. P. Eloff, Les Labuschagne, Karin P. Badenhorst: A comparative framework for risk analysis methods. Computers & Security 12(6): 597-603 (1993) |
1990 | ||
2 | EE | Karin P. Badenhorst, Jan H. P. Eloff: Computer security methodology: Risk analysis and project definition. Computers & Security 9(4): 339-346 (1990) |
1989 | ||
1 | EE | Karin P. Badenhorst, Jan H. P. Eloff: Framework of a methodology for the life cycle of computer security in an organization. Computers & Security 8(5): 433-442 (1989) |
1 | Jan H. P. Eloff | [1] [2] [3] [4] |
2 | Sharon Halliday | [5] |
3 | Les Labuschagne | [3] |
4 | Rossouw von Solms | [5] |