2008 |
55 | EE | Johan Van Niekerk,
Rossouw von Solms:
Bloom's Taxonomy for Information Security Education.
ISSA 2008: 1-13 |
54 | EE | Lynn Futcher,
Rossouw von Solms:
Guidelines for secure software development.
SAICSIT Conf. 2008: 56-65 |
53 | EE | Shaun Posthumus,
Rossouw von Solms:
Agency Theory: Can it be Used to Strengthen IT Governance?.
SEC 2008: 687-691 |
52 | EE | Mariana Gerber,
Rossouw von Solms:
Information security requirements - Interpreting the legal aspects.
Computers & Security 27(5-6): 124-135 (2008) |
2007 |
51 | | Hein S. Venter,
Mariki M. Eloff,
Les Labuschagne,
Jan H. P. Eloff,
Rossouw von Solms:
New Approaches for Security, Privacy and Trust in Complex Environments, Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa
Springer 2007 |
50 | EE | Robert Goss,
Martin Botha,
Rossouw von Solms:
Utilizing fuzzy logic and neural networks for effective, preventative intrusion detection in a wireless environment.
SAICSIT Conf. 2007: 29-35 |
49 | EE | Lynn Futcher,
Rossouw von Solms:
SecSDM: A Model for Integrating Security into the Software Development Life Cycle.
World Conference on Information Security Education 2007: 41-48 |
2006 |
48 | EE | Johan Van Niekerk,
Rossouw von Solms:
Understanding Information Security Culture: A Conceptual Framework.
ISSA 2006: 1-10 |
47 | EE | Mkhululi Tyukala,
Dalenca Pottas,
Rossouw von Solms,
Helen van de Haar:
The Organisational Information Security Profile - A Tool to Assist The Board.
ISSA 2006: 1-13 |
46 | EE | Stephen Flowerday,
Rossouw von Solms:
Trust: An Element of Information Security.
SEC 2006: 87-98 |
45 | EE | Stephen Flowerday,
A. W. Blundell,
Rossouw von Solms:
Continuous auditing technologies and models: A discussion.
Computers & Security 25(5): 325-331 (2006) |
44 | EE | Rossouw von Solms,
Sebastiaan H. von Solms:
Information Security Governance: A model based on the Direct-Control Cycle.
Computers & Security 25(6): 408-412 (2006) |
43 | EE | Rossouw von Solms,
Sebastiaan H. von Solms:
Information security governance: Due care.
Computers & Security 25(7): 494-497 (2006) |
2005 |
42 | EE | R. Mulder,
Rossouw von Solms:
The Proliferation of Wireless Devices and its Role in Corporate Governance.
ISSA 2005: 1-11 |
41 | EE | Johan Van Niekerk,
Rossouw von Solms:
A holistic framework for the fostering of an information security sub-culture in organizations.
ISSA 2005: 1-13 |
40 | EE | Mariana Gerber,
Rossouw von Solms:
Management of risk in the information age.
Computers & Security 24(1): 16-30 (2005) |
39 | EE | Kerry-Lynn Thomson,
Rossouw von Solms:
Information security obedience: a definition.
Computers & Security 24(1): 69-75 (2005) |
38 | EE | Basie von Solms,
Rossouw von Solms:
From information security to ... business security?
Computers & Security 24(4): 271-273 (2005) |
37 | EE | Stephen Flowerday,
Rossouw von Solms:
Real-time information integrity = system integrity + data integrity + continuous assurances.
Computers & Security 24(8): 604-613 (2005) |
2004 |
36 | | Kerry-Lynn Thomson,
Rossouw von Solms:
Towards Corporate Information Security Obedience.
International Information Security Workshops 2004: 19-32 |
35 | | Johan Van Niekerk,
Rossouw von Solms:
Corporate Information Security Education: Is Outcomes Based Education the Solution?
International Information Security Workshops 2004: 3-18 |
34 | EE | Cheryl Vroom,
Rossouw von Solms:
Towards information security behavioural compliance.
Computers & Security 23(3): 191-198 (2004) |
33 | EE | Rossouw von Solms,
Sebastiaan H. von Solms:
From policies to culture.
Computers & Security 23(4): 275-279 (2004) |
32 | EE | Sebastiaan H. von Solms,
Rossouw von Solms:
The 10 deadly sins of information security management.
Computers & Security 23(5): 371-376 (2004) |
31 | EE | Shaun Posthumus,
Rossouw von Solms:
A framework for the governance of information security.
Computers & Security 23(8): 638-646 (2004) |
2003 |
30 | | Kerry-Lynn Thomson,
Rossouw von Solms:
Integrating Information Security into Corporate Governance.
SEC 2003: 169-180 |
29 | | Cheryl Vroom,
Rossouw von Solms:
Information Security: Auditing the Behaviour of the Employee.
SEC 2003: 401-404 |
28 | EE | Helen van de Haar,
Rossouw von Solms:
A model for deriving information security control attribute profiles.
Computers & Security 22(3): 233-244 (2003) |
27 | EE | Martin Botha,
Rossouw von Solms:
Utilising fuzzy logic and trend analysis for effective intrusion detection.
Computers & Security 22(5): 423-434 (2003) |
2002 |
26 | | O. A. Hoppe,
Johan Van Niekerk,
Rossouw von Solms:
The Effective Implementation of Information Security in Organizations.
SEC 2002: 1-18 |
25 | | Cheryl Vroom,
Rossouw von Solms:
A Practical Approach to Information Security Awareness in the Organization.
SEC 2002: 19-38 |
24 | EE | Martin Botha,
Rossouw von Solms:
The utilization of trend analysis in the effective monitoring of information security. Part 2: the model.
Inf. Manag. Comput. Security 10(1): 5-11 (2002) |
23 | EE | Clive Vermeulen,
Rossouw von Solms:
The information security management toolbox - taking the pain out of security management.
Inf. Manag. Comput. Security 10(3): 119-125 (2002) |
2001 |
22 | | Jan H. P. Eloff,
Les Labuschagne,
Rossouw von Solms,
Gurpreet Dhillon:
Advances in Information Security Management & Small Systems Security, IFIP TC11 WG11.1/WG11.2 Eigth Annual Working Conference on Information Security Management & Small Systems Security, September 27-28, 2001, Las Vegas, Nevada, USA
Kluwer 2001 |
21 | | Basie von Solms,
Rossouw von Solms:
Incremental Information Security Certification.
Computers & Security 20(4): 308-310 (2001) |
20 | | Mariana Gerber,
Rossouw von Solms:
From Risk Analysis to Security Requirements.
Computers & Security 20(7): 577-584 (2001) |
19 | EE | Mariana Gerber,
Rossouw von Solms,
Paul L. Overbeek:
Formalizing information security requirements.
Inf. Manag. Comput. Security 9(1): 32-37 (2001) |
18 | EE | Martin Botha,
Rossouw von Solms:
The utilization of trend analysis in the effective monitoring of information security. Part 1: the concept.
Inf. Manag. Comput. Security 9(5): 237-242 (2001) |
2000 |
17 | | Rossouw von Solms,
Helen van de Haar:
From Trusted Information Security Controls to a Trusted Information Security Environment.
SEC 2000: 29-36 |
16 | | Lynette Barnard,
Rossouw von Solms:
A Formalized Approach to the Effective Selection and Evaluation of Information Security Control.
Computers & Security 19(2): 185-194 (2000) |
1999 |
15 | | Jan H. P. Eloff,
Les Labuschagne,
Rossouw von Solms,
Jan Verschuren:
Information Security Management & Small Systems Security, IFIP TC11 WG11.1/WG11.2 Seventh Annual Working Conference on Information Security Management & Small Systems Security, September 30 - October 1, 1999, Amsterdam, The Netherlands
Kluwer 1999 |
14 | | Werner Olivier,
Rossouw von Solms:
The Effective Utilization of Audit Logs in Information Security Management.
Conference on Information Security Management & Small Systems Security 1999: 51-62 |
13 | EE | Rossouw von Solms:
Information security management: why standards are important.
Inf. Manag. Comput. Security 7(1): 50-58 (1999) |
1998 |
12 | EE | Lynette Barnard,
Rossouw von Solms:
The evaluation and certification of information security against BS 7799.
Inf. Manag. Comput. Security 6(2): 72-77 (1998) |
11 | EE | M. E. Thomson,
Rossouw von Solms:
Information security awareness: educating your users effectively.
Inf. Manag. Comput. Security 6(4): 167-173 (1998) |
10 | EE | Rossouw von Solms:
Information security management (1): why information security is so important.
Inf. Manag. Comput. Security 6(4): 174-177 (1998) |
9 | EE | Rossouw von Solms:
Information security management (2): guidelines to the management of information technology security (GMITS).
Inf. Manag. Comput. Security 6(5): 221-223 (1998) |
8 | EE | Rossouw von Solms:
Information security management (3): the Code of Practice for Information Security Management (BS 7799).
Inf. Manag. Comput. Security 6(5): 224-225 (1998) |
1997 |
7 | | Rossouw von Solms:
Can security baselines replace risk analysis?
SEC 1997: 91-98 |
6 | EE | Rossouw von Solms:
Driving safely on the information superhighway.
Inf. Manag. Comput. Security 5(1): 20-22 (1997) |
1996 |
5 | EE | Rossouw von Solms:
Information security management: The second generation.
Computers & Security 15(4): 281-288 (1996) |
4 | EE | Sharon Halliday,
Karin P. Badenhorst,
Rossouw von Solms:
A business approach to effective information technology risk analysis and management.
Inf. Manag. Comput. Security 4(1): 19-31 (1996) |
1993 |
3 | | Rossouw von Solms,
Sebastiaan H. von Solms,
John M. Carroll:
A Process Approach to Information Security Management.
SEC 1993: 385-399 |
2 | EE | Helen van de Haar,
Rossouw von Solms:
A Tool for Information Security Management.
Inf. Manag. Comput. Security 1(1): (1993) |
1 | EE | Rossouw von Solms,
Sebastiaan H. von Solms,
William J. Caelli:
A Model for Information Security Management.
Inf. Manag. Comput. Security 1(3): (1993) |