dblp.uni-trier.dewww.uni-trier.de

Rossouw von Solms

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
55EEJohan Van Niekerk, Rossouw von Solms: Bloom's Taxonomy for Information Security Education. ISSA 2008: 1-13
54EELynn Futcher, Rossouw von Solms: Guidelines for secure software development. SAICSIT Conf. 2008: 56-65
53EEShaun Posthumus, Rossouw von Solms: Agency Theory: Can it be Used to Strengthen IT Governance?. SEC 2008: 687-691
52EEMariana Gerber, Rossouw von Solms: Information security requirements - Interpreting the legal aspects. Computers & Security 27(5-6): 124-135 (2008)
2007
51 Hein S. Venter, Mariki M. Eloff, Les Labuschagne, Jan H. P. Eloff, Rossouw von Solms: New Approaches for Security, Privacy and Trust in Complex Environments, Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa Springer 2007
50EERobert Goss, Martin Botha, Rossouw von Solms: Utilizing fuzzy logic and neural networks for effective, preventative intrusion detection in a wireless environment. SAICSIT Conf. 2007: 29-35
49EELynn Futcher, Rossouw von Solms: SecSDM: A Model for Integrating Security into the Software Development Life Cycle. World Conference on Information Security Education 2007: 41-48
2006
48EEJohan Van Niekerk, Rossouw von Solms: Understanding Information Security Culture: A Conceptual Framework. ISSA 2006: 1-10
47EEMkhululi Tyukala, Dalenca Pottas, Rossouw von Solms, Helen van de Haar: The Organisational Information Security Profile - A Tool to Assist The Board. ISSA 2006: 1-13
46EEStephen Flowerday, Rossouw von Solms: Trust: An Element of Information Security. SEC 2006: 87-98
45EEStephen Flowerday, A. W. Blundell, Rossouw von Solms: Continuous auditing technologies and models: A discussion. Computers & Security 25(5): 325-331 (2006)
44EERossouw von Solms, Sebastiaan H. von Solms: Information Security Governance: A model based on the Direct-Control Cycle. Computers & Security 25(6): 408-412 (2006)
43EERossouw von Solms, Sebastiaan H. von Solms: Information security governance: Due care. Computers & Security 25(7): 494-497 (2006)
2005
42EER. Mulder, Rossouw von Solms: The Proliferation of Wireless Devices and its Role in Corporate Governance. ISSA 2005: 1-11
41EEJohan Van Niekerk, Rossouw von Solms: A holistic framework for the fostering of an information security sub-culture in organizations. ISSA 2005: 1-13
40EEMariana Gerber, Rossouw von Solms: Management of risk in the information age. Computers & Security 24(1): 16-30 (2005)
39EEKerry-Lynn Thomson, Rossouw von Solms: Information security obedience: a definition. Computers & Security 24(1): 69-75 (2005)
38EEBasie von Solms, Rossouw von Solms: From information security to ... business security? Computers & Security 24(4): 271-273 (2005)
37EEStephen Flowerday, Rossouw von Solms: Real-time information integrity = system integrity + data integrity + continuous assurances. Computers & Security 24(8): 604-613 (2005)
2004
36 Kerry-Lynn Thomson, Rossouw von Solms: Towards Corporate Information Security Obedience. International Information Security Workshops 2004: 19-32
35 Johan Van Niekerk, Rossouw von Solms: Corporate Information Security Education: Is Outcomes Based Education the Solution? International Information Security Workshops 2004: 3-18
34EECheryl Vroom, Rossouw von Solms: Towards information security behavioural compliance. Computers & Security 23(3): 191-198 (2004)
33EERossouw von Solms, Sebastiaan H. von Solms: From policies to culture. Computers & Security 23(4): 275-279 (2004)
32EESebastiaan H. von Solms, Rossouw von Solms: The 10 deadly sins of information security management. Computers & Security 23(5): 371-376 (2004)
31EEShaun Posthumus, Rossouw von Solms: A framework for the governance of information security. Computers & Security 23(8): 638-646 (2004)
2003
30 Kerry-Lynn Thomson, Rossouw von Solms: Integrating Information Security into Corporate Governance. SEC 2003: 169-180
29 Cheryl Vroom, Rossouw von Solms: Information Security: Auditing the Behaviour of the Employee. SEC 2003: 401-404
28EEHelen van de Haar, Rossouw von Solms: A model for deriving information security control attribute profiles. Computers & Security 22(3): 233-244 (2003)
27EEMartin Botha, Rossouw von Solms: Utilising fuzzy logic and trend analysis for effective intrusion detection. Computers & Security 22(5): 423-434 (2003)
2002
26 O. A. Hoppe, Johan Van Niekerk, Rossouw von Solms: The Effective Implementation of Information Security in Organizations. SEC 2002: 1-18
25 Cheryl Vroom, Rossouw von Solms: A Practical Approach to Information Security Awareness in the Organization. SEC 2002: 19-38
24EEMartin Botha, Rossouw von Solms: The utilization of trend analysis in the effective monitoring of information security. Part 2: the model. Inf. Manag. Comput. Security 10(1): 5-11 (2002)
23EEClive Vermeulen, Rossouw von Solms: The information security management toolbox - taking the pain out of security management. Inf. Manag. Comput. Security 10(3): 119-125 (2002)
2001
22 Jan H. P. Eloff, Les Labuschagne, Rossouw von Solms, Gurpreet Dhillon: Advances in Information Security Management & Small Systems Security, IFIP TC11 WG11.1/WG11.2 Eigth Annual Working Conference on Information Security Management & Small Systems Security, September 27-28, 2001, Las Vegas, Nevada, USA Kluwer 2001
21 Basie von Solms, Rossouw von Solms: Incremental Information Security Certification. Computers & Security 20(4): 308-310 (2001)
20 Mariana Gerber, Rossouw von Solms: From Risk Analysis to Security Requirements. Computers & Security 20(7): 577-584 (2001)
19EEMariana Gerber, Rossouw von Solms, Paul L. Overbeek: Formalizing information security requirements. Inf. Manag. Comput. Security 9(1): 32-37 (2001)
18EEMartin Botha, Rossouw von Solms: The utilization of trend analysis in the effective monitoring of information security. Part 1: the concept. Inf. Manag. Comput. Security 9(5): 237-242 (2001)
2000
17 Rossouw von Solms, Helen van de Haar: From Trusted Information Security Controls to a Trusted Information Security Environment. SEC 2000: 29-36
16 Lynette Barnard, Rossouw von Solms: A Formalized Approach to the Effective Selection and Evaluation of Information Security Control. Computers & Security 19(2): 185-194 (2000)
1999
15 Jan H. P. Eloff, Les Labuschagne, Rossouw von Solms, Jan Verschuren: Information Security Management & Small Systems Security, IFIP TC11 WG11.1/WG11.2 Seventh Annual Working Conference on Information Security Management & Small Systems Security, September 30 - October 1, 1999, Amsterdam, The Netherlands Kluwer 1999
14 Werner Olivier, Rossouw von Solms: The Effective Utilization of Audit Logs in Information Security Management. Conference on Information Security Management & Small Systems Security 1999: 51-62
13EERossouw von Solms: Information security management: why standards are important. Inf. Manag. Comput. Security 7(1): 50-58 (1999)
1998
12EELynette Barnard, Rossouw von Solms: The evaluation and certification of information security against BS 7799. Inf. Manag. Comput. Security 6(2): 72-77 (1998)
11EEM. E. Thomson, Rossouw von Solms: Information security awareness: educating your users effectively. Inf. Manag. Comput. Security 6(4): 167-173 (1998)
10EERossouw von Solms: Information security management (1): why information security is so important. Inf. Manag. Comput. Security 6(4): 174-177 (1998)
9EERossouw von Solms: Information security management (2): guidelines to the management of information technology security (GMITS). Inf. Manag. Comput. Security 6(5): 221-223 (1998)
8EERossouw von Solms: Information security management (3): the Code of Practice for Information Security Management (BS 7799). Inf. Manag. Comput. Security 6(5): 224-225 (1998)
1997
7 Rossouw von Solms: Can security baselines replace risk analysis? SEC 1997: 91-98
6EERossouw von Solms: Driving safely on the information superhighway. Inf. Manag. Comput. Security 5(1): 20-22 (1997)
1996
5EERossouw von Solms: Information security management: The second generation. Computers & Security 15(4): 281-288 (1996)
4EESharon Halliday, Karin P. Badenhorst, Rossouw von Solms: A business approach to effective information technology risk analysis and management. Inf. Manag. Comput. Security 4(1): 19-31 (1996)
1993
3 Rossouw von Solms, Sebastiaan H. von Solms, John M. Carroll: A Process Approach to Information Security Management. SEC 1993: 385-399
2EEHelen van de Haar, Rossouw von Solms: A Tool for Information Security Management. Inf. Manag. Comput. Security 1(1): (1993)
1EERossouw von Solms, Sebastiaan H. von Solms, William J. Caelli: A Model for Information Security Management. Inf. Manag. Comput. Security 1(3): (1993)

Coauthor Index

1Karin P. Badenhorst [4]
2Lynette Barnard [12] [16]
3A. W. Blundell [45]
4Martin Botha [18] [24] [27] [50]
5William J. Caelli [1]
6John M. Carroll [3]
7Gurpreet Dhillon [22]
8Jan H. P. Eloff [15] [22] [51]
9Mariki M. Eloff [51]
10Stephen Flowerday [37] [45] [46]
11Lynn Futcher [49] [54]
12Mariana Gerber [19] [20] [40] [52]
13Robert Goss [50]
14Helen van de Haar [2] [17] [28] [47]
15Sharon Halliday [4]
16O. A. Hoppe [26]
17Les Labuschagne [15] [22] [51]
18R. Mulder [42]
19Johan Van Niekerk [26] [35] [41] [48] [55]
20Werner Olivier [14]
21Paul L. Overbeek [19]
22Shaun Posthumus [31] [53]
23Dalenca Pottas [47]
24Sebastiaan H. von Solms (Basie von Solms) [1] [3] [21] [32] [33] [38] [43] [44]
25Kerry-Lynn Thomson [30] [36] [39]
26M. E. Thomson [11]
27Mkhululi Tyukala [47]
28Hein S. Venter (H. S. Venter) [51]
29Clive Vermeulen [23]
30Jan Verschuren [15]
31Cheryl Vroom [25] [29] [34]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)