Search the dblp DataBase
Rossouw von Solms :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Werner Olivier , Rossouw von Solms The Effective Utilization of Audit Logs in Information Security Management. [Citation Graph (0, 0)][DBLP ] Conference on Information Security Management & Small Systems Security, 1999, pp:51-62 [Conf ] Johan Van Niekerk , Rossouw von Solms Corporate Information Security Education: Is Outcomes Based Education the Solution? [Citation Graph (0, 0)][DBLP ] International Information Security Workshops, 2004, pp:3-18 [Conf ] Kerry-Lynn Thomson , Rossouw von Solms Towards Corporate Information Security Obedience. [Citation Graph (0, 0)][DBLP ] International Information Security Workshops, 2004, pp:19-32 [Conf ] Stephen Flowerday , Rossouw von Solms Trust: An Element of Information Security. [Citation Graph (0, 0)][DBLP ] SEC, 2006, pp:87-98 [Conf ] O. A. Hoppe , Johan Van Niekerk , Rossouw von Solms The Effective Implementation of Information Security in Organizations. [Citation Graph (0, 0)][DBLP ] SEC, 2002, pp:1-18 [Conf ] Rossouw von Solms Can security baselines replace risk analysis? [Citation Graph (0, 0)][DBLP ] SEC, 1997, pp:91-98 [Conf ] Rossouw von Solms , Helen van de Haar From Trusted Information Security Controls to a Trusted Information Security Environment. [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:29-36 [Conf ] Rossouw von Solms , Sebastiaan H. von Solms , John M. Carroll A Process Approach to Information Security Management. [Citation Graph (0, 0)][DBLP ] SEC, 1993, pp:385-399 [Conf ] Kerry-Lynn Thomson , Rossouw von Solms Integrating Information Security into Corporate Governance. [Citation Graph (0, 0)][DBLP ] SEC, 2003, pp:169-180 [Conf ] Cheryl Vroom , Rossouw von Solms A Practical Approach to Information Security Awareness in the Organization. [Citation Graph (0, 0)][DBLP ] SEC, 2002, pp:19-38 [Conf ] Cheryl Vroom , Rossouw von Solms Information Security: Auditing the Behaviour of the Employee. [Citation Graph (0, 0)][DBLP ] SEC, 2003, pp:401-404 [Conf ] Martin Botha , Rossouw von Solms Utilising fuzzy logic and trend analysis for effective intrusion detection. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2003, v:22, n:5, pp:423-434 [Journal ] Lynette Barnard , Rossouw von Solms A Formalized Approach to the Effective Selection and Evaluation of Information Security Control. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2000, v:19, n:2, pp:185-194 [Journal ] Stephen Flowerday , Rossouw von Solms Real-time information integrity = system integrity + data integrity + continuous assurances. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2005, v:24, n:8, pp:604-613 [Journal ] Helen van de Haar , Rossouw von Solms A model for deriving information security control attribute profiles. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2003, v:22, n:3, pp:233-244 [Journal ] Mariana Gerber , Rossouw von Solms From Risk Analysis to Security Requirements. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2001, v:20, n:7, pp:577-584 [Journal ] Mariana Gerber , Rossouw von Solms Management of risk in the information age. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2005, v:24, n:1, pp:16-30 [Journal ] Shaun Posthumus , Rossouw von Solms A framework for the governance of information security. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2004, v:23, n:8, pp:638-646 [Journal ] Rossouw von Solms Information security management: The second generation. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1996, v:15, n:4, pp:281-288 [Journal ] Basie von Solms , Rossouw von Solms Incremental Information Security Certification. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2001, v:20, n:4, pp:308-310 [Journal ] Rossouw von Solms , Sebastiaan H. von Solms From policies to culture. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2004, v:23, n:4, pp:275-279 [Journal ] Sebastiaan H. von Solms , Rossouw von Solms The 10 deadly sins of information security management. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2004, v:23, n:5, pp:371-376 [Journal ] Basie von Solms , Rossouw von Solms From information security to ... business security? [Citation Graph (0, 0)][DBLP ] Computers & Security, 2005, v:24, n:4, pp:271-273 [Journal ] Kerry-Lynn Thomson , Rossouw von Solms Information security obedience: a definition. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2005, v:24, n:1, pp:69-75 [Journal ] Cheryl Vroom , Rossouw von Solms Towards information security behavioural compliance. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2004, v:23, n:3, pp:191-198 [Journal ] Rossouw von Solms , Sebastiaan H. von Solms Information security governance: Due care. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2006, v:25, n:7, pp:494-497 [Journal ] Rossouw von Solms , Sebastiaan H. von Solms Information Security Governance: A model based on the Direct-Control Cycle. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2006, v:25, n:6, pp:408-412 [Journal ] Stephen Flowerday , A. W. Blundell , Rossouw von Solms Continuous auditing technologies and models: A discussion. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2006, v:25, n:5, pp:325-331 [Journal ] Lynette Barnard , Rossouw von Solms The evaluation and certification of information security against BS 7799. [Citation Graph (0, 0)][DBLP ] Inf. Manag. Comput. Security, 1998, v:6, n:2, pp:72-77 [Journal ] Martin Botha , Rossouw von Solms The utilization of trend analysis in the effective monitoring of information security. Part 1: the concept. [Citation Graph (0, 0)][DBLP ] Inf. Manag. Comput. Security, 2001, v:9, n:5, pp:237-242 [Journal ] Martin Botha , Rossouw von Solms The utilization of trend analysis in the effective monitoring of information security. Part 2: the model. [Citation Graph (0, 0)][DBLP ] Inf. Manag. Comput. Security, 2002, v:10, n:1, pp:5-11 [Journal ] Mariana Gerber , Rossouw von Solms , Paul L. Overbeek Formalizing information security requirements. [Citation Graph (0, 0)][DBLP ] Inf. Manag. Comput. Security, 2001, v:9, n:1, pp:32-37 [Journal ] Helen van de Haar , Rossouw von Solms A Tool for Information Security Management. [Citation Graph (0, 0)][DBLP ] Inf. Manag. Comput. Security, 1993, v:1, n:1, pp:- [Journal ] Sharon Halliday , Karin P. Badenhorst , Rossouw von Solms A business approach to effective information technology risk analysis and management. [Citation Graph (0, 0)][DBLP ] Inf. Manag. Comput. Security, 1996, v:4, n:1, pp:19-31 [Journal ] M. E. Thomson , Rossouw von Solms Information security awareness: educating your users effectively. [Citation Graph (0, 0)][DBLP ] Inf. Manag. Comput. Security, 1998, v:6, n:4, pp:167-173 [Journal ] Rossouw von Solms Driving safely on the information superhighway. [Citation Graph (0, 0)][DBLP ] Inf. Manag. Comput. Security, 1997, v:5, n:1, pp:20-22 [Journal ] Rossouw von Solms Information security management (1): why information security is so important. [Citation Graph (0, 0)][DBLP ] Inf. Manag. Comput. Security, 1998, v:6, n:4, pp:174-177 [Journal ] Rossouw von Solms Information security management (2): guidelines to the management of information technology security (GMITS). [Citation Graph (0, 0)][DBLP ] Inf. Manag. Comput. Security, 1998, v:6, n:5, pp:221-223 [Journal ] Rossouw von Solms Information security management (3): the Code of Practice for Information Security Management (BS 7799). [Citation Graph (0, 0)][DBLP ] Inf. Manag. Comput. Security, 1998, v:6, n:5, pp:224-225 [Journal ] Rossouw von Solms Information security management: why standards are important. [Citation Graph (0, 0)][DBLP ] Inf. Manag. Comput. Security, 1999, v:7, n:1, pp:50-58 [Journal ] Rossouw von Solms , Sebastiaan H. von Solms , William J. Caelli A Model for Information Security Management. [Citation Graph (0, 0)][DBLP ] Inf. Manag. Comput. Security, 1993, v:1, n:3, pp:- [Journal ] Clive Vermeulen , Rossouw von Solms The information security management toolbox - taking the pain out of security management. [Citation Graph (0, 0)][DBLP ] Inf. Manag. Comput. Security, 2002, v:10, n:3, pp:119-125 [Journal ] Lynn Futcher , Rossouw von Solms SecSDM: A Model for Integrating Security into the Software Development Life Cycle. [Citation Graph (0, 0)][DBLP ] World Conference on Information Security Education, 2007, pp:41-48 [Conf ] Agency Theory: Can it be Used to Strengthen IT Governance?. [Citation Graph (, )][DBLP ] Utilizing fuzzy logic and neural networks for effective, preventative intrusion detection in a wireless environment. [Citation Graph (, )][DBLP ] Guidelines for secure software development. [Citation Graph (, )][DBLP ] Bloom's Taxonomy for Information Security Education. [Citation Graph (, )][DBLP ] The Organisational Information Security Profile - A Tool to Assist The Board. [Citation Graph (, )][DBLP ] Understanding Information Security Culture: A Conceptual Framework. [Citation Graph (, )][DBLP ] The Proliferation of Wireless Devices and its Role in Corporate Governance. [Citation Graph (, )][DBLP ] A holistic framework for the fostering of an information security sub-culture in organizations. [Citation Graph (, )][DBLP ] Information security requirements - Interpreting the legal aspects. [Citation Graph (, )][DBLP ] Information security culture: A management perspective. [Citation Graph (, )][DBLP ] Search in 0.007secs, Finished in 0.009secs