The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Rossouw von Solms: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Werner Olivier, Rossouw von Solms
    The Effective Utilization of Audit Logs in Information Security Management. [Citation Graph (0, 0)][DBLP]
    Conference on Information Security Management & Small Systems Security, 1999, pp:51-62 [Conf]
  2. Johan Van Niekerk, Rossouw von Solms
    Corporate Information Security Education: Is Outcomes Based Education the Solution? [Citation Graph (0, 0)][DBLP]
    International Information Security Workshops, 2004, pp:3-18 [Conf]
  3. Kerry-Lynn Thomson, Rossouw von Solms
    Towards Corporate Information Security Obedience. [Citation Graph (0, 0)][DBLP]
    International Information Security Workshops, 2004, pp:19-32 [Conf]
  4. Stephen Flowerday, Rossouw von Solms
    Trust: An Element of Information Security. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:87-98 [Conf]
  5. O. A. Hoppe, Johan Van Niekerk, Rossouw von Solms
    The Effective Implementation of Information Security in Organizations. [Citation Graph (0, 0)][DBLP]
    SEC, 2002, pp:1-18 [Conf]
  6. Rossouw von Solms
    Can security baselines replace risk analysis? [Citation Graph (0, 0)][DBLP]
    SEC, 1997, pp:91-98 [Conf]
  7. Rossouw von Solms, Helen van de Haar
    From Trusted Information Security Controls to a Trusted Information Security Environment. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:29-36 [Conf]
  8. Rossouw von Solms, Sebastiaan H. von Solms, John M. Carroll
    A Process Approach to Information Security Management. [Citation Graph (0, 0)][DBLP]
    SEC, 1993, pp:385-399 [Conf]
  9. Kerry-Lynn Thomson, Rossouw von Solms
    Integrating Information Security into Corporate Governance. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:169-180 [Conf]
  10. Cheryl Vroom, Rossouw von Solms
    A Practical Approach to Information Security Awareness in the Organization. [Citation Graph (0, 0)][DBLP]
    SEC, 2002, pp:19-38 [Conf]
  11. Cheryl Vroom, Rossouw von Solms
    Information Security: Auditing the Behaviour of the Employee. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:401-404 [Conf]
  12. Martin Botha, Rossouw von Solms
    Utilising fuzzy logic and trend analysis for effective intrusion detection. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:5, pp:423-434 [Journal]
  13. Lynette Barnard, Rossouw von Solms
    A Formalized Approach to the Effective Selection and Evaluation of Information Security Control. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:2, pp:185-194 [Journal]
  14. Stephen Flowerday, Rossouw von Solms
    Real-time information integrity = system integrity + data integrity + continuous assurances. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:8, pp:604-613 [Journal]
  15. Helen van de Haar, Rossouw von Solms
    A model for deriving information security control attribute profiles. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:3, pp:233-244 [Journal]
  16. Mariana Gerber, Rossouw von Solms
    From Risk Analysis to Security Requirements. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2001, v:20, n:7, pp:577-584 [Journal]
  17. Mariana Gerber, Rossouw von Solms
    Management of risk in the information age. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:1, pp:16-30 [Journal]
  18. Shaun Posthumus, Rossouw von Solms
    A framework for the governance of information security. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2004, v:23, n:8, pp:638-646 [Journal]
  19. Rossouw von Solms
    Information security management: The second generation. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1996, v:15, n:4, pp:281-288 [Journal]
  20. Basie von Solms, Rossouw von Solms
    Incremental Information Security Certification. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2001, v:20, n:4, pp:308-310 [Journal]
  21. Rossouw von Solms, Sebastiaan H. von Solms
    From policies to culture. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2004, v:23, n:4, pp:275-279 [Journal]
  22. Sebastiaan H. von Solms, Rossouw von Solms
    The 10 deadly sins of information security management. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2004, v:23, n:5, pp:371-376 [Journal]
  23. Basie von Solms, Rossouw von Solms
    From information security to ... business security? [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:4, pp:271-273 [Journal]
  24. Kerry-Lynn Thomson, Rossouw von Solms
    Information security obedience: a definition. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:1, pp:69-75 [Journal]
  25. Cheryl Vroom, Rossouw von Solms
    Towards information security behavioural compliance. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2004, v:23, n:3, pp:191-198 [Journal]
  26. Rossouw von Solms, Sebastiaan H. von Solms
    Information security governance: Due care. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:7, pp:494-497 [Journal]
  27. Rossouw von Solms, Sebastiaan H. von Solms
    Information Security Governance: A model based on the Direct-Control Cycle. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:6, pp:408-412 [Journal]
  28. Stephen Flowerday, A. W. Blundell, Rossouw von Solms
    Continuous auditing technologies and models: A discussion. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:5, pp:325-331 [Journal]
  29. Lynette Barnard, Rossouw von Solms
    The evaluation and certification of information security against BS 7799. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 1998, v:6, n:2, pp:72-77 [Journal]
  30. Martin Botha, Rossouw von Solms
    The utilization of trend analysis in the effective monitoring of information security. Part 1: the concept. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 2001, v:9, n:5, pp:237-242 [Journal]
  31. Martin Botha, Rossouw von Solms
    The utilization of trend analysis in the effective monitoring of information security. Part 2: the model. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 2002, v:10, n:1, pp:5-11 [Journal]
  32. Mariana Gerber, Rossouw von Solms, Paul L. Overbeek
    Formalizing information security requirements. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 2001, v:9, n:1, pp:32-37 [Journal]
  33. Helen van de Haar, Rossouw von Solms
    A Tool for Information Security Management. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 1993, v:1, n:1, pp:- [Journal]
  34. Sharon Halliday, Karin P. Badenhorst, Rossouw von Solms
    A business approach to effective information technology risk analysis and management. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 1996, v:4, n:1, pp:19-31 [Journal]
  35. M. E. Thomson, Rossouw von Solms
    Information security awareness: educating your users effectively. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 1998, v:6, n:4, pp:167-173 [Journal]
  36. Rossouw von Solms
    Driving safely on the information superhighway. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 1997, v:5, n:1, pp:20-22 [Journal]
  37. Rossouw von Solms
    Information security management (1): why information security is so important. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 1998, v:6, n:4, pp:174-177 [Journal]
  38. Rossouw von Solms
    Information security management (2): guidelines to the management of information technology security (GMITS). [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 1998, v:6, n:5, pp:221-223 [Journal]
  39. Rossouw von Solms
    Information security management (3): the Code of Practice for Information Security Management (BS 7799). [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 1998, v:6, n:5, pp:224-225 [Journal]
  40. Rossouw von Solms
    Information security management: why standards are important. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 1999, v:7, n:1, pp:50-58 [Journal]
  41. Rossouw von Solms, Sebastiaan H. von Solms, William J. Caelli
    A Model for Information Security Management. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 1993, v:1, n:3, pp:- [Journal]
  42. Clive Vermeulen, Rossouw von Solms
    The information security management toolbox - taking the pain out of security management. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 2002, v:10, n:3, pp:119-125 [Journal]
  43. Lynn Futcher, Rossouw von Solms
    SecSDM: A Model for Integrating Security into the Software Development Life Cycle. [Citation Graph (0, 0)][DBLP]
    World Conference on Information Security Education, 2007, pp:41-48 [Conf]

  44. Agency Theory: Can it be Used to Strengthen IT Governance?. [Citation Graph (, )][DBLP]


  45. Utilizing fuzzy logic and neural networks for effective, preventative intrusion detection in a wireless environment. [Citation Graph (, )][DBLP]


  46. Guidelines for secure software development. [Citation Graph (, )][DBLP]


  47. Bloom's Taxonomy for Information Security Education. [Citation Graph (, )][DBLP]


  48. The Organisational Information Security Profile - A Tool to Assist The Board. [Citation Graph (, )][DBLP]


  49. Understanding Information Security Culture: A Conceptual Framework. [Citation Graph (, )][DBLP]


  50. The Proliferation of Wireless Devices and its Role in Corporate Governance. [Citation Graph (, )][DBLP]


  51. A holistic framework for the fostering of an information security sub-culture in organizations. [Citation Graph (, )][DBLP]


  52. Information security requirements - Interpreting the legal aspects. [Citation Graph (, )][DBLP]


  53. Information security culture: A management perspective. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.007secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002