Change the world

Centre for Research in Information and Cyber Security

Peer-reviewed Journal Papers

Year Author 1 Author 2 Author 3 Authors 4+ Tiltle of Paper Conference Name Town / City Country Date
1991 von Solms, R       Risk Management and Disaster Recovery: A Management Overview LESTA '91, International Conference on Information Technology Maseru Lesotho Apr 91
1993 von Solms, R. von Solms, S. H. Carroll, J. M.   A Process approach to Information Security Management IFIP/Sec 93 Toronto Canada May 93
1993 von Solms, R. van de Haar, H.     A Tool for Information Security Management CRAMM User Group Technical Conference Coventry United Kingdom Jun 93
1994 Janse van Rensburg, D. von Solms, R.     Conventional Software Development vs. Lower Case Software Development CISNA Cape Town South Africa May 94
1995 Meyer, L. von Solms, R     Information Security Management: The ISO 9000 Route IFIP/Sec '95 Cape Town South Africa May 95
1995 Calitz, M. von Solms, R. von Solms, S. H.   Information Security Management in Open Distributed Systems IFIP/Sec '95 Cape Town South Africa May 95
1995 von Solms, R.       Research in Information Technology at South African Technikons SAICSIT 95 Pretoria South Africa May 95
1995 von Solms, R.       Using Multi-media for social upliftment in deprived communities in Southern Africa Technikon Research Development - The RDP challenge Pretoria South Africa Jun 95
1996 du Preez, E. F. von Solms, R.     Information Technology Education: A New Experience in a New South Africa IFIP TC3 & TC9 Jerusalem Israel Mar 96
1996 von Solms, R.       Information Security Management: What next? SAICSIT 96 Durban South Africa Sep 96
1996 von Solms, R.       Computer Security - How secure are your Systems and Networks CSSA 8th Annual Conference Cape Town South Africa Oct 96
1997 von Solms, R.       Can Security Baselines replace Risk Analysis? IFIP/Sec '97 Copenhagen Denmark May 97
1997 von Solms, R Thomson, M. E.     An Effective Information Security Awareness programme for Industry IFIP WG 11.1 Workshop Copenhagen Denmark May 97
1997 Barnard, L. von Solms, R.     A Model for Evaluating Information Security SAICSIT 97 Vanderbijlpark South Africa Nov 97
1997 Thomson, M. von Solms, R.     Information Security Awareness, A must for the Future SAICSIT 97 Vanderbijlpark South Africa Nov 97
1997 Botha, R. A. Eloff, J. H. P.     Management considerations for securing a distributed client/server infrastructure 2nd International Working Conference on Information Security aspects of Small Systems –  Proceedings of WG11.2 '97     May 97
1998 Barnard, L von Solms, R     A Formalized approach to the Evaluation of Information Security IFIP WG 11.1 Workshop Vienna Austria Sep 98
1998 von Solms, R.       Information Security Management. Why standards are important CSSA 10th Annual Conference Durban South Africa Aug 98
1998 Krige, W. von Solms, R.     Effective Information Security Monitoring using Data Logs SAICSIT 98 Gordons Bay South Africa Nov 98
1998 Munyiri, E. von Solms, R.     Introducing Information Security: A Comprehensive Approach SAICSIT 98 Gordons Bay South Africa Nov 98
1998 Botha, R. A. Eloff, J. H. P.     A Security Interpretation of the Workflow Reference Model 6th Working Conference of WG11.1 and WG11.2 of IFIP TC11   Vienna -- Budapest Sep 98
1999 von Solms, R.       The Information Security Toolbox IRMA International Conference Hershey, PA, USA May 99
1999 Olivier, W. von Solms, R     The Effective Utilization of Audit Logs in Information Security Management IFIP WG 11.1 & 11.2 Conference Amsterdam Netherlands Sep 99
1999 van de Haar, H. von Solms, R.     From Information Security Baselines to Information Security Profiles SAICSIT 99 Pretoria South Africa Nov 99
2000 von Solms, R van de Haar, H.     From Trusted Information Security Controls to a Trusted Information Security Environment World Computer Congress Beijing China Sep 00
2000 Botha, M. von Solms, R.     Computer Security: Hacking Tendencies, Criteria and Solutions World Computer Congress Beijing China Sep 00
2000 Perelson, S.  Botha, R. A.     Conflict Analysis as a Means of Enforcing Static Separation of Duty Requirements in Workflow Environments SAICSIT 2000 Cape Town South Africa Nov 00
2000 Papenfus, C. Botha, R. A.     An XML-based Approach to Enforcing History-based Separation of Duty Policies in Heterogeneous Workflow Environments SAICSIT 2000 Cape Town South Africa Nov 00
2000 Cholewka, D. G. Botha, R. A. Eloff, J. H. P.   A Context-sensitive Access Control Model and Prototype Implementation , IFIP TC11 Sixteenth Annual Working Conference on Information Security (IFIP SEC 2000) Beijing China Aug 00
2001 van Niekerk, J. von Solms, R     Introducing ISO/IEC 17799 using a Phased Approach BITWORLD Cairo Egypt May 01
2001 Gerber, M. von Solms, R.     Security Requirements for an Information Society BITWORLD Cairo Egypt May 01
2001 von Solms, R. Gerber, M. van Niekerk, J. Hoppe, O.; Vroom, C.; Aenmey, K. The Information Security Management Toolbox – A Practical Guide ISSA2001 Magalies Berg South Africa Jul 01
2001 Botha, M. von Solms, R.     Fuzzy Logic in Intrusion Detection ISSA2001 Magalies Berg South Africa Jul 01
2001 Botha, M. Olivier, W. von Solms, R.   Computer Security: Hacking Tendencies, Criteria and Solutions SAICSIT Pretoria South Africa Sep 01
2001 Botha, R. A. J.H.P. Eloff     Designing role hierarchies for access control in workflow systems COMPSAC2001 Chicago USA Oct 01
2001 Botha, R. A. Eloff, J. H. P.     An Access Control Architecture for XML documents in Workflow Environments SAICSIT 2001 Pretoria South Africa Sep 01
2002 Hoppe, O. van Niekerk, J. von Solms, R   The Effective Implementation of Information Security in Organisations IFIP/Sec 2002 Cairo Egypt May 02
2002 Vroom, C. von Solms, R     A Practical Approach to Information Security Awareness in the Organisation IFIP/Sec 2002 Cairo Egypt May 02
2002 Thomson, K-L. von Solms, R.     Corporate Governance: Information security the weakest link? ISSA2002 Muldersdrift South Africa Jul 02
2002 Botha, J. von Solms, R.     A Cyclic approach to Business Continuity Planning ISSA2002 Muldersdrift South Africa Jul 02
2002 Vroom, C. von Solms, R.     Auditing the Employee in the Work Environment with Regard to Information Security ISSA2002 Muldersdrift South Africa Jul 02
2002 du Plessis, L. von Solms, R.     Information Security Awareness Baseline Education and Certification ISSA2002 Muldersdrift South Africa Jul 02
2002 van Niekerk, J. von Solms, R.     A Web-Based Portal for Information Security Education ISSA2002 Muldersdrift South Africa Jul 02
2002 Vroom, C. von Solms, R.     Information Security: Auditing the Behaviour of the Employee SAICSIT2002 (Post-graduate Symposium) Port Elizabeth South Africa Sep 02
2002 Botha, M. von Solms, R. Perry, K. Loubser, E.; Yamoyany, G. The utilization of Artificial Intelligence in a Hybrid Intrusion Detection System SAICSIT2002  Port Elizabeth South Africa Sep 02
2002 de Villiers, P. J. Botha, R. A.     Towards a Content-based Billing Model: The Synergy between Access Control and Billing 2nd Annual Information Security South Africa Conference (ISSA 2002) Hartbeespoort South Africa Jul 02
2002 Ingram, L. A. K.  Botha, R. A.     Towards a pattern-based approach for achieving semantic integrity in (object-) relational databases 2nd Annual Information Security South Africa Conference (ISSA 2002) Hartbeespoort South Africa Jul 02
2002 Engelbrecht, W. Harmse, R.  Botha, R. A.   Access control and separation of duty in agent-based workflow environments 2nd Annual Information Security South Africa Conference (ISSA 2002) Hartbeespoort South Africa Jul 02
2002 Botha, R. A.       Towards Semantic Integrity in Relational Database Systems IFIP TC11 Eighteenth Annual Working Conference on Information Security (IFIP SEC 2002), Cairo Egypt May 02
2002 Gerber, P. Gerber, M.     Information Security Health Check Information Security for South Africa (ISSA) Conference Muldersdrift South Africa Jul 02
2003 Vroom, C. von Solms, R     Information Security: Auditing the behaviour of the employee IFIP Working Group 11.1 Workshop Athens Greece May 03
2003 Thomson, K-L. von Solms, R.     Integrating Information Security into Corporate Governance IFIP/Sec 2003 Athens Greece May 03
2003 Botha, M. von Solms, R.     NeGPAIM: A Hybrid Model that will perform ID by uitlizing artificial intelligence ECIW Reading United Kingdom Jul 03
2003 Noble, R. von Solms, R.     Training Misuse Intrusion Detection Systems in a Honeypot Environment ISSA2003 Johannesburg South Africa Jul 03
2003 Vroom, C. von Solms, R.     Information Security Auditing: The Missing Link? ISSA2003 Johannesburg South Africa Jul 03
2003 Thomson, K-L. von Solms, R.     Creating a Security-Conscious Culture Through Effective Corporate Governance ISSA2003 Johannesburg South Africa Jul 03
2003 van Niekerk, J. von Solms, R.     Establishing an Information Security Culture in Organisations: An Outcomes-Based Education Approach ISSA2003 Johannesburg South Africa Jul 03
2003 van Zyl, J. Pottas, D.  Botha, R. A.   Integrity for forms-based input: An XML Schema based approach 3rd Annual Information Security South Africa Conference (ISSA 2003), Johannesburg South Africa Jul 03
2003 Reyneke, A.  Perelson, S. Botha, R. A.   Access Control requirements for Content Management Systems 3rd Annual Information Security South Africa Conference (ISSA 2003) Johannesburg South Africa Jul 03
2003 de Villiers, P. J. Botha, R. A.     An architecture for selling XML Content Emerging Applications for Mobile Computing Workshop (MoBEA) Budapest Hungary May 03
2004 von Solms, R.       Information Security Governance: A Challenge for Senior Management IRMA 2004 New Orleans USA May 04
2004 von Solms, R. van Niekerk, J.     Corporate Information Security Education: Is outcomes based education the solution? IFIP WG 11.1 Toulouse France Aug 04
2004 von Solms, R. Thomson, K-L.     Towards Corporate Information Security Obedience IFIP WG 11.1 Toulouse France Aug 04
2004 Botha, M. von Solms, R.     Using Neural Networks for effective Intrusion Detection ISSA 2004 Johannesburg South Africa Jun 04
2004 van Niekerk, J. von Solms, R.     Organizational Learning Models for Information Security Education ISSA 2004 Johannesburg South Africa Jun 04
2004 Posthumus, S. von Solms, R.     Risk Management vs the Management of Risk: does it matter to the Board? ISSA 2004 Johannesburg South Africa Jun 04
2004 Meurs, L. von Solms, R.     Corporate Information Security Governance: A Holistic Approach ISSA 2004 Johannesburg South Africa Jun 04
2004 Thomson, K-L. von Solms, R.     Cultivating Corporate Information Security Obedience ISSA 2004 Johannesburg South Africa Jun 04
2004 Rutherford, A. Botha, R. A. Olivier, M.    Towards a Hippocratic Log File Architecture SAICSIT 2004 Stellenbosch South Africa Oct 04
2004 Rutherford, A. Botha, R. A. Olivier, M.    Towards Hippocratic Log Files 4th Annual Information Security South Africa Conference (ISSA 2004 Johannesburg South Africa June/July 2004
2004 Perelson, S. Botha, R. A.     An Investigation into Access Control for Mobile Devices 4th Annual Information Security South Africa Conference (ISSA 2004), Johannesburg South Africa June/July 2004
2005 Posthumus, S von Solms, R.     A Responsibility Framework for Information Security IFIP 11.1&11.5 Fairfax, Virginia USA Dec 05
2005 von Solms, R. Rastogi, R.     Information Security Governance: A Re-definition IFIP 11.1&11.5 Fairfax, Virginia USA Dec 05
2005 Mulder, R. von Solms, R.     The Proliferation of Wireless Devices and its Role in Corporate Governance ISSA 2005 Johannesburg South Africa Jul 05
2005 Maphakela, R. Pottas, D. von Solms, R.   An Investigation of Information Security compliance regulations in the South African financial sector ISSA 2005 Johannesburg South Africa Jul 05
2005 van Niekerk, J. von Solms, R.     A holistic framework for the fostering of an information security sub-culture in organizations ISSA 2005 Johannesburg South Africa Jul 05
2005 Ophoff, J.  Botha, R. A.     Revisiting Reachability Management as a multilateral Security Mechanism 5th Annual Information Security South Africa Conference (ISSA 2005 Johannesburg South Africa June/July 2005
2005 Olivier, W. Botha, R. A.     Detection, Measurement, and Classification of Computer Abuse by Students through Facility Management World Conference on Computers in Education Conference (WCCE2005), Stellenbosch South Africa Jul 05
2006 von Solms, R. Mulder, R.     Going Wireless or Not: Does it bother the Board? 5th Information Security Conference Las Vegas USA Apr 06
2006 Flowerday, S. von Solms, R.     Is Trust a Portent in the Extended Enterprise Supply chain? IFIP/Sec 2006 Karlstadt, Sweden May 06
2006 van Niekerk, J. von Solms, R.     The Roles of E-Learning in Corporate Information Security E-Learn2006 Honolulu Hawaii Oct 06
2006 van Niekerk, J. von Solms, R.     Understanding Information Security Culture: A Conceptual Framework  ISSA 2006 Johannesburg South Africa Jul 06
2006 Gaadingwe, T. G.  Botha, R. A.     Building towards a security taxonomy 8th annual Conference on World Wide Web Applications (ZA-WWW2006), Bloemfontein South Africa Sep 06
2006 Ophoff, J.  Botha, R. A.     Privacy-enhancing Call Management in an IP-based Infrastructure International Conference on Wireless and Mobile Communications ICWMC 2006 Bucharest Romania July/August 2006
2006 Ophoff, J.  Botha, R. A.     Architectural considerations for Reachability Management in Mobile Communications) Sixth International Network Conference (INC 2006 Plymouth UK Jul 06
2006 Perelson, S.  Ophoff, J.  Botha, R. A.   A model for secure value-added service subscriptions in cellular networks 6th Annual Information Security South Africa Conference (ISSA 2006) Johannesburg South Africa Jul 06
2006 Van Niekerk, J. Van Greunen, D     Is user education the answer to online security problems?, Proceedings of the Conference on Information Technology in Tertiary Education Pretoria South Africa, Sep 06
2007 Viljoen, M. von Solms, R. Gerber, M.    An Information Security Reporting Architecture for Information Security Visibility HAISA2007 Plymouth United Kingdom Jul 07
2007 Mauwa, H. von Solms, R.     Information Security Awareness: Towards a Generic Programme HAISA2007 Plymouth United Kingdom Jul 07
2007 Futcher, L. von Solms, R.     SECSDM: A Model for Integrating Security into the Software Development Life Cycle WISE 2007 New York USA May 07
2007 von Solms, R. Goss, R. Botha, M.   Utilizing Fuzzy Logic and Neural Networks for Effective, Preventative Intrusion Detection in a Wireless Environment SAICSIT 2007 Fish River Sun South Africa Oct 07
2007 Karatzouni, S. Furnell, S. M.  Clarke, N. L. Botha, R. A. Perceptions of User Authentication on Mobile Devices 6th Annual ISOneWorld Conference Las Vegas, NV USA Apr 07
2008 Posthumus, S. von Solms, R.     Agency Theory: Can it be used to Strengthen IT Governance IFIP/Sec 2008 Milan Italy Sep 08
2008 Thomson, K-L. von Solms, R.     Using Knowledge Creation and Agency Theory to Shape an Information Security Obedient Culture IFIP WG11.1 Working Conference Richmond, Virginia USA Oct 08
2008 van Niekerk, J. von Solms, R.     Bloom's Taxonomy for Information Security Education Information Security South Africa (ISSA) 2008 Johannesburg South Africa Oct 08
2008 Ophoff, J.  Botha, R. A.     Unstructured Supplementary Service Data: A Forgotten Technology for Mobile Services? 2nd IFIP International Symposium on Wireless Communications and Information Technology in Developing Countries (WCITD2008) Pretoria South Africa Oct 08
2008 Rutherford, A. Botha, R. A.     Towards Enhanced Presence Filtering International Workshop on Security and Privacy in Enterprise Computing (InSPEC2008) Munich Germany Sep 08
2008 Ophoff, J.  Botha, R. A.     Comparing presence standards: IMPS, SIMPLE, and XMPP 10th annual Conference on World Wide Web Applications (ZA-WWW2008     Sep 08
2009 Thomson, K.       Information Security Conscience: a Precondition to an Information Security Culture? 8th Annual Security Conference Las Vegas USA Apr 09
2009 Furnell, S. von Solms, R. Phippen, A.   Recognising and addressing barriers to eSafety and Security Awareness IFIP TC 8 Workshop on Information Systems Security Research Cape Town South Africa May 09
2009 Rastogi, R. von Solms, R.     A Service-oriented Approach to Information Security Management CISTM: 7th International Conference on Information Science Technology and Management (CISTM 2009) Delhi India Jun 09
2009 van Niekerk, J. von Solms, R.     Using Bloom’s Taxonomy for Information Security Education 6th World Conference on Information Security Education (WISE 2009) Bento Goncalves Brazil Jul 09
2009 Futcher, L. von Solms, R.     A Risk-Based Approach to Formalise Information Security Requirements for Software Development 6th World Conference on Information Security Education (WISE 2009) Bento Goncalves Brazil Jul 09
2009 Futcher, L. von Solms, R.     Guidelines for Secure Software Development SAICSIT 2008 Wilderness South Africa Oct 08
2009 Frauenstein, E. von Solms, R.     Phishing: How an Organization can protect itself Information Security South Africa (ISSA) 2009 Johannesburg South Africa Jul 09
2009 Thomas, G. Botha, R. A.     Towards a virtual organisation for intergovernmental training coordination in the SA public sector 11th annual Conference on World Wide Web Applications (ZA-WWW2009), Port Elizabeth South Africa Sep 09
2009 Ophoff, J.  Botha, R. A.     Presence on the web: how to make it more useful 11th annual Conference on World Wide Web Applications (ZA-WWW2009 Port Elizabeth South Africa Sep 09
2009 Boshoff, R. Van Niekerk, J.     E-mail security awareness at Nelson Mandela Metropolitan University (Registrar’s Division) Proceedings of the ISSA 2009 Conference Johannesburg South Africa Jul 09
2009 Van Niekerk, J. Von Solms, R.     Using Bloom's taxonomy for information security education. Education and Technology for a Better World 9th IFIP TC 3 World Conference on Computers in Education, WCCE 2009 Bento Goncalves Brazil Jul 09
2009 Van Niekerk, J.F. Thomson, K. Swanepoel, E.   E-voting: A South African Perspective 1st International ICST Conference on e-Infrastructure and e-Services for Developing Countries Maputu Mozambique Dec 09
2010 Jansson, K. von Solms, R.     Social Engineering: Towards a Holistic Solution South African Information security Multi-Conference (SAISMC) Port Elizabeth South Africa May 10
2010 Frauenstein, E. von Solms, R.     The Wild Wide West of Social Networking Sites South African Information security Multi-Conference (SAISMC) Port Elizabeth South Africa May 10
2010 Futcher, L. Schroder, C. von Solms, R.   An Integrative Approach to Information Security Education: A South African Perspective South African Information security Multi-Conference (SAISMC) Port Elizabeth South Africa May 10
2010 Monk, T van Niekerk, J. von Solms, R.   Sweetening the medicine: Educating users about information security by means of game play SAICSIT 2010     Oct 10
2010 Butgereit, L. Botha, R. A.     A Busyness Model for Assigning Tutors to Pupils in a Mobile, Online Tutoring System: A look at C³TO SAICSIT 2010 Bela Bela South Africa, Oct 11-13, 2010
2010 Butgereit, L. Botha, R. A.     How to scale a mobile tutoring project: a look at C3TO ZA-WWW2010 Durban South Africa Sep 10
2010 Thomas, G. Botha, R. A.     Virtual communities as a mechanism for sustainable coordination within the South African Public Sector EGES 2010 Brisbane Australia Sep, 2010
2010 Butgereit, L. Botha, R. A.     C³TO: A Scalable Architecture for Mobile Tutoring over Cell Phones WCITD 2010 Brisbane Australia Sep 10
2010 Goss, R. Botha, R. A.     Deep Packet Inspection – Fear of the unknown ISSA2010 Johannesburg South Africa Aug 10
2010 Butgereit, L. Botha, R. A.     C³TO: An Architecture for Implementing a Chat Based Call Centre and Tutoring Online IST Africa 2010 Durban South Africa May 10
2010 Butgereit, L. Botha, R. A.     C³TO: Enabling mathematics Teachers to Create a Presence on Mxit and Other Chat Areas AMESA 2010 Durban South Africa 28 Mar – 1 Apr  2010
2010 Butgereit, L. Botha, R. A.     Dr Math moves to C³TO: Chatter Call Center/Tutoring Online TEDC 2010 Maputo Mozambique Jan 10
2010 Van Niekerk, J Thomson, K.     Evaluating the Cisco Networking Academy Program's Instructional Model against Bloom's Taxonomy for the purpose of Information Security Education for Organizational End-users Key Competencies in the Knowledge Society (KCKS 2010), World Computer Congress (WCC) 2010 Brisbane Australia September 2010.
2011 de Lange, M von Solms, R.     A Cyber Security Curriculum for Southern African Schools Southern African Cyber Security Awareness Workshop Gaborone Botswana May 11
2011 van Niekerk, J. von Solms, R.     A Cyber-Security Portal for Southern Africa Southern African Cyber Security Awareness Workshop Gaborone Botswana May 11
2011 Grobler, M. von Solms, R. Flowerday, S. Venter, H. Cyber awareness initiatives in South Africa Southern African Cyber Security Awareness Workshop Gaborone Botswana May 11
2011 Frauenstein, E. von Solms, R.     A Enterprise Anti-Phishing Framework 7th  World Information Security Education (WISE 7) Conference Lucerne Switzerland Jun 11
2011 Stieger, E. von Solms, R.     Criteria for a Personal Information Security Agent 10th European Conference on Information Warfare and Security (ECIW) Tallinn Estonia Jul 11
2011 Rastogi, R. von Solms, R.     Information Security Service Branding - Beyond Information Security Awareness Education and Information Systems, Technologies and Applications (EISTA) 2011 Orlando USA Jul 11
2011 von Solms, R.       Secure Internet Usage: Educating the Cyber Generation Education and Information Systems, Technologies and Applications (EISTA) 2011 Orlando USA Jul 11
2011 Marais, J. van Niekerk, J. von Solms, R.   Mobile parental control: South African youth at risk 6th International Conference on Pervasive Computing and Applications (CPCA) Port Elizabeth South Africa Oct 11
2011 Jansson, K.  von Solms, R.     Simulating malicious emails to educate end-users on-demand 6th International Conference on Pervasive Computing and Applications (CPCA) Port Elizabeth South Africa Oct 11
2011 von Solms, R. van Niekerk, J.     Research in Computer Science, Information Systems and Information Technology – Back to the Basics South African Computer Lecturers Association (SACLA) 2011 Durban South Africa Jun 11
2011 von Solms, R. Thomson, K-L. Maninjwa, M.   Information Security Governance Control through Comprehensive Policy Architectures Information Security South African (ISSA) 2011 Johannesburg South Africa Aug 11
2011 Coertze, J. van Niekerk, J. von Solms, R.   A Web-Based Information Security Governance Toolbox for Small-to-medium Enterprises in Southern Africa Information Security South African (ISSA) 2011 Johannesburg South Africa Aug 11
2011 Reid, R. van Niekerk, J. von Solms, R.   Guidelines for the Creation of Brain Compatible Cyber Security Educational Material in Moodle 2.0 Information Security South African (ISSA) 2011 Johannesburg South Africa Aug 11
2011 de Lange, M. von Solms, R.     The importance of raising e-safety awareness amongst children ZA-WWW 2011 Johannesburg South Africa Sep 11
2011 Jansson, K. von Solms, R.     Towards a social engineering resistant user model ZA-WWW 2011 Johannesburg South Africa Sep 11
2011 Butgereit, L. Botha, R. A.     Using N-grams to Identify Mathematical Topics in MXit Lingo SAICSIT 2011, Cape Town South Africa Oct 11
2011 Jurgens, G. Botha, R. A.     From desktop to mobile: modifying the HTTP stream ZA-WWW 2011 Johannesburg South Africa Sep 11
2011 Butgereit, L. Botha, R. A.     A Lucene Stemmer for MXit lingo ZA-WWW 2011 Johannesburg South Africa Sep 11
2011 Goss, R. Botha, R. A.     Traffic Flow Management in Next Generation Service Provider Networks – Are we there yet?, ISSA 2011 Johannesburg South Africa Aug 11
2011 Butgereit, L. Botha, R. A.     Stop Words for “Dr. Math”, IST-Africa 2011 Gaberone Botswana May 11
2011 Van Niekerk, J. Goss, R.     Towards Information Security Education 3.0: A Call for Information Security Educational Ontologies. The Seventh World Conference on Information Security Education IFIP TC11 WG 11.8 Lucerne Switzerland Jun 11
2011 Futcher, L. Van Niekerk, J.     Towards a Pervasive Information Assurance and Security Educational Model for Information Technology Curricula. The Seventh World Conference on Information Security Education IFIP TC11 WG 11. Lucerne Switzerland Jun 11
2011 Van Niekerk, J. Futcher, L     Developing Criteria for the Supervision of Computer Game Development Projects: A Case Study at the School of ICT, NMMU Innovate- Educate: SACLA 2011 Conference Proceedings Ballito South Africa Jul 11
2011 Thomson, K. Van Niekerk, J.     Combating Information Security Apathy by Encouraging Prosocial Organisational Behaviour Fifth International Symposium on Human Aspects of Information Security & Assurance London UK Jul 11
2011 Van Niekerk, J. Boshoff, R.     Defining a “generic” end user An Information Security perspective. The 6th International Conference on Pervasive Computing and Applications (ICPCA6),   South Africa Oct 11
2011 Fouche, N. Thomson, K.     Exploring the human dimension of TETRA the ISSA Conference Johannesburg South Africa 2011
2012 Kortjan, N. von Solms, R. Van Niekerk, J.    Ethical Guidelines for Cyber-related Services Aimed at the Younger Generations 6th Conference on Human Aspects in Information Security & Assurance (HAISA 2012) Crete Greece May 12
2012 Futcher, L von Solms, R.     SecSDM: A usable tool to support IT undergraduate students in secure software development 6th Conference on Human Aspects in Information Security & Assurance (HAISA 2012) Crete Greece May 12
2012 Coertze, J. von Solms, R.     A Model for Information Security Governance in Developing Countries        
2012 Fouche, J. von Solms, R.     Electronic Communication: Stay Connected AFRICOMM 2012 - Fourth International IEEE EAI Conference on e‐Infrastructure and e‐Services for Developing Countries Yaoundé Cameroon Nov 12
2012 Kortjan, N. von Solms, R.     Cyber Security Education in Developing Countries: A South African Perspective AFRICOMM 2012 - Fourth International IEEE EAI Conference on e‐Infrastructure and e‐Services for Developing Countries Yaoundé Cameroon Nov 12
2012 de Lange, M. von Solms, R.     xlix.       “An e-Safety Educational Framework in South Africa”, Mariska de Lange & Rossouw von Solms, SATNAC 2012, George, September 2012. SATNAC 2012 George South Africa Sep 12
2012 Viljoen, M. von Solms, R. Lavack-Davids, V.   Regulatory Compliance in Cloud Computing: An IT perspective SATNAC 2012 George South Africa Sep 12
2012 Kortjan, N. von Solms, R.     Fostering a Cyber Security Culture: A case of South Africa ZA-WWW 2012 Durban South Africa Oct 12
2012 Haskins, B. Botha, R. A.     Identifying suitable mathematical translation candidates from the logs of Dr. Math PRASA2012 Pretoria South Africa November 2012.
2012 Haskins, B. Botha, R. A.     A comparison of mathematical rendering techniques to support Dr. Math tutors ZA-WWW2012 Durban South Africa November 2012.
2012 Ntlatywa, P. Botha, R. A. Haskins, B.   Factors that influence the choice of privacy settings on Facebook: Freshmen’s view at a South African university SPSN2012 Amsterdam Netherlands Sep 12
2012 Ntlatywa, P. Botha, R. A. Haskins, B.   Claimed vs. Observed Information Disclosure on Social Networking Sites ISSA2012 Johannesburg South Africa Aug 12
2012 Goss, R. Botha, R. A.     Establishing discernible flow characteristics for accurate, real-time network protocol identification INC2012 Port Elizabeth South Africa Jul 12
2012 Butgereit, L. Botha, R. A.     Automated Topic Spotting Provides added efficiency in a chat based tutoring environment IST-Africa 2012 Dar es Salaam Tanzania May 12
2012 Makitla, I. Botha, R. A.     The Use of open Source Communication Platform to Deliver Access-Technology Agnostic Services IST-Africa 2012 Dar es Salaam Tanzania May 12
2012 Okere, I. Van Niekerk, J. Carroll, M.   Assessing information security culture: a critical analyses of current approaches 11th Annual Information Security South Africa Conference   Johannesburg Aug 12
2012 Potgieter, M. Van Niekerk, J.     The use of computer vision technologies to augment human monitoring of secure computing facilities 11th Annual Information Security South Africa Conference Johannesburg South Africa Aug 12
2012 Colesky, M. Van Niekerk, J.     Hacktivism - controlling the effects 14th Annual Conference on WWW Applications Durban South Africa Nov 12
2012 Reid, R. Van Niekerk, J.     A comparative analysis of HTML5 and Silverlight for the implementation of brain-compatible education in Web-based learning environments. Annual Conference on WWW Applications Durban South Africa Nov 12
2012 Mjikeliso, Y. Van Niekerk, J.     Combating identity theft through web-based education: a case study of the major South African banks 14th Annual Conference on WWW Applications Durban South Africa Nov 12
2012 Van Niekerk, J. Von Schoultz, D.     You, according to Google–the effects of filter bubbling 14th Annual Conference on WWW Applications Durban South Africa Nov 12
2013 Tsokota, T. von Solms, R.     ICT and the turning-around of the Zimbabwean Economy ICT4Africa 2013 Harare Zimbabwe Feb 13
2013 Viljoen, M.  von Solms, R.     A Framework for Assuring Conformance of Cloud-based Email 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013) London United Kingdom Dec 13
2013 Coertze, J. von Solms, R.     A Software Gateway to Affordable and Effective Information Security Governance in SMMEs ISSA Johannesburg South Africa Aug 13
2013 Isabirye, N. Flowerday, S. von Solms, R.   A Developing Country Market Model for Voice-based Information Services ZA-WWW Cape Town South Africa Sep 13
2013 Butgereit, L. Botha, R. A.     A Comparison of Different Calculations for N-Gram Similarities in a Spelling Corrector for Mobile Instant Messaging Language SAICSIT 2013 East Londen South Africa Oct 13
2013 Reid, R. Van Niekerk, J.     Towards a Brain-Compatible Approach for Web-Based, Information Security Education Proceedings of the European Information Security Multi-Conference (EISMC 2013) Lisbon Portugal May 13
2013 . Reid, R. Van Niekerk, J.     Back to basics: Information security education for the youth via gameplay The Eighth World Conference on Information Security Education IFIP TC11 WG 11.8 Auckland New Zealand Jul 13
2013 Van Niekerk, J. Thomson, K. Reid, R.   Cyber Safety for School Children: A Case Study in the Nelson Mandela Metropolis The Eighth World Conference on Information Security Education IFIP TC11 WG 11.8, Auckland New Zealand Jul 13
2013 Renaud, K. Kennes, D. Van Niekerk, J. Maguire J.   SNIPPET: Genuine Knowledge Based Authentication. Information Security South Africa (ISSA) Johannesburg South Africa Aug 13
2013 Colesky, M. Futcher, L. Van Niekerk, J.     Design patterns for secure software development: demonstrating security through the MVC pattern Cape Town 15th Annual Conference on WWW Applications Sep 13
2013 Reid, R. Van Niekerk, J.     Digital Pocket Money: Catering for the financial needs of the web generation 15th Annual Conference on WWW Applications Cape Town South Africa Sep 13
2013 Mali, N. Van Niekerk, J.     Towards a Cyber Security Awareness Syllabus for Primary School Children 15th Annual Conference on WWW Applications Cape Town South Africa Sep 13
2013 Marais, C. Van Niekerk, J.     Are you Human? – A Framework to prevent automated Web-form submissions 15th Annual Conference on WWW Applications Cape Town South Africa Sep 13
2013 Potgieter, M. Van Niekerk, J.     A framework to enable collaborative writing using web-enabled technologies 15th Annual Conference on WWW Applications Cape Town South Africa Sep 13
2013 Von Schoutlz, D. Van Niekerk, J. Thomson, K.   Web Usage Mining within a South African University infrastructure: Towards useful information from student Web usage data 15th Annual Conference on WWW Applications Cape Town South Africa Sep 13
2013 Hutton, D. Van Niekerk, J.     The Use of Machine Learning Techniques to Optimize Admission Requirements at a Higher Educational Institution Proceedings of the 42nd Annual Conference of the Operations Research Society of South Africa Stellenbosch South Africa 18 Sep
2013 Potgieter, M. Marais, C. Gerber, M.   Fostering Content Relevant Information Security Awareness through Browser Extensions 8th IFIP WG 11.8 World Conference on Information Security Education (WISE 8) Auckland New Zealand Jul 13
2013 Makedama, N. Gerber, M.     Criteria for promoting information security awareness regarding online banking amongst clients Annual Conference on World Wide Web Applications (ZAWWW) Cape Town South Africa Sep 13
2013 Skolment, D. Gerber, M.     User perceptions regarding Internet Service Providers’ assurance of online privacy and confidentiality Annual Conference on World Wide Web Applications (ZAWWW) Cape Town South Africa Sep 13
2013 Gerber, P. Futcher, L.     Towards a blended learning approach to improving the coordination and supervision of student projects Joint International Conference on Engineering Education and Research and International Conference on Information Technology (ICEE/ICIT) Cape Town South Africa Dec 13
2013 Haskins, B. Botha, R. A.     Rendering Dr. Math learner queries with HTML5 and SVG ZA-WWW 2013 Cape Town South Africa Sep 13
2013 Butgereit, L. Botha, R. A.     Predictable Patterns in Microtext as seen in Educational Applications using Mxit in South Africa IEEE Africon 2013   Mauritius September 2013.
2013 Tschersich, M. Botha, R. A.     Understanding the impact of default privacy settings on self-disclosure in social networking services: Building a conceptual model and measurement instrument 19th Americas Conference on Information Systems (AMCIS 2013) Chicago, Illinois USA Aug 13
2013 Butgereit, L. Botha, R. A.     Can Micro-Volunteering Help in Africa? IST Africa 2013 Nairobi Kenya May 13
2013 Butgereit, L. Botha, R. A.     An Architecture for Synchronous Micro-Volunteering in Africa using Social Media 4th International Workshop on Pervasive Collaboration and Social Networking (PerCol 2013 San Diego, CA, USA Mar 13
2013 Haskins, B. Botha, R. A.     Identifying tag word counterparts for Dr. Math AAAI 2013 Spring Symposium on Analyzing Microtext (SAM 2013) Stanford, California USA March 2013.
2013 Adesemowo, K. Thomson, K.     Service desk link into IT asset disposal: A case of a discarded IT asset 2013 International Conference on Adaptive Science and Technology (ICAST) Pretoria South Africa Nov 13
2014 Coertze, J.  von Solms, R.     The Board and CIO : The IT Alignment Continuum 47th Hawaii International Conference of System Science (HICSS-47) Big Island, Hawaii USA Jan 14
2014 von Solms, S. von Solms, R.     Towards Cyber Safety Education in Primary Schools in Africa Human Aspects of Information & Assurance (HAISA 2014) Plymouth United Kingdom Jul 14
2014 Tsokota, T. von Solms, R. van Greunen, D.   Towards a strategy for ICT integration in the tourism sector in Zimbabwe ICT4Africa 2014 Yaoundé Cameroon Oct 14
2014 Coertze, J. von Solms, R.     The Murky Waters of IT Governance ISSA Johannesburg South Africa Aug 14
2014 Frauenstein, E. von Solms, R     Combatting Phishing: A holistic approach ISSA Johannesburg South Africa Aug 14
2014 Mogale, M.  Gerber, M. Carroll, M. von Solms, R. Information security assurance model (ISAM) for a higher education examination paper preparation process ISSA Johannesburg South Africa Aug 14
2014 Haskins, B. Botha, R. A.     SVM Classification of Dr Math microtext PRASA 2014 Cape Town South Africa Nov 14
2014 Marais, C.,., Van Futcher, L Niekerk, J.     Incorporating Lessons Learned from the ‘Indie Paradigm’ into Student Game Development Projects ICT Education in the Cyber World: SACLA 2014 Conference Proceedings Port Elizabeth, South Africa Jun 14
2014 Mjikeliso, Y Van Niekerk, J Thomson K.   Exploring the Human Dimension in the Beneficiary Institutions of the SANReN Network 8th International Symposium on Human Aspects of Information Security & Assurance Plymouth UK Jul 14
2014 Reid, R. Niekerk, J.     Towards an Education Campaign for Fostering a Societal, Cyber Security Culture 8th International Symposium on Human Aspects of Information Security & Assurance Plymouth UK Jul 14
2014 Reid, R. Van Niekerk, J. Renaud, K.   Information Security Culture: A General Living Systems Theory Perspective ISSA 2014:13th International Information Security for South Africa Conference Johannesburg South Africa Aug 14
2014 Reid, R. Van Niekerk, J.     From Information Security Cultures to Cyber security Cultures: Organizations to Societies ISSA 2014:13th International Information Security for South Africa Conference Johannesburg South Africa Aug 14
2014 Futcher, L. Gerber, M.     Comparison of institutionally recommended e-learning platforms for coordination and supervision of student projects at higher educational level South African Computer Lecturers’ Association (SACLA) Conference Port Elizabeth South Africa Jun 14
2014 Mogale, M. Gerber, M.     Information Security Assurance Model (ISAM) for an Examination Paper Preparation Process Information Security for South Africa (ISSA) Conference Johannesburg South Africa Aug 14
2014 Mxoli, A. Mostert-Phipps, N. Gerber, M.   Personal Health Records: Design considerations for the                                        South African context International Design-Development and Research (DDR) Conference Cape Town South Africa Sep 14
2014 Mxoli, A. Mostert-Phipps, N. Gerber, M.   Personal Health Records in the South African Healthcare Landscape: A Socio-Technical Analysis International Development Informatics Association (IDIA) Conference Port Elizabeth South Africa Nov 14
2014 Okere, I. Pottas, D. Gerber, M.   Managing Patient Safety Risks Associated With Electronic Patient Records: A Holistic Approach African Cyber Citizenship Conference (ACCC) Port Elizabeth South Africa Nov 14
2014 Adesemowo, K. Gerber, M.     E-skilling on Fundamental ICT Networking Concepts – Overcoming the Resource Constraints at a South African University Production and Innovation Conference Cape Town South Africa Nov 14
2014 Haskins, B. Botha, R. A.     A Mixed-Method Approach to Normalising Dr. Math Microtext,   International Conference on Computational Science and Technology 2014 (ICCST 2014) Sabah Malaysia Aug 14
2014 Ophoff, J.   Botha, R. A.     A Privacy-Aware Model for Communications Management in the IP Multimedia Subsystem 10th International Networking Conference, INC2014 Plymouth UK Jul 14
2014 du Preez, R.  Botha, R. A.     Model for Green IT Strategy: A Content Analysis Approach International Conference on Business Strategy and Social Sciences Kuala Lumpur Malaysia Aug 14
2014 Tekeni, L. Thomson, K-L. Botha, R. A.   Concerns Regarding Service Authorization by IP Address using Eduroam ISSA Johannesburg South Africa Aug 14
2014 Tschersich, M. Botha, R. A.     Exploring the impact of restrictive default privacy settings on the privacy calculus on social network sites 22nd European Conference on Information Systems, ECIS 2014   Tel Aviv Jun 14
2014 Mxoli, A. Gerber, M. Mostert-Phipps, N.   Information security risk measures for Cloud-based Personal Health Records International Conference on Information Society (i-Society) London UK November
2015 Coertze, J.  von Solms, R.     Towards a Cybernetics-Based Communication Framework for IT Governance 48th Hawaii International Conference of System Science (HICSS-48) Hawaii USA Jan 15
2015 von Solms, R. von Solms, B.     National Cyber Security in South Africa: A Letter to the Minister of Cyber Security 10th International Conference on Cyber Warfare and Security Kruger National Park South Africa Mar 15
2015 Delport, P. von Solms, R. Gerber, M.   Good Corporate Governance of ICT in Municipalities IST Africa 2015 Lilongwe Malawi May 15
2015 Koen, R. von Solms, R. Gerber, M.   Improved Service Continuity in Municipalities IST Africa 2015 Lilongwe Malawi May 15
2015 de Lange, J. von Solms, R. Gerber, M.   Better Information Security Management in Municipalities IST Africa 2015 Lilongwe Malawi May 15
2015 Gcaza, N. von Solms, R.     An Ontology for the National Cyber Security Culture Environment Human Aspects of Information Security & Assurance (HAISA 2015) Lesvos Greece Jul 15
2015 von Solms, R. von Solms, S.     Cyber Safety Education in Developing Countries Education and Information Systems, Technologies and Applications (EISTA) 2015 Orlando USA Jul 15
2015 Mooi, R. Botha, R. A.     Prerequisites for building a computersecurity incident response capability ISSA 2015 Johannesburg South Africa Aug 15
2015 Thomas, G. Botha, R. A. Van Greunen, D.   Towards Addressing the Requirements for Coordination in the Distributed South African Public Sector from a Virtual Community-Centric Collaboration Process Lifecycle Perspective IST-Africa 2015 Liliongwe Malawi May 15
2015 Van Niekerk, J. Futcher, L.     The use of software design patterns to teach secure software design: an integrated approach The Ninth World Conference on Information Security Education, IFIP TC11 WG 11.8 Hamburg Germany May 15
2015 Reid, R. Van Niekerk, J.     A Cyber Security Culture Fostering Campaign through the Lens of Active Audience Theory 9th International Symposium on Human Aspects of Information Security & Assurance Lesvos Greece Jul 15
2015 Okere, I. van Niekerk, J. Thomson, K.   A critical evaluation of information security education in nursing science: a case study IFIP TC3 Working Conference Vilnius Lithuania 2015
2015 Gomana, L. Futcher, L. Thomson, K.   Integrating Information Security into the IT Undergraduate Curriculum: A Case Study 44th Southern African Computer Lecturers’ Association (SACLA) conference Johannesburg South Africa 2015
2015 Skolmen, D. Gerber, P.     Protection of personal information in the South African Cloud Computing environment: A framework for Cloud Computing adoption Information Security South Africa (ISSA) 2015 Conference Johannesburg South Africa Aug 15
2016 Mabece, T. Futcher, L. Thomson, K.   Towards using pervasive information security education to influence information security behaviour in undergraduate computing graduates International Conference on Information Resources Management (CONF-IRM) Cape Town South Africa May 16
2016 Gomana, L. Futcher, L. Thomson, K.   An Educators Perspective of Integrating Information Security into Undergraduate Computing Curricula Tenth International Symposium on the Human Aspects of Information Security & Assurance (HAISA) Frankfurt Germany Jul 16
2016 Fredericks, D.T. Futcher, L. Thomson, K.   Comparing Student Password Knowledge and Behaviour: A Case Study Tenth International Symposium on the Human Aspects of Information Security & Assurance (HAISA) Frankfurt Germany Jul 16
2016 van Niekerk, J. Thomson, K.     Towards an Interdisciplinary Cyberbullying Campaign Tenth International Symposium on the Human Aspects of Information Security & Assurance (HAISA) Frankfurt Germany Jul 16
2016 Tekeni, L. Botha, R. A. Thomson, K.   An Overview of Access Control Practices: Guidance from ITIL, COBIT 5 and ISO/IEC 27002 Information Institute Annual Security Conference Las Vegas USA Apr 16
2016 Delport, P. von Solms, R. Gerber, M.    Towards Corporate Governance of ICT in Local Government IST Africa 2016 Conference  Durban South Africa May 16
2016 Koen, R.  von Solms, R. Gerber, M.   ICT Readiness for Business Continuity in Local Government IST Africa 2016 Conference  Durban South Africa May 16
2016 de Lange, J. von Solms, R. Gerber, M.   Information Security Management in Local Government IST Africa 2016 Conference  Durban South Africa May 16
2016 Fani, N. von Solms, R. Gerber, M.   Governing Information Security within the Context of “Bring Your Own Device in SMMEs” IST Africa 2016 Conference  Durban South Africa May 16
2016 Mcube, U. Gerber, M. von Solms, R.   Scenario-based IT Risk Assessment in Local Government IST Africa 2016 Conference  Durban South Africa May 16
2016 Fani, N. von Solms, R. Gerber, M.   A framework towards governing “Bring Your Own Device in SMMEs” Information Security South Africa Johannesburg South Africa Aug 16
2016 Delport, P. Gerber, M. Sohrabi-Safa, N.   An Interactive Library for Awareness on the Secure Handling of Business Information Information Security South Africa (ISSA) 2016 Conference Johannesburg South Africa Aug 16
2016 Scharnick, N. Gerber, M. Futcher, L.   Review of Data Storage Protection Approaches for POPI Compliance Information Security South Africa (ISSA) 2016 Conference Johannesburg South Africa Aug 16
2016 Coertze, J. Von Solms, R.     Communication Factors influencing Business-IT Alignment ADIBUM 2016 Kralove Czech Republic Sep 16
2016 Von Solms, W. Von Solms, R.     Co-creation: Tourism, Technology and Wellness IST Africa 2016 Conference  Durban South Africa May 16