Change the world

Centre for Research in Information and Cyber Security

Peer-reviewed Journal Papers

                 
Year Author 1 Author 2 Author 3 Authors 4+ Tiltle of Paper Journal Name Vol / Issue Pages
1990 Von Solms, R. Eloff, J.H.P. Von Solms, S.H.   Computer Security Management: A Framework for Effective Management Control Information Age 12(4) 217 – 222
1993 Von Solms, R. Von Solms, S. H.  Caelli, W.   A Model for Information Security Management. Information Management and Computer Security 1(3)  
1994 Von Solms, R. van de Haar, H. Von Solms, S. H.  Caelli, W. J. A Framework for Information Security Evaluation Information & Management 26(3) 143 – 153
1996 Halliday, S. von Solms, R. Badenhorst, K   A Business Approach to effective Information Technology Risk Analysis and Management Information Management & Computer Security 4(1) 19 – 31
1996 von Solms, R.       Information Security Management: The Second Generation? Computers & Security   281 – 288
1997 von Solms, R.       Driving safely on the Information Security Superhighway Information Management & Computer Security 5(1) 20 - 22
1997 Botha, R. A.  Eloff, J. H. P.      Information Security in a client/server environment   14(2)  
1998 Barnard, L. von Solms, R.     A Methodology for the effective evaluation of Information Security according to BS 7799 Information Management & Computer Security 6(2) 72 – 77
1998 Thomson, M. von Solms, R.     Information Security Awareness: Educating your users effectively Information Management & Computer Security 6(4) 167 – 173
1998 von Solms, R.       Information Security Management (1): Why Information Security is so Important Information Management & Computer Security 6(4) 174 - 177
1998 von Solms, R.       Information Security Management (2): Guidelines for the Management of Information Security (GMITS) Information Management & Computer Security 6(5) 221 – 223
1998 von Solms, R.        Information Security Management (3): A Code of Practice for the Management of Information Security (BS7799) Information Management & Computer Security 6(6) 224 - 225
1999 von Solms, R.        Information Security Management: Why standards are important. Information Management & Computer Security 7(1)  
2000 Barnard, L. von Solms, R.      A Formalized approach to the Effective Selection and Evaluation of Information Security Controls Computers & Security 8(3) 185 – 194
2000 Papenfus, C. Botha, R. A.      An XML-based Approach to Enforcing History-based Separation of Duty Policies in Heterogeneous Workflow Environments South African Computer Journal Special Issue'00(26) 60 – 68
2000 Perelson, S. Botha, R. A.      Conflict Analysis as a Means of Enforcing Static Separation of Duty Requirements in Workflow Environments South African Computer Journal Special Issue'00(26) 212 – 216
2001 Gerber, M. von Solms, R.  Overbeek, P.   Formalizing Security Requirements  Information Management and Computer Security 9(1) 32 – 37
2001 von Solms, S. H.  von Solms, R.      Incremental Information Security Certification Computers & Security 20(4) 308 – 310
2001 von Solms, R.  Botha, M.      Using Trend Analysis for effective Information Security Management: The Concept (Part 1) Information Management and Computer Security 9(5)  
2001 Gerber, M.  von Solms, R.      From Risk Analysis to Security Requirements Computers & Security 20(7) 577 - 584
2001 Botha, R. A.  Eloff, J. H. P.      Separation of Duties for Access Control Enforcement in Workflow Environments IBM Systems Journal 40(3) 666 – 682
2001 Botha, R. A.  Eloff, J. H. P.      A Framework for Access Control in Workflow Systems Information Management and Computer Security 9(3) 126 – 133
2001 Botha, R. A.  Eloff, J. H. P.      Access Control in Document-centric Workflow Systems – An Agent-based Approach Computers & Security 20(6) 525 – 532
2001 Perelson, S. Botha, R. A.  Eloff, J. H. P.    Separation of Duty Administration South African Computer Journal -27 64 – 69
2002 von Solms, R.  Botha, M.     Using Trend Analysis for effective Information Security Management: The Model (Part 2) Information Management and Computer Security 10(1)  
2002 Vermeulen, C. von Solms, R.      The Information Security Management Toolbox – Taking the Pain out of Security Management Information Management and Computer Security 10(3) 119 - 125
2002 Botha, M.  von Solms, R.  Perry, K. Loubser, E.; Yamoyany, G. The utilization of Artificial Intelligence in a Hybrid Intrusion Detection System The ACM Digital Library, SAICSIT2002    
2002 Botha, R. A.  Eloff, J. H. P.      An Access Control Architecture for XML documents in Workflow Environments South African Computer Journal -28 3 – 10
2003 van de Haar, H. von Solms, R.      A Model for deriving Information Security Control Attribute Profiles Computers & Security 22(3) 233 - 244
2003 Botha, M. von Solms, R.      Utilising Fuzzy Logic and Trend Analysis for Effective Intrusion Detection Computers & Security 22(5) 423 - 434
2004 Vroom, C. von Solms, R.      Towards Information Security Behavioural Compliance Computers & Security 23(3) 191 - 198
2004 von Solms, R.  von Solms, B.     From Policies to Culture Computers & Security 23(4) 275 - 279
2004 von Solms, R.  von Solms, B.     The 10 deadly sins of Information Security Computers & Security 23(5) 371 - 376
2004 Botha, J. von Solms, R.      A Cyclic Approach to Business Continuity Planning Information Management & Computer Security 12(4) 328 - 337
2004 Posthumus, S. von Solms, R.      A Framework for the Governance of Information Security Computers & Security 23(8) 638 - 646
2004 Tuyikeze, T. Futcher, L. Schroder, C.    Using enterprise information portals to integrate and share project information Information Technology on the Move 10 134- 141
2005 Gerber, M.  von Solms, R.      Management of Risk in the Information Age Computers & Security 24(1) 16 - 30
2005 Thomson, K-L. von Solms, R.      Information Security Obedience Computers & Security 24(2) 69 - 75
2005 Posthumus, S. von Solms, R.      IT oversight: an important function of corporate governance Computer Fraud & Security 2005(6) 42325
2005 Flowerday, S. von Solms, R.      Continuous auditing: verifying information integrity and providing assurances for financial reports Computer Fraud & Security 2005(7) 42354
2005 von Solms, B. von Solms, R.      From information security to…business security? Computers & Security 24(4) 271 - 273
2005 Flowerday, S. von Solms, R.      Real-time information integrity = System integrity + Data Integrity + Continuous assurances Computers & Security 24(8) 604 - 613
2006 Thomson, K-L. von Solms, R.      Towards an Information Security Competence Maturity Model Computer Fraud & Security 2006(5) 42323
2006 Flowerday, S. Blundell, A. von Solms, R.    Continuous Auditing Models and Technologies: A discussion Computers & Security 25(5) 317 - 324
2006 von Solms, R.  von Solms, B.     Information Security Governance: A Model based on the Direct-Control Cycle Computers & Security 25(6) 408 - 412
2006 Olivier, C. von Solms, R.  Cowley, L.   Information Integrity Assurance for Networks: Let’s learn from the financial model Computer Fraud & Security 2006(8) 42199
2006 von Solms, R.  von Solms, B.     Information Security Governance: Due Care Computers & Security 25(7) 494 - 497
2006 Thomson, K-L. von Solms, R.  Louw, L.   Cultivating an Organizational Information Security Culture Computer Fraud & Security 2006(10) 42196
2006 Lategan, N. von Solms, R.      Towards Enterprise Information Risk Management Computer Fraud & Security 2006(12) 15 - 19
2006 Botha, R. A.  Gaadingwe, T. G.      Reflecting on 20 SEC conferences Computers & Security 25(4) 247 – 256
2007 Flowerday, S. von Solms, R.      What Constitutes Information Integrity? South African Journal for Information Management 9(4) 42023
2007 Thomas, G. Botha, R. A.      Secure Mobile Device Use in Healthcare: Guidance from HIPAA and ISO17799 Information Systems Management 24 333 – 342
2008 Gerber, M.  von Solms, R.      Information Security Requirements – Interpreting the Legal Aspects Computers & Security 27(5-6) 124 - 135
2008 Ophoff, J. Botha, R. A.      Mobile Communication: User perception and practice, Volume 40, June 2008, pp. 63 – 73. South African Computer Journal 40  
2009 Botha, R. A.  Furnell, S. M. Clarke, N. L.   From desktop to mobile: Examining the security experience Computers & Security 28(3-4) 130 – 137
2009 Furnell, S. Thomson, K-L.     From Culture to Disobedience: Recognising the Varying User Acceptance of IT Security Computer Fraud & Security   5 - 10
2009 Furnell, S. Thomson, K-L.     Recognising and addressing ‘security fatigue Computer Fraud & Security   7 - 11
2009 Furnell, S. Papadaki, M. Thomson, K-L.   Scare tactics – a viable weapon in the security war? Computer Fraud & Security   6 - 10
2010 van Niekerk, J. von Solms, R.      Information Security Culture: A Management Perspective Computers & Security 29(4) 476 - 486
2010 Posthumus, S. von Solms, R.  King, M.   The Board and IT Governance: The What, Who and How South African Journal for Business Management (SAJBM) 41(3) 23–32
2010 Futcher, L. Schroder, C von Solms, R.    Information Security Education in South Africa Information Management & Computer Security (IM&CS) 18(5) 366–374
2010 Kaselowski, E. von Solms, R.  von Solms, B.   Municipalities and IT Governance – Towards a strategic planning framework Journal of Public Administration (JOPA) 45(2) 333 - 342
2010 Posthumus, S. von Solms, R.      The Board and IT Governance: Towards practical implementation guidelines Journal of Contemporary Management (JCM) 7 574 - 596
2010 Van Greunen, D. Van Niekerk, J. F.     Implementation of regulation-based e-procurement in the Eastern Cape provincial administration African Journal of Business Management 4(17) 3655 - 3665
2011 Rastogi, R. von Solms, R.      Information Security Service Support - helping end-users cope with security Journal of Computer Technologies and Applications (JCTA) 2(2) 137 - 148
2011 Furnell, S.  von Solms, R.  Phippin, A.   Preventative action for enhancing online protection and privacy International Journal for Information Technology and Systems Approach (IJITSA) 4(2) 42015
2011 Piderit, R. Flowerday, S. von Solms, R.    Enabling information sharing by establishing trust in supply chains: A case study in the South African automotive industry South African Journal of Information Management (SAJIM) 13(1) 42012
2011 Futcher, L. von Solms, R.      How can Secure Software be Trusted South African Computer Journal (SACJ) 47 42010
2011 von Solms, R.  Warren, M.     Towards the Human Information Security Firewall International Journal for Cyber Warfare and Terrorism (IJCWT) 1(2) 42294
2011 Butgereit, L. Botha, R. A.      A model to identify mathematics topics in MXit lingo to provide tutors quick access to supporting documentation Pythagoras 32(2) 23 – 33
2011 Furnell, S. M. Botha, R. A.      Social Networks – access to all areas?  Computer Fraud and Security 2011(5) 14 – 19
2012 Rastogi, R.  von Solms, R.      Information Security Service Management Journal for Contemporary Management 9 257 - 278
2012 Rastogi, R.  von Solms, R.      Information Security Service Culture – information security for end-users Journal of Universal Computer Science 18(12) 1628 - 1642
2012 Viljoen, M. von Solms, R.      Cloud Computing Service Value: A message to the Board Journal for Business Management 43(4) 73 - 81
2012 Butgereit, L. Botha, R. A.  van den Heever, M.   Key Identifiers and Spelling Conventions in MXit-Lingo as found in Conversations with Dr Math The Journal for Transdisciplinary Research in Southern Africa 8(1) 30 – 50
2012 Thomson, K. Van Niekerk, J. F.     Combating Information Security Apathy by Encouraging Prosocial Organisational Behaviour Information Management & Computer Security 20(1)  
2012 Gerber, T. Thomson, K-L.     Risk Management for VoIP Implementations African Journal of Business Management  
2013 Stieger, E. von Solms, R.      A Framework for a Personal Information Security Agent INFORMATION: An International Interdisciplinary Journal 16(6b) 4063 - 4092
2013 van Niekerk, J.  von Solms, R.      A Theory Based Approach to Information Security Culture Change INFORMATION: An International Interdisciplinary Journal 16(6b) 3907 - 3930
2013 Jansson, K. von Solms, R.      Phishing for Phishing Awareness Behaviour and Information Technology 32(6) 584 - 593
2013 von Solms, R.  van Niekerk, J.      From Information Security to Cyber Security Computers & Security 38 97 - 102
2013 Coertze, J. von Solms, R.      The Board and IT Governance: A Replicative Study African Journal of Business Management (AJBM) 7(36) 3357 - 3373
2013 Johl, C. Flowerday, S. von Solms, R.    Information Technology Governance Process Maturity in Higher Education Institutions in South Africa South Africa Journal of Higher Education 27(3) 627 - 644
2013 von Solms, R.  de Lange, E.     SENPORTAL: Internet-based Services for Senior Citizens African Journal of Information and Communication (13) 76 - 82
2013 Potgieter, M. Van Niekerk, J. F.     Multi-agent augmented computer vision technologies to support human monitoring of secure computing facilities SAIEE Africa Research Journal 104(2) 80 - 88
2014 Johl, C. Flowerday, S. von Solms, R.    Information Technology Governance in the context of Higher Education Governance in South Africa South Africa Journal of Higher Education 28(1) 128 - 148
2014 Kortjan, N. von Solms, R.      A conceptual framework for cyber security awareness and education in SA South Africa Computer Journal (SACJ) 52 29 - 41
2014 Renaud, K. Maguire, J. Van Niekerk, J. F. Kennes, D. Contemplating skill-based authentication.  SAIEE Africa Research Journal 105(2) 6 - 20
2014 Reid, R. Van Niekerk, J. F.     Snakes and ladders for digital natives: information security education for the youth Information Management & Computer Security 22(2)  
2014 Furnell, S. Van Niekerk, J. F. Clarke, N.   The price of patching Computer Fraud & Security 2014(8) 8 - 13
2014 Reid, R. Van Niekerk, J. F.     Brain-compatible, Web-based Information Security Education: A Statistical Study  Information Management & Computer Security 22(4)  
2015 Tekeni, L. Botha, R. A.  Thomson, K-L.   A multi-faceted model for IP-based service authorization in the eduroam network IEEE African Research Journal 106 (2) 83-92
2015 Haskins, B. Botha, R. A.      Contrasting methods for classifying microtext statements containing mathematics Journal of New Generation Sciences 13 (1) 70-87
2015 Isabirye, N Flowerday, S. Nanavati, A Von Solms, R Building Technology Trust in a Rural Agricultural E- Marketplace: A User Requirements Perspective Electronic Journal of Information Systems in Developing Countries 70 1-20
2015 Sohrabi Safa, N Soohak, M von Solms, R.  Furnell, S;        Abdul Ghani, N Information Sercurity Conscious Care Behaviour Formation in Organizations Computers & Security (COSE) 53 65-78
2015 Thomas, G. Botha, RA Van Greunen, D   Understanding the problem of coordination in a large scale distributed environment from a service lens view-Towards the South African public sector e-Administration criteria for coordination support Government Information Quarterly 32 (4) 526-358
2016 Sohrabi Safa, N. Von Solms, R.     An Information Security Knowledge Sharing Model in Organizations Computers in Human Behaviour 57 442-451
2016 Sohrabi Safa, N. Von Solms, R. Furnell, S.   Information security policy compliance model in organizations Computers & Security (COSE) 56 1-13
2016 Sohrabi Safa, N. Von Solms, R. Futcher, L.   Human Aspects of Information Security in Organizations Computer Fraud & Security 2016(2) 15-18
2016 Adesemowo, K. Von Solms, R. Botha, R.   Safeguarding Information as an Asset: Do We Need a Redefinition? South African Journal of Information Management (SAJIM) 18(1)  
2016 Sohrabi Safa, N. Von Solms, R.     Customers repurchase intention formation in e-commerce South African Journal of Information Management (SAJIM) 18(1)  
2016 Von Solms, R. Von Solms, B.     Publish or Perish – But where?” R von Solms & B von Solms South African Computer Journal (SACJ) 28(1)  
2016 Von Solms, R. Willett, M.     Towards Cloud-Computing Assurance The Social Sciences 18