default search action
Rossouw von Solms
Person information
- affiliation: Nelson Mandela University, Port Elizabeth, South Africa
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j57]Ebenhaeser Otto Janse van Rensburg, Reinhardt A. Botha, Rossouw von Solms:
Utility indicator for emotion detection in a speaker authentication system. Inf. Comput. Secur. 30(5): 672-686 (2022) - 2021
- [c55]Silma Koekemoer, Rossouw von Solms:
A Feasibility Study Towards E-processing Supply Chain Management Transactions in South African Municipalities. ICICT (3) 2021: 505-513
2010 – 2019
- 2019
- [j56]Mbusi Sibanda, Rossouw von Solms:
Devising a strategy for IT governance implementation in municipalities. A case study of South Africa. Electron. J. Inf. Syst. Dev. Ctries. 85(2): 12067 (2019) - 2018
- [j55]Basie von Solms, Rossouw von Solms:
Cybersecurity and information security - what goes where? Inf. Comput. Secur. 26(1): 2-9 (2018) - [j54]Nader Sohrabi Safa, Carsten Maple, Tim Watson, Rossouw von Solms:
Motivation and opportunity based model to reduce information security insider threats in organisations. J. Inf. Secur. Appl. 40: 247-257 (2018) - [c54]Rahul Maharaj, Rossouw von Solms:
Social Networking: A Tool for Effective Cybersecurity Education in Cyber-Driven Financial Transactions. HAISA 2018: 91-100 - 2017
- [j53]Theo Tsokota, Rossouw von Solms, Darelle van Greunen:
An ICT Strategy for the Sustainable Development of the Tourism Sector in a Developing Country: A Case Study of Zimbabwe. Electron. J. Inf. Syst. Dev. Ctries. 78(1): 1-20 (2017) - [j52]Noluxolo Gcaza, Rossouw von Solms:
A Strategy for a Cybersecurity Culture: A South African Perspective. Electron. J. Inf. Syst. Dev. Ctries. 80(1): 1-17 (2017) - [j51]Rossouw von Solms, Melanie Willett:
Cloud computing assurance - a review of literature guidance. Inf. Comput. Secur. 25(1): 26-46 (2017) - [j50]Noluxolo Gcaza, Rossouw von Solms, Marthie Grobler, Joey Jansen van Vuuren:
A general morphological analysis: delineating a cyber-security culture. Inf. Comput. Secur. 25(3): 259-278 (2017) - [c53]Noluxolo Gcaza, Rossouw von Solms:
Cybersecurity Culture: An Ill-Defined Problem. World Conference on Information Security Education 2017: 98-109 - 2016
- [j49]Nader Sohrabi Safa, Rossouw von Solms:
An information security knowledge sharing model in organizations. Comput. Hum. Behav. 57: 442-451 (2016) - [j48]Nader Sohrabi Safa, Rossouw von Solms, Steven Furnell:
Information security policy compliance model in organizations. Comput. Secur. 56: 70-82 (2016) - [j47]Rossouw von Solms:
Publish or Perish - But where? South Afr. Comput. J. 28(1) (2016) - [c52]Noluvuyo Fani, Rossouw von Solms, Mariana Gerber:
A framework towards governing "Bring Your Own Device in SMMEs". ISSA 2016: 1-8 - 2015
- [j46]Nader Sohrabi Safa, Mehdi Sookhak, Rossouw von Solms, Steven Furnell, Norjihan Binti Abdul Ghani, Tutut Herawan:
Information security conscious care behaviour formation in organizations. Comput. Secur. 53: 65-78 (2015) - [j45]Naomi Isabirye, Stephen V. Flowerday, Amit Nanavati, Rossouw von Solms:
Building Technology Trust in a Rural Agricultural e-Marketplace: A User Requirements Perspective. Electron. J. Inf. Syst. Dev. Ctries. 70(1): 1-20 (2015) - [j44]Rahul Rastogi, Rossouw von Solms:
IT Security for SCADA: A Position Paper. Int. J. Cyber Warf. Terror. 5(3): 19-27 (2015) - [c51]Noluxolo Gcaza, Rossouw von Solms, Joey Jansen van Vuuren:
An Ontology for a National Cyber-Security Culture Environment. HAISA 2015: 1-10 - [c50]Jacques Coertze, Rossouw von Solms:
Towards a Cybernetics-Based Communication Framework for IT Governance. HICSS 2015: 4595-4606 - [c49]Karen Renaud, Andrew Hoskins, Rossouw von Solms:
Biometric identification: Are we ethically ready? ISSA 2015: 1-8 - 2014
- [j43]Noluxolo Kortjan, Rossouw von Solms:
A conceptual framework for cyber-security awareness and education in SA. South Afr. Comput. J. 52: 29-41 (2014) - [c48]Suné von Solms, Rossouw von Solms:
Towards Cyber Safety Education in Primary Schools in Africa. HAISA 2014: 185-197 - [c47]Jacques Coertze, Rossouw von Solms:
The Board and CIO: The IT Alignment Challenge. HICSS 2014: 4426-4435 - [c46]Jacques Coertze, Rossouw von Solms:
The murky waters of IT governance. ISSA 2014: 1-8 - [c45]Edwin Donald Frauenstein, Rossouw von Solms:
Combatting phishing: A holistic human approach. ISSA 2014: 1-10 - [c44]Miemie Mogale, Mariana Gerber, Mariana Carroll, Rossouw von Solms:
Information Security Assurance Model (ISAM) for an Examination Paper Preparation Process. ISSA 2014: 1-10 - 2013
- [j42]K. Jansson, Rossouw von Solms:
Phishing for phishing awareness. Behav. Inf. Technol. 32(6): 584-593 (2013) - [j41]Rossouw von Solms, Johan Van Niekerk:
From information security to cyber security. Comput. Secur. 38: 97-102 (2013) - [c43]Edwin Donald Frauenstein, Rossouw von Solms:
Using Theories and Best Practices to Bridge the Phishing Gap. EISMC 2013: 69-78 - [c42]Melanie Willett, Rossouw von Solms:
A framework for assuring the conformance of cloud-based email. ICITST 2013: 168-173 - [c41]Jacques Coertze, Rossouw von Solms:
A software gateway to affordable and effective Information Security Governance in SMMEs. ISSA 2013: 1-8 - 2012
- [j40]Rahul Rastogi, Rossouw von Solms:
Information Security Service Culture - Information Security for End-users. J. Univers. Comput. Sci. 18(12): 1628-1642 (2012) - [c40]Jacques Fouché, Rossouw von Solms:
Electronic Communication: Stay Connected. AFRICOMM 2012: 199-210 - [c39]Jacques Coertze, Rossouw von Solms:
A Model for Information Security Governance in Developing Countries. AFRICOMM 2012: 279-288 - [c38]Noluxolo Kortjan, Rossouw von Solms:
Cyber Security Education in Developing Countries: A South African Perspective. AFRICOMM 2012: 289-297 - [c37]Lynn Futcher, Rossouw von Solms:
SecSDM: A usable tool to support IT undergraduate students in secure software development. HAISA 2012: 86-96 - [c36]Noluxolo Kortjan, Rossouw von Solms, Johan Van Niekerk:
Ethical Guidelines for Cyber-related Services Aimed at the Younger Generations. HAISA 2012: 205-215 - 2011
- [j39]Rossouw von Solms, Matthew J. Warren:
Towards the Human Information Security Firewall. Int. J. Cyber Warf. Terror. 1(2): 10-17 (2011) - [j38]Steven Furnell, Rossouw von Solms, Andy D. Phippen:
Preventative Actions for Enhancing Online Protection and Privacy. Int. J. Inf. Technol. Syst. Approach 4(2): 1-11 (2011) - [j37]Lynn Futcher, Rossouw von Solms:
How can secure software be trusted? South Afr. Comput. J. 47: 1-6 (2011) - [c35]Edwin Donald Frauenstein, Rossouw von Solms:
An Enterprise Anti-phishing Framework. World Conference on Information Security Education 2011: 196-203 - [c34]Jacques Coertze, Johan Van Niekerk, Rossouw von Solms:
A web-based information security governance toolbox for small-to-medium enterprises in Southern Africa. ISSA 2011 - [c33]Rayne Reid, Johan Van Niekerk, Rossouw von Solms:
Guidelines for the creation of brain compatible cyber security educational material in Moodle 2.0. ISSA 2011 - [c32]Rossouw von Solms, Kerry-Lynn Thomson, Mvikeli Maninjwa:
Information Security Governance control through comprehensive policy architectures. ISSA 2011 - 2010
- [j36]Johan Van Niekerk, Rossouw von Solms:
Information security culture: A management perspective. Comput. Secur. 29(4): 476-486 (2010) - [j35]Lynn Futcher, Cheryl Schroder, Rossouw von Solms:
Information Security Education in South Africa. Inf. Manag. Comput. Secur. 18(5): 366-374 (2010) - [c31]Kenny Olof Robert Jansson, Rossouw von Solms:
Social Engineering: Towards A Holistic Solution. SAISMC 2010: 23-34 - [c30]Edwin Donald Frauenstein, Rossouw von Solms:
The Wild Wide West of Social Networking. SAISMC 2010: 74-87 - [c29]Lynn Futcher, Cheryl Schroder, Rossouw von Solms:
An Integrative Approach to Information Security Education: A South African Perspective. SAISMC 2010: 215-222 - [c28]Thomas Monk, Johan Van Niekerk, Rossouw von Solms:
Sweetening the medicine: educating users about information security by means of game play. SAICSIT 2010: 193-200 - [c27]Johan Van Niekerk, Rossouw von Solms:
Research Methodologies in Information Security Research: The Road Ahead. SEC 2010: 215-216 - [e4]Nathan L. Clarke, Steven Furnell, Rossouw von Solms:
South African Information Security Multi-Conference, SAISMC 2010, Port Elizabeth, South Africa, May 17-18, 2010. Proceedings. University of Plymouth 2010, ISBN 978-1-84102-256-7 [contents]
2000 – 2009
- 2009
- [c26]Lynn Futcher, Rossouw von Solms:
A Risk-Based Approach to Formalise Information Security Requirements for Software Development. World Conference on Information Security Education 2009: 257-264 - [c25]Johan Van Niekerk, Rossouw von Solms:
Using Bloom's Taxonomy for Information Security Education. World Conference on Information Security Education 2009: 280-287 - [c24]Edwin Donald Frauenstein, Rossouw von Solms:
Phishing: How an Organization can Protect Itself. ISSA 2009: 253-268 - [c23]Thomas Monk, Johan Van Niekerk, Rossouw von Solms:
Concealing the Medicine: Information Security Education through Game Play. ISSA 2009: 467-478 - 2008
- [j34]Mariana Gerber, Rossouw von Solms:
Information security requirements - Interpreting the legal aspects. Comput. Secur. 27(5-6): 124-135 (2008) - [c22]Johan Van Niekerk, Rossouw von Solms:
Bloom's Taxonomy for Information Security Education. ISSA 2008: 1-13 - [c21]Lynn Futcher, Rossouw von Solms:
Guidelines for secure software development. SAICSIT 2008: 56-65 - [c20]Shaun Posthumus, Rossouw von Solms:
Agency Theory: Can it be Used to Strengthen IT Governance?. SEC 2008: 687-691 - 2007
- [c19]Lynn Futcher, Rossouw von Solms:
SecSDM: A Model for Integrating Security into the Software Development Life Cycle. World Conference on Information Security Education 2007: 41-48 - [c18]Robert Gavin Goss, Martin Botha, Rossouw von Solms:
Utilizing fuzzy logic and neural networks for effective, preventative intrusion detection in a wireless environment. SAICSIT 2007: 29-35 - [e3]Hein S. Venter, Mariki M. Eloff, Les Labuschagne, Jan H. P. Eloff, Rossouw von Solms:
New Approaches for Security, Privacy and Trust in Complex Environments, Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa. IFIP 232, Springer 2007, ISBN 978-0-387-72366-2 [contents] - 2006
- [j33]Stephen Flowerday, A. W. Blundell, Rossouw von Solms:
Continuous auditing technologies and models: A discussion. Comput. Secur. 25(5): 325-331 (2006) - [j32]Rossouw von Solms, Sebastiaan H. von Solms:
Information Security Governance: A model based on the Direct-Control Cycle. Comput. Secur. 25(6): 408-412 (2006) - [j31]Rossouw von Solms, Sebastiaan H. von Solms:
Information security governance: Due care. Comput. Secur. 25(7): 494-497 (2006) - [c17]Johan Van Niekerk, Rossouw von Solms:
Understanding Information Security Culture: A Conceptual Framework. ISSA 2006: 1-10 - [c16]Mkhululi Tyukala, Dalenca Pottas, Rossouw von Solms, Helen van de Haar:
The Organisational Information Security Profile - A Tool to Assist The Board. ISSA 2006: 1-13 - [c15]Stephen Flowerday, Rossouw von Solms:
Trust: An Element of Information Security. SEC 2006: 87-98 - 2005
- [j30]Mariana Gerber, Rossouw von Solms:
Management of risk in the information age. Comput. Secur. 24(1): 16-30 (2005) - [j29]Kerry-Lynn Thomson, Rossouw von Solms:
Information security obedience: a definition. Comput. Secur. 24(1): 69-75 (2005) - [j28]Basie von Solms, Rossouw von Solms:
From information security to ... business security? Comput. Secur. 24(4): 271-273 (2005) - [j27]Stephen Flowerday, Rossouw von Solms:
Real-time information integrity = system integrity + data integrity + continuous assurances. Comput. Secur. 24(8): 604-613 (2005) - [c14]R. Mulder, Rossouw von Solms:
The Proliferation of Wireless Devices and its Role in Corporate Governance. ISSA 2005: 1-11 - [c13]Johan Van Niekerk, Rossouw von Solms:
A holistic framework for the fostering of an information security sub-culture in organizations. ISSA 2005: 1-13 - 2004
- [j26]Cheryl Vroom, Rossouw von Solms:
Towards information security behavioural compliance. Comput. Secur. 23(3): 191-198 (2004) - [j25]Rossouw von Solms, Sebastiaan H. von Solms:
From policies to culture. Comput. Secur. 23(4): 275-279 (2004) - [j24]Sebastiaan H. von Solms, Rossouw von Solms:
The 10 deadly sins of information security management. Comput. Secur. 23(5): 371-376 (2004) - [j23]Shaun Posthumus, Rossouw von Solms:
A framework for the governance of information security. Comput. Secur. 23(8): 638-646 (2004) - [j22]Jacques Botha, Rossouw von Solms:
A cyclic approach to business continuity planning. Inf. Manag. Comput. Secur. 12(4): 328-337 (2004) - [c12]Johan Van Niekerk, Rossouw von Solms:
Corporate Information Security Education: Is Outcomes Based Education the Solution? International Information Security Workshops 2004: 3-18 - [c11]Kerry-Lynn Thomson, Rossouw von Solms:
Towards Corporate Information Security Obedience. International Information Security Workshops 2004: 19-32 - [c10]Shaun Posthumus, Rossouw von Solms:
A Responsibility Framework for Information Security. IICIS 2004: 205-221 - [c9]Rahul Rastogi, Rossouw von Solms:
Information Security Governance - A Re-Definition. IICIS 2004: 223-236 - 2003
- [j21]Helen van de Haar, Rossouw von Solms:
A model for deriving information security control attribute profiles. Comput. Secur. 22(3): 233-244 (2003) - [j20]Martin Botha, Rossouw von Solms:
Utilising fuzzy logic and trend analysis for effective intrusion detection. Comput. Secur. 22(5): 423-434 (2003) - [c8]Kerry-Lynn Thomson, Rossouw von Solms:
Integrating Information Security into Corporate Governance. SEC 2003: 169-180 - [c7]Cheryl Vroom, Rossouw von Solms:
Information Security: Auditing the Behaviour of the Employee. SEC 2003: 401-404 - 2002
- [j19]Martin Botha, Rossouw von Solms:
The utilization of trend analysis in the effective monitoring of information security. Part 2: the model. Inf. Manag. Comput. Secur. 10(1): 5-11 (2002) - [j18]Clive Vermeulen, Rossouw von Solms:
The information security management toolbox - taking the pain out of security management. Inf. Manag. Comput. Secur. 10(3): 119-125 (2002) - [c6]Oliver André Hoppe, Johan Van Niekerk, Rossouw von Solms:
The Effective Implementation of Information Security in Organizations. SEC 2002: 1-18 - [c5]Cheryl Vroom, Rossouw von Solms:
A Practical Approach to Information Security Awareness in the Organization. SEC 2002: 19-38 - 2001
- [j17]Basie von Solms, Rossouw von Solms:
Incremental Information Security Certification. Comput. Secur. 20(4): 308-310 (2001) - [j16]Mariana Gerber, Rossouw von Solms:
From Risk Analysis to Security Requirements. Comput. Secur. 20(7): 577-584 (2001) - [j15]Mariana Gerber, Rossouw von Solms, Paul L. Overbeek:
Formalizing information security requirements. Inf. Manag. Comput. Secur. 9(1): 32-37 (2001) - [j14]Martin Botha, Rossouw von Solms:
The utilization of trend analysis in the effective monitoring of information security. Part 1: the concept. Inf. Manag. Comput. Secur. 9(5): 237-242 (2001) - [e2]Jan H. P. Eloff, Les Labuschagne, Rossouw von Solms, Gurpreet Dhillon:
Advances in Information Security Management & Small Systems Security, IFIP TC11 WG11.1/WG11.2 Eigth Annual Working Conference on Information Security Management & Small Systems Security, September 27-28, 2001, Las Vegas, Nevada, USA. IFIP Conference Proceedings 200, Kluwer 2001, ISBN 0-7923-7506-8 [contents] - 2000
- [j13]Lynette Barnard, Rossouw von Solms:
A Formalized Approach to the Effective Selection and Evaluation of Information Security Control. Comput. Secur. 19(2): 185-194 (2000) - [c4]Rossouw von Solms, Helen van de Haar:
From Trusted Information Security Controls to a Trusted Information Security Environment. SEC 2000: 29-36
1990 – 1999
- 1999
- [j12]Rossouw von Solms:
Information security management: why standards are important. Inf. Manag. Comput. Secur. 7(1): 50-58 (1999) - [c3]Werner Olivier, Rossouw von Solms:
The Effective Utilization of Audit Logs in Information Security Management. Conference on Information Security Management & Small Systems Security 1999: 51-62 - [e1]Jan H. P. Eloff, Les Labuschagne, Rossouw von Solms, Jan Verschuren:
Information Security Management & Small Systems Security, IFIP TC11 WG11.1/WG11.2 Seventh Annual Working Conference on Information Security Management & Small Systems Security, September 30 - October 1, 1999, Amsterdam, The Netherlands. IFIP Conference Proceedings 154, Kluwer 1999, ISBN 0-7923-8626-4 [contents] - 1998
- [j11]Lynette Barnard, Rossouw von Solms:
The evaluation and certification of information security against BS 7799. Inf. Manag. Comput. Secur. 6(2): 72-77 (1998) - [j10]M. E. Thomson, Rossouw von Solms:
Information security awareness: educating your users effectively. Inf. Manag. Comput. Secur. 6(4): 167-173 (1998) - [j9]Rossouw von Solms:
Information security management (1): why information security is so important. Inf. Manag. Comput. Secur. 6(4): 174-177 (1998) - [j8]Rossouw von Solms:
Information security management (2): guidelines to the management of information technology security (GMITS). Inf. Manag. Comput. Secur. 6(5): 221-223 (1998) - [j7]Rossouw von Solms:
Information security management (3): the Code of Practice for Information Security Management (BS 7799). Inf. Manag. Comput. Secur. 6(5): 224-225 (1998) - 1997
- [j6]Rossouw von Solms:
Driving safely on the information superhighway. Inf. Manag. Comput. Secur. 5(1): 20-22 (1997) - [c2]Rossouw von Solms:
Can security baselines replace risk analysis? SEC 1997: 91-98 - 1996
- [j5]Rossouw von Solms:
Information security management: The second generation. Comput. Secur. 15(4): 281-288 (1996) - [j4]Sharon Halliday, Karin P. Badenhorst, Rossouw von Solms:
A business approach to effective information technology risk analysis and management. Inf. Manag. Comput. Secur. 4(1): 19-31 (1996) - 1994
- [j3]Rossouw von Solms, Helen van de Haar, Sebastiaan H. von Solms, William J. Caelli:
A framework for information security evaluation. Inf. Manag. 26(3): 143-153 (1994) - 1993
- [j2]Helen van de Haar, Rossouw von Solms:
A Tool for Information Security Management. Inf. Manag. Comput. Secur. 1(1): 4-10 (1993) - [j1]Rossouw von Solms, Sebastiaan H. von Solms, William J. Caelli:
A Model for Information Security Management. Inf. Manag. Comput. Secur. 1(3): 12-17 (1993) - [c1]Rossouw von Solms, Sebastiaan H. von Solms, John M. Carroll:
A Process Approach to Information Security Management. SEC 1993: 385-399
Coauthor Index
aka: Basie von Solms
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint