Follow
S H Basie B von Solms
S H Basie B von Solms
Verified email at uj.ac.za - Homepage
Title
Cited by
Cited by
Year
The 10 deadly sins of information security management
B Von Solms, R Von Solms
Computers & security 23 (5), 371-376, 2004
5002004
On blind signatures and perfect crimes
S Von Solms, D Naccache
Computers & Security 11 (6), 581-583, 1992
3711992
Information security—the third wave?
B Von Solms
Computers & security 19 (7), 615-620, 2000
3462000
Information Security governance: COBIT or ISO 17799 or both?
B Von Solms
Computers & Security 24 (2), 99-104, 2005
3182005
From policies to culture
R Von Solms, B Von Solms
Computers & security 23 (4), 275-279, 2004
3152004
Information security–the fourth wave
B Von Solms
Computers & security 25 (3), 165-168, 2006
2842006
Cyber security for home users: A new way of protection through awareness enforcement
E Kritzinger, SH von Solms
Computers & Security 29 (8), 840-847, 2010
2502010
Information security—a multidimensional discipline
B Von Solms
Computers & security 20 (6), 504-508, 2001
2382001
Information Security Governance–compliance management vs operational management
SHB Von Solms
Computers & Security 24 (6), 443-447, 2005
2322005
Cybersecurity and information security–what goes where?
B Von Solms, R Von Solms
Information & Computer Security 26 (1), 2-9, 2018
1932018
Corporate governance and information security
B Von Solms
Computers & Security 20 (3), 215-218, 2001
1762001
Information Security Governance: a model based on the direct–control cycle
R Von Solms, SHB von Solms
Computers & security 25 (6), 408-412, 2006
1672006
Information security management: a hierarchical framework for various approaches
MM Eloff, SH von Solms
Computers & Security 19 (3), 243-256, 2000
1482000
From information security to… business security?
B Von Solms, R Von Solms
Computers & security 24 (4), 271-273, 2005
1472005
Information security governance
SH Solms, R Solms
Springer Science & Business Media, 2008
1442008
Information security management: an approach to combine process certification and product evaluation
MM Eloff, SH Von Solms
Computers & Security 19 (8), 698-709, 2000
1262000
A review of industry 4.0 manufacturing process security risks
J Prinsloo, S Sinha, B von Solms
Applied Sciences 9 (23), 5105, 2019
1142019
A taxonomy for secure object-oriented databases
MS Olivier, SH Von Solms
ACM Transactions on Database Systems (TODS) 19 (1), 3-46, 1994
1011994
Socio-technical systems cybersecurity framework
M Malatji, S Von Solms, A Marnewick
Information & Computer Security 27 (2), 233-272, 2019
942019
A multi-component view of digital forensics
CP Grobler, CP Louwrens, SH von Solms
2010 International Conference on Availability, Reliability and Security, 647-652, 2010
942010
The system can't perform the operation now. Try again later.
Articles 1–20