From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Towards Corporate Information Security Obedience., и . International Information Security Workshops, том 148 из IFIP, стр. 19-32. Kluwer, (2004)Utilizing fuzzy logic and neural networks for effective, preventative intrusion detection in a wireless environment., , и . SAICSIT, том 226 из ACM International Conference Proceeding Series, стр. 29-35. ACM, (2007)Information security policy compliance model in organizations., , и . Comput. Secur., (2016)Information security culture: A management perspective., и . Comput. Secur., 29 (4): 476-486 (2010)A framework for the governance of information security., и . Comput. Secur., 23 (8): 638-646 (2004)Towards information security behavioural compliance., и . Comput. Secur., 23 (3): 191-198 (2004)A conceptual framework for cyber-security awareness and education in SA., и . South Afr. Comput. J., (2014)A cyclic approach to business continuity planning., и . Inf. Manag. Comput. Secur., 12 (4): 328-337 (2004)Information security awareness: educating your users effectively., и . Inf. Manag. Comput. Secur., 6 (4): 167-173 (1998)A Model for Information Security Management., , и . Inf. Manag. Comput. Secur., 1 (3): 12-17 (1993)