From information security to cyber security R Von Solms, J Van Niekerk computers & security 38, 97-102, 2013 | 1179 | 2013 |
Towards information security behavioural compliance C Vroom, R Von Solms Computers & security 23 (3), 191-198, 2004 | 682 | 2004 |
Information security policy compliance model in organizations NS Safa, R Von Solms, S Furnell computers & security 56, 70-82, 2016 | 585 | 2016 |
The 10 deadly sins of information security management B Von Solms, R Von Solms Computers & security 23 (5), 371-376, 2004 | 471 | 2004 |
Information security conscious care behaviour formation in organizations NS Safa, M Sookhak, R Von Solms, S Furnell, NA Ghani, T Herawan Computers & Security 53, 65-78, 2015 | 446 | 2015 |
Information security culture: A management perspective JF Van Niekerk, R Von Solms Computers & security 29 (4), 476-486, 2010 | 426 | 2010 |
Information security awareness: educating your users effectively ME Thomson, R von Solms Information management & computer security 6 (4), 167-173, 1998 | 418 | 1998 |
A framework for the governance of information security S Posthumus, R Von Solms Computers & security 23 (8), 638-646, 2004 | 386 | 2004 |
An information security knowledge sharing model in organizations NS Safa, R Von Solms Computers in Human Behavior 57, 442-451, 2016 | 314 | 2016 |
From policies to culture R Von Solms, B Von Solms Computers & security 23 (4), 275-279, 2004 | 297 | 2004 |
Management of risk in the information age M Gerber, R Von Solms Computers & security 24 (1), 16-30, 2005 | 281 | 2005 |
Cultivating an organizational information security culture KL Thomson, R Von Solms, L Louw Computer fraud & security 2006 (10), 7-11, 2006 | 257 | 2006 |
Information security management: why standards are important R Von Solms Information Management & Computer Security, 1999 | 197 | 1999 |
From risk analysis to security requirements M Gerber, R Solms Computers & Security 20 (7), 577-577, 2001 | 193* | 2001 |
Phishing for phishing awareness K Jansson, R von Solms Behaviour & information technology 32 (6), 584-593, 2013 | 187 | 2013 |
Information security obedience: a definition KL Thomson, R Von Solms Computers & Security 24 (1), 69-75, 2005 | 168 | 2005 |
A cyclic approach to business continuity planning J Botha, R Von Solms Information Management & Computer Security 12 (4), 328-337, 2004 | 166 | 2004 |
Information Security Governance: a model based on the direct–control cycle R Von Solms, SHB von Solms Computers & Security 25 (6), 408-412, 2006 | 153 | 2006 |
A business approach to effective information technology risk analysis and management S Halliday, K Badenhorst, R Von Solms Information Management & Computer Security 4 (1), 19-31, 1996 | 146 | 1996 |
From information security to… business security? B Von Solms, R Von Solms Computers & security 24 (4), 271-273, 2005 | 136 | 2005 |