The management of security in cloud computing S Ramgovind, MM Eloff, E Smith 2010 Information Security for South Africa, 1-7, 2010 | 697 | 2010 |
Information security: The moving target MT Dlamini, JHP Eloff, MM Eloff Computers & security 28 (3-4), 189-198, 2009 | 263 | 2009 |
Integrated digital forensic process model MD Kohn, MM Eloff, JHP Eloff Computers & Security 38, 103-115, 2013 | 255 | 2013 |
Information security management: a new paradigm JHP Eloff, M Eloff Proceedings of the 2003 annual research conference of the South African …, 2003 | 199 | 2003 |
Information security architecture JHP Eloff, MM Eloff Computer Fraud & Security 2005 (11), 10-16, 2005 | 178 | 2005 |
Information security management: a hierarchical framework for various approaches MM Eloff, SH von Solms Computers & Security 19 (3), 243-256, 2000 | 148 | 2000 |
Accommodating soft skills in software project management A Sukhoo, A Barnard, MM Eloff, JA Van der Poll, M Motah Issues in Informing Science and Information Technology 2, 691-704, 2005 | 140 | 2005 |
Information security management: an approach to combine process certification and product evaluation MM Eloff, SH Von Solms Computers & Security 19 (8), 698-709, 2000 | 124 | 2000 |
System usability scale evaluation of online banking services: A South African study M Mujinga, MM Eloff, JH Kroeze South African journal of science 114 (3-4), 1-8, 2018 | 60 | 2018 |
Design of cyber security awareness game utilizing a social media framework WA Labuschagne, I Burke, N Veerasamy, MM Eloff 2011 Information Security for South Africa, 1-9, 2011 | 53 | 2011 |
Internet of people, things and services-the convergence of security, trust and privacy JHP Eloff, MM Eloff, MT Dlamini, MP Zielinski 3rd CompanionAble Workshop – IoPTS, 02 December 2009, Novotel Brussels, 2009 | 43 | 2009 |
A high-level comparison between the South African protection of personal information act and international data protection laws J Botha, MM Grobler, J Hahn, M Eloff ICMLG2017 5th International Conference on Management Leadership and …, 2017 | 37 | 2017 |
Internet of things: emerging and future scenarios from an information security perspective MT Dlamini, MM Eloff, JHP Eloff Southern Africa Telecommunication Networks and Applications Conference, 2009 | 37 | 2009 |
Psychosocial risks: Can their effects on the security of information systems really be ignored? ED Frangopoulos, MM Eloff, LM Venter Information Management & Computer Security 21 (1), 53-65, 2013 | 36 | 2013 |
Psychosocial Risks: can their effects on the Security of Information Systems really be ignored?. ED Frangopoulos, MM Eloff, LM Venter 6th International Symposium on Human Aspects of Information Security …, 2012 | 36 | 2012 |
A sustainable information security framework for e-Government–case of Tanzania CK Wangwe, MM Eloff, L Venter Technological and Economic Development of Economy 18 (1), 117-131, 2012 | 34 | 2012 |
Manet reactive routing protocols node mobility variation effect in analysing the impact of black hole attack EO Ochola, LF Mejaele, MM Eloff, JA Van Der Poll SAIEE Africa Research Journal 108 (2), 80-92, 2017 | 33 | 2017 |
An evolutionary software project management maturity model for Mauritius. A Sukhoo, A Barnard, MM Eloff, JA Van Der Poll Interdisciplinary Journal of Information, Knowledge & Management 2, 2007 | 32 | 2007 |
The Effects of the PoPI Act on Small and Medium Enterprises in South Africa, J Botha, MM Eloff, I Swart Proceedings of the 2015 Information Security South Africa (ISSA 2015 …, 2015 | 30 | 2015 |
An assessment of software project management maturity in Mauritius A Sukhoo, A Barnard, JA Van der Poll, MM Eloff Issues in Informing Science and Information Technology 2, 671-690, 2006 | 25 | 2006 |