From information security to cyber security R Von Solms, J Van Niekerk computers & security 38, 97-102, 2013 | 1089 | 2013 |
Towards information security behavioural compliance C Vroom, R Von Solms Computers & security 23 (3), 191-198, 2004 | 662 | 2004 |
Information security policy compliance model in organizations NS Safa, R Von Solms, S Furnell computers & security 56, 70-82, 2016 | 541 | 2016 |
The 10 deadly sins of information security management B Von Solms, R Von Solms Computers & security 23 (5), 371-376, 2004 | 454 | 2004 |
Information security conscious care behaviour formation in organizations NS Safa, M Sookhak, R Von Solms, S Furnell, NA Ghani, T Herawan Computers & Security 53, 65-78, 2015 | 415 | 2015 |
Information security awareness: educating your users effectively ME Thomson, R von Solms Information management & computer security, 1998 | 410 | 1998 |
Information security culture: A management perspective JF Van Niekerk, R Von Solms Computers & security 29 (4), 476-486, 2010 | 403 | 2010 |
A framework for the governance of information security S Posthumus, R Von Solms Computers & security 23 (8), 638-646, 2004 | 377 | 2004 |
An information security knowledge sharing model in organizations NS Safa, R Von Solms Computers in Human Behavior 57, 442-451, 2016 | 296 | 2016 |
From policies to culture R Von Solms, B Von Solms Computers & security 23 (4), 275-279, 2004 | 293 | 2004 |
Management of risk in the information age M Gerber, R Von Solms Computers & security 24 (1), 16-30, 2005 | 271 | 2005 |
Cultivating an organizational information security culture KL Thomson, R Von Solms, L Louw Computer fraud & security 2006 (10), 7-11, 2006 | 249 | 2006 |
Information security management: why standards are important R Von Solms Information Management & Computer Security, 1999 | 195 | 1999 |
From risk analysis to security requirements M Gerber, R Solms Computers & Security 20 (7), 577-577, 2001 | 189* | 2001 |
Phishing for phishing awareness K Jansson, R von Solms Behaviour & information technology 32 (6), 584-593, 2013 | 174 | 2013 |
Information security obedience: a definition KL Thomson, R Von Solms Computers & Security 24 (1), 69-75, 2005 | 168 | 2005 |
A cyclic approach to business continuity planning J Botha, R Von Solms Information Management & Computer Security, 2004 | 157 | 2004 |
A business approach to effective information technology risk analysis and management S Halliday, K Badenhorst, R Von Solms Information Management & Computer Security, 1996 | 147 | 1996 |
Information Security Governance: a model based on the direct–control cycle R Von Solms, SHB von Solms Computers & Security 25 (6), 408-412, 2006 | 142 | 2006 |
From information security to… business security? B Von Solms, R Von Solms Computers & security 24 (4), 271-273, 2005 | 135 | 2005 |