Kerry-Lynn Thomson
Kerry-Lynn Thomson
Nelson Mandela University
Verified email at
Cited by
Cited by
Cultivating an organizational information security culture
KL Thomson, R Von Solms, L Louw
Computer fraud & security 2006 (10), 7-11, 2006
From culture to disobedience: Recognising the varying user acceptance of IT security
S Furnell, KL Thomson
Computer fraud & security 2009 (2), 5-10, 2009
Information security obedience: a definition
KL Thomson, R Von Solms
Computers & Security 24 (1), 69-75, 2005
Recognising and addressing ‘security fatigue’
S Furnell, KL Thomson
Computer Fraud & Security 2009 (11), 7-11, 2009
Towards an information security competence maturity model
KL Thomson, R von Solms
Computer fraud & security 2006 (5), 11-15, 2006
Combating information security apathy by encouraging prosocial organisational behaviour
K Thomson, J Van Niekerk
Information Management & Computer Security, 2012
Information security governance control through comprehensive policy architectures
R Von Solms, KL Thomson, PM Maninjwa
2011 Information Security for South Africa, 1-6, 2011
Information security conscience: A precondition to an information security culture?
KL Thomson
Journal of Information System Security 6 (4), 2010
Integrating information security into corporate culture
KL Thomson, R Von Solms
Port Elizabeth Technikon, 2003
Evaluating the Cisco Networking Academy Program’s Instructional Model against Bloom’s Taxonomy for the purpose of information security education for organizational end-users
JF Niekerk, KL Thomson
IFIP International Conference on Key Competencies in the Knowledge Society …, 2010
Scare tactics–A viable weapon in the security war?
S Furnell, M Papadaki, KL Thomson
Computer Fraud & Security 2009 (12), 6-10, 2009
Cyber safety for school children
J Van Niekerk, KL Thomson, R Reid
Information Assurance and Security Education and Training, 103, 2009
Assessing the effectiveness of the Cisco Networking Academy program in developing countries
O Yekela, KL Thomson, J Niekerk
IFIP World Conference on Information Security Education, 27-38, 2017
Exploring the human dimension of TETRA
NP Fouché, KL Thomson
2011 Information Security for South Africa, 1-5, 2011
MISSTEV: model for information security shared tacit espoused values
KL Thomson
Doctor Technologiae (DT) thesis at Nelson Mandela Metropolitan University …, 2007
Towards using pervasive information security education to influence information security behaviour in undergraduate computing graduates
T Mabece, L Futcher, KL Thomson
Concerns regarding service authorization by IP address using eduroam
L Tekeni, KL Thomson, RA Botha
2014 Information Security for South Africa, 1-6, 2014
Integrating Information Security into Corporate Governance
KL Thomson, R Solms
IFIP International Information Security Conference, 169-180, 2003
Towards a framework for the integration of information security into undergraduate computing curricula
LA Futcher, L Gomana, KL Thomson
South African Journal of Higher Education 33 (3), 155-175, 2019
Factors influencing smartphone application downloads
W Janse Van Rensburg, KL Thomson, L Futcher
IFIP World Conference on Information Security Education, 81-92, 2018
The system can't perform the operation now. Try again later.
Articles 1–20