Follow
Kerry-Lynn Thomson
Kerry-Lynn Thomson
Nelson Mandela University
Verified email at mandela.ac.za
Title
Cited by
Cited by
Year
Cultivating an organizational information security culture
KL Thomson, R Von Solms, L Louw
Computer fraud & security 2006 (10), 7-11, 2006
2492006
From culture to disobedience: Recognising the varying user acceptance of IT security
S Furnell, KL Thomson
Computer fraud & security 2009 (2), 5-10, 2009
1722009
Information security obedience: a definition
KL Thomson, R Von Solms
Computers & Security 24 (1), 69-75, 2005
1682005
Recognising and addressing ‘security fatigue’
S Furnell, KL Thomson
Computer Fraud & Security 2009 (11), 7-11, 2009
932009
Towards an information security competence maturity model
KL Thomson, R von Solms
Computer fraud & security 2006 (5), 11-15, 2006
702006
Combating information security apathy by encouraging prosocial organisational behaviour
K Thomson, J Van Niekerk
Information Management & Computer Security, 2012
682012
Information security governance control through comprehensive policy architectures
R Von Solms, KL Thomson, PM Maninjwa
2011 Information Security for South Africa, 1-6, 2011
472011
Information security conscience: A precondition to an information security culture?
KL Thomson
Journal of Information System Security 6 (4), 2010
132010
Integrating information security into corporate culture
KL Thomson, R Von Solms
Port Elizabeth Technikon, 2003
132003
Evaluating the Cisco Networking Academy Program’s Instructional Model against Bloom’s Taxonomy for the purpose of information security education for organizational end-users
JF Niekerk, KL Thomson
IFIP International Conference on Key Competencies in the Knowledge Society …, 2010
82010
Scare tactics–A viable weapon in the security war?
S Furnell, M Papadaki, KL Thomson
Computer Fraud & Security 2009 (12), 6-10, 2009
82009
Cyber safety for school children
J Van Niekerk, KL Thomson, R Reid
Information Assurance and Security Education and Training, 103, 2009
82009
Assessing the effectiveness of the Cisco Networking Academy program in developing countries
O Yekela, KL Thomson, J Niekerk
IFIP World Conference on Information Security Education, 27-38, 2017
62017
Exploring the human dimension of TETRA
NP Fouché, KL Thomson
2011 Information Security for South Africa, 1-5, 2011
52011
MISSTEV: model for information security shared tacit espoused values
KL Thomson
Doctor Technologiae (DT) thesis at Nelson Mandela Metropolitan University …, 2007
52007
Towards using pervasive information security education to influence information security behaviour in undergraduate computing graduates
T Mabece, L Futcher, KL Thomson
42016
Concerns regarding service authorization by IP address using eduroam
L Tekeni, KL Thomson, RA Botha
2014 Information Security for South Africa, 1-6, 2014
42014
Integrating Information Security into Corporate Governance
KL Thomson, R Solms
IFIP International Information Security Conference, 169-180, 2003
42003
Towards a framework for the integration of information security into undergraduate computing curricula
LA Futcher, L Gomana, KL Thomson
South African Journal of Higher Education 33 (3), 155-175, 2019
32019
Factors influencing smartphone application downloads
W Janse Van Rensburg, KL Thomson, L Futcher
IFIP World Conference on Information Security Education, 81-92, 2018
32018
The system can't perform the operation now. Try again later.
Articles 1–20