From information security to cyber security R Von Solms, J Van Niekerk computers & security 38, 97-102, 2013 | 1648 | 2013 |
Towards information security behavioural compliance C Vroom, R Von Solms Computers & security 23 (3), 191-198, 2004 | 758 | 2004 |
Information security policy compliance model in organizations NS Safa, R Von Solms, S Furnell computers & security 56, 70-82, 2016 | 697 | 2016 |
Information security conscious care behaviour formation in organizations NS Safa, M Sookhak, R Von Solms, S Furnell, NA Ghani, T Herawan Computers & Security 53, 65-78, 2015 | 551 | 2015 |
The 10 deadly sins of information security management B Von Solms, R Von Solms Computers & security 23 (5), 371-376, 2004 | 516 | 2004 |
Information security culture: A management perspective JF Van Niekerk, R Von Solms Computers & security 29 (4), 476-486, 2010 | 479 | 2010 |
Information security awareness: educating your users effectively ME Thomson, R von Solms Information management & computer security 6 (4), 167-173, 1998 | 449 | 1998 |
A framework for the governance of information security S Posthumus, R Von Solms Computers & security 23 (8), 638-646, 2004 | 418 | 2004 |
An information security knowledge sharing model in organizations NS Safa, R Von Solms Computers in Human Behavior 57, 442-451, 2016 | 389 | 2016 |
From policies to culture R Von Solms, B Von Solms Computers & security 23 (4), 275-279, 2004 | 320 | 2004 |
Management of risk in the information age M Gerber, R Von Solms Computers & security 24 (1), 16-30, 2005 | 303 | 2005 |
Cultivating an organizational information security culture KL Thomson, R Von Solms, L Louw Computer fraud & security 2006 (10), 7-11, 2006 | 284 | 2006 |
Phishing for phishing awareness K Jansson, R von Solms Behaviour & information technology 32 (6), 584-593, 2013 | 250 | 2013 |
Cybersecurity and information security–what goes where? B Von Solms, R Von Solms Information & Computer Security 26 (1), 2-9, 2018 | 226 | 2018 |
Information security management: why standards are important R Von Solms Information Management & Computer Security 7 (1), 50-58, 1999 | 221 | 1999 |
From risk analysis to security requirements M Gerber, R Von Solms Computers & Security 20 (7), 577-584, 2001 | 205* | 2001 |
A cyclic approach to business continuity planning J Botha, R Von Solms Information Management & Computer Security 12 (4), 328-337, 2004 | 186 | 2004 |
Information security obedience: a definition KL Thomson, R Von Solms Computers & Security 24 (1), 69-75, 2005 | 174 | 2005 |
Motivation and opportunity based model to reduce information security insider threats in organisations NS Safa, C Maple, T Watson, R Von Solms Journal of information security and applications 40, 247-257, 2018 | 172 | 2018 |
Information Security Governance: a model based on the direct–control cycle R Von Solms, SHB von Solms Computers & security 25 (6), 408-412, 2006 | 169 | 2006 |