Follow
Kerry-Lynn Thomson
Kerry-Lynn Thomson
Nelson Mandela University
Verified email at mandela.ac.za
Title
Cited by
Cited by
Year
Cultivating an organizational information security culture
KL Thomson, R Von Solms, L Louw
Computer fraud & security 2006 (10), 7-11, 2006
2852006
From culture to disobedience: Recognising the varying user acceptance of IT security
S Furnell, KL Thomson
Computer fraud & security 2009 (2), 5-10, 2009
1992009
Information security obedience: a definition
KL Thomson, R Von Solms
Computers & Security 24 (1), 69-75, 2005
1772005
Recognising and addressing ‘security fatigue’
S Furnell, KL Thomson
Computer Fraud & Security 2009 (11), 7-11, 2009
1472009
Towards an information security competence maturity model
KL Thomson, R von Solms
Computer fraud & security 2006 (5), 11-15, 2006
842006
Combating information security apathy by encouraging prosocial organisational behaviour
K Thomson, J Van Niekerk
Information Management & Computer Security 20 (1), 39-46, 2012
772012
Information security governance control through comprehensive policy architectures
R Von Solms, KL Thomson, PM Maninjwa
2011 Information Security for South Africa, 1-6, 2011
592011
Bringing post-occupancy evaluation to schools in Scotland
C Watson, K Thomson
Evaluating Quality in Educational Facilities 3, 189-220, 2005
322005
Integrating information security into corporate culture
KL Thomson, R Von Solms
Port Elizabeth Technikon, 2003
142003
Information security conscience: A precondition to an information security culture?
KL Thomson
Journal of Information System Security 6 (4), 2010
132010
Cyber safety for school children: A case study in the Nelson Mandela Metropolis
J Van Niekerk, KL Thomson, R Reid
Information Assurance and Security Education and Training: 8th IFIP WG 11.8 …, 2013
112013
Evaluating the Cisco Networking Academy Program’s Instructional Model against Bloom’s Taxonomy for the purpose of information security education for organizational end-users
JF van Niekerk, KL Thomson
IFIP International Conference on Key Competencies in the Knowledge Society …, 2010
92010
Scare tactics–A viable weapon in the security war?
S Furnell, M Papadaki, KL Thomson
Computer Fraud & Security 2009 (12), 6-10, 2009
92009
Factors influencing smartphone application downloads
W Janse Van Rensburg, KL Thomson, L Futcher
IFIP world conference on information security education, 81-92, 2018
72018
Exploring the human dimension of TETRA
NP Fouché, KL Thomson
2011 Information Security for South Africa, 1-5, 2011
72011
Assessing the effectiveness of the Cisco Networking Academy program in developing countries
O Yekela, KL Thomson, J Van Niekerk
Information Security Education for a Global Digital Society: 10th IFIP WG 11 …, 2017
62017
Integrating Information Security into Corporate Governance
KL Thomson, R von Solms
Security and Privacy in the Age of Uncertainty: IFIP TC11 18 th …, 2003
62003
Towards a framework for the integration of information security into undergraduate computing curricula
LA Futcher, L Gomana, KL Thomson
South African Journal of Higher Education 33 (3), 155-175, 2019
52019
An Educational Intervention Towards Safe Smartphone Usage.
WJ Van Rensburg, KL Thomson, LA Futcher
HAISA, 123-134, 2018
52018
Towards Culturally Sensitive Policy: Africanising Approaches to Prevent Social Engineering
KL Thomson, J Niekerk
Advanced Science Letters 24 (4), 2499-2503, 2018
52018
The system can't perform the operation now. Try again later.
Articles 1–20