Cultivating an organizational information security culture KL Thomson, R Von Solms, L Louw Computer fraud & security 2006 (10), 7-11, 2006 | 285 | 2006 |
From culture to disobedience: Recognising the varying user acceptance of IT security S Furnell, KL Thomson Computer fraud & security 2009 (2), 5-10, 2009 | 199 | 2009 |
Information security obedience: a definition KL Thomson, R Von Solms Computers & Security 24 (1), 69-75, 2005 | 177 | 2005 |
Recognising and addressing ‘security fatigue’ S Furnell, KL Thomson Computer Fraud & Security 2009 (11), 7-11, 2009 | 147 | 2009 |
Towards an information security competence maturity model KL Thomson, R von Solms Computer fraud & security 2006 (5), 11-15, 2006 | 84 | 2006 |
Combating information security apathy by encouraging prosocial organisational behaviour K Thomson, J Van Niekerk Information Management & Computer Security 20 (1), 39-46, 2012 | 77 | 2012 |
Information security governance control through comprehensive policy architectures R Von Solms, KL Thomson, PM Maninjwa 2011 Information Security for South Africa, 1-6, 2011 | 59 | 2011 |
Bringing post-occupancy evaluation to schools in Scotland C Watson, K Thomson Evaluating Quality in Educational Facilities 3, 189-220, 2005 | 32 | 2005 |
Integrating information security into corporate culture KL Thomson, R Von Solms Port Elizabeth Technikon, 2003 | 14 | 2003 |
Information security conscience: A precondition to an information security culture? KL Thomson Journal of Information System Security 6 (4), 2010 | 13 | 2010 |
Cyber safety for school children: A case study in the Nelson Mandela Metropolis J Van Niekerk, KL Thomson, R Reid Information Assurance and Security Education and Training: 8th IFIP WG 11.8 …, 2013 | 11 | 2013 |
Evaluating the Cisco Networking Academy Program’s Instructional Model against Bloom’s Taxonomy for the purpose of information security education for organizational end-users JF van Niekerk, KL Thomson IFIP International Conference on Key Competencies in the Knowledge Society …, 2010 | 9 | 2010 |
Scare tactics–A viable weapon in the security war? S Furnell, M Papadaki, KL Thomson Computer Fraud & Security 2009 (12), 6-10, 2009 | 9 | 2009 |
Factors influencing smartphone application downloads W Janse Van Rensburg, KL Thomson, L Futcher IFIP world conference on information security education, 81-92, 2018 | 7 | 2018 |
Exploring the human dimension of TETRA NP Fouché, KL Thomson 2011 Information Security for South Africa, 1-5, 2011 | 7 | 2011 |
Assessing the effectiveness of the Cisco Networking Academy program in developing countries O Yekela, KL Thomson, J Van Niekerk Information Security Education for a Global Digital Society: 10th IFIP WG 11 …, 2017 | 6 | 2017 |
Integrating Information Security into Corporate Governance KL Thomson, R von Solms Security and Privacy in the Age of Uncertainty: IFIP TC11 18 th …, 2003 | 6 | 2003 |
Towards a framework for the integration of information security into undergraduate computing curricula LA Futcher, L Gomana, KL Thomson South African Journal of Higher Education 33 (3), 155-175, 2019 | 5 | 2019 |
An Educational Intervention Towards Safe Smartphone Usage. WJ Van Rensburg, KL Thomson, LA Futcher HAISA, 123-134, 2018 | 5 | 2018 |
Towards Culturally Sensitive Policy: Africanising Approaches to Prevent Social Engineering KL Thomson, J Niekerk Advanced Science Letters 24 (4), 2499-2503, 2018 | 5 | 2018 |