Search Results - "Von Solms, Rossouw"

Refine Results
  1. 1
  2. 2

    An ICT Strategy for the Sustainable Development of the Tourism Sector in a Developing Country: A Case Study of Zimbabwe by Tsokota, Theo, Solms, Rossouw, Greunen, Darelle

    “…This research has sought to propose a strategy for the sustainable use of ICT in the tourism sector in Zimbabwe. In order to achieve the above‐mentioned…”
    Get full text
    Journal Article
  3. 3

    Cybersecurity and information security – what goes where? by von Solms, Basie, von Solms, Rossouw

    Published in Information and computer security (01-01-2018)
    “…Purpose The purpose of this paper is to define cybersecurity and cybersecurity governance in simplified terms – to explain to the boards of directors and…”
    Get full text
    Journal Article
  4. 4

    How does intellectual capital align with cyber security? by Renaud, Karen, Von Solms, Basie, Von Solms, Rossouw

    Published in Journal of intellectual capital (11-11-2019)
    “…Purpose The purpose of this paper is to position the preservation and protection of intellectual capital as a cyber security concern. The paper outlines the…”
    Get full text
    Journal Article
  5. 5

    Revisiting Project Management Maturity in South African Municipalities - Towards Developing a Capable Local Government by Koekemoer, Silma, Solms, Rossouw Von

    Published in 2023 IST-Africa Conference (IST-Africa) (31-05-2023)
    “…Citizens expect clean water, sanitation, reliable electricity, refuse services, and good roads infrastructure. However, South African municipalities fail to…”
    Get full text
    Conference Proceeding
  6. 6

    A Strategy for a Cybersecurity Culture: A South African Perspective by Gcaza, Noluxolo, Solms, Rossouw

    “…Nowadays, having Internet access is deemed to be a basic human right. The South African government has embraced this notion; and as a result, free Wireless…”
    Get full text
    Journal Article
  7. 7

    Utility indicator for emotion detection in a speaker authentication system by Janse van Rensburg, Ebenhaeser Otto, Botha, Reinhardt A., von Solms, Rossouw

    Published in Information and computer security (07-11-2022)
    “…Purpose Authenticating an individual through voice can prove convenient as nothing needs to be stored and cannot easily be stolen. However, if an individual is…”
    Get full text
    Journal Article
  8. 8

    Devising a strategy for IT governance implementation in municipalities. A case study of South Africa by Sibanda, Mbusi, Solms, Rossouw

    “…Information technology (IT) has vastly automated business processes in South African municipalities, and the sound design and implementation of IT is key to…”
    Get full text
    Journal Article
  9. 9

    Cloud computing assurance – a review of literature guidance by von Solms, Rossouw, Willett, Melanie

    Published in Information and computer security (01-01-2017)
    “…Purpose This paper aims to provide guidance on cloud computing assurance from an IT governance point of view. The board and executive management are tasked…”
    Get full text
    Journal Article
  10. 10

    Towards information security behavioural compliance by Vroom, Cheryl, von Solms, Rossouw

    Published in Computers & security (01-05-2004)
    “…Auditing has always played an important role in the business environment. With the introduction of information technology and the resulting security challenges…”
    Get full text
    Journal Article
  11. 11

    A general morphological analysis: delineating a cyber-security culture by Gcaza, Noluxolo, von Solms, Rossouw, Grobler, Marthie M., van Vuuren, Joey Jansen

    Published in Information and computer security (10-07-2017)
    “…Purpose The purpose of this paper is to define and delineate cyber security culture. Cyber security has been a concern for many years. In an effort to mitigate…”
    Get full text
    Journal Article
  12. 12

    A framework for the governance of information security by Posthumus, Shaun, von Solms, Rossouw

    Published in Computers & security (01-12-2004)
    “…This paper highlights the importance of protecting an organization's vital business information assets by investigating several fundamental considerations that…”
    Get full text
    Journal Article
  13. 13

    Customers repurchase intention formation in e-commerce by Safa, Nader S, von Solms, Rossouw

    “…Background: Electronic loyalty (e-loyalty) has become important in the context of electronic commerce (e-commerce) in recent years. Loyal customers bring…”
    Get full text
    Journal Article
  14. 14

    The 10 deadly sins of information security management by von Solms, Basie, von Solms, Rossouw

    Published in Computers & security (01-07-2004)
    “…This paper identifies 10 essential aspects, which, if not taken into account in an information security governance plan, will surely cause the plan to fail, or…”
    Get full text
    Journal Article
  15. 15

    The reticent effect of ICT on tourism: A case study of Zimbabwe by Theo Tsokota, Rossouw von Solms, Darelle van Greunen

    “…The rapid developments in ICT have revolutionised tourism operations and the way companies and countries lure tourists, resulting in stiff competition in the…”
    Get full text
    Journal Article
  16. 16

    Publish or perish - but where? by Von Solms, Rossouw, Von Solms, Basie

    “…'Publish or perish' has been advocated amongst the academic fraternity for decades. As early as 1942, the term has been linked to academic and research…”
    Get full text
    Journal Article
  17. 17

    Management of risk in the information age by Gerber, Mariana, von Solms, Rossouw

    Published in Computers & security (01-02-2005)
    “…Linked together, organisations can exchange information and engage in transactions in ways unanticipated before, the emphasis being on information, which…”
    Get full text
    Journal Article
  18. 18

    From policies to culture by von Solms, Rossouw, von Solms, Basie

    Published in Computers & security (01-06-2004)
    “…Management normally sets company vision, rules and regulations through policies. These policies should provide guidance to employees and partners as to how…”
    Get full text
    Journal Article
  19. 19

    Real-time information integrity = system integrity + data integrity + continuous assurances by Flowerday, Stephen, von Solms, Rossouw

    Published in Computers & security (01-11-2005)
    “…A majority of companies today are totally dependent on their information assets, in most cases stored, processed and communicated within information systems in…”
    Get full text
    Journal Article
  20. 20

    Building Technology Trust in a Rural Agricultural e‐Marketplace: A User Requirements Perspective by Isabirye, Naomi, Flowerday, Stephen V., Nanavati, Amit, Solms, Rossouw

    “…Technologies that are widely perceived to bring value to users in the context of developed countries are not always readily adopted in the developed world…”
    Get full text
    Journal Article