Search Results - "Von Solms, Rossouw"
-
1
INFORMATION TECHNOLOGY GOVERNANCE PROCESS MATURITY IN HIGHER EDUCATION INSTITUTIONS IN SOUTH AFRICA
Published in South African journal of higher education (01-01-2016)Get full text
Journal Article -
2
An ICT Strategy for the Sustainable Development of the Tourism Sector in a Developing Country: A Case Study of Zimbabwe
Published in The Electronic journal of information systems in developing countries (01-01-2017)“…This research has sought to propose a strategy for the sustainable use of ICT in the tourism sector in Zimbabwe. In order to achieve the above‐mentioned…”
Get full text
Journal Article -
3
Cybersecurity and information security – what goes where?
Published in Information and computer security (01-01-2018)“…Purpose The purpose of this paper is to define cybersecurity and cybersecurity governance in simplified terms – to explain to the boards of directors and…”
Get full text
Journal Article -
4
How does intellectual capital align with cyber security?
Published in Journal of intellectual capital (11-11-2019)“…Purpose The purpose of this paper is to position the preservation and protection of intellectual capital as a cyber security concern. The paper outlines the…”
Get full text
Journal Article -
5
Revisiting Project Management Maturity in South African Municipalities - Towards Developing a Capable Local Government
Published in 2023 IST-Africa Conference (IST-Africa) (31-05-2023)“…Citizens expect clean water, sanitation, reliable electricity, refuse services, and good roads infrastructure. However, South African municipalities fail to…”
Get full text
Conference Proceeding -
6
A Strategy for a Cybersecurity Culture: A South African Perspective
Published in The Electronic journal of information systems in developing countries (01-05-2017)“…Nowadays, having Internet access is deemed to be a basic human right. The South African government has embraced this notion; and as a result, free Wireless…”
Get full text
Journal Article -
7
Utility indicator for emotion detection in a speaker authentication system
Published in Information and computer security (07-11-2022)“…Purpose Authenticating an individual through voice can prove convenient as nothing needs to be stored and cannot easily be stolen. However, if an individual is…”
Get full text
Journal Article -
8
Devising a strategy for IT governance implementation in municipalities. A case study of South Africa
Published in The Electronic journal of information systems in developing countries (01-03-2019)“…Information technology (IT) has vastly automated business processes in South African municipalities, and the sound design and implementation of IT is key to…”
Get full text
Journal Article -
9
Cloud computing assurance – a review of literature guidance
Published in Information and computer security (01-01-2017)“…Purpose This paper aims to provide guidance on cloud computing assurance from an IT governance point of view. The board and executive management are tasked…”
Get full text
Journal Article -
10
Towards information security behavioural compliance
Published in Computers & security (01-05-2004)“…Auditing has always played an important role in the business environment. With the introduction of information technology and the resulting security challenges…”
Get full text
Journal Article -
11
A general morphological analysis: delineating a cyber-security culture
Published in Information and computer security (10-07-2017)“…Purpose The purpose of this paper is to define and delineate cyber security culture. Cyber security has been a concern for many years. In an effort to mitigate…”
Get full text
Journal Article -
12
A framework for the governance of information security
Published in Computers & security (01-12-2004)“…This paper highlights the importance of protecting an organization's vital business information assets by investigating several fundamental considerations that…”
Get full text
Journal Article -
13
Customers repurchase intention formation in e-commerce
Published in South African journal of information management (01-01-2016)“…Background: Electronic loyalty (e-loyalty) has become important in the context of electronic commerce (e-commerce) in recent years. Loyal customers bring…”
Get full text
Journal Article -
14
The 10 deadly sins of information security management
Published in Computers & security (01-07-2004)“…This paper identifies 10 essential aspects, which, if not taken into account in an information security governance plan, will surely cause the plan to fail, or…”
Get full text
Journal Article -
15
The reticent effect of ICT on tourism: A case study of Zimbabwe
Published in African journal of hospitality, tourism and leisure (01-05-2019)“…The rapid developments in ICT have revolutionised tourism operations and the way companies and countries lure tourists, resulting in stiff competition in the…”
Get full text
Journal Article -
16
Publish or perish - but where?
Published in South African computer journal = Suid-Afrikaanse rekenaartydskrif (2016)“…'Publish or perish' has been advocated amongst the academic fraternity for decades. As early as 1942, the term has been linked to academic and research…”
Get full text
Journal Article -
17
Management of risk in the information age
Published in Computers & security (01-02-2005)“…Linked together, organisations can exchange information and engage in transactions in ways unanticipated before, the emphasis being on information, which…”
Get full text
Journal Article -
18
From policies to culture
Published in Computers & security (01-06-2004)“…Management normally sets company vision, rules and regulations through policies. These policies should provide guidance to employees and partners as to how…”
Get full text
Journal Article -
19
Real-time information integrity = system integrity + data integrity + continuous assurances
Published in Computers & security (01-11-2005)“…A majority of companies today are totally dependent on their information assets, in most cases stored, processed and communicated within information systems in…”
Get full text
Journal Article -
20
Building Technology Trust in a Rural Agricultural e‐Marketplace: A User Requirements Perspective
Published in The Electronic journal of information systems in developing countries (01-09-2015)“…Technologies that are widely perceived to bring value to users in the context of developed countries are not always readily adopted in the developed world…”
Get full text
Journal Article