The 10 deadly sins of information security management B Von Solms, R Von Solms Computers & security 23 (5), 371-376, 2004 | 503 | 2004 |
On blind signatures and perfect crimes S Von Solms, D Naccache Computers & Security 11 (6), 581-583, 1992 | 372 | 1992 |
Information security—the third wave? B Von Solms Computers & security 19 (7), 615-620, 2000 | 346 | 2000 |
Information Security governance: COBIT or ISO 17799 or both? B Von Solms Computers & Security 24 (2), 99-104, 2005 | 318 | 2005 |
From policies to culture R Von Solms, B Von Solms Computers & security 23 (4), 275-279, 2004 | 318 | 2004 |
Information security–the fourth wave B Von Solms Computers & security 25 (3), 165-168, 2006 | 285 | 2006 |
Cyber security for home users: A new way of protection through awareness enforcement E Kritzinger, SH von Solms Computers & Security 29 (8), 840-847, 2010 | 252 | 2010 |
Information security—a multidimensional discipline B Von Solms Computers & security 20 (6), 504-508, 2001 | 239 | 2001 |
Information Security Governance–compliance management vs operational management SHB Von Solms Computers & Security 24 (6), 443-447, 2005 | 232 | 2005 |
Cybersecurity and information security–what goes where? B Von Solms, R Von Solms Information & Computer Security 26 (1), 2-9, 2018 | 201 | 2018 |
Corporate governance and information security B Von Solms Computers & Security 20 (3), 215-218, 2001 | 178 | 2001 |
Information Security Governance: a model based on the direct–control cycle R Von Solms, SHB von Solms Computers & security 25 (6), 408-412, 2006 | 167 | 2006 |
Information security management: a hierarchical framework for various approaches MM Eloff, SH von Solms Computers & Security 19 (3), 243-256, 2000 | 148 | 2000 |
From information security to… business security? B Von Solms, R Von Solms Computers & security 24 (4), 271-273, 2005 | 147 | 2005 |
Information security governance SH Solms, R Solms Springer Science & Business Media, 2008 | 145 | 2008 |
Information security management: an approach to combine process certification and product evaluation MM Eloff, SH Von Solms Computers & Security 19 (8), 698-709, 2000 | 126 | 2000 |
A review of industry 4.0 manufacturing process security risks J Prinsloo, S Sinha, B von Solms Applied Sciences 9 (23), 5105, 2019 | 122 | 2019 |
A taxonomy for secure object-oriented databases MS Olivier, SH Von Solms ACM Transactions on Database Systems (TODS) 19 (1), 3-46, 1994 | 101 | 1994 |
Socio-technical systems cybersecurity framework M Malatji, S Von Solms, A Marnewick Information & Computer Security 27 (2), 233-272, 2019 | 98 | 2019 |
A multi-component view of digital forensics CP Grobler, CP Louwrens, SH von Solms 2010 International Conference on Availability, Reliability and Security, 647-652, 2010 | 95 | 2010 |