The 10 deadly sins of information security management B Von Solms, R Von Solms Computers & security 23 (5), 371-376, 2004 | 527 | 2004 |
On blind signatures and perfect crimes S Von Solms, D Naccache Computers & Security 11 (6), 581-583, 1992 | 377 | 1992 |
Information security—the third wave? B Von Solms Computers & security 19 (7), 615-620, 2000 | 342 | 2000 |
Information Security governance: COBIT or ISO 17799 or both? B Von Solms Computers & Security 24 (2), 99-104, 2005 | 336 | 2005 |
From policies to culture R Von Solms, B Von Solms Computers & security 23 (4), 275-279, 2004 | 324 | 2004 |
Information security–the fourth wave B Von Solms Computers & security 25 (3), 165-168, 2006 | 295 | 2006 |
Cyber security for home users: A new way of protection through awareness enforcement E Kritzinger, SH von Solms Computers & Security 29 (8), 840-847, 2010 | 263 | 2010 |
Cybersecurity and information security–what goes where? B Von Solms, R Von Solms Information & Computer Security 26 (1), 2-9, 2018 | 242 | 2018 |
Information security—a multidimensional discipline B Von Solms Computers & security 20 (6), 504-508, 2001 | 241 | 2001 |
Information Security Governance–compliance management vs operational management SHB von Solms Computers & Security 24 (6), 443-447, 2005 | 235 | 2005 |
Corporate governance and information security B Von Solms Computers & Security 20 (3), 215-218, 2001 | 184 | 2001 |
Information Security Governance: a model based on the direct–control cycle R Von Solms, SHB von Solms Computers & security 25 (6), 408-412, 2006 | 173 | 2006 |
A review of industry 4.0 manufacturing process security risks J Prinsloo, S Sinha, B Von Solms Applied Sciences 9 (23), 5105, 2019 | 162 | 2019 |
Information security governance SH Solms, R Solms Springer Science & Business Media, 2008 | 159 | 2008 |
Information security management: a hierarchical framework for various approaches MM Eloff, SH von Solms Computers & Security 19 (3), 243-256, 2000 | 150 | 2000 |
From information security to… business security? B Von Solms, R Von Solms Computers & security 24 (4), 271-273, 2005 | 145 | 2005 |
Socio-technical systems cybersecurity framework M Malatji, S Von Solms, A Marnewick Information & Computer Security 27 (2), 233-272, 2019 | 130 | 2019 |
Information security management: an approach to combine process certification and product evaluation MM Eloff, SH Von Solms Computers & Security 19 (8), 698-709, 2000 | 130 | 2000 |
A taxonomy for secure object-oriented databases MS Olivier, SH Von Solms ACM Transactions on Database Systems (TODS) 19 (1), 3-46, 1994 | 104 | 1994 |
A multi-component view of digital forensics CP Grobler, CP Louwrens, SH von Solms 2010 International Conference on Availability, Reliability and Security, 647-652, 2010 | 100 | 2010 |