The management of security in cloud computing S Ramgovind, MM Eloff, E Smith 2010 Information Security for South Africa, 1-7, 2010 | 629 | 2010 |
Information security: The moving target MT Dlamini, JHP Eloff, MM Eloff Computers & security 28 (3-4), 189-198, 2009 | 227 | 2009 |
Integrated digital forensic process model MD Kohn, MM Eloff, JHP Eloff Computers & Security 38, 103-115, 2013 | 189 | 2013 |
Information security management: a new paradigm JHP Eloff, M Eloff Proceedings of the 2003 annual research conference of the South African …, 2003 | 177 | 2003 |
Information security architecture JHP Eloff, MM Eloff Computer Fraud & Security 2005 (11), 10-16, 2005 | 160 | 2005 |
Information security management: a hierarchical framework for various approaches MM Eloff, SH von Solms Computers & Security 19 (3), 243-256, 2000 | 141 | 2000 |
Accommodating soft skills in software project management A Sukhoo, A Barnard, MM Eloff, JA Van der Poll, M Motah Issues in Informing Science and Information Technology 2, 691-704, 2005 | 123 | 2005 |
Information security management: an approach to combine process certification and product evaluation MM Eloff, SH Von Solms Computers & Security 19 (8), 698-709, 2000 | 118 | 2000 |
Design of cyber security awareness game utilizing a social media framework WA Labuschagne, I Burke, N Veerasamy, MM Eloff 2011 Information Security for South Africa, 1-9, 2011 | 39 | 2011 |
System usability scale evaluation of online banking services: A South African study M Mujinga, MM Eloff, JH Kroeze South African journal of science 114 (3-4), 1-8, 2018 | 38 | 2018 |
Internet of people, things and services-the convergence of security, trust and privacy JHP Eloff, MM Eloff, MT Dlamini, MP Zielinski 3rd CompanionAble Workshop – IoPTS, 02 December 2009, Novotel Brussels, 2009 | 38 | 2009 |
Internet of things: emerging and future scenarios from an information security perspective MT Dlamini, MM Eloff, JHP Eloff Southern Africa Telecommunication Networks and Applications Conference, 2009 | 31 | 2009 |
An evolutionary software project management maturity model for Mauritius. A Sukhoo, A Barnard, MM Eloff, JA Van der Poll Interdisciplinary Journal of Information, Knowledge & Management 2, 2007 | 30 | 2007 |
Psychosocial Risks: can their effects on the Security of Information Systems really be ignored?. ED Frangopoulos, MM Eloff, LM Venter 6th International Symposium on Human Aspects of Information Security …, 2012 | 28 | 2012 |
A sustainable information security framework for e-Government–case of Tanzania CK Wangwe, MM Eloff, L Venter Technological and Economic Development of Economy 18 (1), 117-131, 2012 | 27 | 2012 |
A high-level comparison between the South African Protection of Personal Information Act and international data protection laws J Botha, MM Grobler, J Hahn, M Eloff ICMLG2017 5th International Conference on Management Leadership and …, 2017 | 25 | 2017 |
An assessment of software project management maturity in Mauritius A Sukhoo, A Barnard, JA Van der Poll, MM Eloff Issues in Informing Science and Information Technology 2, 671-690, 2006 | 23 | 2006 |
Psychosocial risks: Can their effects on the security of information systems really be ignored? ED Frangopoulos, MM Eloff, LM Venter Information Management & Computer Security 21 (1), 53-65, 2013 | 22 | 2013 |
The Effects of the PoPI Act on Small and Medium Enterprises in South Africa, J Botha, MM Eloff, I Swart Proceedings of the 2015 Information Security South Africa (ISSA 2015 …, 2015 | 21 | 2015 |
Prosperus Report: The African Edition C Marnewick, L Labuschagne, M Eloff, H Steyn, P Tobin Project Management South Africa, Johannesburg, 2013 | 19 | 2013 |