Mixed methods research for improved scientific study ML Baran IGI Global, 2016 | 175 | 2016 |
Community living lab as a collaborative innovation environment JS Van Der Walt, AA Buitendag, JJ Zaaiman, JJ Van Vuuren Issues in Informing Science and Information Technology 6 (1), 421-436, 2009 | 108 | 2009 |
A general morphological analysis: delineating a cyber-security culture N Gcaza, R Von Solms, MM Grobler, JJ Van Vuuren Information & Computer Security 25 (3), 259-278, 2017 | 44 | 2017 |
An Ontology for a National Cyber-Security Culture Environment JC Gcaza, N., Von Solms, R., & Jansen van Vuuren Proceedings of the Ninth International Symposium on Human Aspects of …, 2015 | 41* | 2015 |
Implementation of a cyber security policy in South Africa: Reflection on progress and the way forward M Grobler, JJ van Vuuren, L Leenen ICT Critical Infrastructures and Society: 10th IFIP TC 9 International …, 2012 | 35 | 2012 |
Evaluating cyber security awareness in South Africa M Grobler, J Jansen van Vuuren, J Zaaiman | 27 | 2011 |
Using an ontology as a model for the implementation of the national cybersecurity policy framework for South Africa JJ van Vuuren, L Leenen, J Zaaiman Proceedings of the ICCWS2014-9th International Conference on Cyber Warfare …, 2014 | 24 | 2014 |
The Impact of Increase in Broadband Access on South African National Security and the Average Citizen JCJ van Vuuren, J Phahlamohlaka, M Brazzoli Journal of Information Warfare 9 (3), 1-13, 2010 | 23 | 2010 |
Preparing South Africa for cyber crime and cyber defense M Grobler, J Jansen van Vuuren, J Zaaiman International Institute of Informatics and Cybernetics, 2013 | 21 | 2013 |
Cyber security awareness toolkit for national security: an approach to South Africa's cyber security policy implementation LJ Phahlamohlaka, JC Jansen van Vuuren, AJ Coetzee Southern African Cyber Security Awareness Workshop (SACSAW11). Gaberone …, 2011 | 21 | 2011 |
Broadband broadens scope for cyber crime in Africa M Grobler, JJ van Vuuren 2010 Information Security for South Africa, 1-8, 2010 | 19 | 2010 |
Building cybersecurity resilience in Africa W Dalton, JJ van Vuuren, J Westcott 12th International Conference on Cyber Warfare and Security, 112-120, 2017 | 15 | 2017 |
Development of a semantic-enabled cybersecurity threat intelligence sharing model JS Mtsweni, NA Shozi, K Matenche, M Mutemwa, N Mkhonto, ... | 15 | 2016 |
Collaboration as proactive measure against cyber warfare in South Africa M Grobler, JJ van Vuuren African Security Review 21 (2), 61-73, 2012 | 15 | 2012 |
An approach to governance of cybersecurity in South Africa JJ van Vuuren, L Leenen, J Phahlamohlaka, J Zaaiman Cyber behavior: concepts, methodologies, tools, and applications, 1583-1597, 2014 | 10 | 2014 |
Development of a South African cybersecurity policy implementation framework JC Jansen van Vuuren, L Leenen, J Phahlamohlaka, JJ Zaaiman 8th International Conference in Information warfare and Security (ICIW) 2013 …, 2013 | 10* | 2013 |
Framework for the cultivation of a military cybersecurity culture L Leenen, JCJ van Vuuren Proceedings of the 14th International Conference on Cyber Warfare and …, 2019 | 9 | 2019 |
A Model for Measuring Perceived Cyberpower JJ van Vuuren, L Leenen ICCWS 2018 13th International Conference on Cyber Warfare and Security, 320, 2018 | 7* | 2018 |
The influence of cyber security levels of South African citizens on national security J Jansen van Vuuren, M Grobler, J Zaaiman 7th International Conference on Information Warfare and Security ICIW-2012 …, 2012 | 7* | 2012 |
Development and implementation of cybercrime strategies in Africa with specific reference to South Africa JCJ van Vuuren, L Leenen, P Pieterse Journal of Information Warfare 19 (3), 83-101, 2020 | 6 | 2020 |