Joey Jansen van Vuuren
Joey Jansen van Vuuren
Department Computer Science Tshwane University of Technology
Verified email at
Cited by
Cited by
Mixed methods research for improved scientific study
ML Baran
IGI Global, 2016
Community living lab as a collaborative innovation environment
JS Van Der Walt, AAK Buitendag, JJ Zaaiman, JJ Van Vuuren
Issues in Informing Science and Information Technology 6 (1), 421-436, 2009
A general morphological analysis: delineating a cyber-security culture
N Gcaza, R Von Solms, MM Grobler, JJ Van Vuuren
Information & Computer Security 25 (3), 259-278, 2017
An Ontology for a National Cyber-Security Culture Environment
JC Gcaza, N., Von Solms, R., & Jansen van Vuuren
Proceedings of the Ninth International Symposium on Human Aspects of …, 2015
Implementation of a cyber security policy in South Africa: Reflection on progress and the way forward
M Grobler, JJ van Vuuren, L Leenen
ICT Critical Infrastructures and Society: 10th IFIP TC 9 International …, 2012
Evaluating cyber security awareness in South Africa
M Grobler, J Jansen van Vuuren, J Zaaiman
Using an ontology as a model for the implementation of the national cybersecurity policy framework for South Africa
JJ van Vuuren, L Leenen, J Zaaiman
Proceedings of the ICCWS2014-9th International Conference on Cyber Warfare …, 2014
The Impact of Increase in Broadband Access on South African National Security and the Average Citizen
JCJ van Vuuren, J Phahlamohlaka, M Brazzoli
Journal of Information Warfare 9 (3), 1-13, 2010
Preparing South Africa for cyber crime and cyber defense
M Grobler, J Jansen van Vuuren, J Zaaiman
International Institute of Informatics and Cybernetics, 2013
Cyber security awareness toolkit for national security: an approach to South Africa's cyber security policy implementation
LJ Phahlamohlaka, JC Jansen van Vuuren, AJ Coetzee
Southern African Cyber Security Awareness Workshop (SACSAW11). Gaberone …, 2011
Broadband broadens scope for cyber crime in Africa
M Grobler, JJ van Vuuren
2010 Information Security for South Africa, 1-8, 2010
Building cybersecurity resilience in Africa
W Dalton, JJ van Vuuren, J Westcott
12th International Conference on Cyber Warfare and Security, 112-120, 2017
Development of a semantic-enabled cybersecurity threat intelligence sharing model
JS Mtsweni, NA Shozi, K Matenche, M Mutemwa, N Mkhonto, ...
Collaboration as proactive measure against cyber warfare in South Africa
M Grobler, JJ van Vuuren
African Security Review 21 (2), 61-73, 2012
An approach to governance of cybersecurity in South Africa
JJ van Vuuren, L Leenen, J Phahlamohlaka, J Zaaiman
Cyber behavior: concepts, methodologies, tools, and applications, 1583-1597, 2014
Development of a South African cybersecurity policy implementation framework
JC Jansen van Vuuren, L Leenen, J Phahlamohlaka, JJ Zaaiman
8th International Conference in Information warfare and Security (ICIW) 2013 …, 2013
Framework for the cultivation of a military cybersecurity culture
L Leenen, JCJ van Vuuren
14th International Conference on Cyber Warfare and Security (ICCWS 2019 …, 2019
A Model for Measuring Perceived Cyberpower
JJ van Vuuren, L Leenen
ICCWS 2018 13th International Conference on Cyber Warfare and Security, 320, 2018
Towards the Establishment of an African Cyber-Army
M Aschmann, JC Jansen van Vuuren, L Leenen
The Journal of Information Warfare 14 (3), 2015
The influence of cyber security levels of South African citizens on national security
J Jansen van Vuuren, M Grobler, J Zaaiman
7th International Conference on Information Warfare and Security ICIW-2012 …, 2012
The system can't perform the operation now. Try again later.
Articles 1–20