Lynn futcher
Lynn futcher
Nelson Mandela University
Verified email at
Cited by
Cited by
Human aspects of information security in organisations
NS Safa, R Von Solms, L Futcher
Computer Fraud & Security 2016 (2), 15-18, 2016
Guidelines for secure software development
L Futcher, R Von Solms
Proceedings of the 2008 annual research conference of the South African …, 2008
Enforcement of the Protection of Personal Information (POPI) Act : perspective of data management professionals
AT Kandeh, RA Botha, LA Futcher
South African Journal of Information Management 20 (1), 1-9, 2018
Information security education in South Africa
L Futcher, C Schroder, R von Solms
Information Management & Computer Security 18 (5), 366-374, 2010
A framework to assist email users in the identification of phishing attacks
A Lötter, L Futcher
Information & Computer Security 23 (4), 370-381, 2015
SecSDM: a model for integrating security into the software development life cycle
L Futcher, R von Solms
Fifth World Conference on Information Security Education: Proceedings of the …, 2007
Cybersecurity curricular guidelines
M Bishop, D Burley, S Buck, JJ Ekstrom, L Futcher, D Gibson, ...
Information Security Education for a Global Digital Society: 10th IFIP WG 11 …, 2017
Mobile device usage in higher education institutions in South Africa
R De Kock, LA Futcher
2016 Information Security for South Africa (ISSA), 27-34, 2016
Adaption of a secure software development methodology for secure engineering design
S Von Solms, LA Futcher
IEEE Access 8, 125630-125637, 2020
Identifying the cybersecurity body of knowledge for a postgraduate module in systems engineering
S Von Solms, L Futcher
Information Security Education–Towards a Cybersecure Society: 11th IFIP WG …, 2018
Cybersecurity curricula 2017
DL Burley, M Bishop, S Buck, JJ Ekstrom, L Futcher, D Gibson, ...
Version 0.75 Report 12, 2017
The use of software design patterns to teach secure software design: An integrated approach
J Van Niekerk, L Futcher
Information Security Education Across the Curriculum: 9th IFIP WG 11.8 World …, 2015
Cybersecurity curricula 2017: curriculum guidelines for post-secondary degree programs in cybersecurity
DL Burley, M Bishop, S Buck, J Ekstrom, L Futcher, D Gibson, ...
Joint Task Force on Cybersecurity Education, 2017
An educational intervention for teaching secure coding practices
V Mdunyelwa, L Futcher, J Van Niekerk
Information Security Education. Education in Proactive Information Security …, 2019
Information Security Education
M Bishop, L Futcher, N Miloslavskaya, M Theocharidou
Springer International Publishing, 2017
SecSDM: A usable tool to support IT undergraduate students in secure software development.
L Futcher, R von Solms
HAISA, 86-96, 2012
Factors influencing smartphone application downloads
W Janse Van Rensburg, KL Thomson, L Futcher
IFIP world conference on information security education, 81-92, 2018
Towards a framework for the integration of information security into undergraduate computing curricula
LA Futcher, L Gomana, KL Thomson
South African Journal of Higher Education 33 (3), 155-175, 2019
An Educational Intervention Towards Safe Smartphone Usage.
WJ Van Rensburg, KL Thomson, LA Futcher
HAISA, 123-134, 2018
Comparing Student Password Knowledge and Behaviour: A Case Study.
DT Fredericks, LA Futcher, KL Thomson
HAISA, 167-178, 2016
The system can't perform the operation now. Try again later.
Articles 1–20