The 10 deadly sins of information security management B Von Solms, R Von Solms Computers & security 23 (5), 371-376, 2004 | 513 | 2004 |
On blind signatures and perfect crimes S Von Solms, D Naccache Computers & Security 11 (6), 581-583, 1992 | 369 | 1992 |
Information security—the third wave? B Von Solms Computers & security 19 (7), 615-620, 2000 | 346 | 2000 |
Information Security governance: COBIT or ISO 17799 or both? B Von Solms Computers & Security 24 (2), 99-104, 2005 | 322 | 2005 |
From policies to culture R Von Solms, B Von Solms Computers & security 23 (4), 275-279, 2004 | 319 | 2004 |
Information security–the fourth wave B Von Solms Computers & security 25 (3), 165-168, 2006 | 295 | 2006 |
Cyber security for home users: A new way of protection through awareness enforcement E Kritzinger, SH von Solms Computers & Security 29 (8), 840-847, 2010 | 253 | 2010 |
Information security—a multidimensional discipline B Von Solms Computers & security 20 (6), 504-508, 2001 | 240 | 2001 |
Information Security Governance–compliance management vs operational management SHB Von Solms Computers & Security 24 (6), 443-447, 2005 | 234 | 2005 |
Cybersecurity and information security–what goes where? B Von Solms, R Von Solms Information & Computer Security 26 (1), 2-9, 2018 | 225 | 2018 |
Corporate governance and information security B Von Solms Computers & Security 20 (3), 215-218, 2001 | 181 | 2001 |
Information Security Governance: a model based on the direct–control cycle R Von Solms, SHB von Solms Computers & security 25 (6), 408-412, 2006 | 169 | 2006 |
From information security to… business security? B Von Solms, R Von Solms Computers & security 24 (4), 271-273, 2005 | 148 | 2005 |
Information security management: a hierarchical framework for various approaches MM Eloff, SH von Solms Computers & Security 19 (3), 243-256, 2000 | 148 | 2000 |
Information security governance SH Solms, R Solms Springer Science & Business Media, 2008 | 146 | 2008 |
A review of industry 4.0 manufacturing process security risks J Prinsloo, S Sinha, B Von Solms Applied Sciences 9 (23), 5105, 2019 | 141 | 2019 |
Information security management: an approach to combine process certification and product evaluation MM Eloff, SH Von Solms Computers & Security 19 (8), 698-709, 2000 | 125 | 2000 |
Socio-technical systems cybersecurity framework M Malatji, S Von Solms, A Marnewick Information & Computer Security 27 (2), 233-272, 2019 | 113 | 2019 |
A taxonomy for secure object-oriented databases MS Olivier, SH Von Solms ACM Transactions on Database Systems (TODS) 19 (1), 3-46, 1994 | 102 | 1994 |
A multi-component view of digital forensics CP Grobler, CP Louwrens, SH von Solms 2010 International Conference on Availability, Reliability and Security, 647-652, 2010 | 96 | 2010 |