Follow
Kerry-Lynn Thomson
Kerry-Lynn Thomson
Nelson Mandela University
Verified email at mandela.ac.za
Title
Cited by
Cited by
Year
Cultivating an organizational information security culture
KL Thomson, R Von Solms, L Louw
Computer fraud & security 2006 (10), 7-11, 2006
2572006
From culture to disobedience: Recognising the varying user acceptance of IT security
S Furnell, KL Thomson
Computer fraud & security 2009 (2), 5-10, 2009
1812009
Information security obedience: a definition
KL Thomson, R Von Solms
Computers & Security 24 (1), 69-75, 2005
1682005
Recognising and addressing ‘security fatigue’
S Furnell, KL Thomson
Computer Fraud & Security 2009 (11), 7-11, 2009
1022009
Towards an information security competence maturity model
KL Thomson, R von Solms
Computer fraud & security 2006 (5), 11-15, 2006
772006
Combating information security apathy by encouraging prosocial organisational behaviour
K Thomson, J Van Niekerk
Information Management & Computer Security 20 (1), 39-46, 2012
672012
Information security governance control through comprehensive policy architectures
R Von Solms, KL Thomson, PM Maninjwa
2011 Information Security for South Africa, 1-6, 2011
472011
Integrating information security into corporate culture
KL Thomson, R Von Solms
Port Elizabeth Technikon, 2003
132003
Information security conscience: A precondition to an information security culture?
KL Thomson
Journal of Information System Security 6 (4), 2010
122010
Cyber safety for school children: a case study in the Nelson Mandela Metropolis
J Van Niekerk, KL Thomson, R Reid
Information Assurance and Security Education and Training: 8th IFIP WG 11.8 …, 2013
92013
Evaluating the Cisco Networking Academy Program’s Instructional Model against Bloom’s Taxonomy for the purpose of information security education for organizational end-users
JF van Niekerk, KL Thomson
Key Competencies in the Knowledge Society: IFIP TC 3 International …, 2010
82010
Scare tactics–A viable weapon in the security war?
S Furnell, M Papadaki, KL Thomson
Computer Fraud & Security 2009 (12), 6-10, 2009
82009
Assessing the effectiveness of the Cisco Networking Academy program in developing countries
O Yekela, KL Thomson, J Van Niekerk
Information Security Education for a Global Digital Society: 10th IFIP WG 11 …, 2017
62017
Towards using pervasive information security education to influence information security behaviour in undergraduate computing graduates
T Mabece, L Futcher, KL Thomson
52016
Exploring the human dimension of TETRA
NP Fouché, KL Thomson
2011 Information Security for South Africa, 1-5, 2011
52011
MISSTEV: model for information security shared tacit espoused values
KL Thomson
Doctor Technologiae (DT) thesis at Nelson Mandela Metropolitan University …, 2007
52007
Factors influencing smartphone application downloads
W Janse Van Rensburg, KL Thomson, L Futcher
Information Security Education–Towards a Cybersecure Society: 11th IFIP WG …, 2018
42018
Comparing Student Password Knowledge and Behaviour: A Case Study
DT Fredericks, LA Futcher, K Thomson
Tenth International Symposium on Human Aspects of Information Security …, 2016
42016
Concerns Regarding Service Authorization by IP address using eduroam
L Tekeni, KL Thomson, RA Botha
2014 Information Security for South Africa, 1-6, 2014
42014
E-voting: A south african perspective
E Swanepoel, K Thomson, JF Van Niekerk
E-Infrastructures and E-Services on Developing Countries: First …, 2010
42010
The system can't perform the operation now. Try again later.
Articles 1–20