Author of the publication

A Review of IFIP TC 11 WG 11.8 Publications through the Ages.

, and . World Conference on Information Security Education, volume 406 of IFIP Advances in Information and Communication Technology, page 113-122. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards using pervasive information security education to influence information security behaviour in undergraduate computing graduates., , and . CONF-IRM, page 6. (2016)SecSDM: A Model for Integrating Security into the Software Development Life Cycle., and . World Conference on Information Security Education, volume 237 of IFIP, page 41-48. Springer, (2007)An Investigation into the Cybersecurity Skills Gap in South Africa., , and . HAISA, volume 674 of IFIP Advances in Information and Communication Technology, page 237-248. Springer, (2023)A framework to assist email users in the identification of phishing attacks., and . HAISA, page 42-52. University of Plymouth, (2014)Key Elements for Cybersafety Education of Primary School Learners in South Africa., , , and . HAISA, volume 674 of IFIP Advances in Information and Communication Technology, page 116-128. Springer, (2023)Identifying the Cybersecurity Body of Knowledge for a Postgraduate Module in Systems Engineering., and . World Conference on Information Security Education, volume 531 of IFIP Advances in Information and Communication Technology, page 121-132. Springer, (2018)South African Computing Educators' Perspectives on Information Security Behaviour., , and . World Conference on Information Security Education, volume 503 of IFIP Advances in Information and Communication Technology, page 121-132. Springer, (2017)A Review of Constructive Alignment in Information Security Educational Research., , and . HAISA, volume 674 of IFIP Advances in Information and Communication Technology, page 461-469. Springer, (2023)The Use of Software Design Patterns to Teach Secure Software Design: An Integrated Approach., and . World Conference on Information Security Education, volume 453 of IFIP Advances in Information and Communication Technology, page 75-83. Springer, (2015)Learning Principles and the Secure Programming Clinic., , , , , , and . World Conference on Information Security Education, volume 557 of IFIP Advances in Information and Communication Technology, page 16-29. Springer, (2019)