Author of the publication

Assessing the Effectiveness of the Cisco Networking Academy Program in Developing Countries.

, , and . World Conference on Information Security Education, volume 503 of IFIP Advances in Information and Communication Technology, page 27-38. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Corporate Information Security Obedience., and . International Information Security Workshops, volume 148 of IFIP, page 19-32. Kluwer, (2004)Exploring the Human Dimension of TETRA., and . ISSA, ISSA, Pretoria, South Africa, (2011)South African Computing Educators' Perspectives on Information Security Behaviour., , and . World Conference on Information Security Education, volume 503 of IFIP Advances in Information and Communication Technology, page 121-132. Springer, (2017)Key Elements for Cybersafety Education of Primary School Learners in South Africa., , , and . HAISA, volume 674 of IFIP Advances in Information and Communication Technology, page 116-128. Springer, (2023)Towards an Interdisciplinary Cyberbullying Campaign., and . HAISA, page 231-240. University of Plymouth, (2016)Corporate Governance: Information security the weakest link?. ISSA, page 1-10. ISSA, Pretoria, South Africa, (2002)An Investigation into the Cybersecurity Skills Gap in South Africa., , and . HAISA, volume 674 of IFIP Advances in Information and Communication Technology, page 237-248. Springer, (2023)Towards using pervasive information security education to influence information security behaviour in undergraduate computing graduates., , and . CONF-IRM, page 6. (2016)Concerns regarding service authorization by IP address using eduroam., , and . ISSA, page 1-6. IEEE, (2014)Evaluating the Cisco Networking Academy Program's Instructional Model against Bloom's Taxonomy for the Purpose of Information Security Education for Organizational End-Users., and . Key Competencies in the Knowledge Society, volume 324 of IFIP Advances in Information and Communication Technology, page 412-423. Springer, (2010)