Author of the publication

Cyber Safety for School Children - A Case Study in the Nelson Mandela Metropolis.

, , and . World Conference on Information Security Education, volume 406 of IFIP Advances in Information and Communication Technology, page 103-112. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Combating Information Security Apathy by Encouraging Prosocial Organisational Behaviour., and . Inf. Manag. Comput. Secur., 20 (1): 39-46 (2012)The use of computer vision technologies to augment human monitoring of secure computing facilities., and . ISSA, page 1-6. IEEE, (2012)SNIPPET: Genuine knowledge-based authentication., , , and . ISSA, page 1-8. IEEE, (2013)E-mail Security awareness at Nelson Mandela Metropolitan University (Registrar's Division)., and . ISSA, page 279-292. ISSA, Pretoria, South Africa, (2009)Combating Information Security Apathy By Encouraging Prosocial Organisational Behaviour., and . HAISA, page 1-10. University of Plymouth, (2011)Research Methodologies in Information Security Research: The Road Ahead., and . SEC, volume 330 of IFIP Advances in Information and Communication Technology, page 215-216. Springer, (2010)Towards a Brain-Compatible Approach for Web-Based, Information Security Education., and . EISMC, page 59-68. Plymouth University, (2013)Teaching with Computing, Educational Games.. Encyclopedia of Education and Information Technologies, Springer International Publishing, (2020)Decoding audience interpretations of awareness campaign messages., and . Inf. Comput. Secur., 24 (2): 177-193 (2016)The Use of Software Design Patterns to Teach Secure Software Design: An Integrated Approach., and . World Conference on Information Security Education, volume 453 of IFIP Advances in Information and Communication Technology, page 75-83. Springer, (2015)