S H Basie B von Solms
University of Johannesburg
H-index: 35
Africa-South Africa
Top articles of S H Basie B von Solms
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Building Cybersecurity Capacity through Education, Awareness, and Training | Ruth Shillair Patricia Esteve-Gonzalez William H. Dutton Sadie Creese Basie and Von Solms | 2023 | |
Another Look at Cybersecurity Awareness Programs | SH von Solms Jaco du Toit Elmarie Kritzinger | 2023/7/4 | |
The impact of COVID‐19 on cybersecurity awareness‐raising and mindset in the southern African development community (SADC) | The Electronic Journal of Information Systems in Developing Countries | Laban Bagui Shallen Lusinga Nthabiseng Pule Teofelus Tuyeni Chimwemwe Q Mtegha | 2023/7 |
A Cyber Counterintelligence Competence Framework: Developing the Job Roles | ECCWS 2023 22nd European Conference on Cyber Warfare and Security | Thenjiwe Sithole Jaco Du Toit Sebastian H von Solms | 2023/6/22 |
Towards an Active Cyber Defence Framework for SMMEs in Developing Countries | ECCWS 2023 22nd European Conference on Cyber Warfare and Security | Nombeko Ntingi Jaco du Toit Sebastian von Solms | 2023/6/22 |
Cyber power in the African context: an exploratory analysis and proposition | European Conference on Cyber Warfare and Security | Petrus Duvenage Wilhelm Bernhardt Sebastian von Solms | 2023/6/19 |
Some Guidelines for Cybersecurity Governance in the Internet of Medical Things | Basie von Solms Jaco du Toit | 2023/7/13 | |
A Cyber-Diplomacy and Cybersecurity Awareness Framework (CDAF) for Developing Countries | European Conference on Cyber Warfare and Security | Hendrik Zwarts Jaco Du Toit Basie Von Solms | 2022/6/8 |
Cybersecurity education, awareness raising, and training initiatives: National level evidence-based results, challenges, and promise | Computers & Security | Ruth Shillair Patricia Esteve-González William H Dutton Sadie Creese Eva Nagyfejeo | 2022/8/1 |
Planning the building a SOC-A Conceptual Process Model | European Conference on Cyber Warfare and Security | Pierre Jacobs Sebastiaan von Solms | 2022/6/8 |
Cybersecurity knowledge requirements for a water sector employee | Rendani Thomani Annlizé Marnewick Suné von Solms Masike Malatji | 2022/7/6 | |
Effective Cyber Threat Hunting: Where and how does it fit? | European Conference on Cyber Warfare and Security | Nombeko Ntingi Petrus Duvenage Jaco du Toit Sebastian von Solms | 2022/6/8 |
A cybersecurity guide for using fitness devices | Maria Bada Basie von Solms | 2022/6/12 | |
Smart Rural Village’s Healthcare and Energy Indicators—Twin Enablers to Smart Rural Life. Sustainability 2022, 14, 12466 | PW Maja J Meyer S von Solms | 2022 | |
South Africa’s Taxi Industry as a Cybersecurity-Awareness Game Changer: Why and How? | Petrus Duvenage Victor Jaquire Sebastian von Solms | 2022/6/9 | |
Utilisation of the Cyber Security Challenge for Learning within the South African Perspective | Journal of Information Warfare | S von Solms RP van Heerden | 2022/1/1 |
A Shoestring Digital Forensic Cyber Range for a Developing Country | ECCWS 2021 20th European Conference on Cyber Warfare and Security | Jaco du Toit Sebastian von Solms | 2021/6/1 |
Some Cybersecurity Governance Imperatives in Securing the Fourth Industrial Revolution | ECCWS 2021 20th European Conference on Cyber Warfare and Security | Victor Jaquire Petrus Duvenage Sebastian von Solms | 2021/6/1 |
A model for protecting personal information using Blockchain | Thauriq Jappie Basie Von Solms Jaco Du Toit Dustin Van Der Haar | 2021/5/10 | |
Cyber Counterintelligence: Some Contours towards the Academic Research Agenda | ECCWS 2020 19th European Conference on Cyber Warfare and Security | Petrus Duvenage Victor Jaquire Sebastian Von Solms | 2020/6/1 |