Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where R von Solms is active.

Publication


Featured researches published by R von Solms.


Information Management & Computer Security | 1998

Information security awareness: educating your users effectively

M.E. Thomson; R von Solms

This article investigates the evolution of computing, with specific reference to the security issues involved. These issues are then taken further to determine the need for education in the workplace through an information security awareness program. Techniques borrowed from the field of social psychology, which have been largely ignored in current awareness programs, are highlighted in order to show how they could be utilized to improve the effectiveness of the awareness program.


Computers & Security | 2010

Information security culture: A management perspective

J.F. Van Niekerk; R von Solms

Information technology has become an integral part of modern life. Today, the use of information permeates every aspect of both business and private lives. Most organizations need information systems to survive and prosper and thus need to be serious about protecting their information assets. Many of the processes needed to protect these information assets are, to a large extent, dependent on human cooperated behavior. Employees, whether intentionally or through negligence, often due to a lack of knowledge, are the greatest threat to information security. It has become widely accepted that the establishment of an organizational sub-culture of information security is key to managing the human factors involved in information security. This paper briefly examines the generic concept of corporate culture and then borrows from the management and economical sciences to present a conceptual model of information security culture. The presented model incorporates the concept of elasticity from the economical sciences in order to show how various variables in an information security culture influence each other. The purpose of the presented model is to facilitate conceptual thinking and argumentation about information security culture.


Computers & Security | 2006

Continuous auditing technologies and models: A discussion

Stephen Flowerday; A.W. Blundell; R von Solms

In the age of real-time accounting and real-time communication current audit practices, while effective, often provide audit results long after fraud and/or errors have occurred. Real-time assurances can assist in preventing intentional or unintentional errors. This can best be achieved through continuous auditing which relies heavily on technology. These technologies are embedded within and are crucial to continuous auditing models.


Behaviour & Information Technology | 2013

Phishing for phishing awareness

Kenny Jansson; R von Solms

Using various social-engineering techniques, criminals run havoc on the Internet and defraud many people in a number of different ways. This puts various organisational communities at risk. Therefore, it is important that people within such communities should learn how to protect themselves when active in cyberspace, or when dealing with cyber-related technologies. Training can indeed play a big role in this regard, and consequently, assist by altering the insecure behaviour of many people. The objective of this article is to ascertain whether simulating phishing attacks together with embedded training can contribute towards cultivating users’ resistance towards ‘phishing attacks’. In order to achieve this objective, a phishing exercise at an institution in South Africa was conducted.


Information Management & Computer Security | 1993

A Tool for Information Security Management

H. van de Haar; R von Solms

Top management is responsible for the wellbeing of the organization. Most organizations nowadays are dependent totally on the availability and effectiveness of their information service resources. For this reason it is imperative that top management gets involved and stays involved in the protection of the information service assets of the organization. This can only be accomplished through a process of continuous information security evaluation and reporting. An information security evaluation and reporting tool, representing the information security status in a concise, clear manner, will help a great deal in ensuring top management involvement. Suggests implementation of an information security management model by means of an evaluation tool. This tool will provide top management with information security status reporting in a clear, non‐technical format.


Information Management & Computer Security | 1993

A Model for Information Security Management

R von Solms; S.H. von Solms; W.J. Caelli

Information Security Management consists of various facets, for example Information Security Policy, Risk Analysis, Risk Management, Contingency Planning and Disaster Recovery which are all interrelated in some way. These interrelationships often cause uncertainty and confusion among top management. Proposes a model for Information Security Management, called an Information Security Management Model (ISM⊃2) and puts all the various facts in context. The model consists of five different levels defined on a security axis. ISM⊃2 introduces the idea of international security criteria or international security standards (baselines). The rationale behind these baselines is to enable information security evaluation according to internationally‐accepted criteria.


Archive | 2008

Information Security Governance

S.H. von Solms; R von Solms


Archive | 2009

Information Technology Governance

S.H. von Solms; R von Solms


SA Journal of Information Management | 2007

What constitutes information integrity

Stephen Flowerday; R von Solms


Archive | 2009

An Introduction to Corporate Governance

S.H. von Solms; R von Solms

Collaboration


Dive into the R von Solms's collaboration.

Top Co-Authors

Avatar

S.H. von Solms

University of Johannesburg

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

C. Johl

University of Fort Hare

View shared research outputs
Top Co-Authors

Avatar

A.W. Blundell

Nelson Mandela Metropolitan University

View shared research outputs
Top Co-Authors

Avatar

C. Olivier

Nelson Mandela Metropolitan University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

J.F. Van Niekerk

Nelson Mandela Metropolitan University

View shared research outputs
Top Co-Authors

Avatar

Kenny Jansson

Nelson Mandela Metropolitan University

View shared research outputs
Top Co-Authors

Avatar

L. Cowley

Nelson Mandela Metropolitan University

View shared research outputs
Top Co-Authors

Avatar

W.J. Caelli

Queensland University of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge