default search action
BibTeX records: Mariana Gerber
@inproceedings{DBLP:conf/ictas/MxoliMG19, author = {Avuya Mxoli and Nicky Mostert and Mariana Gerber}, title = {Guidelines for Secure Cloud-Based Personal Health Records}, booktitle = {Conference on Information Communications Technology and Society, {ICTAS} 2019, Durban, South Africa, March 6-8, 2019}, pages = {1--7}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICTAS.2019.8703524}, doi = {10.1109/ICTAS.2019.8703524}, timestamp = {Mon, 09 Aug 2021 14:54:02 +0200}, biburl = {https://dblp.org/rec/conf/ictas/MxoliMG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/FaniSG16, author = {Noluvuyo Fani and Rossouw von Solms and Mariana Gerber}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Jan H. P. Eloff}, title = {A framework towards governing "Bring Your Own Device in SMMEs"}, booktitle = {2016 Information Security for South Africa, {ISSA} 2016, Johannesburg, South Africa, August 17-18, 2016}, pages = {1--8}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISSA.2016.7802922}, doi = {10.1109/ISSA.2016.7802922}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/issa/FaniSG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/DelportGS16, author = {Petrus M. J. Delport and Mariana Gerber and Nader Sohrabi Safa}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Jan H. P. Eloff}, title = {An interactive visual library model to improve awareness in handling of business information}, booktitle = {2016 Information Security for South Africa, {ISSA} 2016, Johannesburg, South Africa, August 17-18, 2016}, pages = {18--26}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISSA.2016.7802924}, doi = {10.1109/ISSA.2016.7802924}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/DelportGS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/ScharnickGF16, author = {Nicholas Scharnick and Mariana Gerber and Lynn Futcher}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Jan H. P. Eloff}, title = {Review of data storage protection approaches for {POPI} compliance}, booktitle = {2016 Information Security for South Africa, {ISSA} 2016, Johannesburg, South Africa, August 17-18, 2016}, pages = {48--55}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISSA.2016.7802928}, doi = {10.1109/ISSA.2016.7802928}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/ScharnickGF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/SkolmenG15, author = {Dayne Edward Skolmen and Mariana Gerber}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Stephen Flowerday}, title = {Protection of Personal Information in the South African Cloud Computing environment: {A} framework for Cloud Computing adoption}, booktitle = {2015 Information Security for South Africa, {ISSA} 2015, Johannesburg, South Africa, August 12-13, 2015}, pages = {1--10}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISSA.2015.7335049}, doi = {10.1109/ISSA.2015.7335049}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/issa/SkolmenG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/MogaleGCS14, author = {Miemie Mogale and Mariana Gerber and Mariana Carroll and Rossouw von Solms}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff}, title = {Information Security Assurance Model {(ISAM)} for an Examination Paper Preparation Process}, booktitle = {2014 Information Security for South Africa, Johannesburg, South Africa, August 13-14, 2014}, pages = {1--10}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ISSA.2014.6950505}, doi = {10.1109/ISSA.2014.6950505}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/issa/MogaleGCS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-8/PotgieterMG13, author = {Marius Potgieter and Craig Marais and Mariana Gerber}, editor = {Ronald C. Dodge Jr. and Lynn Futcher}, title = {Fostering Content Relevant Information Security Awareness through Browser Extensions}, booktitle = {Information Assurance and Security Education and Training - 8th {IFIP} {WG} 11.8 World Conference on Information Security Education, {WISE} 8, Auckland, New Zealand, July 8-10, 2013, Proceedings, {WISE} 7, Lucerne Switzerland, June 9-10, 2011, and {WISE} 6, Bento Gon{\c{c}}alves, RS, Brazil, July 27-31, 2009, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {406}, pages = {58--67}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39377-8\_7}, doi = {10.1007/978-3-642-39377-8\_7}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-8/PotgieterMG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GerberS08, author = {Mariana Gerber and Rossouw von Solms}, title = {Information security requirements - Interpreting the legal aspects}, journal = {Comput. Secur.}, volume = {27}, number = {5-6}, pages = {124--135}, year = {2008}, url = {https://doi.org/10.1016/j.cose.2008.07.009}, doi = {10.1016/J.COSE.2008.07.009}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GerberS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GerberS05, author = {Mariana Gerber and Rossouw von Solms}, title = {Management of risk in the information age}, journal = {Comput. Secur.}, volume = {24}, number = {1}, pages = {16--30}, year = {2005}, url = {https://doi.org/10.1016/j.cose.2004.11.002}, doi = {10.1016/J.COSE.2004.11.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GerberS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GerberS01, author = {Mariana Gerber and Rossouw von Solms}, title = {From Risk Analysis to Security Requirements}, journal = {Comput. Secur.}, volume = {20}, number = {7}, pages = {577--584}, year = {2001}, url = {https://doi.org/10.1016/S0167-4048(01)00706-4}, doi = {10.1016/S0167-4048(01)00706-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GerberS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/GerberSO01, author = {Mariana Gerber and Rossouw von Solms and Paul L. Overbeek}, title = {Formalizing information security requirements}, journal = {Inf. Manag. Comput. Secur.}, volume = {9}, number = {1}, pages = {32--37}, year = {2001}, url = {https://doi.org/10.1108/09685220110366768}, doi = {10.1108/09685220110366768}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/GerberSO01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.