BibTeX records: Mariana Gerber

download as .bib file

@inproceedings{DBLP:conf/ictas/MxoliMG19,
  author       = {Avuya Mxoli and
                  Nicky Mostert and
                  Mariana Gerber},
  title        = {Guidelines for Secure Cloud-Based Personal Health Records},
  booktitle    = {Conference on Information Communications Technology and Society, {ICTAS}
                  2019, Durban, South Africa, March 6-8, 2019},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICTAS.2019.8703524},
  doi          = {10.1109/ICTAS.2019.8703524},
  timestamp    = {Mon, 09 Aug 2021 14:54:02 +0200},
  biburl       = {https://dblp.org/rec/conf/ictas/MxoliMG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/FaniSG16,
  author       = {Noluvuyo Fani and
                  Rossouw von Solms and
                  Mariana Gerber},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Jan H. P. Eloff},
  title        = {A framework towards governing "Bring Your Own Device in SMMEs"},
  booktitle    = {2016 Information Security for South Africa, {ISSA} 2016, Johannesburg,
                  South Africa, August 17-18, 2016},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ISSA.2016.7802922},
  doi          = {10.1109/ISSA.2016.7802922},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/FaniSG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/DelportGS16,
  author       = {Petrus M. J. Delport and
                  Mariana Gerber and
                  Nader Sohrabi Safa},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Jan H. P. Eloff},
  title        = {An interactive visual library model to improve awareness in handling
                  of business information},
  booktitle    = {2016 Information Security for South Africa, {ISSA} 2016, Johannesburg,
                  South Africa, August 17-18, 2016},
  pages        = {18--26},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ISSA.2016.7802924},
  doi          = {10.1109/ISSA.2016.7802924},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/DelportGS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/ScharnickGF16,
  author       = {Nicholas Scharnick and
                  Mariana Gerber and
                  Lynn Futcher},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Jan H. P. Eloff},
  title        = {Review of data storage protection approaches for {POPI} compliance},
  booktitle    = {2016 Information Security for South Africa, {ISSA} 2016, Johannesburg,
                  South Africa, August 17-18, 2016},
  pages        = {48--55},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ISSA.2016.7802928},
  doi          = {10.1109/ISSA.2016.7802928},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/ScharnickGF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/SkolmenG15,
  author       = {Dayne Edward Skolmen and
                  Mariana Gerber},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Stephen Flowerday},
  title        = {Protection of Personal Information in the South African Cloud Computing
                  environment: {A} framework for Cloud Computing adoption},
  booktitle    = {2015 Information Security for South Africa, {ISSA} 2015, Johannesburg,
                  South Africa, August 12-13, 2015},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISSA.2015.7335049},
  doi          = {10.1109/ISSA.2015.7335049},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/SkolmenG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/MogaleGCS14,
  author       = {Miemie Mogale and
                  Mariana Gerber and
                  Mariana Carroll and
                  Rossouw von Solms},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff},
  title        = {Information Security Assurance Model {(ISAM)} for an Examination Paper
                  Preparation Process},
  booktitle    = {2014 Information Security for South Africa, Johannesburg, South Africa,
                  August 13-14, 2014},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISSA.2014.6950505},
  doi          = {10.1109/ISSA.2014.6950505},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/MogaleGCS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-8/PotgieterMG13,
  author       = {Marius Potgieter and
                  Craig Marais and
                  Mariana Gerber},
  editor       = {Ronald C. Dodge Jr. and
                  Lynn Futcher},
  title        = {Fostering Content Relevant Information Security Awareness through
                  Browser Extensions},
  booktitle    = {Information Assurance and Security Education and Training - 8th {IFIP}
                  {WG} 11.8 World Conference on Information Security Education, {WISE}
                  8, Auckland, New Zealand, July 8-10, 2013, Proceedings, {WISE} 7,
                  Lucerne Switzerland, June 9-10, 2011, and {WISE} 6, Bento Gon{\c{c}}alves,
                  RS, Brazil, July 27-31, 2009, Revised Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {406},
  pages        = {58--67},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39377-8\_7},
  doi          = {10.1007/978-3-642-39377-8\_7},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-8/PotgieterMG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GerberS08,
  author       = {Mariana Gerber and
                  Rossouw von Solms},
  title        = {Information security requirements - Interpreting the legal aspects},
  journal      = {Comput. Secur.},
  volume       = {27},
  number       = {5-6},
  pages        = {124--135},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.cose.2008.07.009},
  doi          = {10.1016/J.COSE.2008.07.009},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GerberS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GerberS05,
  author       = {Mariana Gerber and
                  Rossouw von Solms},
  title        = {Management of risk in the information age},
  journal      = {Comput. Secur.},
  volume       = {24},
  number       = {1},
  pages        = {16--30},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.cose.2004.11.002},
  doi          = {10.1016/J.COSE.2004.11.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GerberS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GerberS01,
  author       = {Mariana Gerber and
                  Rossouw von Solms},
  title        = {From Risk Analysis to Security Requirements},
  journal      = {Comput. Secur.},
  volume       = {20},
  number       = {7},
  pages        = {577--584},
  year         = {2001},
  url          = {https://doi.org/10.1016/S0167-4048(01)00706-4},
  doi          = {10.1016/S0167-4048(01)00706-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GerberS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/GerberSO01,
  author       = {Mariana Gerber and
                  Rossouw von Solms and
                  Paul L. Overbeek},
  title        = {Formalizing information security requirements},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {9},
  number       = {1},
  pages        = {32--37},
  year         = {2001},
  url          = {https://doi.org/10.1108/09685220110366768},
  doi          = {10.1108/09685220110366768},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/GerberSO01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}