default search action
Kerry-Lynn Thomson
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c24]Lynn Futcher, Kerry-Lynn Thomson, Lean Kucherera, Noluxolo Gcaza:
Key Elements for Cybersafety Education of Primary School Learners in South Africa. HAISA 2023: 116-128 - [c23]Michael de Jager, Lynn Futcher, Kerry-Lynn Thomson:
An Investigation into the Cybersecurity Skills Gap in South Africa. HAISA 2023: 237-248 - 2022
- [c22]Madri Kruger, Lynn Futcher, Kerry-Lynn Thomson:
A Thematic Content Analysis of the Cybersecurity Skills Demand in South Africa. HAISA 2022: 24-38 - 2021
- [c21]Eugene Slabbert, Kerry-Lynn Thomson, Lynn Futcher:
Towards a Risk Assessment Matrix for Information Security Workarounds. HAISA 2021: 164-178 - [p1]Steven Furnell, Paul S. Haskell-Dowland, Manish Agrawal, Richard L. Baskerville, Anirban Basu, Matt Bishop, Jorge Cuéllar, Sara Foresti, Lynn Futcher, Nurit Gal-Oz, Tejaswini (Teju) Herath, Christian Damsgaard Jensen, Allen C. Johnston, Wouter Joosen, Giovanni Livraga, Javier López, Stephen Marsh, Fabio Martinelli, Fabio Massacci, Aljosa Pasic, Stef Schinagl, Abbas Shahim, Kerry-Lynn Thomson, Jaideep Vaidya, Tony Vance, Merrill Warkentin:
Information Security and Privacy - Challenges and Outlook. IFIP's Exciting First 60+ Years 2021: 383-401 - 2020
- [c20]Dean John von Schoultz, Kerry-Lynn Thomson, Johan Van Niekerk:
Internet Self-regulation in Higher Education: A Metacognitive Approach to Internet Addiction. HAISA 2020: 186-207
2010 – 2019
- 2018
- [c19]Wiehan Janse Van Rensburg, Kerry-Lynn Thomson, Lynn Ann Futcher:
An Educational Intervention Towards Safe Smartphone Usage. HAISA 2018: 123-134 - [c18]Wiehan Janse Van Rensburg, Kerry-Lynn Thomson, Lynn Futcher:
Factors Influencing Smartphone Application Downloads. World Conference on Information Security Education 2018: 81-92 - 2017
- [c17]Odwa Yekela, Kerry-Lynn Thomson, Johan Van Niekerk:
Assessing the Effectiveness of the Cisco Networking Academy Program in Developing Countries. World Conference on Information Security Education 2017: 27-38 - [c16]Thandolwethu Mabece, Lynn Futcher, Kerry-Lynn Thomson:
South African Computing Educators' Perspectives on Information Security Behaviour. World Conference on Information Security Education 2017: 121-132 - 2016
- [c15]Thandolwethu Mabece, Lynn Futcher, Kerry-Lynn Thomson:
Towards using pervasive information security education to influence information security behaviour in undergraduate computing graduates. CONF-IRM 2016: 6 - [c14]Damian Todd Fredericks, Lynn Ann Futcher, Kerry-Lynn Thomson:
Comparing Student Password Knowledge and Behaviour: A Case Study. HAISA 2016: 167-178 - [c13]Lindokuhle Gcina Gomana, Lynn Ann Futcher, Kerry-Lynn Thomson:
An Educators Perspective of Integrating Information Security into Undergraduate Computing Curricula. HAISA 2016: 179-188 - [c12]Johan Van Niekerk, Kerry-Lynn Thomson:
Towards an Interdisciplinary Cyberbullying Campaign. HAISA 2016: 231-240 - 2014
- [c11]Yolanda Mjikeliso, Johan Van Niekerk, Kerry-Lynn Thomson:
Exploring the Human Dimension in the Beneficiary Institutions of the SANReN Network. HAISA 2014: 206-216 - [c10]Luzuko Tekeni, Kerry-Lynn Thomson, Reinhardt A. Botha:
Concerns regarding service authorization by IP address using eduroam. ISSA 2014: 1-6 - 2013
- [c9]Johan Van Niekerk, Kerry-Lynn Thomson, Rayne Reid:
Cyber Safety for School Children - A Case Study in the Nelson Mandela Metropolis. World Conference on Information Security Education 2013: 103-112 - 2012
- [j2]Kerry-Lynn Thomson, Johan Van Niekerk:
Combating Information Security Apathy by Encouraging Prosocial Organisational Behaviour. Inf. Manag. Comput. Secur. 20(1): 39-46 (2012) - 2011
- [c8]Kerry-Lynn Thomson, Johan Van Niekerk:
Combating Information Security Apathy By Encouraging Prosocial Organisational Behaviour. HAISA 2011: 1-10 - [c7]Nico Pieter Fouche, Kerry-Lynn Thomson:
Exploring the Human Dimension of TETRA. ISSA 2011 - [c6]Rossouw von Solms, Kerry-Lynn Thomson, Mvikeli Maninjwa:
Information Security Governance control through comprehensive policy architectures. ISSA 2011 - 2010
- [c5]Johan Van Niekerk, Kerry-Lynn Thomson:
Evaluating the Cisco Networking Academy Program's Instructional Model against Bloom's Taxonomy for the Purpose of Information Security Education for Organizational End-Users. Key Competencies in the Knowledge Society 2010: 412-423
2000 – 2009
- 2009
- [c4]Eraneé Swanepoel, Kerry-Lynn Thomson, Johan F. Van Niekerk:
E-Voting: A South African Perspective. AFRICOM 2009: 70-77 - 2005
- [j1]Kerry-Lynn Thomson, Rossouw von Solms:
Information security obedience: a definition. Comput. Secur. 24(1): 69-75 (2005) - 2004
- [c3]Kerry-Lynn Thomson, Rossouw von Solms:
Towards Corporate Information Security Obedience. International Information Security Workshops 2004: 19-32 - 2003
- [c2]Kerry-Lynn Thomson, Rossouw von Solms:
Integrating Information Security into Corporate Governance. SEC 2003: 169-180 - 2002
- [c1]Kerry-Lynn Thomson:
Corporate Governance: Information security the weakest link? ISSA 2002: 1-10
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-10 00:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint