Joint Effects of Neutralisation Techniques and the Dark Triad of Personality Traits on Gender : An Insider Threat Perspective | 0 | 0.34 | 2021 |
A Snapshot Survey of ICT Integration in South African Schools | 0 | 0.34 | 2017 |
Internet Mediated Research: Challenges and Issues | 0 | 0.34 | 2016 |
An assessment of opportunity-reducing techniques in information security: An insider threat perspective. | 0 | 0.34 | 2016 |
SpotMal: A hybrid malware detection framework with privacy protection for BYOD. | 0 | 0.34 | 2015 |
Evaluating usage control deterrents. | 0 | 0.34 | 2012 |
Taxonomy of compliant information security behavior | 44 | 1.16 | 2012 |
Adapting usage control as a deterrent to address the inadequacies of access controls | 3 | 0.40 | 2009 |
An Aspect-Oriented Approach to Enhancing Multilevel Security with Usage Control: An Experience Report | 1 | 0.37 | 2007 |
Enhancing optimistic access controls with usage control | 2 | 0.37 | 2007 |
Instrumentation of AspectJ Programs: An Exploratory Study | 0 | 0.34 | 2007 |