Institutional Repository
Search
Login
UnisaIR Home
→
College of Science, Engineering and Technology
→
School of Computing
→
Research Outputs (School of Computing)
→
Search
JavaScript is disabled for your browser. Some features of this site may not work without it.
Search
Filters
Use filters to refine the search results.
Current Filters:
Title
Author
Subject
Date issued
Has File(s)
Filename
File description
Contains
Equals
ID
Not Contains
Not Equals
Not ID
New Filters:
Title
Author
Subject
Date issued
Has File(s)
Filename
File description
Contains
Equals
ID
Not Contains
Not Equals
Not ID
Showing 5 out of a total of 5 results for collection: Research Outputs (School of Computing).
(0.009 seconds)
Now showing items 1-5 of 5
1
Sort Options:
Relevance
Title Asc
Title Desc
Issue Date Asc
Issue Date Desc
Results Per Page:
5
10
20
40
60
80
100
Teaching safe and secure usage of ICTs in South African schools
Padayachee, Keshnee
;
Kritzinger, Elmarie
(
2010
)
Enhancing optimistic access controls with usage control
Padayachee, Keshnee
;
Eloff, J.H.P.
(
2007
)
A CONCEPTUAL OPPORTUNITY-BASED FRAMEWORK TO MITIGATE THE INSIDER THREAT
Padayachee, Keshnee
(
2014-01-29
)
A Framework of Opportunity-Reducing Techniques to Mitigate the Insider Threat: Towards Best Practice
Padayachee, Keshnee
(
2014-10-07
)
AN INSIDER THREAT NEUTRALISATION MITIGATION MODEL PREDICATED ON COGNITIVE DISSONANCE (ITNMCD)
Padayachee, Keshnee
(
2014-01-06
)
Now showing items 1-5 of 5
1
Sort Options:
Relevance
Title Asc
Title Desc
Issue Date Asc
Issue Date Desc
Results Per Page:
5
10
20
40
60
80
100
Browse
All of UnisaIR
Communities & Collections
By Issue Date
Authors
Titles
Subjects
Advisor
Type
This Collection
By Issue Date
Authors
Titles
Subjects
Advisor
Type
My Account
Login
Register
Discover
Author
Padayachee, Keshnee (5)
Eloff, J.H.P. (1)
Kritzinger, E. (1)
Subject
Abuse and crime involving computers, Network-level security and protection, Organizational management and coordination, Security and Privacy Protection (1)
Access controls (1)
e-safety (1)
Information security (1)
Insider Threat (1)
Insider Threat,Cognitive Dissonance,Neutralisation (1)
Life orientation (1)
Usage control (1)
... View More
Date Issued
2014 (3)
2007 (1)
2010 (1)
Has File(s)
Yes (5)