Human aspects of information security in organisations NS Safa, R Von Solms, L Futcher Computer Fraud & Security 2016 (2), 15-18, 2016 | 131 | 2016 |
Guidelines for secure software development L Futcher, R Von Solms Proceedings of the 2008 annual research conference of the South African …, 2008 | 66 | 2008 |
Enforcement of the Protection of Personal Information (POPI) Act : perspective of data management professionals AT Kandeh, RA Botha, LA Futcher South African Journal of Information Management 20 (1), 1-9, 2018 | 36 | 2018 |
Information security education in South Africa L Futcher, C Schroder, R von Solms Information Management & Computer Security 18 (5), 366-374, 2010 | 32 | 2010 |
Cybersecurity curricular guidelines M Bishop, D Burley, S Buck, JJ Ekstrom, L Futcher, D Gibson, ... Information Security Education for a Global Digital Society: 10th IFIP WG 11 …, 2017 | 29 | 2017 |
A framework to assist email users in the identification of phishing attacks A Lötter, L Futcher Information & Computer Security 23 (4), 370-381, 2015 | 27 | 2015 |
Adaption of a secure software development methodology for secure engineering design S Von Solms, LA Futcher IEEE Access 8, 125630-125637, 2020 | 25 | 2020 |
Mobile device usage in higher education institutions in South Africa R De Kock, LA Futcher 2016 Information Security for South Africa (ISSA), 27-34, 2016 | 25 | 2016 |
SecSDM: a model for integrating security into the software development life cycle L Futcher, R von Solms Fifth World Conference on Information Security Education: Proceedings of the …, 2007 | 25 | 2007 |
Identifying the cybersecurity body of knowledge for a postgraduate module in systems engineering S Von Solms, L Futcher Information Security Education–Towards a Cybersecure Society: 11th IFIP WG …, 2018 | 14 | 2018 |
Cybersecurity curricula 2017 DL Burley, M Bishop, S Buck, JJ Ekstrom, L Futcher, D Gibson, ... Version 0.75 Report 12, 2017 | 12 | 2017 |
Cybersecurity curricula 2017: curriculum guidelines for post-secondary degree programs in cybersecurity DL Burley, M Bishop, S Buck, J Ekstrom, L Futcher, D Gibson, ... Joint Task Force on Cybersecurity Education, 2017 | 11 | 2017 |
The use of software design patterns to teach secure software design: An integrated approach J Van Niekerk, L Futcher Information Security Education Across the Curriculum: 9th IFIP WG 11.8 World …, 2015 | 9 | 2015 |
An educational intervention for teaching secure coding practices V Mdunyelwa, L Futcher, J Van Niekerk Information Security Education. Education in Proactive Information Security …, 2019 | 8 | 2019 |
Information Security Education for a Global Digital Society: 10th IFIP WG 11.8 World Conference, WISE 10, Rome, Italy, May 29-31, 2017, Proceedings M Bishop, L Futcher, N Miloslavskaya, M Theocharidou Springer, 2017 | 7* | 2017 |
SecSDM: A usable tool to support IT undergraduate students in secure software development. L Futcher, R von Solms HAISA, 86-96, 2012 | 7 | 2012 |
Factors influencing smartphone application downloads W Janse Van Rensburg, KL Thomson, L Futcher IFIP world conference on information security education, 81-92, 2018 | 6 | 2018 |
Towards a framework for the integration of information security into undergraduate computing curricula LA Futcher, L Gomana, KL Thomson South African Journal of Higher Education 33 (3), 155-175, 2019 | 5 | 2019 |
An Educational Intervention Towards Safe Smartphone Usage. WJ Van Rensburg, KL Thomson, LA Futcher HAISA, 123-134, 2018 | 5 | 2018 |
Comparing Student Password Knowledge and Behaviour: A Case Study. DT Fredericks, LA Futcher, KL Thomson HAISA, 167-178, 2016 | 5 | 2016 |