Johan Van Niekerk

According to our database1, Johan Van Niekerk authored at least 48 papers between 2002 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Teaching with Computing, Educational Games.
Proceedings of the Encyclopedia of Education and Information Technologies, 2020

Programming and Coding in Secondary Schools.
Proceedings of the Encyclopedia of Education and Information Technologies, 2020

Internet Self-regulation in Higher Education: A Metacognitive Approach to Internet Addiction.
Proceedings of the Human Aspects of Information Security and Assurance, 2020

2019
Guest editorial: SAICSIT 2018 Special Issue.
South Afr. Comput. J., 2019

An Educational Intervention for Teaching Secure Coding Practices.
Proceedings of the Information Security Education. Education in Proactive Information Security, 2019

Learning Principles and the Secure Programming Clinic.
Proceedings of the Information Security Education. Education in Proactive Information Security, 2019

2018
Process Model for Differentiated Instruction using Learning Analytics.
South Afr. Comput. J., 2018

2017
Assessing the Effectiveness of the Cisco Networking Academy Program in Developing Countries.
Proceedings of the Information Security Education for a Global Digital Society, 2017

2016
Decoding audience interpretations of awareness campaign messages.
Inf. Comput. Secur., 2016

The effectiveness of brain-compatible blended learning material in the teaching of programming logic.
Comput. Educ., 2016

Towards an Interdisciplinary Cyberbullying Campaign.
Proceedings of the Tenth International Symposium on Human Aspects of Information Security & Assurance, 2016

2015
The Use of Software Design Patterns to Teach Secure Software Design: An Integrated Approach.
Proceedings of the Information Security Education Across the Curriculum, 2015

A Cyber Security Culture Fostering Campaign through the Lens of Active Audience Theory.
Proceedings of the Ninth International Symposium on Human Aspects of Information Security & Assurance, 2015

2014
Brain-compatible, web-based information security education: a statistical study.
Inf. Manag. Comput. Secur., 2014

Snakes and ladders for digital natives: information security education for the youth.
Inf. Manag. Comput. Secur., 2014

Quest for fire, water, earth and air: an interaction design bus and art installation reflecting climate change concerns through human and elemental connectedness.
Proceedings of the Participatory Design Conference, 2014

Information security culture: A general living systems theory perspective.
Proceedings of the 2014 Information Security for South Africa, 2014

From information security to cyber security cultures.
Proceedings of the 2014 Information Security for South Africa, 2014

Towards an Education Campaign for Fostering a Societal, Cyber Security Culture.
Proceedings of the Eighth International Symposium on Human Aspects of Information Security & Assurance, 2014

Exploring the Human Dimension in the Beneficiary Institutions of the SANReN Network.
Proceedings of the Eighth International Symposium on Human Aspects of Information Security & Assurance, 2014

2013
From information security to cyber security.
Comput. Secur., 2013

SNIPPET: Genuine knowledge-based authentication.
Proceedings of the 2013 Information Security for South Africa, 2013

Back to Basics: Information Security Education for the Youth via Gameplay.
Proceedings of the Information Assurance and Security Education and Training, 2013

Cyber Safety for School Children - A Case Study in the Nelson Mandela Metropolis.
Proceedings of the Information Assurance and Security Education and Training, 2013

Towards a Brain-Compatible Approach for Web-Based, Information Security Education.
Proceedings of the European Information Security Multi-Conference (EISMC 2013), 2013

2012
Combating Information Security Apathy by Encouraging Prosocial Organisational Behaviour.
Inf. Manag. Comput. Secur., 2012

The use of computer vision technologies to augment human monitoring of secure computing facilities.
Proceedings of the 2012 Information Security for South Africa, 2012

Assessing information security culture: A critical analysis of current approaches.
Proceedings of the 2012 Information Security for South Africa, 2012

Ethical Guidelines for Cyber-related Services Aimed at the Younger Generations.
Proceedings of the 6th International Symposium on Human Aspects of Information Security and Assurance, 2012

2011
Guidelines for the creation of brain compatible cyber security educational material in Moodle 2.0.
Proceedings of the Information Security South Africa Conference 2011, 2011

A web-based information security governance toolbox for small-to-medium enterprises in Southern Africa.
Proceedings of the Information Security South Africa Conference 2011, 2011

Towards Information Security Education 3.0 - A Call for Information Security Educational Ontologies.
Proceedings of the Information Assurance and Security Education and Training, 2011

Towards a Pervasive Information Assurance Security Educational Model for Information Technology Curricula.
Proceedings of the Information Assurance and Security Education and Training, 2011

2010
Information security culture: A management perspective.
Comput. Secur., 2010

Research Methodologies in Information Security Research: The Road Ahead.
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010

Sweetening the medicine: educating users about information security by means of game play.
Proceedings of the 2010 Annual Conference of the South African Institute of Computer Scientists and Information Technologists, 2010

Evaluating the Cisco Networking Academy Program's Instructional Model against Bloom's Taxonomy for the Purpose of Information Security Education for Organizational End-Users.
Proceedings of the Key Competencies in the Knowledge Society, 2010

2009
Concealing the Medicine: Information Security Education through Game Play.
Proceedings of the Information Security South Africa Conference 2009, 2009

E-mail Security awareness at Nelson Mandela Metropolitan University (Registrar's Division).
Proceedings of the Information Security South Africa Conference 2009, 2009

Using Bloom's Taxonomy for Information Security Education.
Proceedings of the Information Assurance and Security Education and Training, 2009

E-Voting: A South African Perspective.
Proceedings of the E-Infrastructures and E-Services on Developing Countries, 2009

2008
Bloom's Taxonomy for Information Security Education.
Proceedings of the ISSA 2008 Innovative Minds Conference, 2008

2006
Understanding Information Security Culture: A Conceptual Framework.
Proceedings of the ISSA 2006 from Insight to Foresight Conference, 2006

2005
A holistic framework for the fostering of an information security sub-culture in organizations.
Proceedings of the ISSA 2005 New Knowledge Today Conference, 29 June, 2005

2004
Organisational Learning Models For Information Security Education.
Proceedings of the ISSA 2004 Enabling Tomorrow Conference, 30 June, 2004

Corporate Information Security Education: Is Outcomes Based Education the Solution?
Proceedings of the Information Security Management, Education and Privacy, 2004

2002
The Effective Implementation of Information Security in Organizations.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002

A Web-Based Portal For Information Security Education.
Proceedings of the ISSA 2002 Information for Security for South-Africa 2nd Annual Conference, 2002


  Loading...