default search action
Johan Van Niekerk 0001
Person information
- affiliation: Nelson Mandela University, Port Elizabeth, South Africa
Other persons with the same name
- Johan Van Niekerk 0002 — Cape Peninsula University of Technology, Cape Town, South Africa
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c41]Vuyolwethu Sizoli Mdunyelwa, Lynn Futcher, Johan Van Niekerk:
A Review of Constructive Alignment in Information Security Educational Research. HAISA 2023: 461-469 - 2022
- [c40]Petrus M. J. Delport, Johan Van Niekerk, Rayne Reid:
Introduction to Information Security: From Formal Curriculum to Organisational Awareness. EuroS&P Workshops 2022: 463-469 - [c39]Vuyolwethu Sizoli Mdunyelwa, Lynn Futcher, Johan Van Niekerk:
An Investigation into Educational Process Models for Teaching Secure Programming. HAISA 2022: 77-90 - 2020
- [c38]Dean John von Schoultz, Kerry-Lynn Thomson, Johan Van Niekerk:
Internet Self-regulation in Higher Education: A Metacognitive Approach to Internet Addiction. HAISA 2020: 186-207 - [p2]Johan Van Niekerk:
Programming and Coding in Secondary Schools. Encyclopedia of Education and Information Technologies 2020: 1-2 - [p1]Johan Van Niekerk:
Teaching with Computing, Educational Games. Encyclopedia of Education and Information Technologies 2020: 1-2
2010 – 2019
- 2019
- [j9]Bertram Haskins, Johan Van Niekerk:
Guest editorial: SAICSIT 2018 Special Issue. South Afr. Comput. J. 31(2) (2019) - [c37]Vuyolwethu Sizoli Mdunyelwa, Lynn Futcher, Johan Van Niekerk:
An Educational Intervention for Teaching Secure Coding Practices. World Conference on Information Security Education 2019: 3-15 - [c36]Matt Bishop, Melissa Dark, Lynn Futcher, Johan Van Niekerk, Ida Ngambeki, Somdutta Bose, Minghua Zhu:
Learning Principles and the Secure Programming Clinic. World Conference on Information Security Education 2019: 16-29 - 2018
- [j8]Ronald George Leppan, Reinhardt A. Botha, Johan F. Van Niekerk:
Process Model for Differentiated Instruction using Learning Analytics. South Afr. Comput. J. 30(2) (2018) - [e1]Sue Petratos, Johan Van Niekerk, Bertram Haskins:
Proceedings of the Annual Conference of the South African Institute of Computer Scientists and Information Technologists, SAICSIT 2018, Port Elizabeth, South Africa, September 26-28, 2018. ACM 2018, ISBN 978-1-4503-6647-2 [contents] - 2017
- [c35]Vuyolwethu Sizoli Mdunyelwa, Johannes Frederick Van Niekerk, Lynn Ann Futcher:
Secure Coding Practices in the Software Development Capstone Projects. HAISA 2017: 282-291 - [c34]Odwa Yekela, Kerry-Lynn Thomson, Johan Van Niekerk:
Assessing the Effectiveness of the Cisco Networking Academy Program in Developing Countries. World Conference on Information Security Education 2017: 27-38 - 2016
- [j7]Johan Van Niekerk, Paul Webb:
The effectiveness of brain-compatible blended learning material in the teaching of programming logic. Comput. Educ. 103: 16-27 (2016) - [j6]Rayne Reid, Johan Van Niekerk:
Decoding audience interpretations of awareness campaign messages. Inf. Comput. Secur. 24(2): 177-193 (2016) - [c33]Johan Van Niekerk, Kerry-Lynn Thomson:
Towards an Interdisciplinary Cyberbullying Campaign. HAISA 2016: 231-240 - 2015
- [c32]Rayne Reid, Johan Van Niekerk:
A Cyber Security Culture Fostering Campaign through the Lens of Active Audience Theory. HAISA 2015: 34-44 - [c31]Johan Van Niekerk, Lynn Futcher:
The Use of Software Design Patterns to Teach Secure Software Design: An Integrated Approach. World Conference on Information Security Education 2015: 75-83 - 2014
- [j5]Rayne Reid, Johan Van Niekerk:
Snakes and ladders for digital natives: information security education for the youth. Inf. Manag. Comput. Secur. 22(2): 179-190 (2014) - [j4]Rayne Reid, Johan Van Niekerk:
Brain-compatible, web-based information security education: a statistical study. Inf. Manag. Comput. Secur. 22(4): 371-381 (2014) - [c30]Rayne Reid, Johan Van Niekerk:
Towards an Education Campaign for Fostering a Societal, Cyber Security Culture. HAISA 2014: 174-184 - [c29]Yolanda Mjikeliso, Johan Van Niekerk, Kerry-Lynn Thomson:
Exploring the Human Dimension in the Beneficiary Institutions of the SANReN Network. HAISA 2014: 206-216 - [c28]Rayne Reid, Johan Van Niekerk:
From information security to cyber security cultures. ISSA 2014: 1-7 - [c27]Rayne Reid, Johan Van Niekerk, Karen Renaud:
Information security culture: A general living systems theory perspective. ISSA 2014: 1-8 - 2013
- [j3]Rossouw von Solms, Johan Van Niekerk:
From information security to cyber security. Comput. Secur. 38: 97-102 (2013) - [c26]Rayne Reid, Johan Van Niekerk:
Towards a Brain-Compatible Approach for Web-Based, Information Security Education. EISMC 2013: 59-68 - [c25]Rayne Reid, Johan Van Niekerk:
Back to Basics: Information Security Education for the Youth via Gameplay. World Conference on Information Security Education 2013: 1-10 - [c24]Johan Van Niekerk, Kerry-Lynn Thomson, Rayne Reid:
Cyber Safety for School Children - A Case Study in the Nelson Mandela Metropolis. World Conference on Information Security Education 2013: 103-112 - [c23]Karen Renaud, Demetris Kennes, Johan Van Niekerk, Joe Maguire:
SNIPPET: Genuine knowledge-based authentication. ISSA 2013: 1-8 - 2012
- [j2]Kerry-Lynn Thomson, Johan Van Niekerk:
Combating Information Security Apathy by Encouraging Prosocial Organisational Behaviour. Inf. Manag. Comput. Secur. 20(1): 39-46 (2012) - [c22]Noluxolo Kortjan, Rossouw von Solms, Johan Van Niekerk:
Ethical Guidelines for Cyber-related Services Aimed at the Younger Generations. HAISA 2012: 205-215 - [c21]Irene Okere, Johan Van Niekerk, Mariana Carroll:
Assessing information security culture: A critical analysis of current approaches. ISSA 2012: 1-8 - [c20]Marius Potgieter, Johan Van Niekerk:
The use of computer vision technologies to augment human monitoring of secure computing facilities. ISSA 2012: 1-6 - 2011
- [c19]Kerry-Lynn Thomson, Johan Van Niekerk:
Combating Information Security Apathy By Encouraging Prosocial Organisational Behaviour. HAISA 2011: 1-10 - [c18]Lynn Futcher, Johan Van Niekerk:
Towards a Pervasive Information Assurance Security Educational Model for Information Technology Curricula. World Conference on Information Security Education 2011: 164-171 - [c17]Johan Van Niekerk, Ryan G. Goss:
Towards Information Security Education 3.0 - A Call for Information Security Educational Ontologies. World Conference on Information Security Education 2011: 180-187 - [c16]Jacques Coertze, Johan Van Niekerk, Rossouw von Solms:
A web-based information security governance toolbox for small-to-medium enterprises in Southern Africa. ISSA 2011 - [c15]Rayne Reid, Johan Van Niekerk, Rossouw von Solms:
Guidelines for the creation of brain compatible cyber security educational material in Moodle 2.0. ISSA 2011 - 2010
- [j1]Johan Van Niekerk, Rossouw von Solms:
Information security culture: A management perspective. Comput. Secur. 29(4): 476-486 (2010) - [c14]Johan Van Niekerk, Kerry-Lynn Thomson:
Evaluating the Cisco Networking Academy Program's Instructional Model against Bloom's Taxonomy for the Purpose of Information Security Education for Organizational End-Users. Key Competencies in the Knowledge Society 2010: 412-423 - [c13]Thomas Monk, Johan Van Niekerk, Rossouw von Solms:
Sweetening the medicine: educating users about information security by means of game play. SAICSIT 2010: 193-200 - [c12]Johan Van Niekerk, Rossouw von Solms:
Research Methodologies in Information Security Research: The Road Ahead. SEC 2010: 215-216
2000 – 2009
- 2009
- [c11]Eraneé Swanepoel, Kerry-Lynn Thomson, Johan F. Van Niekerk:
E-Voting: A South African Perspective. AFRICOM 2009: 70-77 - [c10]Johan Van Niekerk, Rossouw von Solms:
Using Bloom's Taxonomy for Information Security Education. World Conference on Information Security Education 2009: 280-287 - [c9]Ryno Boshoff, Johan Van Niekerk:
E-mail Security awareness at Nelson Mandela Metropolitan University (Registrar's Division). ISSA 2009: 279-292 - [c8]Thomas Monk, Johan Van Niekerk, Rossouw von Solms:
Concealing the Medicine: Information Security Education through Game Play. ISSA 2009: 467-478 - 2008
- [c7]Johan Van Niekerk, Rossouw von Solms:
Bloom's Taxonomy for Information Security Education. ISSA 2008: 1-13 - 2006
- [c6]Johan Van Niekerk, Rossouw von Solms:
Understanding Information Security Culture: A Conceptual Framework. ISSA 2006: 1-10 - 2005
- [c5]Johan Van Niekerk, Rossouw von Solms:
A holistic framework for the fostering of an information security sub-culture in organizations. ISSA 2005: 1-13 - 2004
- [c4]Johan Van Niekerk, Rossouw von Solms:
Corporate Information Security Education: Is Outcomes Based Education the Solution? International Information Security Workshops 2004: 3-18 - [c3]Johan Van Niekerk:
Organisational Learning Models For Information Security Education. ISSA 2004: 1-11 - 2002
- [c2]Johan Van Niekerk:
A Web-Based Portal For Information Security Education. ISSA 2002: 1-10 - [c1]Oliver André Hoppe, Johan Van Niekerk, Rossouw von Solms:
The Effective Implementation of Information Security in Organizations. SEC 2002: 1-18
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint