default search action
Mariki M. Eloff
Person information
- affiliation: University of South Africa, Pretoria, South Africa
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j8]M. T. Dlamini, Jan H. P. Eloff, H. S. Venter, Mariki M. Eloff:
CBAC4C: conflict-based VM isolation control for cloud computing. Int. Trans. Oper. Res. 29(1): 372-395 (2022) - 2020
- [e11]Hein S. Venter, Marianne Loock, Marijke Coetzee, Mariki M. Eloff, Jan H. P. Eloff:
Information and Cyber Security - 18th International Conference, ISSA 2019, Johannesburg, South Africa, August 15, 2019, Proceedings. Communications in Computer and Information Science 1166, Springer 2020, ISBN 978-3-030-43275-1 [contents]
2010 – 2019
- 2019
- [j7]Mathias Mujinga, Mariki M. Eloff, Jan H. Kroeze:
Towards a framework for online information security applications development: A socio-technical approach. South Afr. Comput. J. 31(1) (2019) - [c32]Motlhabane Jacobus Maboe, Mariki M. Eloff, Marthie A. Schoeman:
Comparison of students using electronic learning website of University of South Africa. ICTAS 2019: 1-6 - [c31]Motlhabane Jacobus Maboe, Mariki M. Eloff, Marthie A. Schoeman:
Analysis of students with and without disabilities in an e-learning setting. SAICSIT 2019: 29:1-29:7 - [e10]Hein S. Venter, Marianne Loock, Marijke Coetzee, Mariki M. Eloff, Jan H. P. Eloff:
Information Security - 17th International Conference, ISSA 2018, Pretoria, South Africa, August 15-16, 2018, Revised Selected Papers. Communications in Computer and Information Science 973, Springer 2019, ISBN 978-3-030-11406-0 [contents] - 2018
- [c30]Motlhabane Jacobus Maboe, Mariki M. Eloff, Marthie A. Schoeman:
The role of accessibility and usability in bridging the digital divide for students with disabilities in an e-learning environment. SAICSIT 2018: 222-228 - 2017
- [c29]Mathias Mujinga, Mariki M. Eloff, Jan Hendrik Kroeze:
A Socio-Technical Approach to Information Security. AMCIS 2017 - [c28]Sarathiel Chaipa, Mariki M. Eloff:
Towards the development of an effective intrusion detection model. ISSA 2017: 32-39 - [e9]Hein S. Venter, Marianne Loock, Marijke Coetzee, Mariki M. Eloff, Jan H. P. Eloff:
2017 Information Security for South Africa, ISSA 2017, Johannesburg, South Africa, August 16-17, 2017. IEEE 2017, ISBN 978-1-5386-0545-5 [contents] - 2016
- [c27]M. T. Dlamini, Mariki M. Eloff, H. S. Venter, Jan H. P. Eloff, Jonathan M. Blackledge, K. Chetty:
Securing Cloud Computing's Blind-spots using Strong and Risk-based MFA. CONF-IRM 2016: 22 - [c26]Johnny Botha, Mariki M. Eloff, Marthie Grobler:
Ethical and Legal Issues Involved in the Pro-active Collection of Personal Information with the Aim of Reducing Online Disclosure. HCC 2016: 72-85 - [e8]Hein S. Venter, Marianne Loock, Marijke Coetzee, Mariki M. Eloff, Jan H. P. Eloff:
2016 Information Security for South Africa, ISSA 2016, Johannesburg, South Africa, August 17-18, 2016. IEEE 2016, ISBN 978-1-5090-2473-5 [contents] - 2015
- [c25]J. G. Botha, Mariki M. Eloff, I. Swart:
The effects of the PoPI Act on small and medium enterprises in South Africa. ISSA 2015: 1-8 - [c24]Hein S. Venter, Marianne Loock, Marijke Coetzee, Mariki M. Eloff:
Introduction. ISSA 2015: 1 - [e7]Hein S. Venter, Marianne Loock, Marijke Coetzee, Mariki M. Eloff, Stephen Flowerday:
2015 Information Security for South Africa, ISSA 2015, Johannesburg, South Africa, August 12-13, 2015. IEEE 2015, ISBN 978-1-4799-7755-0 [contents] - 2014
- [c23]Evangelos D. Frangopoulos, Mariki M. Eloff, Lucas M. Venter:
Human Aspects of Information Assurance: A Questionnaire-based Quantitative Approach to Assessment. HAISA 2014: 217-229 - [c22]M. T. Dlamini, Jan H. P. Eloff, Mariki M. Eloff:
CBAC4C: Conflict Based Allocation Control for Cloud. ICITST 2014: 447-448 - [c21]Hein S. Venter, Marianne Loock, Marijke Coetzee, Mariki M. Eloff:
Introduction. ISSA 2014: 1 - [e6]Hein S. Venter, Marianne Loock, Marijke Coetzee, Mariki M. Eloff:
2014 Information Security for South Africa, Johannesburg, South Africa, August 13-14, 2014. IEEE 2014, ISBN 978-1-4799-3384-6 [contents] - 2013
- [j6]Michael D. Kohn, Mariki M. Eloff, Jan H. P. Eloff:
Integrated digital forensic process model. Comput. Secur. 38: 103-115 (2013) - [j5]Evangelos D. Frangopoulos, Mariki M. Eloff, Lucas M. Venter:
Psychosocial risks: Can their effects on the security of information systems really be ignored? Inf. Manag. Comput. Secur. 21(1): 53-65 (2013) - [c20]Mathias Mujinga, Jan H. Kroeze, Mariki M. Eloff:
Towards a Heuristic Model for Usable and Secure Online Banking. ACIS 2013: 163 - [c19]Elisha O. Ochola, Mariki M. Eloff, John A. van der Poll:
Democratic detection of malicious behaviour in MANET: A voting process. ISSA 2013: 1-7 - [c18]Elisha O. Ochola, Mariki M. Eloff, John A. van der Poll:
The failure of watchdog schemes in MANET security: a case of an intelligent black-hole. SAICSIT 2013: 305-311 - 2012
- [c17]Evangelos D. Frangopoulos, Mariki M. Eloff, Lucas M. Venter:
Psychosocial Risks: can their effects on the Security of Information Systems really be ignored?. HAISA 2012: 52-63 - [c16]Aubrey Labuschagne, Mariki M. Eloff, Namosha Veerasamy:
The Dark Side of Web 2.0. HCC 2012: 237-249 - [c15]Elisha Oketch Ochola, Mariki M. Eloff, John A. van der Poll:
Mobile Ad-hoc Network Security Challenges Under AODV Routing Protocol. INC 2012: 113-122 - 2011
- [c14]Mahier Hattas, Mariki M. Eloff:
Secure Digital Data Collection in household surveys. AFRICON 2011: 1-6 - [c13]Moses Dlamini, Mariki M. Eloff, Jan H. P. Eloff, Hein S. Venter:
A Budget Model for Information Security. HAISA 2011: 47-57 - [c12]Elisha O. Ochola, Mariki M. Eloff:
A Review of Black Hole attack on AODV Routing in MANET. ISSA 2011 - 2010
- [c11]Alain Craven, Mariki M. Eloff:
Biometrics as an Agent to Reduce Fraud in the Micro Lending Industry in South Africa. ISSA 2010 - [c10]Sumant Ramgovind, Mariki M. Eloff, Elme Smith:
The Management of Cloud Computing Security. ISSA 2010
2000 – 2009
- 2009
- [j4]M. T. Dlamini, Jan H. P. Eloff, Mariki M. Eloff:
Information security: The moving target. Comput. Secur. 28(3-4): 189-198 (2009) - [c9]Moses Dlamini, Mariki M. Eloff, Jan H. P. Eloff, Karin Höne:
BC3I - Towards Requirements Specification for Preparing an Information Security Budget. ISSA 2009: 53-68 - [c8]Rabelani Dagada, Mariki M. Eloff, Lucas M. Venter:
Too Many Laws But Very Little Progress! Is South African Highly Acclaimed Information Security Legislation Redundant? ISSA 2009: 327-346 - 2008
- [c7]Evangelos D. Frangopoulos, Mariki M. Eloff, Lucas M. Venter:
Social Aspects of Information Security. ISSA 2008: 1-33 - [e5]Hein S. Venter, Mariki M. Eloff, Jan H. P. Eloff, Les Labuschagne:
Proceedings of the ISSA 2008 Innovative Minds Conference, ISSA 2008, Gauteng Region (Johannesburg), South Africa, 7-9 July 2008. ISSA, Pretoria, South Africa 2008, ISBN 978-1-86854-693-0 [contents] - 2007
- [e4]Hein S. Venter, Mariki M. Eloff, Les Labuschagne, Jan H. P. Eloff, Rossouw von Solms:
New Approaches for Security, Privacy and Trust in Complex Environments, Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa. IFIP 232, Springer 2007, ISBN 978-0-387-72366-2 [contents] - 2006
- [c6]Kate Ormiston, Mariki M. Eloff:
Denial-of-Service & Distributed Denial-of-Service on The Internet. ISSA 2006: 1-14 - [e3]Jan H. P. Eloff, Les Labuschagne, Mariki M. Eloff, Hein S. Venter:
Proceedings of the ISSA 2006 from Insight to Foresight Conference, 5-7 July 2006, Balalaika Hotel, Sandton, South Africa. ISSA, Pretoria, South Africa 2006, ISBN 1-86854-636-5 [contents] - 2005
- [c5]Evangelos D. Frangopoulos, Lucas M. Venter, Mariki M. Eloff:
Secure Authentication combined with Anonymity: The end of an oxymoron? ISSA 2005: 1-11 - [e2]Jan H. P. Eloff, Les Labuschagne, Mariki M. Eloff, Hein S. Venter:
Proceedings of the ISSA 2005 New Knowledge Today Conference, 29 June - 1 July 2005, Balalaika Hotel, Sandton, South Africa. ISSA, Pretoria, South Africa 2005, ISBN 1-86854-625-X [contents] - 2004
- [c4]Paula Kotzé, Mariki M. Eloff, Ayodele Adesina-Ojo, Jan H. P. Eloff:
Accessible Computer Interaction for People with Disabilities: The Case of Quadriplegics. ICEIS (5) 2004: 97-106 - [e1]Jan H. P. Eloff, Les Labuschagne, Mariki M. Eloff, Hein S. Venter:
Proceedings of the ISSA 2004 Enabling Tomorrow Conference, 30 June - 1 July 2004, Gallagher Estate, Midrand, South Africa. ISSA, Pretoria, South Africa 2004, ISBN 1-86854-522-9 [contents] - 2003
- [j3]Elme Smith, Mariki M. Eloff, Lucas M. Venter, Andries Barnard, Laurette Pretorius:
Agents, security and ethics: a framework for analysis. South Afr. Comput. J. 31: 18-24 (2003) - [c3]Mariki M. Eloff, Jan H. P. Eloff:
Information Security Management System: Processes and Products. SEC 2003: 193-204 - 2002
- [c2]Mariki M. Eloff, Jan H. P. Eloff:
Human Computer Interaction: An Information Security Perspectives. SEC 2002: 535-546 - 2000
- [j2]Mariki M. Eloff, Sebastiaan H. von Solms:
Information Security Management: A Hierarchical Framework for Various Approaches. Comput. Secur. 19(3): 243-256 (2000) - [j1]Mariki M. Eloff, Sebastiaan H. von Solms:
Information Security Management: An Approach to Combine Process Certification And Product Evaluation. Comput. Secur. 19(8): 698-709 (2000) - [c1]Mariki M. Eloff, Sebastiaan H. von Solms:
Information Security: Process Evaluation and Product Evaluation. SEC 2000: 11-18
Coauthor Index
aka: H. S. Venter
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint