Showing
1 - 7
results of
7
Skip to content
VuFind
Log in
Library Catalogue Plus
Library
Subject guides
Databases
Referencing
Catalogue
Articles Plus
Keyword
Title
Author
Subject
Find
Advanced Search
Search Results - Karin Eloff
Search Results - Karin Eloff
Showing
1 - 7
results of
7
Refine Results
Sort
Relevance
Date Descending
Author
Title
1
Loading…
A survey of online social networking used to support health awareness campaigns in the City of Johannesburg metropolitan municipality
by
Eloff, Karin
,
Niemand, Cornelius J
Published in
South African journal of information management
Get full text
Article
Save to List
Saved in:
2
Loading…
A survey of online social networking used to support health awareness campaigns in the City of Johannesburg metropolitan municipality
by
Karin Eloff
,
Cornelius J. Niemand
Published in
South African journal of information management
Get full text
Article
Save to List
Saved in:
3
Loading…
A survey of online social networking used to support health awareness campaigns in the City of Johannesburg metropolitan municipality : original research
by
Eloff, Karin
,
Niemand, Cornelius J.
Published in
South African journal of information management
Get full text
Article
Save to List
Saved in:
4
Loading…
A survey of online social networking used to support health awareness campaigns in the City of Johannesburg metropolitan municipality : original research
by
Eloff, Karin
,
Niemand, Cornelius J.
Published in
South African journal of information management
Get full text
Article
Save to List
Saved in:
5
Loading…
Information security policy — what do international information security standards say?
by
Höne, Karin
,
Eloff, J.H.P.
Published in
Computers & security
Get full text
Items that this one cites
Items that cite this one
Article
Save to List
Saved in:
6
Loading…
TOPM: a formal approach to the optimization of information technology risk management
by
Badenhorst, Karin P.
,
Eloff, Jan H.P.
Published in
Computers & security
Get full text
Items that cite this one
Article
Save to List
Saved in:
7
Loading…
Framework of a methodology for the life cycle of computer security in an organization
by
Badenhorst, K.P.
,
Eloff, Jan H.P.
Published in
Computers & security
Get full text
Items that cite this one
Article
Save to List
Saved in:
Search Tools:
RSS Feed
Email Search
Save Search
Back
Refine Results
Page will reload when a filter is selected or excluded.
Limit To
Peer Reviewed
7 results
7
Full Text
7 results
7
Format
Articles
7 results
7
Journal Title
South African Journal Of Information Management
4 results
4
Computers & Security
3 results
3
Subjects
Computer Science
2 results
2
Computer Science, Information Systems
2 results
2
Cybersecurity
2 results
2
Information Security
2 results
2
Science & Technology
2 results
2
Security Management
2 results
2
Technology
2 results
2
Advertising
1 results
1
Applications Security
1 results
1
Audiences
1 results
1
Characteristics
1 results
1
Elements
1 results
1
Financial Risk Management
1 results
1
Government Agencies
1 results
1
Health Promotion
1 results
1
Implementations
1 results
1
Information Communication
1 results
1
Information Management
1 results
1
Information Security Policy
1 results
1
Information Sharing
1 results
1
Year of Publication
From:
To:
Source
Social Science Premium Collection
4 results
4
Library & Information Science Collection
4 results
4
Doaj Directory Of Open Access Journals
4 results
4
Abi/Inform Global
4 results
4
Library Science Database
4 results
4
Road: Directory Of Open Access Scholarly Resources
4 results
4
Free E-Journal (出版社公開部分のみ)
4 results
4
Publicly Available Content (Proquest)
4 results
4
Sciencedirect Journals
3 results
3
Sciencedirect Freedom Collection
3 results
3
Backfile Package - Business, Management And Accounting Including Supplement 1 [Yub]
3 results
3
Backfile Package - Computer Science (Legacy) [Ycs]
3 results
3
Backfile Package - Business, Management And Accounting (Legacy) [Ybt]
3 results
3
Library & Information Science Abstracts (Lisa)
1 results
1