1. Managing and controlling computer misuse
2. Assessing the security perceptions of personal Internet users
3. Maseti, O. and Pottas, D. (2006), “A role‐based security awareness model for South African hospitals”, Proceedings of the 6th Annual Information Security South Africa Conference, Sandton, South Africa, 5‐7 July.
4. Schlienger, T. and Teufel, S. (2003), “Information security culture – from analysis to change”, South African Computer Journal, Vol. 31, pp. 46‐52.
5. van der Walt, M.S., Maree, K. and Ellis, S. (2008), “A mathematics vocabulary questionnaire for use in the intermediate phase”, South African Journal of Education, No. 28, pp. 489‐504.