default search action
Lynn Futcher
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c31]Lynn Futcher, Kerry-Lynn Thomson, Lean Kucherera, Noluxolo Gcaza:
Key Elements for Cybersafety Education of Primary School Learners in South Africa. HAISA 2023: 116-128 - [c30]Michael de Jager, Lynn Futcher, Kerry-Lynn Thomson:
An Investigation into the Cybersecurity Skills Gap in South Africa. HAISA 2023: 237-248 - [c29]Vuyolwethu Sizoli Mdunyelwa, Lynn Futcher, Johan Van Niekerk:
A Review of Constructive Alignment in Information Security Educational Research. HAISA 2023: 461-469 - 2022
- [c28]Madri Kruger, Lynn Futcher, Kerry-Lynn Thomson:
A Thematic Content Analysis of the Cybersecurity Skills Demand in South Africa. HAISA 2022: 24-38 - [c27]Vuyolwethu Sizoli Mdunyelwa, Lynn Futcher, Johan Van Niekerk:
An Investigation into Educational Process Models for Teaching Secure Programming. HAISA 2022: 77-90 - 2021
- [c26]Eugene Slabbert, Kerry-Lynn Thomson, Lynn Futcher:
Towards a Risk Assessment Matrix for Information Security Workarounds. HAISA 2021: 164-178 - [c25]Matt Bishop, Lynette Drevin, Lynn Futcher, Wai Sze Leung, Natalia G. Miloslavskaya, Erik L. Moore, Jacques Ophoff, Suné von Solms:
A Brief History and Overview of WISE. World Conference on Information Security Education 2021: 3-9 - [p1]Steven Furnell, Paul S. Haskell-Dowland, Manish Agrawal, Richard L. Baskerville, Anirban Basu, Matt Bishop, Jorge Cuéllar, Sara Foresti, Lynn Futcher, Nurit Gal-Oz, Tejaswini (Teju) Herath, Christian Damsgaard Jensen, Allen C. Johnston, Wouter Joosen, Giovanni Livraga, Javier López, Stephen Marsh, Fabio Martinelli, Fabio Massacci, Aljosa Pasic, Stef Schinagl, Abbas Shahim, Kerry-Lynn Thomson, Jaideep Vaidya, Tony Vance, Merrill Warkentin:
Information Security and Privacy - Challenges and Outlook. IFIP's Exciting First 60+ Years 2021: 383-401 - [e4]Audun Jøsang, Lynn Futcher, Janne Merete Hagen:
ICT Systems Security and Privacy Protection - 36th IFIP TC 11 International Conference, SEC 2021, Oslo, Norway, June 22-24, 2021, Proceedings. IFIP Advances in Information and Communication Technology 625, Springer 2021, ISBN 978-3-030-78119-4 [contents] - 2020
- [j4]Suné von Solms, Lynn Ann Futcher:
Adaption of a Secure Software Development Methodology for Secure Engineering Design. IEEE Access 8: 125630-125637 (2020)
2010 – 2019
- 2019
- [c24]Vuyolwethu Sizoli Mdunyelwa, Lynn Futcher, Johan Van Niekerk:
An Educational Intervention for Teaching Secure Coding Practices. World Conference on Information Security Education 2019: 3-15 - [c23]Matt Bishop, Melissa Dark, Lynn Futcher, Johan Van Niekerk, Ida Ngambeki, Somdutta Bose, Minghua Zhu:
Learning Principles and the Secure Programming Clinic. World Conference on Information Security Education 2019: 16-29 - 2018
- [c22]Wiehan Janse Van Rensburg, Kerry-Lynn Thomson, Lynn Ann Futcher:
An Educational Intervention Towards Safe Smartphone Usage. HAISA 2018: 123-134 - [c21]Wiehan Janse Van Rensburg, Kerry-Lynn Thomson, Lynn Futcher:
Factors Influencing Smartphone Application Downloads. World Conference on Information Security Education 2018: 81-92 - [c20]Suné von Solms, Lynn Futcher:
Identifying the Cybersecurity Body of Knowledge for a Postgraduate Module in Systems Engineering. World Conference on Information Security Education 2018: 121-132 - 2017
- [c19]Suné von Solms, Lynn Futcher:
Towards the Design of a Cybersecurity Module for Postgraduate Engineering Studies. HAISA 2017: 261-271 - [c18]Vuyolwethu Sizoli Mdunyelwa, Johannes Frederick Van Niekerk, Lynn Ann Futcher:
Secure Coding Practices in the Software Development Capstone Projects. HAISA 2017: 282-291 - [c17]Matt Bishop, Diana L. Burley, Scott Buck, Joseph J. Ekstrom, Lynn Futcher, David S. Gibson, Elizabeth K. Hawthorne, Siddharth Kaza, Yair Levy, Herbert J. Mattord, Allen Parrish:
Cybersecurity Curricular Guidelines. World Conference on Information Security Education 2017: 3-13 - [c16]Thandolwethu Mabece, Lynn Futcher, Kerry-Lynn Thomson:
South African Computing Educators' Perspectives on Information Security Behaviour. World Conference on Information Security Education 2017: 121-132 - [e3]Matt Bishop, Lynn Futcher, Natalia G. Miloslavskaya, Marianthi Theocharidou:
Information Security Education for a Global Digital Society - 10th IFIP WG 11.8 World Conference, WISE 10, Rome, Italy, May 29-31, 2017, Proceedings. IFIP Advances in Information and Communication Technology 503, Springer 2017, ISBN 978-3-319-58552-9 [contents] - 2016
- [c15]Thandolwethu Mabece, Lynn Futcher, Kerry-Lynn Thomson:
Towards using pervasive information security education to influence information security behaviour in undergraduate computing graduates. CONF-IRM 2016: 6 - [c14]Damian Todd Fredericks, Lynn Ann Futcher, Kerry-Lynn Thomson:
Comparing Student Password Knowledge and Behaviour: A Case Study. HAISA 2016: 167-178 - [c13]Lindokuhle Gcina Gomana, Lynn Ann Futcher, Kerry-Lynn Thomson:
An Educators Perspective of Integrating Information Security into Undergraduate Computing Curricula. HAISA 2016: 179-188 - [c12]Ryan De Kock, Lynn Ann Futcher:
Mobile device usage in higher education institutions in South Africa. ISSA 2016: 27-34 - [c11]Nicholas Scharnick, Mariana Gerber, Lynn Futcher:
Review of data storage protection approaches for POPI compliance. ISSA 2016: 48-55 - [c10]Diana L. Burley, Matt Bishop, Elizabeth K. Hawthorne, Siddharth Kaza, Scott Buck, Lynn Futcher:
Special Session: ACM Joint Task Force on Cyber Education. SIGCSE 2016: 234-235 - 2015
- [j3]André Lötter, Lynn Futcher:
A framework to assist email users in the identification of phishing attacks. Inf. Comput. Secur. 23(4): 370-381 (2015) - [c9]Johan Van Niekerk, Lynn Futcher:
The Use of Software Design Patterns to Teach Secure Software Design: An Integrated Approach. World Conference on Information Security Education 2015: 75-83 - 2014
- [c8]André Lötter, Lynn Futcher:
A framework to assist email users in the identification of phishing attacks. HAISA 2014: 42-52 - 2013
- [c7]Lynn Futcher, Louise Yngström:
A Review of IFIP TC 11 WG 11.8 Publications through the Ages. World Conference on Information Security Education 2013: 113-122 - [e2]Ronald C. Dodge Jr., Lynn Futcher:
Information Assurance and Security Education and Training - 8th IFIP WG 11.8 World Conference on Information Security Education, WISE 8, Auckland, New Zealand, July 8-10, 2013, Proceedings, WISE 7, Lucerne Switzerland, June 9-10, 2011, and WISE 6, Bento Gonçalves, RS, Brazil, July 27-31, 2009, Revised Selected Papers. IFIP Advances in Information and Communication Technology 406, Springer 2013, ISBN 978-3-642-39376-1 [contents] - 2012
- [c6]Lynn Futcher, Rossouw von Solms:
SecSDM: A usable tool to support IT undergraduate students in secure software development. HAISA 2012: 86-96 - 2011
- [j2]Lynn Futcher, Rossouw von Solms:
How can secure software be trusted? South Afr. Comput. J. 47: 1-6 (2011) - [c5]Lynn Futcher, Johan Van Niekerk:
Towards a Pervasive Information Assurance Security Educational Model for Information Technology Curricula. World Conference on Information Security Education 2011: 164-171 - 2010
- [j1]Lynn Futcher, Cheryl Schroder, Rossouw von Solms:
Information Security Education in South Africa. Inf. Manag. Comput. Secur. 18(5): 366-374 (2010) - [c4]Lynn Futcher, Cheryl Schroder, Rossouw von Solms:
An Integrative Approach to Information Security Education: A South African Perspective. SAISMC 2010: 215-222
2000 – 2009
- 2009
- [c3]Lynn Futcher, Rossouw von Solms:
A Risk-Based Approach to Formalise Information Security Requirements for Software Development. World Conference on Information Security Education 2009: 257-264 - 2008
- [c2]Lynn Futcher, Rossouw von Solms:
Guidelines for secure software development. SAICSIT 2008: 56-65 - 2007
- [c1]Lynn Futcher, Rossouw von Solms:
SecSDM: A Model for Integrating Security into the Software Development Life Cycle. World Conference on Information Security Education 2007: 41-48 - [e1]Lynn Futcher, Ronald Dodge:
Fifth World Conference on Information Security Education, Proceedings of the IFIP TC11 WG 11.8, WISE 5, 19 to 21 June 2007, United States Military Academy, West Point, New York, USA. IFIP 237, Springer 2007, ISBN 978-0-387-73268-8 [contents]
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-10 00:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint