Representative Publications
In 2022, “A Thematic Content Analysis of the Cybersecurity Skills Demand in South Africa”, M Kruger, L Futcher and K Thomson was published in Human Aspects of Information Security and Assurances, Springer, IFIP AICT 658, pages 24-38.
In 2021, “Towards a Risk Assessment Matrix for Information Security Workarounds”, E Slabbert, K Thomson and L Futcher was published in Human Aspects of Information Security and Assurances, Springer, IFIP AICT 613, pages 164-178.
In 2020, “Internet Self-Regulation in Higher Education: A Metacognitive Approach to Internet Addiction”, D von Schoultz, K Thomson and J van Niekerk was published in Human Aspects of Information Security and Assurance, Springer, IFIP AICT 593, pages 186-210.
In 2020, “A Cybersecurity Curricular Framework for IT Undergraduates in South Africa”, L Futcher, K Thomson and A Mbuqe was chosen for publication in Communications in Computer and Information Science (CCIS Vol. 730) – SACLA 2020.
In 2019, “Towards a Framework for the Integration of Information Security into Undergraduate Computing Curricula”, L. Gomana, L. Futcher and K. Thomson was published in the South African Journal of Higher Education in August 2019.
In 2018, “Towards Culturally Sensitive Policy: Africanising Approaches to prevent Social Engineering”, K. Thomson and J. van Niekerk was published in Advanced Science Letters, Volume 24, Number 4, April 2018, pages 2499 – 2503(5).
In 2018, “Factors Influencing Smart Application Downloads”, W. Janse van Rensburg, K. Thomson and L. Futcher was published in IFIP Advances in Information and Communication Technology (Information Security Education - Towards a Cybersecure Society), Springer, Volume 531, pages 81-92.
In 2017, “South African Computing Educators’ Perspectives on Information Security Behaviour” T. Mabece, L. Futcher & K. Thomson was published in IFIP Advances in Information and Communication Technology (Information Security Education for a Global Digital Society), Springer, Volume 503, 2017, pages 121-132.
In 2017, “Assessing the Effectiveness of the Cisco Network Academy Program in Developing Countries”, O. Yekela, J. van Niekerk & K. Thomson was published in IFIP Advances in Information and Communication Technology (Information Security Education for a Global Digital Society), Springer, Volume 503, 2017, pages 27-38.
In 2015, “A Multi-faceted Model for IP-based Service Authorization in the eduroam Network”, L Tekeni, R Botha & K Thomson was published in the South African Institute for Electrical Engineers (SAIEE) edition of the Africa Research Journal.
In 2012, “Risk Management for VoIP Implementations”, T Gerber & K Thomson was published in the African Journal of Business Management.
In 2009, “Scare tactics – a viable weapon in the security war?”, S Furnell, M Papadaki & K-L Thomson was published in Computer Fraud & Security, December 2009, pages 6 – 10.
In 2009, “Recognising and addressing ‘security fatigue’”, S Furnell & K-L Thomson was published in Computer Fraud & Security, November 2009, pages 7 – 11.
In 2009, “From Culture to Disobedience: Recognising the Varying User Acceptance of IT Security”, S Furnell & K-L Thomson was published in Computer Fraud & Security, February 2009, pages 5 – 10.
In 2006, “Cultivating an Organisational Information Security Culture”; K-L Thomson, R von Solms & L Louw was published in Computer Fraud & Security, Volume 2006, Issue 10, pages 7 – 11.
In 2006, “Towards an Information Security Competence Maturity Model”; K-L Thomson & R von Solms was published in Computer Fraud & Security, Volume 2006, Issue 5, pages 11-15.
In 2005, “Information Security Obedience: A Definition”; K-L Thomson & R von Solms was published in Computers & Security, Volume 24, pages 69-75.
List of Publications (Conference Papers)
In 2020, Kerry-Lynn co-authored a paper, “Internet Self-Regulation in Higher Education: A Metacognitive approach to Internet Addiction” for the virtual Human Aspects of Information Security & Assurance (HAISA 2020). Authors: D. von Schoultz, K. Thomson & J. van Niekerk.
In 2020, Kerry-Lynn co-authored a paper, “A Cybersecurity Curricular Framework for IT Undergraduates in South Africa” for the virtual Southern African Computer Lecturers’ Association Conference (SACLA 2020). Authors: L. Futcher, K. Thomson & A. Mbuqe.
In 2018, Kerry-Lynn co-authored a paper, “An Educational Intervention Towards Safe Smartphone Usage” for the Twelfth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2018) in Dundee, Scotland. Authors: W. Janse van Rensburg, K. Thomson & L. Futcher.
In 2018, Kerry-Lynn co-authored a paper “A Personal Informatics Approach for Internet Self-regulatory efficacy in a South African University” for the Open Conference on Computers in Education (OCCE) IFIP 3 in Linz, Austria. Authors: D. von Schoultz, K. Thomson and J. van Niekerk.
In 2016, Kerry-Lynn co-authored a paper, “An Overview of Access Control Practices: Guidance from ITIL, COBIT 5 and ISO/IEC 27002” for the Information Institute Annual Security Conference in Las Vegas, USA. Authors: L. Tekeni, R. Botha & K. Thomson.
In 2016, Kerry-Lynn co-authored a paper, “Towards an Interdisciplinary Cyberbullying Campaign” for the Tenth International Symposium on the Human Aspects of Information Security & Assurance (HAISA) in Frankfurt, Germany. Authors: J. van Niekerk & K. Thomson.
In 2016, Kerry-Lynn co-authored a paper, “Comparing Student Password Knowledge and Behaviour: A Case Study” for the Tenth International Symposium on the Human Aspects of Information Security & Assurance (HAISA) in Frankfurt, Germany. Authors: D.T. Fredericks, L.A. Futcher & K. Thomson.
In 2016, Kerry-Lynn co-authored a paper, “An Educators Perspective of Integrating Information Security into Undergraduate Computing Curricula” for the Tenth International Symposium on the Human Aspects of Information Security & Assurance (HAISA) in Frankfurt, Germany. Authors: L. Gomana, L.A. Futcher & K. Thomson.
In 2016, Kerry-Lynn co-authored a paper, “Towards using pervasive information security education to influence information security behaviour in undergraduate computing graduates” for the International Conference on Information Resources Management (CONF-IRM) in Cape Town, South Africa. Authors: T. Mabece, L. Futcher & K. Thomson.
In 2015, Kerry-Lynn co-authored a paper, “A critical evaluation of information security education in nursing science: a case study” for the IFIP TC3 Working Conference in Vilnius, Lithuania. Authors: I Okere, J van Niekerk & K Thomson.
In 2015, Kerry-Lynn co-authored a paper, “Integrating Information Security into the IT Undergraduate Curriculum: A Case Study” for the 44th Southern African Computer Lecturers’ Association (SACLA) conference in Johannesburg, South Africa. Authors: L Gomana, L Futcher & K Thomson.
In 2014, Kerry-Lynn co-authored a paper, “Concerns Regarding Service Authorization by IP address using eduroam” for the 13th Information Security South Africa (ISSA) conference in Johannesburg, South Africa. Authors: L Tekeni, R Botha & K Thomson.
In 2014, Kerry-Lynn co-authored a paper, “Exploring the Human Dimension in the Beneficiary Institution of the SANReN Network” for the 8th International Symposium Human Aspects of Information Security and Assurance Conference in Plymouth, England. Authors: Y Mjikeliso, J van Niekerk & K Thomson.
In 2013, Kerry-Lynn co-authored a paper, “Cyber Safety for School Children: A Case Study in the Nelson Mandela Metropolis” for the 8th IFIP WG 11.8 World Conference on Information Security Education in Auckland, New Zealand. Authors: J van Niekerk, K Thomson & R Reid.
In 2013, Kerry-Lynn co-authored a paper, “Web usage mining within a South African university infrastructure: towards useful information from student web usage data” for the ZAWWW – Annual Conference on World Wide Web Applications. Authors: D von Schoultz, J van Niekerk & K Thomson.
In 2013, Kerry-Lynn co-authored a paper, “Service desk link into IT asset disposal: A case of a discarded IT asset” for the 2013 International Conference on Adaptive Science and Technology (ICAST). Authors: K Adesemowo & K Thomson.
In 2011, Kerry-Lynn presented a paper, “Combating Information Security Apathy by Encouraging Prosocial Organisational Behaviour” at the International Symposium for Human Aspects of Information Security and Assurance in London, England. Authors: K Thomson & J van Niekerk.
In 2011, Kerry-Lynn co-authored a paper, “Information security governance control through comprehensive policy architectures” which was presented at the ISSA Conference in Johannesburg. Authors: R von Solms, K Thomson & M Maninjwa.
In 2011, Kerry-Lynn co-authored a paper, “Exploring the human dimension of TETRA” which was presented at the ISSA Conference in Johannesburg. Authors: N Fouche & K Thomson.
In 2010, Kerry-Lynn presented a paper, “Evaluating the Cisco Networking Academy Program's Instructional Model against Bloom‘s Taxonomy for the purpose of Information Security Education for Organizational End-users” at the World Computer Congress in Brisbane, Australia. Authors: J van Niekerk & K Thomson.
In 2009, Kerry-Lynn presented a paper, “Information Security Conscience: a Precondition to an Information Security Culture?” at the 8th Annual Security Conference in Las Vegas, Nevada, US (Kerry-Lynn received the “Best Conference Paper Award” for this paper she presented in Las Vegas). Authors: K Thomson.
In 2009, Kerry-Lynn co-authored a paper, “E-voting: A South African Perspective” that was presented at the 1st AFRICOMM conference held in Maputo, Mozambique. Authors: E. Swanepoel, K Thomson & J van Niekerk.
In 2008, Kerry-Lynn presented a paper, “Using Knowledge Creation and Agency Theory to Shape an Information Security Obedient Culture” at the IFIP TC11.1 Working Conference in Information Security Management in Richmond, Virginia, US. Authors: K Thomson & R von Solms.
In 2004, Kerry-Lynn presented a paper, “Towards Corporate Information Security Obedience” at IFIP/SEC Conference in Toulouse, France. Authors: K Thomson & R von Solms.
In 2004, Kerry-Lynn presented a paper, “Cultivating Corporate Information Security Obedience” at the Information Security of South Africa (ISSA) Conference in Midrand, Gauteng, South Africa. Authors: K Thomson & R von Solms.
In 2003, Kerry-Lynn presented a paper, “Integrating Information Security into Corporate Governance” at IFIP/SEC Conference in Athens, Greece. Authors: K Thomson & R von Solms.
In 2003, Kerry-Lynn presented a paper, “Effective Corporate Governance” at the Information Security of South Africa (ISSA) Conference in Johannesburg, South Africa. Authors: K Thomson & R von Solms.
In 2002, Kerry-Lynn presented a paper, “Corporate Governance: Information security the weakest link?” at the Information Security of South Africa (ISSA) Conference in Muldersdrift, Gauteng, South Africa. Authors: K Thomson & R von Solms.