Institute for Corporate Citizenship

Prof MM Eloff

College of Economic and Management Sciences
Corporate Citizenship
Acting Head
Tel: (012) 4334604
E-mail: eloffmm@unisa.ac.za

Qualifications

  • PhD
  • MSc. Computer Science
  • B.Sc. Honors
  • NHD EDP
  • B.Sc. (Ed) Computer Science

NRF Rating

C2

Fields of academic interests

  • Information Security as a social responsibility

Field of Specialisation

  • Information Security Awareness such as secure and usable online information security applications and the use of gaming to foster awareness. Legal requirements pertaining to Information Security such as the POPIA,

Books

  • 2018 Venter HS, Coetzee M, Loock M and Eloff, M.M. (2018), Proceedings of the 17th International Information Security for South Africa (ISSA 2018) Conference, ISBN TBC, 15 - 16 August 2018, Pretoria, South Africa.
  • 2017 Venter HS, Coetzee M, Loock M and Eloff, M.M. (2017), Proceedings of the 16th International Information Security for South Africa (ISSA 2017) Conference, ISBN 978-1-5386-0544-8,pp 32-39, 16 - 17 August 2017, Johannesburg, South Africa.
  • 2016 Venter HS, Coetzee M, Loock M and Eloff, M.M. (2016), Proceedings of the 15th International Information Security for South Africa (ISSA 2016) Conference, EEE Catalog Number: CFP1666I-USB ISBN 978-1-5090-2472-8, 17-18 August 2016, Johannesburg, South Africa
  • 2015 Venter HS, Coetzee M, Loock M and Eloff, M.M.(2015), Proceedings of the 2015 Information Security for South Africa (ISSA 2015) Conference, 12 – 13 August 2014, 54 on Bath Hotel, Rosebank, Johannesburg, South Africa, IEEE Part Number: CFP1566I-CDR, ISBN 978-1-4799-7754-3
  • 2014 Venter HS, Coetzee M, Loock M and Eloff, M.M.(2014), Proceedings of the 2014 Information Security for South Africa (ISSA 2014) Conference, 13 – 14 August 2014, Radisson Blu Gautrain Hotel, Sandton, Johannesburg, South Africa, IEEE Part Number: CFP1466I-CDR, ISBN 978-1-4799-3383-9
  • 2014 Eloff J.H.P., Eloff M.M., Bihina Bella, M.A., Isherwood D., Dlamini M., Ngassam E.K., (2014), Information Security Innovation: Personalisation of Security Services in a mobile cloud infrastructure, in Information Security in Diverse Computing Environments, edited by Anne Kayem, and Christoph Meinel, Chapter 15, pp 310 – 315, DOI: 10.4018/978-1-4666-6158-5, ISBN13: 9781466661585, ISBN10: 1466661585, EISBN13: 9781466661592
  • 2013 Eloff, J.H.P., Eloff, M.M., Dlamini, M.T., Ngassam, E. and Ras, D. (2013) Interoperability as a Catalyst for Business Innovation, Chapter 4 in Enterprise Interoperability (eds M. Zelm, M. van Sinderen, L. F. Pires and G. Doumeingts), pp 33-46, John Wiley & Sons, Ltd, Chichester, UK. doi: 10.1002/9781118846995.ch4, Print ISBN: 9781848216624, Online ISBN: 9781118846995
  • 2013 Eloff M.M. & Marnewick C. (2013) Chapter 4: Project Management In Information Technology, book chapter in Project Management Maturity versus Project Outcomes in Africa. Prosperus Report, The African Edition Editor: Carl Marnewick. Published by: Project Management South Africa (PMSA), South Africa, ISBN: 978-0-620-56906-4, pp80-95, December 2013
  • 2012 Schwartzel T., Eloff M.M., (2012), A practical approach to theory structuring and analysis - A way to structure research and Perform Sub-Problem Solving in a Changing IS Landscape, in Research Methodologies, Innovations and Philosophies in Software Systems Engineering and Information Systems, edited by Manuel Mora, Ovsei Gelman, Annette Steenkamp, and Mahesh Raisinghani. Hershey PA: Information Science Reference (an imprint of IGI Global). Chapter 14, pp. 271 - 297. ISBN 978-1-4666-0179-6 (hardcover) -- ISBN 978-1-4666-0180-2 (ebook) – ISBN 978-1-4666-0181-9 (print & perpetual access). Hershey, PA: IGI Global.
  • 2008 Venter H.S., Eloff, M.M., Eloff, J.H.P. and Labuschagne L, (Editors) (2008), Proceedings of the ISSA 2008 Innovative Minds Conference, 7 – 9 July 2008 School of Tourism & Hospitality, University of Johannesburg, Johannesburg, South Africa, ISBN 978-1-86854-693-0
  • 2007 Venter H.S., Eloff, M.M., Labuschagne L, Eloff, J.H.P. and Von Solms, R, (Editors) (2007), New Approaches for Security, Privacy and Trust in Complex Environments, Proceedings of the 22nd International Information Security Conference (SEC 2007), Series: IFIP International Federation for Information Processing, 14-16 May 2007, Sandton, South Africa, Hardcover ISBN: 978-0-387-72366-2,
  • 2006 Venter HS, Eloff, J.H.P., Labuschagne L, and Eloff, MM (Editors) (2006), from Insight to Foresight, Proceedings of the 6TH Annual International Information Security South Africa (ISSA) conference, 5 - 7 July 2006, Johannesburg, South Africa, ISBN 1-86854-636-5
  • 2005 Venter HS, Eloff, JHP, Labuschagne L, and Eloff, MM (Editors) (2005), New Knowledge Today, Proceedings of the 5TH Annual International Information Security South Africa (ISSA) conference, 29 June - 1July 2005, Johannesburg, South Africa, ISBN 1-86854-625X
  • 2004 Venter HS, Eloff, JHP, Labuschagne L, and Eloff, MM (Editors) (2004), enabling tomorrow, Peer-reviewed Proceedings of the ISSA 2004 Conference, 30 June – 2 July 2004, Gallagher Estate, Midrand, ISBN 1-86854-522-9 2003 Eloff JHP, Engelbrecht A, Kotzé P and Eloff MM (Editors) (2003), IT Research in Developing Countries, Proceedings of the annual South African Institute of Computer Scientists and Information Technologists conference (SAICSIT), 319 pages, Unisa Press, 2003, ISBN 1-58113-774-5
  • 2003 Eloff JHP, Venter HS, Labuschagne L, and Eloff MM (Editors), ISSA 2003, The Future Secured, Proceedings of the 3rd Annual Information Security South Africa Conference, 368 pages, Unisa Press, 2003, ISBN 1-86854-485-0
  • 2000 Eloff, J.H.P., Von Solms, S.H., Eloff, M.M. & Smith, E., (2000), Information Security

Journal articles

  • 2019 Mujinga M., Eloff M.M. Kroeze J.H., Towards a framework for online information security applications development: A socio-technical approach, accepted SACJ
  • 2018 Mujinga M., Eloff M.M. Kroeze J.H., System usability scale evaluation of online banking service: A South African study, in the South African Journal of Science, Volume 114 | Number 3/4 March/ April 2018, pp1-8.
  • 2017 Ochola E.O., Mejaele, L.F., Eloff M.M. van der Poll J.A., Manet reactive routing protocols nodes mobility variation effect in analysing the impact of black hole attack. in South African Institute for Electrical Engineers Africa Research Journal (SAIEE - ARJ) Vol 108(2), pp. 80-91. June 2017
  • 2015 Frangopoulos E.D., Eloff M.M., Venter, L.M., (2015) Cybersecurity Economics - Induced Risks, Latent Costs and Possible Controls, Journal of Information Warfare, Vol. 13(4), pp. 12-26, January 12, 2015
  • 2013 Dagada R, and Eloff M.M., (2013), Integration of policy aspects into information security issues in South African organisations, African Journal of Business Management, Vol. 7(31), pp. 3069-3077, 21 August, 2013
  • 2013 Kohn M.D., Eloff M.M. and Eloff J.H.P., (2013), Digital Forensic Process Models – DFPMs, Computers & Security, 38(2013) pp. 103-115, http://dx.doi.org/10.1016/j.cose.2013.05.001, available online at http://authors.elsevier.com/sd/article/S0167404813000849
  • 2013 Frangopoulos E.D., Eloff M.M., Venter, L.M., (2013), Psychosocial Risks: can their effects on the Security of Information Systems really be ignored?" in Information Management and Computer Security, 21(1), pp.53 – 65, ISSN: 0968-5227, IMCS-08-2012-0041, DOI: http://dx.doi.org/10.1108/09685221311314428 (Permanent URL)
  • 2012 Wangwe, C. K., Eloff, M. M. and Venter L. M., (2012), A Sustainable Information Security Framework for e-Government - Case of Tanzania, Technological and Economic Development of Economy Journal. 2012, Volume 18(1): 117–131, ISSN: 1392-8619
  • 2011 Frangopoulos E.D., Eloff M.M., Venter, L.M., (2010), Psychological Considerations in Social Engineering – The Ψ-Wall as Defense, IADIS International Journal on Computer Science and Information Systems, 5(2), 1-20, ISSN: 1646-3692, Year: 2010, Editors: Pedro Isaías and Marcin Paprzycki, http://www.iadis.net/dl/
  • 2009 Dlamini, M., Eloff, J.H.P., Eloff, M.M., 2009, Information Security: The Moving Target, Computers & Security 28(3-4) May-June 2009, pp. 189-198, http://dx.doi.org/10.1016/j.cose.2008.11.007
  • 2007 Sukhoo, A; Barnard, A; Eloff, MM; van der Poll, JA. (2007), An Evolutionary Software Project Management Maturity Model for Mauritius, in Interdisciplinary Journal of Information, Knowledge, and Management, (2), 099-118. http://scholar.google.co.za/scholar?as_q=&num=10&btnG=Search+Scholar&as_epq=Accommodating+Soft+Skills+in+Software+Project+Management&as_oq=&as_eq=&as_occt=any&as_sauthors=eloff&as_publication=&as_ylo=&as_yhi=&as_sdt=1.&as_sdtp=on&as_sdts=5&hl=en
  • 2006 Sukhoo, A; Barnard, A; Eloff, MM; van der Poll, J A. (2006), An Assessment of Software Project Management Maturity in Mauritius, Issues in Informing Science and Information Technology, (2), 671-690.http://scholar.google.co.za/scholar?hl=en&q=an+Assessment+of+Software+Project+Management+Maturity+in+Mauritius%22+author%3Aeloff&btnG=Search&as_sdt=2000&as_ylo=2005&as_vis=0
  • 2006 Sukhoo, A; Barnard, A; Eloff, MM; van der Poll, J A; Motah, M. (2006), Accommodating Soft Skills in Software Project Management, Issues in Informing Science and Information Technology, (2), 691-704. http://scholar.google.co.za/scholar?as_q=&num=10&btnG=Search+Scholar&as_epq=Accommodating+Soft+Skills+in+Software+Project+Management&as_oq=&as_eq=&as_occt=any&as_sauthors=eloff&as_publication=&as_ylo=&as_yhi=&as_sdt=1.&as_sdtp=on&as_sdts=5&hl=en
  • 2005 Eloff J.H.P., Eloff M.M., (2005), Information Security Architecture, Computers Fraud & Security, Vol. 2005(11), Nov 2005, pp10-16. http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6VNT-4HPM0VV-7&_user=10&_coverDate=11%2F30%2F2005&_rdoc=1&_fmt=high&_orig=search&_sort=d&_docanchor=&view=c&_searchStrId=1197001228&_rerunOrigin=scholar.google&_acct=C000050221&_version=1&_urlVersion=0&_userid=10&md5=7100f17997a2f5d1f75346e19f2bd5b6
  • 2003 Smith E., Eloff M.M., Venter L.M., Barnard A and Pretorius L., (2003), Agents, security and ethics: a framework for analysis, South African Computer Journal, SACJ December 2003, 31, 18-24, (ISSN 1015-7999)
  • 2000 Eloff M.M., Von Solms SH (2000), Information Security management: an approach to combine process certification and product evaluation, Computers & Security, 19(8), 698-709
  • 2000 Eloff, M.M., & Von Solms, S.H. (2000), Information Security management: a hierarchical framework for various approaches Computers & Security, Volume 19(3), 243-256

Paper presentations

  • 2019 Maboe M.M., Eloff M.M. & Schoeman M.A., Comparison of students using electronic learn-ing website of the University of South Africa, accepted at the Conference on Information Communications Technology and Society (ICTAS 2019) Conference, 6 – 8 March 2019, Durban
  • 2018 Maboe M.M., Eloff M.M. & Schoeman M.A., (2018). The role of accessibility and usability in bridging the digital divide for students with disabilities in an e-learning environment, in proceedings of SAICSIT 2018 Conference - pp 222-228, 26 -28 September 2018, Port Elizabeth, DOI 10.1145/3278681.3278708.
  • 2018 Maboe M.M., Eloff M.M. & Schoeman M.A., Abatan O.M., The Experience of Students with Disabilities at an Open Distance e-learning Institution, at ICEL 2018, The 13th InternationalConference on e-Learning, pp 220-227, Print ISBN: 978-1-911218-90-6, 5 - 6th July 2018, Cape Town, South Africa
  • 2018 Mujinga M., Eloff M.M. Kroeze J.H., (2018) Perceptions of online banking custodians on system development and user behaviour: an empirical study, at IST-Africa 2018 Conference, Gaborone, Botswana, 09 - 11 May 2018
  • 2017 Dlamini M.T., Eloff J.H.P., Venter H.S., Eloff M.M., Eyono R.H., Mosola N., Behavioural Analytics: Beyond Risk-based MFA, Proceedings of Southern Africa Telecommunication Networks and Applications Conference, SATNAC 2017, ISBN 978-0-620-76756-9, pp 312-317, 3 - 10 September 2017 on the Freedom of the Seas Cruise Liner operated by Royal Caribbean International.
  • 2017 Chaipa S., Eloff M.M., Towards the development of an effective intrusion detection model, at 16th International Information Security South Africa (ISSA) Conference, ISBN 978-1-5386-0544-8,pp 32-39, 16 - 17 August 2017, Johannesburg, South Africa. 2017 Mujinga M., Eloff M.M. Kroeze J.H., A Socio-Technical Approach to Information Security, at 23rd Americas Conference on Information Systems (AMCIS 2017), 10-12 August 2017, Boston, MA.
  • 2017 Botha J., Grobler M.M., Eloff M.M., Global Data Breaches Responsible for the Disclosure of Personal Information: 2015 & 2016, ECCWS 2017, 16th European Conference on Cyber Warfare and Security, pp 63-72, http://tinyurl.com/ECCWS2017, E-Book ISBN: 978-1-911218-44-9, E-Book ISSN: 2048-8610, Book version ISBN: 978-1-911218-43-2, Book Version ISSN: 2048-8602. 29-30 June 2017, Dublin, Ireland
  • 2017 Botha J., Hahn J., Grobler M.M., Eloff M.M., A High-Level Comparison between the South African Protection of Personal Information Act and International Data Protection Laws, at the 12th International Conference on Cyber Warfare and Security – ICCWS-17, pp 57-66, E-Book ISBN: 978-1-911218-26-5, E-Book ISSN: 2048-9889, Book version ISBN: 978-1-911218-25-8, Book Version ISSN: 2048-9870, Dayton, Ohio, USA, 2-3 March 2017
  • 2016 Mosola NN, Dlamini MT, Eloff JHP, Venter HS, Eloff MM, Evolutionary Neural Crypto-System for Cloud-bound Data, in proceedings of the annual Southern Africa Telecommunication Networks and Applications Conference, SATNAC 2016, pp 216-221, 4 – 7 September 2016, Fancourt, George, Western Cape, South Africa.
  • 2016 Botha J., Eloff M.M. and Grobler M., Ethical and legal issues involved in the pro-active collection of personal information with the aim of reducing online disclosure, in proceedings of HCC12, 12th IFIP TC9 Human Choice and Computers Conference, pp 72-85, 7th-9th Sept 2016, Manchester, UK
  • 2016 Ochola E.O., Eloff M.M. van der Poll J.A., Beyond Watchdog Schemes in Securing MANET’s Reactive Protocols Operating on a Dynamic Transmission Power Control Technique, at the IEEE Technically Sponsored SAI Computing Conference 2016, pp 637-643, 13-15 July 2016 in London, United Kingdom.
  • 2016 Dlamini MT, Eloff JHP, Venter HS, Eloff MM, Chetty K, Blackledge JM, Securing Cloud Computing’s Blind-spots using Strong and Risk-based MFA, in Proceedings of the 2016 International Conference on Information Resources Management (CONF-IRM), pp 1-21, 18-20 May 2016, Cape Town, South Africa.
  • 2016 Mujinga M., Eloff M.M. Kroeze J.H., Online Banking Users’ Perceptions in South Africa: An Exploratory Empirical Study, in the Proceedings of IST-Africa 2016, 11th Ministerial level Technology Research Conferences, pp 1-7, 11 - 13 May, Durban, South Africa.
  • 2016 Eloff J.H.P., Dlamini M and Eloff M.M., Industrial Espionage - Corporate Data Continues to Leak, at ICCWS16, 11th International Conference on Cyber Warfare and Security ICCWS-2016, pp 91-98, ISBN 978_1_910810_82_8, Boston, Massachusetts, USA, 17-18 March 2016
  • 2016 Botha J., Eloff M.M. and Swart I., Pro-active Data Breach Detection: Examining Accuracy and Applicability on Personal Information Detected, at ICCWS16, 11th International Conference on Cyber Warfare and Security ICCWS-2016, pp 47-55, ISBN 978_1_910810_82_8, Boston, Massachusetts, USA, 17-18 March 2016
  • 2015 Maphosa M. & Eloff M.M. The state of Project Management Maturity Models in South Africa, in proceedings of IPMA 3rd Research Conference – Stellenbosch, p 1-9, South Africa, 25-26 November, 2015
  • 2015 Botha J., Eloff M.M. and Swart I., The Effects of the PoPI Act on Small and Medium Enterprises in South Africa, Proceedings of the 2015 Information Security South Africa (ISSA 2015) Conference, 12-13 August 2015, Johannesburg, South Africa, IEEE Part Number: CFP1566I-CDR, ISBN 978-1-4799-7754-3
  • 2015 Botha J., Eloff M.M. and Swart I., Evaluation of Online Resources on the Implementation of the Protection of Personal Information Act in South Africa,10th International Conference on Cyber Warfare and Security, pp 39 48, E Book ISBN: 978-1-910309-97-1, E Book ISSN: 2048-9889, Book version ISBN: 978-1-910309-96-4, Book Version ISSN: 2048-9870, CD Version ISBN: 978-1910309-98-8, CD Version ISSN: 2048-9897, Academic Conferences and Publishing International Limited, Reading, UK. 24-25 March 2015, Kruger National Park, South Africa
  • 2014 Eloff J.H.P., Dlamini M and Eloff M.M., CBAC4C: Conflict Based Allocation Control for Cloud, in proceedings of The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014), December 8-10, 2014, London, UK
  • 2014 Frangopoulos, E.D., Eloff M.M., and Venter L.M., Human Aspects of Information Assurance: A Questionnaire-based Quantitative Approach to Assessment at 8th International Symposium on Human Aspects of Information Security & Assurance, (HAISA 2014), Nathan Clarke, Steven Furnell (Ed.), pp217-229, ISBN: 978-1-84102-375-5, Plymouth University, 8th - 10th July 2014
  • 2014 Labuschagne W.A., Eloff M.M., The Effectiveness of Online Gaming as Part of a Security Awareness Program, at the 13th European Conference on Cyber Warfare and Security ECCWS-2014, Andrew Liaropoulos and George Tsihrintzis (Eds), pp125-132, ISBN: 978‐1‐9910309‐25‐4, 3-4 July 2014, The University of Piraeus, Piraeus, Greece
  • 2014 Dlamini M., Venter H.S., Eloff J.H.P., Eloff M.M., Preparing the Cloud to Become Ready for Digital Forensic Investigation, at the 13th European Conference on Cyber Warfare and Security ECCWS-2014, Andrew Liaropoulos and George Tsihrintzis (Eds), pp242-250, ISBN: 978‐1‐9910309‐25‐4, 3-4 July 2014, The University of Piraeus, Piraeus, Greece
  • 2014 Frangopoulos, E.D., Eloff M.M., and Venter L.M., Information Security Economics: Induced Risks and Latent Costs, at the 13th European Conference on Cyber Warfare and Security ECCWS-2014, Andrew Liaropoulos and George Tsihrintzis (Eds), pp80-88, ISBN: 978‐1‐9910309‐25‐4, 3-4 July 2014, The University of Piraeus, Piraeus, Greece
  • 2013 Mujinga M., Eloff M.M. Kroeze J.H. Towards a Usable and Secure Online Banking Security Heuristic Model, 24th Australasian Conference on Information Systems, 4-6 Dec 2013, Melbourne
  • 2013 Ochola E.O., Eloff M.M. van der Poll J.A., (2013), The Failure of Watchdog Schemes in MANET Security: A Case of an Intelligent Black-Hole, in the Proceedings of SAICSIT 2013, (South African Institute of Computer Scientists and Information Technologists conference) pp 305-311, available online at doi>10.1145/2513456.2513497, ISBN: 978-1-4503-2112-9, 7-9 October 2013, Blue Lagoon Hotel & Conference Centre, East London, South Africa.
  • 2013 Ochola E.O., Eloff M.M. van der Poll J.A., (2013), Democratic Detection of Malicious Behaviour in MANET: A Voting Process, in the Proceedings of the 2013 Information Security South Africa (ISSA 2013) Conference, 14-16 August 2013, Johannesburg, South Africa, ISBN: 978-1-4799-0809-7.
  • 2012 Eloff J.H.P., Eloff M.M., Bihina Bella, M.A., Isherwood D., Dlamini M., Ngassam E.K., (2012), Information Security Innovation: Personalisation of Security Services in a mobile cloud infrastructure, Theories and Intricacies of Information Security Problems, INTRICATE/SEC Workshop, part of ISSA 2012, August 15 – 17, 2012, Johannesburg, South Africa.
  • 2012 Frangopoulos, E.D., Eloff M.M., and Venter L.M., (2012), Psychosocial Risks: can their effects on the Security of Information Systems really be ignored?, 6th International Symposium on Human Aspects of Information Security & Assurance (HAISA 2012), editors Clarke NL & Furnell SM, pp 52-63, ISBN NO: 978-1-84102-317-5, Heraklion, Greece, 6 – 8 June 2012
  • 2012 Labuschagne W.A., Eloff M.M., (2012), Towards an automated security awareness system in a virtualized environment, in Proceedings of 11th European Conference on Information Warfare and Security (ECIW), The Institute Ecole Supérieure en Informatique, Electronique et Automatique, pp 163-171; ISBN: 978-1-908272-56-0; Laval, France, 5-6 July 2012 (http://bit.ly/TqelTH)
  • 2012 Labuschagne WA, Eloff MM, Veerasamy N, (2012), The dark side of Web 2.0, Magda David Hercheui, Diane Whitehouse, William J. McIver Jr., Jackie Phahlamohlaka (Eds.): ICT Critical Infrastructures and Society - 10th IFIP TC 9 International Conference on Human Choice and Computers, HCC10 2012. Proceedings. IFIP Advances in Information and Communication Technology 386 Springer 2012, pp 237-249, ISBN 978-3-642-33331-6, Amsterdam, the Netherlands, 27-28 September, 2012. (http://bit.ly/YemU4W),
  • 2012 Maphosa M, Eloff MM, Managing Innovative Projects, in proceeding of PMSA’s 2012 Biennial National Conference: Next Generation Project, Programme and Portfolio Management, pp 78-88, ISBN: 978-1-920017-58-3 (CD-ROM), The Birchwood Hotel and Conference Centre, Johannesburg, South Africa, 17 - 19 Sept 2012
  • 2012 Ochola, E.O., Eloff M.M. and van der Poll J.A., (2012), Mobile Ad-hoc Network Security Challenges Under AODV Routing Protocol, in proceedings of Ninth International Network Conference 2012, pp 113-122, ISBN 978-1-84102-315-1; 10 – 12 July 2012 in Port Elizabeth, South Africa.
  • 2011 Dlamini M., Eloff M.M., Venter H.S., Eloff J.H.P., (2011), A Budget Model for Information Security, in proceedings of the 5th International Symposium on Human Aspects of Information Security & Assurance (HAISA 2011), Steven Furnell, Nathan Clarke (Eds.) ISBN 978-1-84102-284-0. 7-8 July 2011, London, UK
  • 2011 Dlamini M., Venter H.S., Eloff J.H.P., Eloff M.M.,(2011), Security of Cloud Computing: Seeing Through the Fog, “Social Communications – Challenging the Limits of Technology Innovation”, The Southern Africa Telecommunication Networks and Applications Conference (SATNAC 2011), 4-7 September 2011, East London International Convention Centre (ELICC), East London, South Africa. Also available online at http://www.techrepublic.com/whitepapers/security-of-cloud-computing-seeing-through-the-fog/4079317
  • 2011 Hattas M.M., Eloff M.M., (2011), Secure Digital Data Collection In Household Surveys, in proceedings of 10th IEEE Region 8 AFRICON 2011 Conference, ISBN 978-1-61284-991-1, 13 Sept- 15 Sept 2011, Zambezi Sun Hotel, Zambia
  • 2011 Labuschagne W.A., Burke I., Veerasamy N., Eloff M.M., (2011), “Design of cyber security awareness game utilizing a social media framework” ISSA 2011, August 15 – 17, 2011, Johannesburg, South Africa.
  • 2011 Labuschagne W.A., Eloff M.M., Veerasamy N., Leenen L., Mujinga, Design of a Cyber Security Awareness Campaign for Internet Café Users in Rural Areas, Proceedings of the First IFIP TC9 / TC11 Southern African Cyber Security Awareness Workshop 2011 (SACSAW 2011), part of IEEE IST Africa 2011 Conference, p 42-58, 11-13 May 2011. Gaborone, Botswana, available online at http://www.csir.co.za/dpss/SACSAW_2011.html 2010 Craven, A., Eloff M.M., (2010), Towards the Adoption of a Reputational Reward Model for In-house Software Projects, in proceedings of Project Management South Africa (PMSA) Biennial National Conference 2010: Review – Reflect – Renew: Project Insight Gained & Lessons for the Future, The Birchwood Hotel and Conference Centre, Johannesburg, South Africa, 6-8 September 2010, ISBN NO: 978-1-920017-48-4, pp 44.52
  • 2010 Frangopoulos E.D., Eloff M.M., Venter, L.M., (2010), Psychological Considerations in Social Engineering, in the proceedings of IADIS International Information Systems 2010 (IS 2010) Conference Edited by Miguel Baptista Nunes, Pedro Isaias and Philip Powell. Associate Editors: Luis Rodrigues and Patricia Barbosa. pp 247-257 ISBN 978-972-8939-09-0, Porto, Portugal, 18-20 March 2010,
  • 2010 Ramgovind, S., Eloff M.M., & Smith, E., (2010), The Management of Cloud Computing Security, In Proceedings of the 2010 Information Security for South Africa International Conference, IEEE Catalog number: CFP10661-CDR, ISBN: 978-1-4244-5494-5, IEEE, Sandton, South Africa, August 2-4, 2010.
  • 2009 Dagada, R., Eloff M.M., Venter, L.M.; (2009), Too many laws but very little progress! Is South African highly acclaimed information security legislation redundant? Proceedings of the ISSA 2009 Conference, Editors: Hein Venter, Marijke Coetzee and Les Labuschagne, pp 327 - 346, ISBN 978-1-86854-740-1, 6 – 8 July 2009, Johannesburg, South Africa, available online at http://hdl.handle.net/10500/2660
  • 2009 Dlamini, M.T. Eloff, M.M. Eloff, J.H.P. & Hone, K. (2009a), BC3I – Towards requirements specification for preparing an Information Security budget, Proceedings of the ISSA 2009 Conference, Editors: Hein Venter, Marijke Coetzee and Les Labuschagne, pp 53 – 67, ISBN 978-1-86854-740-1, 6 – 8 July 2009, Johannesburg, South Africa, available online at http://hdl.handle.net/10500/2663
  • 2009 Dlamini, M.T. Eloff, M.M. Eloff, J.H.P., (2009b), Internet of Things: Emerging and Future Scenarios from an Information Security Perspective, Proceedings of SATNAC 2009: Convergence - 21st Century Lifestyle Enabler, 31 August – 2 September 2009. Royal Swazi Spa, Ezulwini, Swaziland.
  • 2009 Eloff, J.H.P., Eloff, M.M., Dlamini, M.T. Zielinski M.P., (2009), Internet of People, Things and Services - The Convergence of Security, Trust and Privacy, 3rd CompanionAble Workshop – IoPTS, 02 December 2009, Novotel Brussels – Brussels, available online at http://www.companionable.net/index.php?option=com_phocadownload&view=category&id=7:3rd-companionable-workshop-iopts-proceedings&Itemid=6
  • 2009 Wangwe, C., Eloff M.M., Venter, L.M.; (2009), E-Government Readiness: An Information Security Perspective from East Africa, IST-Africa 2009 Conference Proceedings, Paul Cunningham and Miriam Cunningham (Eds), Published by IIMC International Information Management Corporation, 2009, ISBN: 978-1-905824-11-3, 06 - 08 May 2009, Uganda
  • 2008 Frangopoulos E.D, Eloff M.M., Venter, L.M., (2008), Social Aspects of Information Security, in Venter H.S., Eloff, M.M., Eloff, J.H.P. and Labuschagne L, (Editors) (2008), Proceedings of the ISSA 2008 Innovative Minds Conference, 7 – 9 July 2008 School of Tourism & Hospitality, University of Johannesburg, Johannesburg, South Africa, ISBN 978-1-86854-693-0, pp 275-308
  • 2008 Wangwe, C., Eloff M.M., Venter, L.M., (2008), A Proposed Implementation of SAML V2.0 in an e Government Setting, in Proceedings of IST-Africa 2008 Conference & Exhibition, Windhoek, Namibia, 07 - 09 May 2008, ISBN 978 1-905824-076
  • 2007 Sukhoo, A., Barnard, A., Eloff, M.M., Van der Poll, J.A., (2007), An Evolutionary Software Project Management Maturity Model for Mauritius, in Proceedings of 2007 Informing Science and Information Technology Conference, InSITE 2007, Ljubljana, Slovenia – 22-25 June 2007
  • 2006 Eloff, MM; Ormiston K., (2006), Denial-of-Service & Distributed Denial-of-Service on the Internet, 6TH Annual International Information Security South Africa (ISSA) from Insight to Foresight Conference, Johannesburg
  • 2005 Frangopoulos E.D, Venter, L.M., Eloff M.M., (2005), Secure Authentication combined with Anonymity: The end of an oxymoron? Proceedings of the 5TH Annual International Information Security South Africa (ISSA) conference, July 2005, ISBN 1-86854-625X
  • 2005 Sukhoo A., Barnard A., Eloff M.M., Van der Poll J.A. and Motah, M, (2005a), Accommodating Soft Skills in Software Project Management, presented at InSITE2005 conference, published June 2005 as part of the conference proceedings in the journal Issues in Informing Science and Information Technology, vol. 2; pp. 691-704. ISSN 1547-5859.
  • 2005 Sukhoo A., Barnard A., Eloff M.M., Van der Poll J.A., (2005b), An assessment of Software Project Management Maturity in Mauritius, presented at InSITE2005 conference, published June 2005 as part of the conference proceedings in the journal Issues in Informing Science and Information Technology, vol. 2; pp. 671-690. ISSN 1547-5859
  • 2004 Eloff M.M., Kotze P., Adesina-Ojo A, Eloff J.H.P. (2004), Accessible Computer Interaction for People with Disabilities – the Case of Quadriplegics, 6th International Conference on Enterprise Information Systems, Porto, Portugal, 14 – 17 April 2004, pp 97-106
  • 2004 Frangopoulos E.D, Eloff M.M., (2004), A Comparative Study of Standards and Practices Related to Information Security Management, Proceedings of the 4TH Annual International Information Security South Africa (ISSA) conference, July 2004, ISBN 1-86854-522-9
  • 2004 Nkundla S., Pottas D, Eloff M.M., (2004), The Protection of Public Health Data - A Case Study, Proceedings of the 4TH Annual International Information Security South Africa (ISSA) conference, July 2004, ISBN 1-86854-522-9
  • 2004 Ramdeyal A., Eloff M.M., (2004), A General Methodology for the Development of an Effective Information Security Policy, Proceedings of the 4TH Annual International Information Security South Africa (ISSA) conference, July 2004, ISBN 1-86854-522-9
  • 2004 Sukhoo A., Barnard A., Eloff M.M., Van der Poll J.A., (2004a), A Survey of Project Management Tools, Techniques and Methodologies used in Mauritius: The Current Status, Proceedings of The Project Management South Africa (PMSA) Conference 2004, 10 – 12 May 2004, Gallagher Estate, Midrand, available online at http://hdl.ha
  • 2004 Sukhoo A., Barnard A., Eloff M.M., Van der Poll J.A., (2004b), Towards a Framework for Evaluating Strengths and Weaknesses of Software Projects. Proceedings of The Project Management South Africa (PMSA) Conference 2004, 10 – 12 May 2004, Gallagher Estate, Midrand, available online at http://hdl.handle.net/10500/2662
  • 2003 Eloff J.H.P., Eloff M.M., (2003a), Information Security Management – A New Paradigm, Proceedings of the annual South African Institute of Computer Scientists and Information Technologists conference (SAICSIT), September 2003, pp 130-136 ISBN 1-58113-774-5
  • 2003 Eloff, M.M., Eloff J.H.P., (2003b), Information Security Management System: processes and products Proceedings of IFIP SEC 2003, May 2003, Athens, Greece, ISBN 1-4020-7449-2
  • 2003 Smith E., Eloff M.M., Venter L.M., Barnard A and Pretorius L., (2003), Agents, security and ethics: a framework for analysis, Proceedings of the Annual International Information Security South Africa (ISSA) conference, July 2003. ISBN 1-86854-485-0
  • 2003 Zantsi N., Eloff M.M., (2003), Guide to South African Law, Proceedings of the Annual International Information Security South Africa (ISSA) conference, July 2003. ISBN 1-86854-485-0, available online at http://icsa.cs.up.ac.za/issa/2003/downloadsDay3.htm
  • 2002 Eloff, M.M., Eloff J.H.P., (2002), Secure Human Computer Interaction: an Information Security Perspective, Proceedings of IFIP SEC 2002, May 2002, Cairo, Egypt. 2000 Eloff, M.M., & Von Solms, S.H. (2000), Information Security: Process Evaluation and Product Evaluation, Information Security for Global Information Infrastructures (Proceedings of the sixteenth annual international conference on Information Security) Eloff, J.H.P. & Qing, S. (ed)
  • 1998 Eloff, M.M., & Von Solms, S.H. (1998), Measuring the Information Security Level in an Organisation Security & Information Security Management – 2 (Proceedings of the sixth working conference of WG 11.1 & WG 11.2 of Technical Committee 11 of IFIP); Eloff, J.H.P. & Von Solms, R. (ed) 1991 Eloff, J.H.P. & Eloff, M.M (1991), Distance education in computer training Proceedings of CISNA’91, Blantyre
  • 1989 Eloff, J.H.P. & Eloff, M.M. (1989), A Methodology for the Management of End-user Computing Proceedings of 5th South African Computer Congress

Professional positions, fellowships & awards

  • 2010 Unisa Women in Research: Research Leadership Award.
    • This prize is for a researcher who in the last five years should have demonstrated their outstanding leadership in research through the following:
      • High quality publications (meaning: Numbers, Impact, Range of journals)
      • Contributed to the advancement of research within their respective fields, which can also include organising conferences, workshops, seminars and editorships
      • Mentoring and enablement of developing scholars
      • Successfully supervising of a substantial number of postgraduate students
      • Recognition and awards in their field as an achiever
      • Community engagement
  • 2009 One of the top 25 most downloaded articles in the last quarter of 2009:
  • 1998 Received IQ Business Group Award for best PhD presentation at the RAU Research Indaba, 27-10-199

Other

Citation indexes:

  • WOS h-index = 5
  • Google Scholar h-index = 15
  • Scopus h-index = 8