Adéle da Veiga

Orcid: 0000-0001-9777-8721

Affiliations:
  • University of South Africa, Johannesburg


According to our database1, Adéle da Veiga authored at least 44 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Introduction to the special issue on insider threats in cybersecurity.
J. Inf. Secur. Appl., December, 2023

Measuring organizational information security awareness in South Africa.
Inf. Secur. J. A Glob. Perspect., March, 2023

A model for information security culture with creativity and innovation as enablers - refined with an expert panel.
Inf. Comput. Secur., 2023

Proposed Guidelines for Website Data Privacy Policies and an Application Thereof.
Proceedings of the Human Aspects of Information Security and Assurance, 2023

Towards Roles and Responsibilities in a Cyber Security Awareness Framework for South African Small, Medium, and Micro Enterprises (SMMEs).
Proceedings of the Human Aspects of Information Security and Assurance, 2023

2022
Cyber4Dev-Q: Calibrating cyber awareness in the developing country context.
Electron. J. Inf. Syst. Dev. Ctries., 2022

A study on information privacy concerns and expectations of demographic groups in South Africa.
Comput. Law Secur. Rev., 2022

A Model for Information Security Culture with Innovation and Creativity as Enablers.
Proceedings of the Human Aspects of Information Security and Assurance, 2022

Cyber4Dev Security Culture Model for African Countries.
Proceedings of the Human Aspects of Information Security and Assurance, 2022

Investigating Data Privacy Evaluation Criteria and Requirements for e-Commerce Websites.
Proceedings of the Advanced Research in Technologies, Information, Innovation and Sustainability, 2022

A Cyber4Dev Security Culture Model.
Proceedings of the Advanced Research in Technologies, Information, Innovation and Sustainability, 2022

2021
Validating an information privacy governance questionnaire to measure the perception of employees.
Inf. Comput. Secur., 2021

Assessing information security behaviour: a self-determination theory perspective.
Inf. Comput. Secur., 2021

A Reference Point for Designing a Cybersecurity Curriculum for Universities.
Proceedings of the Human Aspects of Information Security and Assurance, 2021

A Conceptual Information Security Culture Framework for Higher Learning Institutions.
Proceedings of the Human Aspects of Information Security and Assurance, 2021

2020
Protection of personal information: An experiment involving data value chains and the use of personal information for marketing purposes in South Africa.
South Afr. Comput. J., 2020

Comparing the protection and use of online personal information in South Africa and the United Kingdom in line with data protection requirements.
Inf. Comput. Secur., 2020

Defining organisational information security culture - Perspectives from academia and industry.
Comput. Secur., 2020

Concern for Information Privacy: A Cross-Nation Study of the United Kingdom and South Africa.
Proceedings of the Human Aspects of Information Security and Assurance, 2020

Validation of an Information Privacy Perception Instrument at a Zimbabwean University.
Proceedings of the Human Aspects of Information Security and Assurance, 2020

Information Security Behavior: Development of a Measurement Instrument Based on the Self-determination Theory.
Proceedings of the Human Aspects of Information Security and Assurance, 2020

2019
An Analysis of Assessment Approaches and Maturity Scales used for Evaluation of Information Security and Cybersecurity User Awareness and Training Programs: A Scoping Review.
Proceedings of the Conference on Next Generation Computing Applications, 2019

A conceptual privacy governance framework.
Proceedings of the Conference on Information Communications Technology and Society, 2019

Cyber security awareness for small, medium and micro enterprises (SMMEs) in South Africa.
Proceedings of the Conference on Information Communications Technology and Society, 2019

A conceptual model of information security compliant behaviour based on the self-determination theory.
Proceedings of the Conference on Information Communications Technology and Society, 2019

A conceptual framework for a student personal information privacy culture at universities in Zimbabwe.
Proceedings of 4th International Conference on the Internet, 2019

2018
An approach to information security culture change combining ADKAR and the ISCA questionnaire to aid transition to the desired culture.
Inf. Comput. Secur., 2018

An information privacy culture instrument to measure consumer privacy expectations and confidence.
Inf. Comput. Secur., 2018

An online information privacy culture: A framework and validated instrument to measure consumer expectations and confidence.
Proceedings of the 2018 Conference on Information Communications Technology and Society (ICTAS), 2018

A Comparison of compliance with data privacy requirements in two countries.
Proceedings of the 26th European Conference on Information Systems: Beyond Digitization, 2018

2017
Defining and identifying dominant information security cultures and subcultures.
Comput. Secur., 2017

Compliance with the protection of personal information act and consumer privacy expectations: A comparison between the retail and medical aid industry.
Proceedings of the 2017 Information Security for South Africa, 2017

An Information Privacy Culture Index Framework and Instrument to Measure Privacy Perceptions across Nations: Results of an Empirical Study.
Proceedings of the Eleventh International Symposium on Human Aspects of Information Security & Assurance, 2017

The influence of data protection regulation on the information security culture of an organisation - A case study comparing legislation and offices across jurisdictions.
Proceedings of the Eleventh International Symposium on Human Aspects of Information Security & Assurance, 2017

2016
Comparing the information security culture of employees who had read the information security policy and those who had not: Illustrated through an empirical study.
Inf. Comput. Secur., 2016

PoPI Act - opt-in and opt-out compliance from a data value chain perspective: A South African insurance industry experiment.
Proceedings of the 2016 Information Security for South Africa, 2016

Personal information value chains in the South African insurance industry - an experiment.
Proceedings of the CONF-IRM 2016, 2016

2015
Improving the information security culture through monitoring and implementation actions illustrated through a case study.
Comput. Secur., 2015

Information security culture and information protection culture: A validated assessment instrument.
Comput. Law Secur. Rev., 2015

An Information Security Training and Awareness Approach (ISTAAP) to Instil an Information Security-Positive Culture.
Proceedings of the Ninth International Symposium on Human Aspects of Information Security & Assurance, 2015

The Influence of Information Security Policies on Information Security Culture: Illustrated through a Case Study.
Proceedings of the Ninth International Symposium on Human Aspects of Information Security & Assurance, 2015

An Information Security Culture Model Validated with Structural Equation Modelling.
Proceedings of the Ninth International Symposium on Human Aspects of Information Security & Assurance, 2015

2010
A framework and assessment instrument for information security culture.
Comput. Secur., 2010

2007
An Information Security Governance Framework.
Inf. Syst. Manag., 2007


  Loading...