Keshnee Padayachee
Orcid: 0000-0001-7056-4723
According to our database1,
Keshnee Padayachee
authored at least 27 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
An exploration of dark and light triad personality traits towards situational crime prevention and compliant information security behaviour.
Inf. Comput. Secur., 2024
A Combined Competency-Based and Design-Based Research (DBR) Approach to Curriculum Development: Implications for Information Technology (IT) Programs.
Proceedings of the Intelligent Computing, 2024
2022
Understanding the effects of situational crime prevention and personality factors on insider compliance.
J. Inf. Secur. Appl., 2022
An Exploratory Factor Analysis of Personality Factors: An Insider Threat Perspective.
Proceedings of the Human Aspects of Information Security and Assurance, 2022
2021
Joint Effects of Neutralisation Techniques and the Dark Triad of Personality Traits on Gender : An Insider Threat Perspective.
Proceedings of the Conference on Information Communications Technology and Society, 2021
Proceedings of the Human Aspects of Information Security and Assurance, 2021
A Theoretical Underpinning for Examining Insider Attacks Leveraging the Fraud Pentagon.
Proceedings of the Human Aspects of Information Security and Assurance, 2021
2020
Understanding the Relationship Between the Dark Triad of Personality Traits and Neutralization Techniques Toward Cybersecurity Behaviour.
Int. J. Cyber Warf. Terror., 2020
2017
South Afr. Comput. J., 2017
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017
2016
An assessment of opportunity-reducing techniques in information security: An insider threat perspective.
Decis. Support Syst., 2016
2015
An Insider Threat Neutralization Mitigation Model Predicated On Cognitive Dissonance (ITNMCD).
South Afr. Comput. J., 2015
Proceedings of the 2015 Annual Research Conference on South African Institute of Computer Scientists and Information Technologists, 2015
Proceedings of the 2015 Information Security for South Africa, 2015
Proceedings of the 10th International Conference for Internet Technology and Secured Transactions, 2015
2013
Proceedings of the 2013 Information Security for South Africa, 2013
Cloud security and compliance concerns: Demystifying stakeholders' roles and responsibilities.
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013
Proceedings of the AFRICON 2013, Pointe aux Piments, Mauritius, September 9-12, 2013, 2013
2012
2009
Adapting usage control as a deterrent to address the inadequacies of access controls.
Comput. Secur., 2009
2007
Proceedings of the Trust, 2007
An Aspect-Oriented Approach to Enhancing Multilevel Security with Usage Control: An Experience Report.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007
Instrumentation of AspectJ Programs: An Exploratory Study.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007