Stephen Flowerday
Orcid: 0000-0002-4591-3802
According to our database1,
Stephen Flowerday
authored at least 72 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2006
2008
2010
2012
2014
2016
2018
2020
2022
2024
0
1
2
3
4
5
6
7
8
9
3
3
3
3
6
1
1
3
3
3
2
1
1
1
3
1
2
3
3
2
6
4
5
4
2
2
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
J. Cybersecur. Priv., September, 2024
Inf. Comput. Secur., 2024
Proceedings of the 30th Americas Conference on Information Systems: Elevating Life through Digital Social Entrepreneurship, 2024
Cybersecurity in the Age of Uncertainty: A Call for Resilient and Antifragile Systems.
Proceedings of the 30th Americas Conference on Information Systems: Elevating Life through Digital Social Entrepreneurship, 2024
Proceedings of the 30th Americas Conference on Information Systems: Elevating Life through Digital Social Entrepreneurship, 2024
2023
Unraveling the behavioral influence of social media on phishing susceptibility: A Personality-Habit-Information Processing model.
Inf. Manag., November, 2023
Future Internet, May, 2023
The mediating role of perceived risks and benefits when self-disclosing: A study of social media trust and FoMO.
Comput. Secur., March, 2023
2022
Inf. Comput. Secur., 2022
A smart city qualitative data analysis model: Participatory crowdsourcing of public safety reports in South Africa.
Electron. J. Inf. Syst. Dev. Ctries., 2022
Behav. Inf. Technol., 2022
2021
A system architecture for ensuring interoperability in a South African national electronic health record system.
South Afr. Comput. J., 2021
2020
Privacy risk and the use of Facebook Apps: A gender-focused vulnerability assessment.
Comput. Secur., 2020
Comput. Secur., 2020
Susceptibility to phishing on social network sites: A personality information processing model.
Comput. Secur., 2020
Comput. Secur., 2020
Proceedings of the 26th Americas Conference on Information Systems, 2020
2019
Electron. J. Inf. Syst. Dev. Ctries., 2019
Proceedings of the South African Institute of Computer Scientists and Information Technologists, 2019
Proceedings of the Conference on Information Communications Technology and Society, 2019
2018
Comput. Secur., 2018
The Influence of Native Language on Password Composition and Security: A Socioculture Theoretical View.
Proceedings of the ICT Systems Security and Privacy Protection, 2018
Password Policies Adopted by South African Organizations: Influential Factors and Weaknesses.
Proceedings of the Information Security - 17th International Conference, 2018
Proceedings of the Twelfth International Symposium on Human Aspects of Information Security & Assurance, 2018
2017
Factors that influence the usability of a participatory IVR crowdsourcing system in a smart city.
South Afr. Comput. J., 2017
Contemplating human-centred security & privacy research: Suggesting future directions.
J. Inf. Secur. Appl., 2017
2016
Inf. Comput. Secur., 2016
Electron. J. Inf. Syst. Dev. Ctries., 2016
Comput. Secur., 2016
Proceedings of the 2016 Information Security for South Africa, 2016
A feedback loop model to facilitate communication between citizens and local government in Buffalo City.
Proceedings of the CONF-IRM 2016, 2016
Proceedings of the CONF-IRM 2016, 2016
2015
Exploring the relationship between student mobile information security awareness and behavioural intent.
Inf. Comput. Secur., 2015
Building Technology Trust in a Rural Agricultural e-Marketplace: A User Requirements Perspective.
Electron. J. Inf. Syst. Dev. Ctries., 2015
Information Security Behaviour Profiling Framework (ISBPF) for student mobile phone users.
Comput. Secur., 2015
An ethnographic study to assess the enactment of information security culture in a retail store.
Proceedings of the 2015 World Congress on Internet Security, 2015
The Relationship Between Privacy, Information Security and the Trustworthiness of a Crowdsourcing System in a Smart City.
Proceedings of the Ninth International Symposium on Human Aspects of Information Security & Assurance, 2015
2014
User Acceptance of Telemedicine by Health Care Workers A Case of the Eastern Cape Province, South Africa.
Electron. J. Inf. Syst. Dev. Ctries., 2014
Comput. Secur., 2014
Proceedings of the 2014 World Congress on Internet Security, 2014
The risk relationship between trust and information sharing in automotive supply chains.
Proceedings of the 2014 World Congress on Internet Security, 2014
Information security in a public safety, participatory crowdsourcing smart city project.
Proceedings of the 2014 World Congress on Internet Security, 2014
Proceedings of the Internet of Things. IoT Infrastructures, 2014
Information Security Policy Development and Implementation: A Content Analysis Approach.
Proceedings of the Eighth International Symposium on Human Aspects of Information Security & Assurance, 2014
Proceedings of the Eighth International Symposium on Human Aspects of Information Security & Assurance, 2014
2013
Using Participatory Crowdsourcing in South Africa to Create a Safer Living Environment.
Int. J. Distributed Sens. Networks, 2013
2012
Proceedings of the 2012 Information Security for South Africa, 2012
The enemy within: A behavioural intention model and an information security awareness process.
Proceedings of the 2012 Information Security for South Africa, 2012
Proceedings of the Advances in Digital Forensics VIII, 2012
Principal Causes of Information Communication Technology (ICT) Risk Failure in an SME.
Proceedings of the 2012 ASE International Conference on Cyber Security, 2012
2011
Proceedings of the Information Security South Africa Conference 2011, 2011
Proceedings of the Information Security South Africa Conference 2011, 2011
Online Social Networks: Enhancing user trust through effective controls and identity management.
Proceedings of the Information Security South Africa Conference 2011, 2011
Proceedings of the Information Security South Africa Conference 2011, 2011
Proceedings of the Information Security South Africa Conference 2011, 2011
2010
Proceedings of the Information Security South Africa Conference 2010, 2010
Proceedings of the Information Security South Africa Conference 2010, 2010
A Conceptual Operational Risk Model for SMEs: Impact on Organisational Information Technology.
Proceedings of the Information Security South Africa Conference 2010, 2010
Proceedings of the South African Information Security Multi-Conference, 2010
2008
Proceedings of the 2008 Annual Conference of the South African Institute of Computer Scientists and Information Technologists on IT Research in Developing Countries, 2008
Proceedings of the ISSA 2008 Innovative Minds Conference, 2008
2007
Identification Now and in the Future: Social Grant Distribution Process in South Africa.
Proceedings of the New Approaches for Security, 2007
Identity and access management for the distribution of social grants in South Africa.
Proceedings of the 2007 Annual Conference of the South African Institute of Computer Scientists and Information Technologists on IT Research in Developing Countries, 2007
2006
Proceedings of the Security and Privacy in Dynamic Environments, 2006
2005
Real-time information integrity = system integrity + data integrity + continuous assurances.
Comput. Secur., 2005