Прати
Stephen Flowerday
Stephen Flowerday
Professor - School of Cyber Studies
Верификована је имејл адреса на utulsa.edu
Наслов
Навело
Навело
Година
Effects of electronic health record implementation and barriers to adoption and use: a scoping review and qualitative analysis of the content
CH Tsai, A Eghdam, N Davoody, G Wright, S Flowerday, S Koch
Life 10 (12), 327, 2020
2642020
Information security policy development and implementation: The what, how and who
SV Flowerday, T Tuyikeze
Computers & Security 61, 169-183, 2016
1782016
Susceptibility to phishing on social network sites: A personality information processing model
ED Frauenstein, S Flowerday
Computers & Security 94, 101862, 2020
1662020
Continuous auditing technologies and models: A discussion
S Flowerday, AW Blundell, R Von Solms
Computers & Security 25 (5), 325-331, 2006
1492006
Smartphone information security awareness: A victim of operational pressures
S Allam, SV Flowerday, E Flowerday
Computers & Security 42, 56-65, 2014
1342014
Ignorance to awareness: Towards an information security awareness process
T Gundu, SV Flowerday
SAIEE Africa Research Journal 104 (2), 69-79, 2013
117*2013
Real-time information integrity= system integrity+ data integrity+ continuous assurances
S Flowerday, R Von Solms
Computers & Security 24 (8), 604-613, 2005
1152005
An assessment of the role of cultural factors in information security awareness
HA Kruger, L Drevin, S Flowerday, T Steyn
2011 Information Security for South Africa, 1-7, 2011
83*2011
Is the responsibilization of the cyber security risk reasonable and judicious?
K Renaud, S Flowerday, M Warkentin, P Cockshott, C Orgeron
Computers & Security 78, 198-211, 2018
752018
Duplicitous social media and data surveillance: An evaluation of privacy risk
K Van der Schyff, S Flowerday, S Furnell
Computers & Security 94, 101822, 2020
632020
Continuous auditing: verifying information integrity and providing assurances for financial reports
S Flowerday, R Von Solms
Computer Fraud & Security, 12-16, 2005
632005
Successful IT governance in SMES: an application of the Technology-Organisation-Environment theory
O Olutoyin, S Flowerday
South African Journal of Information Management 18 (1), 1-8, 2016
562016
Contributing factors to increased susceptibility to social media phishing attacks
HJ Parker, SV Flowerday
South African Journal of Information Management 22 (1), 1-10, 2020
522020
Health information systems to improve health care: A telemedicine case study
L Cilliers, SV Flowerday
South African Journal of Information Management 15 (1), 5, 2013
522013
User acceptance of telemedicine by health care workers a case of the eastern cape province, South Africa
L Cilliers, S Flowerday
The Electronic Journal of Information Systems in Developing Countries 65 (1 …, 2014
512014
Information Security Behaviour Profiling Framework (ISBPF) for student mobile phone users
B Ngoqo, SV Flowerday
Computers & Security 53, 132-142, 2015
502015
Trust: An element of information security
S Flowerday, R Von Solms
IFIP International Information Security Conference, 87-98, 2006
462006
Information security in a public safety, participatory crowdsourcing smart city project
L Cilliers, S Flowerday
World Congress on Internet Security (WorldCIS-2014), 36-41, 2014
44*2014
Passphrase and keystroke dynamics authentication: Usable security
B Bhana, S Flowerday
Computers & Security 96, 101925, 2020
432020
The usability of IVRs for smart city crowdsourcing in developing cities
T Breetzke, SV Flowerday
The Electronic Journal of Information Systems in Developing Countries 73 (1 …, 2016
432016
Систем тренутно не може да изврши ову радњу. Пробајте поново касније.
Чланци 1–20