default search action
Stephen Flowerday
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j33]Jack Laurie Tilbury, Stephen Flowerday:
Automation Bias and Complacency in Security Operation Centers. Comput. 13(7): 165 (2024) - [j32]Jack Laurie Tilbury, Stephen Flowerday:
Humans and Automation: Augmenting Security Operation Centers. J. Cybersecur. Priv. 4(3): 388-409 (2024) - [c38]Stephen V. Flowerday, James Higgs, Ethan Flowerday, Jack Laurie Tilbury:
Epidemiology Triad Analysis Guiding Malware Control Expenditure. AMCIS 2024 - [c37]Stephen V. Flowerday, Jack Laurie Tilbury, James Higgs:
Cybersecurity in the Age of Uncertainty: A Call for Resilient and Antifragile Systems. AMCIS 2024 - [c36]James Higgs, Stephen V. Flowerday:
Online Video Game Laundering: A Bayesian Trial. AMCIS 2024 - 2023
- [j31]Karl van der Schyff, Stephen Flowerday:
The mediating role of perceived risks and benefits when self-disclosing: A study of social media trust and FoMO. Comput. Secur. 126: 103071 (2023) - [j30]Karl van der Schyff, Greg Foster, Karen Renaud, Stephen Flowerday:
Online Privacy Fatigue: A Scoping Review and Research Agenda. Future Internet 15(5): 164 (2023) - [j29]Edwin Donald Frauenstein, Stephen Flowerday, Syden Mishi, Merrill Warkentin:
Unraveling the behavioral influence of social media on phishing susceptibility: A Personality-Habit-Information Processing model. Inf. Manag. 60(7): 103858 (2023) - 2022
- [j28]Karl van der Schyff, Stephen Flowerday, Hennie A. Kruger, Nikitha Patel:
Intensity of Facebook use: a personality-based perspective on dependency formation. Behav. Inf. Technol. 41(1): 198-214 (2022) - [j27]Aubrey Currin, Stephen Flowerday, Edward de la Rey, Karl van der Schyff, Greg Foster:
A smart city qualitative data analysis model: Participatory crowdsourcing of public safety reports in South Africa. Electron. J. Inf. Syst. Dev. Ctries. 88(6) (2022) - [j26]Bhaveer Bhana, Stephen V. Flowerday:
Usability of the login authentication process: passphrases and passwords. Inf. Comput. Secur. 30(2): 280-305 (2022) - 2021
- [j25]Karl van der Schyff, Stephen Flowerday:
Mediating effects of information security awareness. Comput. Secur. 106: 102313 (2021) - [j24]Heather J. Parker, Stephen Flowerday:
Understanding the disclosure of personal data online. Inf. Comput. Secur. 29(3): 413-434 (2021) - [j23]Tamir Tsegaye, Stephen Flowerday:
A system architecture for ensuring interoperability in a South African national electronic health record system. South Afr. Comput. J. 33(1) (2021) - 2020
- [j22]Pardon Blessings Maoneke, Stephen Flowerday, Naomi Isabirye:
Evaluating the strength of a multilingual passphrase policy. Comput. Secur. 92: 101746 (2020) - [j21]Karl van der Schyff, Stephen Flowerday, Steven Furnell:
Duplicitous social media and data surveillance: An evaluation of privacy risk. Comput. Secur. 94: 101822 (2020) - [j20]Edwin Donald Frauenstein, Stephen Flowerday:
Susceptibility to phishing on social network sites: A personality information processing model. Comput. Secur. 94: 101862 (2020) - [j19]Karl van der Schyff, Stephen Flowerday, Steven Furnell:
Privacy risk and the use of Facebook Apps: A gender-focused vulnerability assessment. Comput. Secur. 96: 101866 (2020) - [j18]Bhaveer Bhana, Stephen Flowerday:
Passphrase and keystroke dynamics authentication: Usable security. Comput. Secur. 96: 101925 (2020) - [j17]Tamir Tsegaye, Stephen Flowerday:
A Clark-Wilson and ANSI role-based access control model. Inf. Comput. Secur. 28(3): 373-395 (2020) - [c35]Pardon Blessings Maoneke, Stephen V. Flowerday, Merrill Warkentin:
Evaluating the Usability of a Multilingual Passphrase Policy. AMCIS 2020
2010 – 2019
- 2019
- [j16]Alfred Musarurwa, Stephen Flowerday, Liezel Cilliers:
The bring-your-own-device unintended administrator: A perspective from Zimbabwe. Electron. J. Inf. Syst. Dev. Ctries. 85(4) (2019) - [c34]Tapiwa Gundu, Stephen Flowerday, Karen Renaud:
Deliver Security Awareness Training, then Repeat: {Deliver; Measure Efficacy}. ICTAS 2019: 1-6 - [c33]Tamir Tsegaye, Stephen Flowerday:
PoPI Compliance through Access Control of Electronic Health Records. SAICSIT 2019: 21:1-21:9 - 2018
- [j15]Karen Renaud, Stephen Flowerday, Merrill Warkentin, Paul Cockshott, Craig P. Orgeron:
Is the responsibilization of the cyber security risk reasonable and judicious? Comput. Secur. 78: 198-211 (2018) - [c32]Alfred Musarurwa, Stephen Flowerday:
The BYOD Information Security Challenge for CIOs. HAISA 2018: 246-262 - [c31]Pardon Blessings Maoneke, Stephen Flowerday:
Password Policies Adopted by South African Organizations: Influential Factors and Weaknesses. ISSA (Revised Selected Papers) 2018: 30-43 - [c30]Pardon Blessings Maoneke, Stephen Flowerday, Naomi Isabirye:
The Influence of Native Language on Password Composition and Security: A Socioculture Theoretical View. SEC 2018: 33-46 - 2017
- [j14]Karen Renaud, Stephen Flowerday:
Human-centred cyber security. J. Inf. Secur. Appl. 34: 1 (2017) - [j13]Karen Renaud, Stephen Flowerday:
Contemplating human-centred security & privacy research: Suggesting future directions. J. Inf. Secur. Appl. 34: 76-81 (2017) - [j12]Liezel Cilliers, Stephen Flowerday:
Factors that influence the usability of a participatory IVR crowdsourcing system in a smart city. South Afr. Comput. J. 29(3) (2017) - 2016
- [j11]Stephen V. Flowerday, Tite Tuyikeze:
Information security policy development and implementation: The what, how and who. Comput. Secur. 61: 169-183 (2016) - [j10]Thayne Breetzke, Stephen V. Flowerday:
The Usability of IVRs for Smart City Crowdsourcing in Developing Cities. Electron. J. Inf. Syst. Dev. Ctries. 73(1): 1-14 (2016) - [j9]Karen Renaud, Stephen Flowerday, Rosanne English, Melanie Volkamer:
Why don't UK citizens protest against privacy-invading dragnet surveillance? Inf. Comput. Secur. 24(4): 400-415 (2016) - [c29]Amanda Gopeni, Ntombovuyo Wayi, Stephen Flowerday:
A feedback loop model to facilitate communication between citizens and local government in Buffalo City. CONF-IRM 2016: 73 - [c28]Liezel Cilliers, Stephen Flowerday, Sean McLean:
A crowdsourcing, smart city model for a developing country. CONF-IRM 2016: 74 - [c27]Edwin Donald Frauenstein, Stephen V. Flowerday:
Social network phishing: Becoming habituated to clicks and ignorant to threats? ISSA 2016: 98-105 - 2015
- [j8]Bukelwa Ngoqo, Stephen V. Flowerday:
Information Security Behaviour Profiling Framework (ISBPF) for student mobile phone users. Comput. Secur. 53: 132-142 (2015) - [j7]Naomi Isabirye, Stephen V. Flowerday, Amit Nanavati, Rossouw von Solms:
Building Technology Trust in a Rural Agricultural e-Marketplace: A User Requirements Perspective. Electron. J. Inf. Syst. Dev. Ctries. 70(1): 1-20 (2015) - [j6]Bukelwa Ngoqo, Stephen V. Flowerday:
Exploring the relationship between student mobile information security awareness and behavioural intent. Inf. Comput. Secur. 23(4): 406-420 (2015) - [c26]Liezel Cilliers, Stephen Flowerday:
The Relationship Between Privacy, Information Security and the Trustworthiness of a Crowdsourcing System in a Smart City. HAISA 2015: 243-255 - [c25]Andrews Greig, Karen Renaud, Stephen Flowerday:
An ethnographic study to assess the enactment of information security culture in a retail store. WorldCIS 2015: 61-66 - [e1]Hein S. Venter, Marianne Loock, Marijke Coetzee, Mariki M. Eloff, Stephen Flowerday:
2015 Information Security for South Africa, ISSA 2015, Johannesburg, South Africa, August 12-13, 2015. IEEE 2015, ISBN 978-1-4799-7755-0 [contents] - 2014
- [j5]Sean Allam, Stephen Flowerday, Ethan Flowerday:
Smartphone information security awareness: A victim of operational pressures. Comput. Secur. 42: 56-65 (2014) - [j4]Liezel Cilliers, Stephen Flowerday:
User Acceptance of Telemedicine by Health Care Workers A Case of the Eastern Cape Province, South Africa. Electron. J. Inf. Syst. Dev. Ctries. 65(1): 1-10 (2014) - [c24]Tite Tuyikeze, Stephen Flowerday:
Information Security Policy Development and Implementation: A Content Analysis Approach. HAISA 2014: 11-20 - [c23]Bukelwa Ngoqo, Stephen Flowerday:
Linking student information security awareness and behavioural intent. HAISA 2014: 162-173 - [c22]Roxanne Piderit, Stephen Flowerday, Sean McLean:
Motivating Citizens to Contribute to the Smart City: A Public Safety Case Study. IoT360 (2) 2014: 131-136 - [c21]Tamir Tsegaye, Stephen Flowerday:
Controls for protecting critical information infrastructure from cyberattacks. WorldCIS 2014: 24-29 - [c20]Liezel Cilliers, Stephen Flowerday:
Information security in a public safety, participatory crowdsourcing smart city project. WorldCIS 2014: 36-41 - [c19]Roxanne Piderit, Stephen Flowerday:
The risk relationship between trust and information sharing in automotive supply chains. WorldCIS 2014: 80-85 - 2013
- [j3]Bhaveer Bhana, Stephen Flowerday, Aharon Satt:
Using Participatory Crowdsourcing in South Africa to Create a Safer Living Environment. Int. J. Distributed Sens. Networks 9 (2013) - 2012
- [c18]Anass Bayaga, Stephen Flowerday:
Principal Causes of Information Communication Technology (ICT) Risk Failure in an SME. CyberSecurity 2012: 152-156 - [c17]Himal Lalla, Stephen Flowerday, Tendai Sanyamahwe, Paul Tarwireyi:
A Log File Digital Forensic Model. IFIP Int. Conf. Digital Forensics 2012: 247-259 - [c16]Tapiwa Gundu, Stephen Flowerday:
The enemy within: A behavioural intention model and an information security awareness process. ISSA 2012: 1-8 - [c15]Sobhana Rama, Stephen Flowerday, Duane Boucher:
Information confidentiality and the Chinese Wall Model in Government tender fraud. ISSA 2012: 1-8 - 2011
- [c14]Sean Allam, Stephen Flowerday:
An adaptation of the awareness boundary model towards smartphone security. ISSA 2011 - [c13]Duane Boucher, Stephen Flowerday:
Privacy: In pursuit of Information security awareness. ISSA 2011 - [c12]Ryan Galpin, Stephen Flowerday:
Online Social Networks: Enhancing user trust through effective controls and identity management. ISSA 2011 - [c11]Hennie A. Kruger, Stephen Flowerday, Lynette Drevin, Tjaart Steyn:
An assessment of the role of cultural factors in information security awareness. ISSA 2011 - [c10]Paul Tarwireyi, Stephen Flowerday, Anass Bayaga:
Information Security Competence Test with Regards to Password Management. ISSA 2011 - 2010
- [c9]Stephen Flowerday, Sean Allam:
A model to measure the maturity of smartphone security at software consultancies. SAISMC 2010: 110-121 - [c8]Anass Bayaga, Stephen Flowerday:
A Conceptual Operational Risk Model for SMEs: Impact on Organisational Information Technology. ISSA 2010 - [c7]Himal Lalla, Stephen Flowerday:
Towards a Standardised Digital Forensic Process: E-mail Forensics. ISSA 2010 - [c6]Greg Megaw, Stephen Flowerday:
Phishing within E-Commerce: A Trust and Confidence Game. ISSA 2010
2000 – 2009
- 2008
- [c5]Matthew Deas, Stephen Flowerday:
A User Centric Model for Online Identity and Access Management. ISSA 2008: 1-21 - [c4]Naomi Isabirye, Stephen Flowerday:
A model for eliciting user requirements specific to South African rural areas. SAICSIT 2008: 124-130 - 2007
- [c3]Gideon Ranga, Stephen Flowerday:
Identity and access management for the distribution of social grants in South Africa. SAICSIT 2007: 125-131 - [c2]Stephen Flowerday, Gideon Ranga:
Identification Now and in the Future: Social Grant Distribution Process in South Africa. SEC 2007: 457-459 - 2006
- [j2]Stephen Flowerday, A. W. Blundell, Rossouw von Solms:
Continuous auditing technologies and models: A discussion. Comput. Secur. 25(5): 325-331 (2006) - [c1]Stephen Flowerday, Rossouw von Solms:
Trust: An Element of Information Security. SEC 2006: 87-98 - 2005
- [j1]Stephen Flowerday, Rossouw von Solms:
Real-time information integrity = system integrity + data integrity + continuous assurances. Comput. Secur. 24(8): 604-613 (2005)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-16 20:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint