关注
Karl van der Schyff
Karl van der Schyff
Cybersecurity Lecturer
在 abertay.ac.uk 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Duplicitous social media and data surveillance: An evaluation of privacy risk
K Van der Schyff, S Flowerday, S Furnell
Computers & Security 94, 101822, 2020
562020
Higher education cloud computing in South Africa: towards understanding trust and adoption issues
K Van Der Schyff, KEM Krauss
South African Computer Journal 55 (1), 40-55, 2014
442014
Information privacy behavior in the use of Facebook apps: A personality-based vulnerability assessment
K van der Schyff, S Flowerday, PB Lowry
Heliyon 6 (8), 2020
252020
Business process models of blockchain and South African real estate transactions
JL Tilbury, E de la Rey, K van der Schyff
2019 International conference on advances in big data, computing and data …, 2019
252019
Mediating effects of information security awareness
K van der Schyff, S Flowerday
Computers & Security 106, 102313, 2021
222021
Investigating the mediating effects of phubbing on self-presentation and FoMO within the context of excessive Instagram use
K van der Schyff, K Renaud, JP Townes, N Tshiqi
Cogent Psychology 9 (1), 2062879, 2022
142022
Intensity of Facebook use: a personality-based perspective on dependency formation
K Van der Schyff, S Flowerday, H Kruger, N Patel
Behaviour & Information Technology 41 (1), 198-214, 2022
142022
Privacy risk and the use of Facebook apps: A gender-focused vulnerability assessment
K van der Schyff, S Flowerday, S Furnell
Computers & Security 96, 101866, 2020
142020
The mediating role of perceived risks and benefits when self-disclosing: A study of social media trust and FoMO
K van der Schyff, S Flowerday
Computers & Security 126, 103071, 2023
122023
Social media surveillance: A personality-driven behaviour model
S Flowerday, K Van der Schyff
Journal of Economic and Financial Sciences 12 (1), 1-9, 2019
92019
Facebook and dataveillance: demonstrating a multimodal discourse analysis
K Van Der Schyff, K Krauss, J Kroeze
92018
The challenges of cloud adoption among South African small to medium enterprises: A thematic analysis
R Mudzamba, K van der Schyff, K Renaud
The Electronic Journal of Information Systems in Developing Countries 88 (6 …, 2022
52022
VISTA: An inclusive insider threat taxonomy, with mitigation strategies
K Renaud, M Warkentin, G Pogrebna, K van der Schyff
Information & Management 61 (1), 103877, 2024
42024
Online privacy fatigue: a scoping review and research agenda
K Van Der Schyff, G Foster, K Renaud, S Flowerday
Future Internet 15 (5), 164, 2023
42023
Socially desirable responding within the context of privacy-related research: A personality perspective
K van der Schyff, S Flowerday, K Renaud
South African Journal of Information Management 24 (1), 1507, 2022
42022
Modelling the intended use of Facebook privacy settings
K Read, K van der Schyff
South African Journal of Information Management 22 (1), 1-9, 2020
42020
Uncertainty in cyber de-responsibilisation
K Renaud, S Flowerday, K van der Schyff
Computer Fraud & Security 2021 (8), 13-19, 2021
32021
A functional ontology for information systems
YM Motara, K Van der Schyff
South African Computer Journal 31 (2), 57-76, 2019
32019
Would US citizens accept cybersecurity deresponsibilization? Perhaps not
K Renaud, K Van Der Schyff, S MacDonald
Computers & Security 131, 103301, 2023
22023
A functional ontology
YM Motara, K van der Schyff
Proceedings of the Annual Conference of the South African Institute of …, 2018
22018
系统目前无法执行此操作,请稍后再试。
文章 1–20