Effects of electronic health record implementation and barriers to adoption and use: a scoping review and qualitative analysis of the content CH Tsai, A Eghdam, N Davoody, G Wright, S Flowerday, S Koch Life 10 (12), 327, 2020 | 186 | 2020 |
Information security policy development and implementation: The what, how and who SV Flowerday, T Tuyikeze Computers & Security 61, 169-183, 2016 | 169 | 2016 |
Continuous auditing technologies and models: A discussion S Flowerday, AW Blundell, R Von Solms Computers & Security 25 (5), 325-331, 2006 | 151 | 2006 |
Smartphone information security awareness: A victim of operational pressures S Allam, SV Flowerday, E Flowerday Computers & Security 42, 56-65, 2014 | 133 | 2014 |
Susceptibility to phishing on social network sites: A personality information processing model ED Frauenstein, S Flowerday Computers & Security 94, 101862, 2020 | 123 | 2020 |
Real-time information integrity= system integrity+ data integrity+ continuous assurances S Flowerday, R Von Solms Computers & Security 24 (8), 604-613, 2005 | 112 | 2005 |
Ignorance to awareness: Towards an information security awareness process T Gundu, SV Flowerday SAIEE Africa Research Journal 104 (2), 69-79, 2013 | 110* | 2013 |
An assessment of the role of cultural factors in information security awareness HA Kruger, L Drevin, S Flowerday, T Steyn 2011 Information Security for South Africa, 1-7, 2011 | 84* | 2011 |
Continuous auditing: verifying information integrity and providing assurances for financial reports S Flowerday, R Von Solms Computer Fraud & Security, 12-16, 2005 | 63 | 2005 |
Is the responsibilization of the cyber security risk reasonable and judicious? K Renaud, S Flowerday, M Warkentin, P Cockshott, C Orgeron Computers & Security 78, 198-211, 2018 | 60 | 2018 |
Duplicitous social media and data surveillance: An evaluation of privacy risk K Van der Schyff, S Flowerday, S Furnell Computers & Security 94, 101822, 2020 | 56 | 2020 |
Successful IT governance in SMES: an application of the Technology-Organisation-Environment theory O Olutoyin, S Flowerday South African Journal of Information Management 18 (1), 1-8, 2016 | 54 | 2016 |
Health information systems to improve health care: A telemedicine case study L Cilliers, SV Flowerday South African Journal of Information Management 15 (1), 5, 2013 | 51 | 2013 |
Information Security Behaviour Profiling Framework (ISBPF) for student mobile phone users B Ngoqo, SV Flowerday Computers & Security 53, 132-142, 2015 | 46 | 2015 |
Trust: An element of information security S Flowerday, R Von Solms IFIP International Information Security Conference, 87-98, 2006 | 46 | 2006 |
Information security in a public safety, participatory crowdsourcing smart city project L Cilliers, S Flowerday World Congress on Internet Security (WorldCIS-2014), 36-41, 2014 | 43* | 2014 |
User acceptance of telemedicine by health care workers a case of the eastern cape province, South Africa L Cilliers, S Flowerday The Electronic Journal of Information Systems in Developing Countries 65 (1 …, 2014 | 43 | 2014 |
Exploring the relationship between student mobile information security awareness and behavioural intent B Ngoqo, SV Flowerday Information & Computer Security 23 (4), 406-420, 2015 | 41* | 2015 |
Contributing factors to increased susceptibility to social media phishing attacks HJ Parker, SV Flowerday South African Journal of Information Management 22 (1), 1-10, 2020 | 39 | 2020 |
Absorptive capacity: Relevancy for large and small enterprises JR Ndiege, ME Herselman, SV Flowerday South African Journal of Information Management (SAJIM) 14 (1), 1-9, 2012 | 39 | 2012 |