关注
Stephen Flowerday
Stephen Flowerday
Professor - School of Cyber Studies
在 utulsa.edu 的电子邮件经过验证
标题
引用次数
引用次数
年份
Effects of electronic health record implementation and barriers to adoption and use: a scoping review and qualitative analysis of the content
CH Tsai, A Eghdam, N Davoody, G Wright, S Flowerday, S Koch
Life 10 (12), 327, 2020
1862020
Information security policy development and implementation: The what, how and who
SV Flowerday, T Tuyikeze
Computers & Security 61, 169-183, 2016
1692016
Continuous auditing technologies and models: A discussion
S Flowerday, AW Blundell, R Von Solms
Computers & Security 25 (5), 325-331, 2006
1512006
Smartphone information security awareness: A victim of operational pressures
S Allam, SV Flowerday, E Flowerday
Computers & Security 42, 56-65, 2014
1332014
Susceptibility to phishing on social network sites: A personality information processing model
ED Frauenstein, S Flowerday
Computers & Security 94, 101862, 2020
1232020
Real-time information integrity= system integrity+ data integrity+ continuous assurances
S Flowerday, R Von Solms
Computers & Security 24 (8), 604-613, 2005
1122005
Ignorance to awareness: Towards an information security awareness process
T Gundu, SV Flowerday
SAIEE Africa Research Journal 104 (2), 69-79, 2013
110*2013
An assessment of the role of cultural factors in information security awareness
HA Kruger, L Drevin, S Flowerday, T Steyn
2011 Information Security for South Africa, 1-7, 2011
84*2011
Continuous auditing: verifying information integrity and providing assurances for financial reports
S Flowerday, R Von Solms
Computer Fraud & Security, 12-16, 2005
632005
Is the responsibilization of the cyber security risk reasonable and judicious?
K Renaud, S Flowerday, M Warkentin, P Cockshott, C Orgeron
Computers & Security 78, 198-211, 2018
602018
Duplicitous social media and data surveillance: An evaluation of privacy risk
K Van der Schyff, S Flowerday, S Furnell
Computers & Security 94, 101822, 2020
562020
Successful IT governance in SMES: an application of the Technology-Organisation-Environment theory
O Olutoyin, S Flowerday
South African Journal of Information Management 18 (1), 1-8, 2016
542016
Health information systems to improve health care: A telemedicine case study
L Cilliers, SV Flowerday
South African Journal of Information Management 15 (1), 5, 2013
512013
Information Security Behaviour Profiling Framework (ISBPF) for student mobile phone users
B Ngoqo, SV Flowerday
Computers & Security 53, 132-142, 2015
462015
Trust: An element of information security
S Flowerday, R Von Solms
IFIP International Information Security Conference, 87-98, 2006
462006
Information security in a public safety, participatory crowdsourcing smart city project
L Cilliers, S Flowerday
World Congress on Internet Security (WorldCIS-2014), 36-41, 2014
43*2014
User acceptance of telemedicine by health care workers a case of the eastern cape province, South Africa
L Cilliers, S Flowerday
The Electronic Journal of Information Systems in Developing Countries 65 (1 …, 2014
432014
Exploring the relationship between student mobile information security awareness and behavioural intent
B Ngoqo, SV Flowerday
Information & Computer Security 23 (4), 406-420, 2015
41*2015
Contributing factors to increased susceptibility to social media phishing attacks
HJ Parker, SV Flowerday
South African Journal of Information Management 22 (1), 1-10, 2020
392020
Absorptive capacity: Relevancy for large and small enterprises
JR Ndiege, ME Herselman, SV Flowerday
South African Journal of Information Management (SAJIM) 14 (1), 1-9, 2012
392012
系统目前无法执行此操作,请稍后再试。
文章 1–20