BibTeX records: Stephen Flowerday

download as .bib file

@article{DBLP:journals/compsec/SchyffF23,
  author       = {Karl van der Schyff and
                  Stephen Flowerday},
  title        = {The mediating role of perceived risks and benefits when self-disclosing:
                  {A} study of social media trust and FoMO},
  journal      = {Comput. Secur.},
  volume       = {126},
  pages        = {103071},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103071},
  doi          = {10.1016/J.COSE.2022.103071},
  timestamp    = {Wed, 21 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SchyffF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fi/SchyffFRF23,
  author       = {Karl van der Schyff and
                  Greg Foster and
                  Karen Renaud and
                  Stephen Flowerday},
  title        = {Online Privacy Fatigue: {A} Scoping Review and Research Agenda},
  journal      = {Future Internet},
  volume       = {15},
  number       = {5},
  pages        = {164},
  year         = {2023},
  url          = {https://doi.org/10.3390/fi15050164},
  doi          = {10.3390/FI15050164},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fi/SchyffFRF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iam/FrauensteinFMW23,
  author       = {Edwin Donald Frauenstein and
                  Stephen Flowerday and
                  Syden Mishi and
                  Merrill Warkentin},
  title        = {Unraveling the behavioral influence of social media on phishing susceptibility:
                  {A} Personality-Habit-Information Processing model},
  journal      = {Inf. Manag.},
  volume       = {60},
  number       = {7},
  pages        = {103858},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.im.2023.103858},
  doi          = {10.1016/J.IM.2023.103858},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iam/FrauensteinFMW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/behaviourIT/SchyffFKP22,
  author       = {Karl van der Schyff and
                  Stephen Flowerday and
                  Hennie A. Kruger and
                  Nikitha Patel},
  title        = {Intensity of Facebook use: a personality-based perspective on dependency
                  formation},
  journal      = {Behav. Inf. Technol.},
  volume       = {41},
  number       = {1},
  pages        = {198--214},
  year         = {2022},
  url          = {https://doi.org/10.1080/0144929x.2020.1800095},
  doi          = {10.1080/0144929X.2020.1800095},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/behaviourIT/SchyffFKP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisdc/CurrinFRSF22,
  author       = {Aubrey Currin and
                  Stephen Flowerday and
                  Edward de la Rey and
                  Karl van der Schyff and
                  Greg Foster},
  title        = {A smart city qualitative data analysis model: Participatory crowdsourcing
                  of public safety reports in South Africa},
  journal      = {Electron. J. Inf. Syst. Dev. Ctries.},
  volume       = {88},
  number       = {6},
  year         = {2022},
  url          = {https://doi.org/10.1002/isd2.12232},
  doi          = {10.1002/ISD2.12232},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisdc/CurrinFRSF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/BhanaF22,
  author       = {Bhaveer Bhana and
                  Stephen V. Flowerday},
  title        = {Usability of the login authentication process: passphrases and passwords},
  journal      = {Inf. Comput. Secur.},
  volume       = {30},
  number       = {2},
  pages        = {280--305},
  year         = {2022},
  url          = {https://doi.org/10.1108/ICS-07-2021-0093},
  doi          = {10.1108/ICS-07-2021-0093},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/BhanaF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SchyffF21,
  author       = {Karl van der Schyff and
                  Stephen Flowerday},
  title        = {Mediating effects of information security awareness},
  journal      = {Comput. Secur.},
  volume       = {106},
  pages        = {102313},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102313},
  doi          = {10.1016/J.COSE.2021.102313},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SchyffF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ParkerF21,
  author       = {Heather J. Parker and
                  Stephen Flowerday},
  title        = {Understanding the disclosure of personal data online},
  journal      = {Inf. Comput. Secur.},
  volume       = {29},
  number       = {3},
  pages        = {413--434},
  year         = {2021},
  url          = {https://doi.org/10.1108/ICS-10-2020-0168},
  doi          = {10.1108/ICS-10-2020-0168},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ParkerF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MaonekeFI20,
  author       = {Pardon Blessings Maoneke and
                  Stephen Flowerday and
                  Naomi Isabirye},
  title        = {Evaluating the strength of a multilingual passphrase policy},
  journal      = {Comput. Secur.},
  volume       = {92},
  pages        = {101746},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101746},
  doi          = {10.1016/J.COSE.2020.101746},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MaonekeFI20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SchyffFF20,
  author       = {Karl van der Schyff and
                  Stephen Flowerday and
                  Steven Furnell},
  title        = {Duplicitous social media and data surveillance: An evaluation of privacy
                  risk},
  journal      = {Comput. Secur.},
  volume       = {94},
  pages        = {101822},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101822},
  doi          = {10.1016/J.COSE.2020.101822},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SchyffFF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/FrauensteinF20,
  author       = {Edwin Donald Frauenstein and
                  Stephen Flowerday},
  title        = {Susceptibility to phishing on social network sites: {A} personality
                  information processing model},
  journal      = {Comput. Secur.},
  volume       = {94},
  pages        = {101862},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101862},
  doi          = {10.1016/J.COSE.2020.101862},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/FrauensteinF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SchyffFF20a,
  author       = {Karl van der Schyff and
                  Stephen Flowerday and
                  Steven Furnell},
  title        = {Privacy risk and the use of Facebook Apps: {A} gender-focused vulnerability
                  assessment},
  journal      = {Comput. Secur.},
  volume       = {96},
  pages        = {101866},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101866},
  doi          = {10.1016/J.COSE.2020.101866},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SchyffFF20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BhanaF20,
  author       = {Bhaveer Bhana and
                  Stephen Flowerday},
  title        = {Passphrase and keystroke dynamics authentication: Usable security},
  journal      = {Comput. Secur.},
  volume       = {96},
  pages        = {101925},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101925},
  doi          = {10.1016/J.COSE.2020.101925},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BhanaF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/TsegayeF20,
  author       = {Tamir Tsegaye and
                  Stephen Flowerday},
  title        = {A Clark-Wilson and {ANSI} role-based access control model},
  journal      = {Inf. Comput. Secur.},
  volume       = {28},
  number       = {3},
  pages        = {373--395},
  year         = {2020},
  url          = {https://doi.org/10.1108/ICS-08-2019-0100},
  doi          = {10.1108/ICS-08-2019-0100},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/TsegayeF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/MaonekeFW20,
  author       = {Pardon Blessings Maoneke and
                  Stephen V. Flowerday and
                  Merrill Warkentin},
  editor       = {Bonnie Brinton Anderson and
                  Jason Thatcher and
                  Rayman D. Meservy and
                  Kathy Chudoba and
                  Kelly J. Fadel and
                  Sue Brown},
  title        = {Evaluating the Usability of a Multilingual Passphrase Policy},
  booktitle    = {26th Americas Conference on Information Systems, {AMCIS} 2020, Virtual
                  Conference, August 15-17, 2020},
  publisher    = {Association for Information Systems},
  year         = {2020},
  url          = {https://aisel.aisnet.org/amcis2020/info\_security\_privacy/info\_security\_privacy/19},
  timestamp    = {Mon, 27 Jul 2020 19:06:34 +0200},
  biburl       = {https://dblp.org/rec/conf/amcis/MaonekeFW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisdc/MusarurwaFC19,
  author       = {Alfred Musarurwa and
                  Stephen Flowerday and
                  Liezel Cilliers},
  title        = {The bring-your-own-device unintended administrator: {A} perspective
                  from Zimbabwe},
  journal      = {Electron. J. Inf. Syst. Dev. Ctries.},
  volume       = {85},
  number       = {4},
  year         = {2019},
  url          = {https://doi.org/10.1002/isd2.12076},
  doi          = {10.1002/ISD2.12076},
  timestamp    = {Thu, 22 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisdc/MusarurwaFC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ictas/GunduFR19,
  author       = {Tapiwa Gundu and
                  Stephen Flowerday and
                  Karen Renaud},
  title        = {Deliver Security Awareness Training, then Repeat: \{Deliver; Measure
                  Efficacy\}},
  booktitle    = {Conference on Information Communications Technology and Society, {ICTAS}
                  2019, Durban, South Africa, March 6-8, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICTAS.2019.8703523},
  doi          = {10.1109/ICTAS.2019.8703523},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ictas/GunduFR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/saicsit/TsegayeF19,
  author       = {Tamir Tsegaye and
                  Stephen Flowerday},
  editor       = {Carina de Villiers and
                  Hanlie Smuts},
  title        = {PoPI Compliance through Access Control of Electronic Health Records},
  booktitle    = {Proceedings of the South African Institute of Computer Scientists
                  and Information Technologists, {SAICSIT} 2019, Skukuza, South Africa,
                  September 17-18, 2019},
  pages        = {21:1--21:9},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3351108.3351130},
  doi          = {10.1145/3351108.3351130},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/saicsit/TsegayeF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RenaudFWCO18,
  author       = {Karen Renaud and
                  Stephen Flowerday and
                  Merrill Warkentin and
                  Paul Cockshott and
                  Craig P. Orgeron},
  title        = {Is the responsibilization of the cyber security risk reasonable and
                  judicious?},
  journal      = {Comput. Secur.},
  volume       = {78},
  pages        = {198--211},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2018.06.006},
  doi          = {10.1016/J.COSE.2018.06.006},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/RenaudFWCO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/haisa/MusarurwaF18,
  author       = {Alfred Musarurwa and
                  Stephen Flowerday},
  editor       = {Nathan L. Clarke and
                  Steven Furnell},
  title        = {The {BYOD} Information Security Challenge for CIOs},
  booktitle    = {Twelfth International Symposium on Human Aspects of Information Security
                  {\&} Assurance, {HAISA} 2018, Dundee, Scotland, UK, August 29-31,
                  2018, Proceedings},
  pages        = {246--262},
  publisher    = {University of Plymouth},
  year         = {2018},
  url          = {https://www.cscan.org/?page=openaccess\&\#38;eid=20\&\#38;id=394},
  timestamp    = {Wed, 14 Aug 2019 18:43:23 +0200},
  biburl       = {https://dblp.org/rec/conf/haisa/MusarurwaF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/MaonekeF18,
  author       = {Pardon Blessings Maoneke and
                  Stephen Flowerday},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Jan H. P. Eloff},
  title        = {Password Policies Adopted by South African Organizations: Influential
                  Factors and Weaknesses},
  booktitle    = {Information Security - 17th International Conference, {ISSA} 2018,
                  Pretoria, South Africa, August 15-16, 2018, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {973},
  pages        = {30--43},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-11407-7\_3},
  doi          = {10.1007/978-3-030-11407-7\_3},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/MaonekeF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/MaonekeFI18,
  author       = {Pardon Blessings Maoneke and
                  Stephen Flowerday and
                  Naomi Isabirye},
  editor       = {Lech Jan Janczewski and
                  Miroslaw Kutylowski},
  title        = {The Influence of Native Language on Password Composition and Security:
                  {A} Socioculture Theoretical View},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 33rd {IFIP} {TC} 11
                  International Conference, {SEC} 2018, Held at the 24th {IFIP} World
                  Computer Congress, {WCC} 2018, Poznan, Poland, September 18-20, 2018,
                  Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {529},
  pages        = {33--46},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99828-2\_3},
  doi          = {10.1007/978-3-319-99828-2\_3},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/MaonekeFI18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/RenaudF17,
  author       = {Karen Renaud and
                  Stephen Flowerday},
  title        = {Human-centred cyber security},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {34},
  pages        = {1},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.jisa.2017.05.007},
  doi          = {10.1016/J.JISA.2017.05.007},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/RenaudF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/RenaudF17a,
  author       = {Karen Renaud and
                  Stephen Flowerday},
  title        = {Contemplating human-centred security {\&} privacy research: Suggesting
                  future directions},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {34},
  pages        = {76--81},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.jisa.2017.05.006},
  doi          = {10.1016/J.JISA.2017.05.006},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/RenaudF17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/saj/CilliersF17,
  author       = {Liezel Cilliers and
                  Stephen Flowerday},
  title        = {Factors that influence the usability of a participatory {IVR} crowdsourcing
                  system in a smart city},
  journal      = {South Afr. Comput. J.},
  volume       = {29},
  number       = {3},
  year         = {2017},
  url          = {https://doi.org/10.18489/sacj.v29i3.422},
  doi          = {10.18489/SACJ.V29I3.422},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/saj/CilliersF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/FlowerdayT16,
  author       = {Stephen V. Flowerday and
                  Tite Tuyikeze},
  title        = {Information security policy development and implementation: The what,
                  how and who},
  journal      = {Comput. Secur.},
  volume       = {61},
  pages        = {169--183},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.cose.2016.06.002},
  doi          = {10.1016/J.COSE.2016.06.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/FlowerdayT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisdc/BreetzkeF16,
  author       = {Thayne Breetzke and
                  Stephen V. Flowerday},
  title        = {The Usability of IVRs for Smart City Crowdsourcing in Developing Cities},
  journal      = {Electron. J. Inf. Syst. Dev. Ctries.},
  volume       = {73},
  number       = {1},
  pages        = {1--14},
  year         = {2016},
  url          = {https://doi.org/10.1002/j.1681-4835.2016.tb00527.x},
  doi          = {10.1002/J.1681-4835.2016.TB00527.X},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejisdc/BreetzkeF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/RenaudFEV16,
  author       = {Karen Renaud and
                  Stephen Flowerday and
                  Rosanne English and
                  Melanie Volkamer},
  title        = {Why don't {UK} citizens protest against privacy-invading dragnet surveillance?},
  journal      = {Inf. Comput. Secur.},
  volume       = {24},
  number       = {4},
  pages        = {400--415},
  year         = {2016},
  url          = {https://doi.org/10.1108/ICS-06-2015-0024},
  doi          = {10.1108/ICS-06-2015-0024},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/RenaudFEV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/conf-irm/GopeniWF16,
  author       = {Amanda Gopeni and
                  Ntombovuyo Wayi and
                  Stephen Flowerday},
  title        = {A feedback loop model to facilitate communication between citizens
                  and local government in Buffalo City},
  booktitle    = {{CONF-IRM} 2016, The International Conference on Information Resources
                  Management: Digital Emancipation in a Networked Society, Cape Town,
                  South Africa, May 18-20, 2016},
  pages        = {73},
  year         = {2016},
  url          = {http://aisel.aisnet.org/confirm2016/73},
  timestamp    = {Mon, 07 Nov 2016 15:02:30 +0100},
  biburl       = {https://dblp.org/rec/conf/conf-irm/GopeniWF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/conf-irm/CilliersFM16,
  author       = {Liezel Cilliers and
                  Stephen Flowerday and
                  Sean McLean},
  title        = {A crowdsourcing, smart city model for a developing country},
  booktitle    = {{CONF-IRM} 2016, The International Conference on Information Resources
                  Management: Digital Emancipation in a Networked Society, Cape Town,
                  South Africa, May 18-20, 2016},
  pages        = {74},
  year         = {2016},
  url          = {http://aisel.aisnet.org/confirm2016/74},
  timestamp    = {Mon, 07 Nov 2016 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/conf-irm/CilliersFM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/FrauensteinF16,
  author       = {Edwin Donald Frauenstein and
                  Stephen V. Flowerday},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Jan H. P. Eloff},
  title        = {Social network phishing: Becoming habituated to clicks and ignorant
                  to threats?},
  booktitle    = {2016 Information Security for South Africa, {ISSA} 2016, Johannesburg,
                  South Africa, August 17-18, 2016},
  pages        = {98--105},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ISSA.2016.7802935},
  doi          = {10.1109/ISSA.2016.7802935},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/FrauensteinF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/NgoqoF15,
  author       = {Bukelwa Ngoqo and
                  Stephen V. Flowerday},
  title        = {Information Security Behaviour Profiling Framework {(ISBPF)} for student
                  mobile phone users},
  journal      = {Comput. Secur.},
  volume       = {53},
  pages        = {132--142},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.cose.2015.05.011},
  doi          = {10.1016/J.COSE.2015.05.011},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/NgoqoF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisdc/IsabiryeFNS15,
  author       = {Naomi Isabirye and
                  Stephen V. Flowerday and
                  Amit Nanavati and
                  Rossouw von Solms},
  title        = {Building Technology Trust in a Rural Agricultural e-Marketplace: {A}
                  User Requirements Perspective},
  journal      = {Electron. J. Inf. Syst. Dev. Ctries.},
  volume       = {70},
  number       = {1},
  pages        = {1--20},
  year         = {2015},
  url          = {https://doi.org/10.1002/j.1681-4835.2015.tb00504.x},
  doi          = {10.1002/J.1681-4835.2015.TB00504.X},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejisdc/IsabiryeFNS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/NgoqoF15,
  author       = {Bukelwa Ngoqo and
                  Stephen V. Flowerday},
  title        = {Exploring the relationship between student mobile information security
                  awareness and behavioural intent},
  journal      = {Inf. Comput. Secur.},
  volume       = {23},
  number       = {4},
  pages        = {406--420},
  year         = {2015},
  url          = {https://doi.org/10.1108/ICS-10-2014-0072},
  doi          = {10.1108/ICS-10-2014-0072},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/NgoqoF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/haisa/CilliersF15,
  author       = {Liezel Cilliers and
                  Stephen Flowerday},
  editor       = {Steven Furnell and
                  Nathan L. Clarke},
  title        = {The Relationship Between Privacy, Information Security and the Trustworthiness
                  of a Crowdsourcing System in a Smart City},
  booktitle    = {Ninth International Symposium on Human Aspects of Information Security
                  {\&} Assurance, {HAISA} 2015 ,Lesvos, Greece, July 1-3, 2015,
                  Proceedings},
  pages        = {243--255},
  publisher    = {University of Plymouth},
  year         = {2015},
  url          = {http://www.cscan.org/openaccess/?paperid=274},
  timestamp    = {Tue, 06 Jul 2021 12:22:17 +0200},
  biburl       = {https://dblp.org/rec/conf/haisa/CilliersF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/worldcis/GreigRF15,
  author       = {Andrews Greig and
                  Karen Renaud and
                  Stephen Flowerday},
  title        = {An ethnographic study to assess the enactment of information security
                  culture in a retail store},
  booktitle    = {2015 World Congress on Internet Security, WorldCIS 2015, Dublin, Ireland,
                  October 19-21, 2015},
  pages        = {61--66},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WorldCIS.2015.7359415},
  doi          = {10.1109/WORLDCIS.2015.7359415},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/worldcis/GreigRF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/issa/2015,
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee and
                  Mariki M. Eloff and
                  Stephen Flowerday},
  title        = {2015 Information Security for South Africa, {ISSA} 2015, Johannesburg,
                  South Africa, August 12-13, 2015},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7328027/proceeding},
  isbn         = {978-1-4799-7755-0},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AllamFF14,
  author       = {Sean Allam and
                  Stephen Flowerday and
                  Ethan Flowerday},
  title        = {Smartphone information security awareness: {A} victim of operational
                  pressures},
  journal      = {Comput. Secur.},
  volume       = {42},
  pages        = {56--65},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.cose.2014.01.005},
  doi          = {10.1016/J.COSE.2014.01.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AllamFF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisdc/CilliersF14,
  author       = {Liezel Cilliers and
                  Stephen Flowerday},
  title        = {User Acceptance of Telemedicine by Health Care Workers {A} Case of
                  the Eastern Cape Province, South Africa},
  journal      = {Electron. J. Inf. Syst. Dev. Ctries.},
  volume       = {65},
  number       = {1},
  pages        = {1--10},
  year         = {2014},
  url          = {https://doi.org/10.1002/j.1681-4835.2014.tb00467.x},
  doi          = {10.1002/J.1681-4835.2014.TB00467.X},
  timestamp    = {Mon, 14 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejisdc/CilliersF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/haisa/TuyikezeF14,
  author       = {Tite Tuyikeze and
                  Stephen Flowerday},
  editor       = {Nathan L. Clarke and
                  Steven Furnell},
  title        = {Information Security Policy Development and Implementation: {A} Content
                  Analysis Approach},
  booktitle    = {Eighth International Symposium on Human Aspects of Information Security
                  {\&} Assurance, {HAISA} 2014 ,Plymouth, UK, July 8-9, 2014. Proceedings},
  pages        = {11--20},
  publisher    = {University of Plymouth},
  year         = {2014},
  url          = {http://www.cscan.org/openaccess/?paperid=233},
  timestamp    = {Tue, 06 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/haisa/TuyikezeF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/haisa/NgoqoF14,
  author       = {Bukelwa Ngoqo and
                  Stephen Flowerday},
  editor       = {Nathan L. Clarke and
                  Steven Furnell},
  title        = {Linking student information security awareness and behavioural intent},
  booktitle    = {Eighth International Symposium on Human Aspects of Information Security
                  {\&} Assurance, {HAISA} 2014 ,Plymouth, UK, July 8-9, 2014. Proceedings},
  pages        = {162--173},
  publisher    = {University of Plymouth},
  year         = {2014},
  url          = {http://www.cscan.org/openaccess/?paperid=240},
  timestamp    = {Tue, 06 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/haisa/NgoqoF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iot360/PideritFM14,
  author       = {Roxanne Piderit and
                  Stephen Flowerday and
                  Sean McLean},
  editor       = {Raffaele Giaffreda and
                  Dagmar Cag{\'{a}}nov{\'{a}} and
                  Yong Li and
                  Roberto Riggio and
                  Agn{\`{e}}s Voisard},
  title        = {Motivating Citizens to Contribute to the Smart City: {A} Public Safety
                  Case Study},
  booktitle    = {Internet of Things. IoT Infrastructures - First International Summit,
                  IoT360 2014, Rome, Italy, October 27-28, 2014, Revised Selected Papers,
                  Part {II}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {151},
  pages        = {131--136},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-19743-2\_20},
  doi          = {10.1007/978-3-319-19743-2\_20},
  timestamp    = {Fri, 27 Mar 2020 08:54:59 +0100},
  biburl       = {https://dblp.org/rec/conf/iot360/PideritFM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/worldcis/TsegayeF14,
  author       = {Tamir Tsegaye and
                  Stephen Flowerday},
  title        = {Controls for protecting critical information infrastructure from cyberattacks},
  booktitle    = {2014 World Congress on Internet Security, WorldCIS 2014, London, United
                  Kingdom, December 8-10, 2014},
  pages        = {24--29},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/WorldCIS.2014.7028160},
  doi          = {10.1109/WORLDCIS.2014.7028160},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/worldcis/TsegayeF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/worldcis/CilliersF14,
  author       = {Liezel Cilliers and
                  Stephen Flowerday},
  title        = {Information security in a public safety, participatory crowdsourcing
                  smart city project},
  booktitle    = {2014 World Congress on Internet Security, WorldCIS 2014, London, United
                  Kingdom, December 8-10, 2014},
  pages        = {36--41},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/WorldCIS.2014.7028163},
  doi          = {10.1109/WORLDCIS.2014.7028163},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/worldcis/CilliersF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/worldcis/PideritF14,
  author       = {Roxanne Piderit and
                  Stephen Flowerday},
  title        = {The risk relationship between trust and information sharing in automotive
                  supply chains},
  booktitle    = {2014 World Congress on Internet Security, WorldCIS 2014, London, United
                  Kingdom, December 8-10, 2014},
  pages        = {80--85},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/WorldCIS.2014.7028171},
  doi          = {10.1109/WORLDCIS.2014.7028171},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/worldcis/PideritF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/BhanaFS13,
  author       = {Bhaveer Bhana and
                  Stephen Flowerday and
                  Aharon Satt},
  title        = {Using Participatory Crowdsourcing in South Africa to Create a Safer
                  Living Environment},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {9},
  year         = {2013},
  url          = {https://doi.org/10.1155/2013/907196},
  doi          = {10.1155/2013/907196},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/BhanaFS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecurity/BayagaF12,
  author       = {Anass Bayaga and
                  Stephen Flowerday},
  title        = {Principal Causes of Information Communication Technology {(ICT)} Risk
                  Failure in an {SME}},
  booktitle    = {2012 {ASE} International Conference on Cyber Security, Alexandria,
                  VA, USA, December 14-16, 2012},
  pages        = {152--156},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSecurity.2012.26},
  doi          = {10.1109/CYBERSECURITY.2012.26},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersecurity/BayagaF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-9/LallaFST12,
  author       = {Himal Lalla and
                  Stephen Flowerday and
                  Tendai Sanyamahwe and
                  Paul Tarwireyi},
  editor       = {Gilbert L. Peterson and
                  Sujeet Shenoi},
  title        = {A Log File Digital Forensic Model},
  booktitle    = {Advances in Digital Forensics {VIII} - 8th {IFIP} {WG} 11.9 International
                  Conference on Digital Forensics, Pretoria, South Africa, January 3-5,
                  2012, Revised Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {383},
  pages        = {247--259},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33962-2\_17},
  doi          = {10.1007/978-3-642-33962-2\_17},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-9/LallaFST12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/GunduF12,
  author       = {Tapiwa Gundu and
                  Stephen Flowerday},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {The enemy within: {A} behavioural intention model and an information
                  security awareness process},
  booktitle    = {2012 Information Security for South Africa, Balalaika Hotel, Sandton,
                  Johannesburg, South Africa, August 15-17, 2012},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ISSA.2012.6320437},
  doi          = {10.1109/ISSA.2012.6320437},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/GunduF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/RamaFB12,
  author       = {Sobhana Rama and
                  Stephen Flowerday and
                  Duane Boucher},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {Information confidentiality and the Chinese Wall Model in Government
                  tender fraud},
  booktitle    = {2012 Information Security for South Africa, Balalaika Hotel, Sandton,
                  Johannesburg, South Africa, August 15-17, 2012},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ISSA.2012.6320438},
  doi          = {10.1109/ISSA.2012.6320438},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/RamaFB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/AllamF11,
  author       = {Sean Allam and
                  Stephen Flowerday},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {An adaptation of the awareness boundary model towards smartphone security},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/36\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/AllamF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/BoucherF11,
  author       = {Duane Boucher and
                  Stephen Flowerday},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Privacy: In pursuit of Information security awareness},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Research/Baucher\_Flowerday.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/BoucherF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/GalpinF11,
  author       = {Ryan Galpin and
                  Stephen Flowerday},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Online Social Networks: Enhancing user trust through effective controls
                  and identity management},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/16\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/GalpinF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/KrugerFDS11,
  author       = {Hennie A. Kruger and
                  Stephen Flowerday and
                  Lynette Drevin and
                  Tjaart Steyn},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {An assessment of the role of cultural factors in information security
                  awareness},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/93\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/KrugerFDS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/TarwireyiFB11,
  author       = {Paul Tarwireyi and
                  Stephen Flowerday and
                  Anass Bayaga},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Information Security Competence Test with Regards to Password Management},
  booktitle    = {Information Security South Africa Conference 2011, Hyatt Regency Hotel,
                  Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings
                  {ISSA} 2011},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2011},
  url          = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/29\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/TarwireyiFB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/haisa/FlowerdayA10,
  author       = {Stephen Flowerday and
                  Sean Allam},
  editor       = {Nathan L. Clarke and
                  Steven Furnell and
                  Rossouw von Solms},
  title        = {A model to measure the maturity of smartphone security at software
                  consultancies},
  booktitle    = {South African Information Security Multi-Conference, {SAISMC} 2010,
                  Port Elizabeth, South Africa, May 17-18, 2010. Proceedings},
  pages        = {110--121},
  publisher    = {University of Plymouth},
  year         = {2010},
  url          = {http://www.cscan.org/openaccess/?paperid=191},
  timestamp    = {Tue, 06 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/haisa/FlowerdayA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/BayagaF10,
  author       = {Anass Bayaga and
                  Stephen Flowerday},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {A Conceptual Operational Risk Model for SMEs: Impact on Organisational
                  Information Technology},
  booktitle    = {Information Security South Africa Conference 2010, Sandton Convention
                  Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA}
                  2010},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2010},
  url          = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Full/09\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/BayagaF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/LallaF10,
  author       = {Himal Lalla and
                  Stephen Flowerday},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Towards a Standardised Digital Forensic Process: E-mail Forensics},
  booktitle    = {Information Security South Africa Conference 2010, Sandton Convention
                  Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA}
                  2010},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2010},
  url          = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Research/05\_paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/LallaF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/MegawF10,
  author       = {Greg Megaw and
                  Stephen Flowerday},
  editor       = {Hein S. Venter and
                  Marijke Coetzee and
                  Marianne Loock},
  title        = {Phishing within E-Commerce: {A} Trust and Confidence Game},
  booktitle    = {Information Security South Africa Conference 2010, Sandton Convention
                  Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA}
                  2010},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2010},
  url          = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Full/07\_Paper.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/MegawF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/DeasF08,
  author       = {Matthew Deas and
                  Stephen Flowerday},
  editor       = {Hein S. Venter and
                  Mariki M. Eloff and
                  Jan H. P. Eloff and
                  Les Labuschagne},
  title        = {A User Centric Model for Online Identity and Access Management},
  booktitle    = {Proceedings of the {ISSA} 2008 Innovative Minds Conference, {ISSA}
                  2008, Gauteng Region (Johannesburg), South Africa, 7-9 July 2008},
  pages        = {1--21},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2008},
  url          = {http://icsa.cs.up.ac.za/issa/2008/Proceedings/Full/13.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/DeasF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/saicsit/IsabiryeF08,
  author       = {Naomi Isabirye and
                  Stephen Flowerday},
  editor       = {Reinhardt A. Botha and
                  Charmain Cilliers},
  title        = {A model for eliciting user requirements specific to South African
                  rural areas},
  booktitle    = {Proceedings of the 2008 Annual Conference of the South African Institute
                  of Computer Scientists and Information Technologists on {IT} Research
                  in Developing Countries, {SAICSIT} 2008, Wilderness, South Africa,
                  October 6-8, 2008},
  series       = {{ACM} International Conference Proceeding Series},
  volume       = {338},
  pages        = {124--130},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456659.1456674},
  doi          = {10.1145/1456659.1456674},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/saicsit/IsabiryeF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/saicsit/RangaF07,
  author       = {Gideon Ranga and
                  Stephen Flowerday},
  editor       = {Lynette Barnard and
                  Reinhardt A. Botha},
  title        = {Identity and access management for the distribution of social grants
                  in South Africa},
  booktitle    = {Proceedings of the 2007 Annual Conference of the South African Institute
                  of Computer Scientists and Information Technologists on {IT} Research
                  in Developing Countries, {SAICSIT} 2007, Port Elizabeth, South Africa,
                  October 2-3, 2007},
  series       = {{ACM} International Conference Proceeding Series},
  volume       = {226},
  pages        = {125--131},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1292491.1292506},
  doi          = {10.1145/1292491.1292506},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/saicsit/RangaF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/FlowerdayR07,
  author       = {Stephen Flowerday and
                  Gideon Ranga},
  editor       = {Hein S. Venter and
                  Mariki M. Eloff and
                  Les Labuschagne and
                  Jan H. P. Eloff and
                  Rossouw von Solms},
  title        = {Identification Now and in the Future: Social Grant Distribution Process
                  in South Africa},
  booktitle    = {New Approaches for Security, Privacy and Trust in Complex Environments,
                  Proceedings of the {IFIP} {TC-11} 22nd International Information Security
                  Conference {(SEC} 2007), 14-16 May 2007, Sandton, South Africa},
  series       = {{IFIP}},
  volume       = {232},
  pages        = {457--459},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-72367-9\_40},
  doi          = {10.1007/978-0-387-72367-9\_40},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/FlowerdayR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/FlowerdayBS06,
  author       = {Stephen Flowerday and
                  A. W. Blundell and
                  Rossouw von Solms},
  title        = {Continuous auditing technologies and models: {A} discussion},
  journal      = {Comput. Secur.},
  volume       = {25},
  number       = {5},
  pages        = {325--331},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.cose.2006.06.004},
  doi          = {10.1016/J.COSE.2006.06.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/FlowerdayBS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/FlowerdayS06,
  author       = {Stephen Flowerday and
                  Rossouw von Solms},
  editor       = {Simone Fischer{-}H{\"{u}}bner and
                  Kai Rannenberg and
                  Louise Yngstr{\"{o}}m and
                  Stefan Lindskog},
  title        = {Trust: An Element of Information Security},
  booktitle    = {Security and Privacy in Dynamic Environments, Proceedings of the {IFIP}
                  {TC-11} 21st International Information Security Conference {(SEC}
                  2006), 22-24 May 2006, Karlstad, Sweden},
  series       = {{IFIP}},
  volume       = {201},
  pages        = {87--98},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/0-387-33406-8\_8},
  doi          = {10.1007/0-387-33406-8\_8},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/FlowerdayS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/FlowerdayS05,
  author       = {Stephen Flowerday and
                  Rossouw von Solms},
  title        = {Real-time information integrity = system integrity + data integrity
                  + continuous assurances},
  journal      = {Comput. Secur.},
  volume       = {24},
  number       = {8},
  pages        = {604--613},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.cose.2005.08.004},
  doi          = {10.1016/J.COSE.2005.08.004},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/FlowerdayS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics