Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Stephen Flowerday
@article{DBLP:journals/compsec/SchyffF23, author = {Karl van der Schyff and Stephen Flowerday}, title = {The mediating role of perceived risks and benefits when self-disclosing: {A} study of social media trust and FoMO}, journal = {Comput. Secur.}, volume = {126}, pages = {103071}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103071}, doi = {10.1016/J.COSE.2022.103071}, timestamp = {Wed, 21 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SchyffF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fi/SchyffFRF23, author = {Karl van der Schyff and Greg Foster and Karen Renaud and Stephen Flowerday}, title = {Online Privacy Fatigue: {A} Scoping Review and Research Agenda}, journal = {Future Internet}, volume = {15}, number = {5}, pages = {164}, year = {2023}, url = {https://doi.org/10.3390/fi15050164}, doi = {10.3390/FI15050164}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fi/SchyffFRF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iam/FrauensteinFMW23, author = {Edwin Donald Frauenstein and Stephen Flowerday and Syden Mishi and Merrill Warkentin}, title = {Unraveling the behavioral influence of social media on phishing susceptibility: {A} Personality-Habit-Information Processing model}, journal = {Inf. Manag.}, volume = {60}, number = {7}, pages = {103858}, year = {2023}, url = {https://doi.org/10.1016/j.im.2023.103858}, doi = {10.1016/J.IM.2023.103858}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iam/FrauensteinFMW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/behaviourIT/SchyffFKP22, author = {Karl van der Schyff and Stephen Flowerday and Hennie A. Kruger and Nikitha Patel}, title = {Intensity of Facebook use: a personality-based perspective on dependency formation}, journal = {Behav. Inf. Technol.}, volume = {41}, number = {1}, pages = {198--214}, year = {2022}, url = {https://doi.org/10.1080/0144929x.2020.1800095}, doi = {10.1080/0144929X.2020.1800095}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/behaviourIT/SchyffFKP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisdc/CurrinFRSF22, author = {Aubrey Currin and Stephen Flowerday and Edward de la Rey and Karl van der Schyff and Greg Foster}, title = {A smart city qualitative data analysis model: Participatory crowdsourcing of public safety reports in South Africa}, journal = {Electron. J. Inf. Syst. Dev. Ctries.}, volume = {88}, number = {6}, year = {2022}, url = {https://doi.org/10.1002/isd2.12232}, doi = {10.1002/ISD2.12232}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisdc/CurrinFRSF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/BhanaF22, author = {Bhaveer Bhana and Stephen V. Flowerday}, title = {Usability of the login authentication process: passphrases and passwords}, journal = {Inf. Comput. Secur.}, volume = {30}, number = {2}, pages = {280--305}, year = {2022}, url = {https://doi.org/10.1108/ICS-07-2021-0093}, doi = {10.1108/ICS-07-2021-0093}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/BhanaF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SchyffF21, author = {Karl van der Schyff and Stephen Flowerday}, title = {Mediating effects of information security awareness}, journal = {Comput. Secur.}, volume = {106}, pages = {102313}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102313}, doi = {10.1016/J.COSE.2021.102313}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SchyffF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ParkerF21, author = {Heather J. Parker and Stephen Flowerday}, title = {Understanding the disclosure of personal data online}, journal = {Inf. Comput. Secur.}, volume = {29}, number = {3}, pages = {413--434}, year = {2021}, url = {https://doi.org/10.1108/ICS-10-2020-0168}, doi = {10.1108/ICS-10-2020-0168}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ParkerF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MaonekeFI20, author = {Pardon Blessings Maoneke and Stephen Flowerday and Naomi Isabirye}, title = {Evaluating the strength of a multilingual passphrase policy}, journal = {Comput. Secur.}, volume = {92}, pages = {101746}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101746}, doi = {10.1016/J.COSE.2020.101746}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MaonekeFI20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SchyffFF20, author = {Karl van der Schyff and Stephen Flowerday and Steven Furnell}, title = {Duplicitous social media and data surveillance: An evaluation of privacy risk}, journal = {Comput. Secur.}, volume = {94}, pages = {101822}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101822}, doi = {10.1016/J.COSE.2020.101822}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SchyffFF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/FrauensteinF20, author = {Edwin Donald Frauenstein and Stephen Flowerday}, title = {Susceptibility to phishing on social network sites: {A} personality information processing model}, journal = {Comput. Secur.}, volume = {94}, pages = {101862}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101862}, doi = {10.1016/J.COSE.2020.101862}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/FrauensteinF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SchyffFF20a, author = {Karl van der Schyff and Stephen Flowerday and Steven Furnell}, title = {Privacy risk and the use of Facebook Apps: {A} gender-focused vulnerability assessment}, journal = {Comput. Secur.}, volume = {96}, pages = {101866}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101866}, doi = {10.1016/J.COSE.2020.101866}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SchyffFF20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BhanaF20, author = {Bhaveer Bhana and Stephen Flowerday}, title = {Passphrase and keystroke dynamics authentication: Usable security}, journal = {Comput. Secur.}, volume = {96}, pages = {101925}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101925}, doi = {10.1016/J.COSE.2020.101925}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BhanaF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/TsegayeF20, author = {Tamir Tsegaye and Stephen Flowerday}, title = {A Clark-Wilson and {ANSI} role-based access control model}, journal = {Inf. Comput. Secur.}, volume = {28}, number = {3}, pages = {373--395}, year = {2020}, url = {https://doi.org/10.1108/ICS-08-2019-0100}, doi = {10.1108/ICS-08-2019-0100}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/TsegayeF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/MaonekeFW20, author = {Pardon Blessings Maoneke and Stephen V. Flowerday and Merrill Warkentin}, editor = {Bonnie Brinton Anderson and Jason Thatcher and Rayman D. Meservy and Kathy Chudoba and Kelly J. Fadel and Sue Brown}, title = {Evaluating the Usability of a Multilingual Passphrase Policy}, booktitle = {26th Americas Conference on Information Systems, {AMCIS} 2020, Virtual Conference, August 15-17, 2020}, publisher = {Association for Information Systems}, year = {2020}, url = {https://aisel.aisnet.org/amcis2020/info\_security\_privacy/info\_security\_privacy/19}, timestamp = {Mon, 27 Jul 2020 19:06:34 +0200}, biburl = {https://dblp.org/rec/conf/amcis/MaonekeFW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisdc/MusarurwaFC19, author = {Alfred Musarurwa and Stephen Flowerday and Liezel Cilliers}, title = {The bring-your-own-device unintended administrator: {A} perspective from Zimbabwe}, journal = {Electron. J. Inf. Syst. Dev. Ctries.}, volume = {85}, number = {4}, year = {2019}, url = {https://doi.org/10.1002/isd2.12076}, doi = {10.1002/ISD2.12076}, timestamp = {Thu, 22 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisdc/MusarurwaFC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ictas/GunduFR19, author = {Tapiwa Gundu and Stephen Flowerday and Karen Renaud}, title = {Deliver Security Awareness Training, then Repeat: \{Deliver; Measure Efficacy\}}, booktitle = {Conference on Information Communications Technology and Society, {ICTAS} 2019, Durban, South Africa, March 6-8, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICTAS.2019.8703523}, doi = {10.1109/ICTAS.2019.8703523}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ictas/GunduFR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/saicsit/TsegayeF19, author = {Tamir Tsegaye and Stephen Flowerday}, editor = {Carina de Villiers and Hanlie Smuts}, title = {PoPI Compliance through Access Control of Electronic Health Records}, booktitle = {Proceedings of the South African Institute of Computer Scientists and Information Technologists, {SAICSIT} 2019, Skukuza, South Africa, September 17-18, 2019}, pages = {21:1--21:9}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3351108.3351130}, doi = {10.1145/3351108.3351130}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/saicsit/TsegayeF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/RenaudFWCO18, author = {Karen Renaud and Stephen Flowerday and Merrill Warkentin and Paul Cockshott and Craig P. Orgeron}, title = {Is the responsibilization of the cyber security risk reasonable and judicious?}, journal = {Comput. Secur.}, volume = {78}, pages = {198--211}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2018.06.006}, doi = {10.1016/J.COSE.2018.06.006}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/RenaudFWCO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/haisa/MusarurwaF18, author = {Alfred Musarurwa and Stephen Flowerday}, editor = {Nathan L. Clarke and Steven Furnell}, title = {The {BYOD} Information Security Challenge for CIOs}, booktitle = {Twelfth International Symposium on Human Aspects of Information Security {\&} Assurance, {HAISA} 2018, Dundee, Scotland, UK, August 29-31, 2018, Proceedings}, pages = {246--262}, publisher = {University of Plymouth}, year = {2018}, url = {https://www.cscan.org/?page=openaccess\&\#38;eid=20\&\#38;id=394}, timestamp = {Wed, 14 Aug 2019 18:43:23 +0200}, biburl = {https://dblp.org/rec/conf/haisa/MusarurwaF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/MaonekeF18, author = {Pardon Blessings Maoneke and Stephen Flowerday}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Jan H. P. Eloff}, title = {Password Policies Adopted by South African Organizations: Influential Factors and Weaknesses}, booktitle = {Information Security - 17th International Conference, {ISSA} 2018, Pretoria, South Africa, August 15-16, 2018, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {973}, pages = {30--43}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-11407-7\_3}, doi = {10.1007/978-3-030-11407-7\_3}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/MaonekeF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/MaonekeFI18, author = {Pardon Blessings Maoneke and Stephen Flowerday and Naomi Isabirye}, editor = {Lech Jan Janczewski and Miroslaw Kutylowski}, title = {The Influence of Native Language on Password Composition and Security: {A} Socioculture Theoretical View}, booktitle = {{ICT} Systems Security and Privacy Protection - 33rd {IFIP} {TC} 11 International Conference, {SEC} 2018, Held at the 24th {IFIP} World Computer Congress, {WCC} 2018, Poznan, Poland, September 18-20, 2018, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {529}, pages = {33--46}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99828-2\_3}, doi = {10.1007/978-3-319-99828-2\_3}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/MaonekeFI18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/RenaudF17, author = {Karen Renaud and Stephen Flowerday}, title = {Human-centred cyber security}, journal = {J. Inf. Secur. Appl.}, volume = {34}, pages = {1}, year = {2017}, url = {https://doi.org/10.1016/j.jisa.2017.05.007}, doi = {10.1016/J.JISA.2017.05.007}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/RenaudF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/RenaudF17a, author = {Karen Renaud and Stephen Flowerday}, title = {Contemplating human-centred security {\&} privacy research: Suggesting future directions}, journal = {J. Inf. Secur. Appl.}, volume = {34}, pages = {76--81}, year = {2017}, url = {https://doi.org/10.1016/j.jisa.2017.05.006}, doi = {10.1016/J.JISA.2017.05.006}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/RenaudF17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/saj/CilliersF17, author = {Liezel Cilliers and Stephen Flowerday}, title = {Factors that influence the usability of a participatory {IVR} crowdsourcing system in a smart city}, journal = {South Afr. Comput. J.}, volume = {29}, number = {3}, year = {2017}, url = {https://doi.org/10.18489/sacj.v29i3.422}, doi = {10.18489/SACJ.V29I3.422}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/saj/CilliersF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/FlowerdayT16, author = {Stephen V. Flowerday and Tite Tuyikeze}, title = {Information security policy development and implementation: The what, how and who}, journal = {Comput. Secur.}, volume = {61}, pages = {169--183}, year = {2016}, url = {https://doi.org/10.1016/j.cose.2016.06.002}, doi = {10.1016/J.COSE.2016.06.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/FlowerdayT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisdc/BreetzkeF16, author = {Thayne Breetzke and Stephen V. Flowerday}, title = {The Usability of IVRs for Smart City Crowdsourcing in Developing Cities}, journal = {Electron. J. Inf. Syst. Dev. Ctries.}, volume = {73}, number = {1}, pages = {1--14}, year = {2016}, url = {https://doi.org/10.1002/j.1681-4835.2016.tb00527.x}, doi = {10.1002/J.1681-4835.2016.TB00527.X}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejisdc/BreetzkeF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/RenaudFEV16, author = {Karen Renaud and Stephen Flowerday and Rosanne English and Melanie Volkamer}, title = {Why don't {UK} citizens protest against privacy-invading dragnet surveillance?}, journal = {Inf. Comput. Secur.}, volume = {24}, number = {4}, pages = {400--415}, year = {2016}, url = {https://doi.org/10.1108/ICS-06-2015-0024}, doi = {10.1108/ICS-06-2015-0024}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/RenaudFEV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/conf-irm/GopeniWF16, author = {Amanda Gopeni and Ntombovuyo Wayi and Stephen Flowerday}, title = {A feedback loop model to facilitate communication between citizens and local government in Buffalo City}, booktitle = {{CONF-IRM} 2016, The International Conference on Information Resources Management: Digital Emancipation in a Networked Society, Cape Town, South Africa, May 18-20, 2016}, pages = {73}, year = {2016}, url = {http://aisel.aisnet.org/confirm2016/73}, timestamp = {Mon, 07 Nov 2016 15:02:30 +0100}, biburl = {https://dblp.org/rec/conf/conf-irm/GopeniWF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/conf-irm/CilliersFM16, author = {Liezel Cilliers and Stephen Flowerday and Sean McLean}, title = {A crowdsourcing, smart city model for a developing country}, booktitle = {{CONF-IRM} 2016, The International Conference on Information Resources Management: Digital Emancipation in a Networked Society, Cape Town, South Africa, May 18-20, 2016}, pages = {74}, year = {2016}, url = {http://aisel.aisnet.org/confirm2016/74}, timestamp = {Mon, 07 Nov 2016 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/conf-irm/CilliersFM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/FrauensteinF16, author = {Edwin Donald Frauenstein and Stephen V. Flowerday}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Jan H. P. Eloff}, title = {Social network phishing: Becoming habituated to clicks and ignorant to threats?}, booktitle = {2016 Information Security for South Africa, {ISSA} 2016, Johannesburg, South Africa, August 17-18, 2016}, pages = {98--105}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISSA.2016.7802935}, doi = {10.1109/ISSA.2016.7802935}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/FrauensteinF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/NgoqoF15, author = {Bukelwa Ngoqo and Stephen V. Flowerday}, title = {Information Security Behaviour Profiling Framework {(ISBPF)} for student mobile phone users}, journal = {Comput. Secur.}, volume = {53}, pages = {132--142}, year = {2015}, url = {https://doi.org/10.1016/j.cose.2015.05.011}, doi = {10.1016/J.COSE.2015.05.011}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/NgoqoF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisdc/IsabiryeFNS15, author = {Naomi Isabirye and Stephen V. Flowerday and Amit Nanavati and Rossouw von Solms}, title = {Building Technology Trust in a Rural Agricultural e-Marketplace: {A} User Requirements Perspective}, journal = {Electron. J. Inf. Syst. Dev. Ctries.}, volume = {70}, number = {1}, pages = {1--20}, year = {2015}, url = {https://doi.org/10.1002/j.1681-4835.2015.tb00504.x}, doi = {10.1002/J.1681-4835.2015.TB00504.X}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejisdc/IsabiryeFNS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/NgoqoF15, author = {Bukelwa Ngoqo and Stephen V. Flowerday}, title = {Exploring the relationship between student mobile information security awareness and behavioural intent}, journal = {Inf. Comput. Secur.}, volume = {23}, number = {4}, pages = {406--420}, year = {2015}, url = {https://doi.org/10.1108/ICS-10-2014-0072}, doi = {10.1108/ICS-10-2014-0072}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/NgoqoF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/haisa/CilliersF15, author = {Liezel Cilliers and Stephen Flowerday}, editor = {Steven Furnell and Nathan L. Clarke}, title = {The Relationship Between Privacy, Information Security and the Trustworthiness of a Crowdsourcing System in a Smart City}, booktitle = {Ninth International Symposium on Human Aspects of Information Security {\&} Assurance, {HAISA} 2015 ,Lesvos, Greece, July 1-3, 2015, Proceedings}, pages = {243--255}, publisher = {University of Plymouth}, year = {2015}, url = {http://www.cscan.org/openaccess/?paperid=274}, timestamp = {Tue, 06 Jul 2021 12:22:17 +0200}, biburl = {https://dblp.org/rec/conf/haisa/CilliersF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/worldcis/GreigRF15, author = {Andrews Greig and Karen Renaud and Stephen Flowerday}, title = {An ethnographic study to assess the enactment of information security culture in a retail store}, booktitle = {2015 World Congress on Internet Security, WorldCIS 2015, Dublin, Ireland, October 19-21, 2015}, pages = {61--66}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/WorldCIS.2015.7359415}, doi = {10.1109/WORLDCIS.2015.7359415}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/worldcis/GreigRF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/issa/2015, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee and Mariki M. Eloff and Stephen Flowerday}, title = {2015 Information Security for South Africa, {ISSA} 2015, Johannesburg, South Africa, August 12-13, 2015}, publisher = {{IEEE}}, year = {2015}, url = {https://ieeexplore.ieee.org/xpl/conhome/7328027/proceeding}, isbn = {978-1-4799-7755-0}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AllamFF14, author = {Sean Allam and Stephen Flowerday and Ethan Flowerday}, title = {Smartphone information security awareness: {A} victim of operational pressures}, journal = {Comput. Secur.}, volume = {42}, pages = {56--65}, year = {2014}, url = {https://doi.org/10.1016/j.cose.2014.01.005}, doi = {10.1016/J.COSE.2014.01.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AllamFF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisdc/CilliersF14, author = {Liezel Cilliers and Stephen Flowerday}, title = {User Acceptance of Telemedicine by Health Care Workers {A} Case of the Eastern Cape Province, South Africa}, journal = {Electron. J. Inf. Syst. Dev. Ctries.}, volume = {65}, number = {1}, pages = {1--10}, year = {2014}, url = {https://doi.org/10.1002/j.1681-4835.2014.tb00467.x}, doi = {10.1002/J.1681-4835.2014.TB00467.X}, timestamp = {Mon, 14 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejisdc/CilliersF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/haisa/TuyikezeF14, author = {Tite Tuyikeze and Stephen Flowerday}, editor = {Nathan L. Clarke and Steven Furnell}, title = {Information Security Policy Development and Implementation: {A} Content Analysis Approach}, booktitle = {Eighth International Symposium on Human Aspects of Information Security {\&} Assurance, {HAISA} 2014 ,Plymouth, UK, July 8-9, 2014. Proceedings}, pages = {11--20}, publisher = {University of Plymouth}, year = {2014}, url = {http://www.cscan.org/openaccess/?paperid=233}, timestamp = {Tue, 06 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/haisa/TuyikezeF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/haisa/NgoqoF14, author = {Bukelwa Ngoqo and Stephen Flowerday}, editor = {Nathan L. Clarke and Steven Furnell}, title = {Linking student information security awareness and behavioural intent}, booktitle = {Eighth International Symposium on Human Aspects of Information Security {\&} Assurance, {HAISA} 2014 ,Plymouth, UK, July 8-9, 2014. Proceedings}, pages = {162--173}, publisher = {University of Plymouth}, year = {2014}, url = {http://www.cscan.org/openaccess/?paperid=240}, timestamp = {Tue, 06 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/haisa/NgoqoF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iot360/PideritFM14, author = {Roxanne Piderit and Stephen Flowerday and Sean McLean}, editor = {Raffaele Giaffreda and Dagmar Cag{\'{a}}nov{\'{a}} and Yong Li and Roberto Riggio and Agn{\`{e}}s Voisard}, title = {Motivating Citizens to Contribute to the Smart City: {A} Public Safety Case Study}, booktitle = {Internet of Things. IoT Infrastructures - First International Summit, IoT360 2014, Rome, Italy, October 27-28, 2014, Revised Selected Papers, Part {II}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {151}, pages = {131--136}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-19743-2\_20}, doi = {10.1007/978-3-319-19743-2\_20}, timestamp = {Fri, 27 Mar 2020 08:54:59 +0100}, biburl = {https://dblp.org/rec/conf/iot360/PideritFM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/worldcis/TsegayeF14, author = {Tamir Tsegaye and Stephen Flowerday}, title = {Controls for protecting critical information infrastructure from cyberattacks}, booktitle = {2014 World Congress on Internet Security, WorldCIS 2014, London, United Kingdom, December 8-10, 2014}, pages = {24--29}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/WorldCIS.2014.7028160}, doi = {10.1109/WORLDCIS.2014.7028160}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/worldcis/TsegayeF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/worldcis/CilliersF14, author = {Liezel Cilliers and Stephen Flowerday}, title = {Information security in a public safety, participatory crowdsourcing smart city project}, booktitle = {2014 World Congress on Internet Security, WorldCIS 2014, London, United Kingdom, December 8-10, 2014}, pages = {36--41}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/WorldCIS.2014.7028163}, doi = {10.1109/WORLDCIS.2014.7028163}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/worldcis/CilliersF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/worldcis/PideritF14, author = {Roxanne Piderit and Stephen Flowerday}, title = {The risk relationship between trust and information sharing in automotive supply chains}, booktitle = {2014 World Congress on Internet Security, WorldCIS 2014, London, United Kingdom, December 8-10, 2014}, pages = {80--85}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/WorldCIS.2014.7028171}, doi = {10.1109/WORLDCIS.2014.7028171}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/worldcis/PideritF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/BhanaFS13, author = {Bhaveer Bhana and Stephen Flowerday and Aharon Satt}, title = {Using Participatory Crowdsourcing in South Africa to Create a Safer Living Environment}, journal = {Int. J. Distributed Sens. Networks}, volume = {9}, year = {2013}, url = {https://doi.org/10.1155/2013/907196}, doi = {10.1155/2013/907196}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/BhanaFS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecurity/BayagaF12, author = {Anass Bayaga and Stephen Flowerday}, title = {Principal Causes of Information Communication Technology {(ICT)} Risk Failure in an {SME}}, booktitle = {2012 {ASE} International Conference on Cyber Security, Alexandria, VA, USA, December 14-16, 2012}, pages = {152--156}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/CyberSecurity.2012.26}, doi = {10.1109/CYBERSECURITY.2012.26}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersecurity/BayagaF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-9/LallaFST12, author = {Himal Lalla and Stephen Flowerday and Tendai Sanyamahwe and Paul Tarwireyi}, editor = {Gilbert L. Peterson and Sujeet Shenoi}, title = {A Log File Digital Forensic Model}, booktitle = {Advances in Digital Forensics {VIII} - 8th {IFIP} {WG} 11.9 International Conference on Digital Forensics, Pretoria, South Africa, January 3-5, 2012, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {383}, pages = {247--259}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33962-2\_17}, doi = {10.1007/978-3-642-33962-2\_17}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-9/LallaFST12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/GunduF12, author = {Tapiwa Gundu and Stephen Flowerday}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {The enemy within: {A} behavioural intention model and an information security awareness process}, booktitle = {2012 Information Security for South Africa, Balalaika Hotel, Sandton, Johannesburg, South Africa, August 15-17, 2012}, pages = {1--8}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ISSA.2012.6320437}, doi = {10.1109/ISSA.2012.6320437}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/GunduF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/RamaFB12, author = {Sobhana Rama and Stephen Flowerday and Duane Boucher}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {Information confidentiality and the Chinese Wall Model in Government tender fraud}, booktitle = {2012 Information Security for South Africa, Balalaika Hotel, Sandton, Johannesburg, South Africa, August 15-17, 2012}, pages = {1--8}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ISSA.2012.6320438}, doi = {10.1109/ISSA.2012.6320438}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/RamaFB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/AllamF11, author = {Sean Allam and Stephen Flowerday}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {An adaptation of the awareness boundary model towards smartphone security}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/36\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/AllamF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/BoucherF11, author = {Duane Boucher and Stephen Flowerday}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Privacy: In pursuit of Information security awareness}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Research/Baucher\_Flowerday.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/BoucherF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/GalpinF11, author = {Ryan Galpin and Stephen Flowerday}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Online Social Networks: Enhancing user trust through effective controls and identity management}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/16\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/GalpinF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/KrugerFDS11, author = {Hennie A. Kruger and Stephen Flowerday and Lynette Drevin and Tjaart Steyn}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {An assessment of the role of cultural factors in information security awareness}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/93\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/KrugerFDS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/TarwireyiFB11, author = {Paul Tarwireyi and Stephen Flowerday and Anass Bayaga}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Information Security Competence Test with Regards to Password Management}, booktitle = {Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings {ISSA} 2011}, publisher = {ISSA, Pretoria, South Africa}, year = {2011}, url = {http://icsa.cs.up.ac.za/issa/2011/Proceedings/Full/29\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/TarwireyiFB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/haisa/FlowerdayA10, author = {Stephen Flowerday and Sean Allam}, editor = {Nathan L. Clarke and Steven Furnell and Rossouw von Solms}, title = {A model to measure the maturity of smartphone security at software consultancies}, booktitle = {South African Information Security Multi-Conference, {SAISMC} 2010, Port Elizabeth, South Africa, May 17-18, 2010. Proceedings}, pages = {110--121}, publisher = {University of Plymouth}, year = {2010}, url = {http://www.cscan.org/openaccess/?paperid=191}, timestamp = {Tue, 06 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/haisa/FlowerdayA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/BayagaF10, author = {Anass Bayaga and Stephen Flowerday}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {A Conceptual Operational Risk Model for SMEs: Impact on Organisational Information Technology}, booktitle = {Information Security South Africa Conference 2010, Sandton Convention Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA} 2010}, publisher = {ISSA, Pretoria, South Africa}, year = {2010}, url = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Full/09\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/BayagaF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/LallaF10, author = {Himal Lalla and Stephen Flowerday}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Towards a Standardised Digital Forensic Process: E-mail Forensics}, booktitle = {Information Security South Africa Conference 2010, Sandton Convention Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA} 2010}, publisher = {ISSA, Pretoria, South Africa}, year = {2010}, url = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Research/05\_paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/LallaF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/MegawF10, author = {Greg Megaw and Stephen Flowerday}, editor = {Hein S. Venter and Marijke Coetzee and Marianne Loock}, title = {Phishing within E-Commerce: {A} Trust and Confidence Game}, booktitle = {Information Security South Africa Conference 2010, Sandton Convention Centre, Sandton, South Africa, August 2-4, 2010. Proceedings {ISSA} 2010}, publisher = {ISSA, Pretoria, South Africa}, year = {2010}, url = {http://icsa.cs.up.ac.za/issa/2010/Proceedings/Full/07\_Paper.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/MegawF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/DeasF08, author = {Matthew Deas and Stephen Flowerday}, editor = {Hein S. Venter and Mariki M. Eloff and Jan H. P. Eloff and Les Labuschagne}, title = {A User Centric Model for Online Identity and Access Management}, booktitle = {Proceedings of the {ISSA} 2008 Innovative Minds Conference, {ISSA} 2008, Gauteng Region (Johannesburg), South Africa, 7-9 July 2008}, pages = {1--21}, publisher = {ISSA, Pretoria, South Africa}, year = {2008}, url = {http://icsa.cs.up.ac.za/issa/2008/Proceedings/Full/13.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/DeasF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/saicsit/IsabiryeF08, author = {Naomi Isabirye and Stephen Flowerday}, editor = {Reinhardt A. Botha and Charmain Cilliers}, title = {A model for eliciting user requirements specific to South African rural areas}, booktitle = {Proceedings of the 2008 Annual Conference of the South African Institute of Computer Scientists and Information Technologists on {IT} Research in Developing Countries, {SAICSIT} 2008, Wilderness, South Africa, October 6-8, 2008}, series = {{ACM} International Conference Proceeding Series}, volume = {338}, pages = {124--130}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456659.1456674}, doi = {10.1145/1456659.1456674}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/saicsit/IsabiryeF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/saicsit/RangaF07, author = {Gideon Ranga and Stephen Flowerday}, editor = {Lynette Barnard and Reinhardt A. Botha}, title = {Identity and access management for the distribution of social grants in South Africa}, booktitle = {Proceedings of the 2007 Annual Conference of the South African Institute of Computer Scientists and Information Technologists on {IT} Research in Developing Countries, {SAICSIT} 2007, Port Elizabeth, South Africa, October 2-3, 2007}, series = {{ACM} International Conference Proceeding Series}, volume = {226}, pages = {125--131}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1292491.1292506}, doi = {10.1145/1292491.1292506}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/saicsit/RangaF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/FlowerdayR07, author = {Stephen Flowerday and Gideon Ranga}, editor = {Hein S. Venter and Mariki M. Eloff and Les Labuschagne and Jan H. P. Eloff and Rossouw von Solms}, title = {Identification Now and in the Future: Social Grant Distribution Process in South Africa}, booktitle = {New Approaches for Security, Privacy and Trust in Complex Environments, Proceedings of the {IFIP} {TC-11} 22nd International Information Security Conference {(SEC} 2007), 14-16 May 2007, Sandton, South Africa}, series = {{IFIP}}, volume = {232}, pages = {457--459}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-72367-9\_40}, doi = {10.1007/978-0-387-72367-9\_40}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/FlowerdayR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/FlowerdayBS06, author = {Stephen Flowerday and A. W. Blundell and Rossouw von Solms}, title = {Continuous auditing technologies and models: {A} discussion}, journal = {Comput. Secur.}, volume = {25}, number = {5}, pages = {325--331}, year = {2006}, url = {https://doi.org/10.1016/j.cose.2006.06.004}, doi = {10.1016/J.COSE.2006.06.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/FlowerdayBS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/FlowerdayS06, author = {Stephen Flowerday and Rossouw von Solms}, editor = {Simone Fischer{-}H{\"{u}}bner and Kai Rannenberg and Louise Yngstr{\"{o}}m and Stefan Lindskog}, title = {Trust: An Element of Information Security}, booktitle = {Security and Privacy in Dynamic Environments, Proceedings of the {IFIP} {TC-11} 21st International Information Security Conference {(SEC} 2006), 22-24 May 2006, Karlstad, Sweden}, series = {{IFIP}}, volume = {201}, pages = {87--98}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/0-387-33406-8\_8}, doi = {10.1007/0-387-33406-8\_8}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/FlowerdayS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/FlowerdayS05, author = {Stephen Flowerday and Rossouw von Solms}, title = {Real-time information integrity = system integrity + data integrity + continuous assurances}, journal = {Comput. Secur.}, volume = {24}, number = {8}, pages = {604--613}, year = {2005}, url = {https://doi.org/10.1016/j.cose.2005.08.004}, doi = {10.1016/J.COSE.2005.08.004}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/FlowerdayS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.