Hennie A. Kruger

Orcid: 0000-0001-8514-4422

According to our database1, Hennie A. Kruger authored at least 41 papers between 2005 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
The Story of Safety Snail and Her e-Mail: A Digital Wellness and Cybersecurity Serious Game for Pre-School Children.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023

2022
Intensity of Facebook use: a personality-based perspective on dependency formation.
Behav. Inf. Technol., 2022

The Role of Information Deserts in Information Security Awareness and Behaviour.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022

2021
Collective information security behaviour: a technology-driven framework.
Inf. Comput. Secur., 2021

Children's Awareness of Digital Wellness: A Serious Games Approach.
Proceedings of the Information Security Education for Cyber Resilience, 2021

A Wolf, Hyena, and Fox Game to Raise Cybersecurity Awareness Among Pre-school Children.
Proceedings of the Human Aspects of Information Security and Assurance, 2021

2020
A Unified Approach to Anomaly Detection.
Proceedings of the Machine Learning, Optimization, and Data Science, 2020

Contextual Factors in Information Security Group Behaviour: A Comparison of Two Studies.
Proceedings of the Information Systems Security and Privacy - 6th International Conference, 2020

External Contextual Factors in Information Security Behaviour.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

Information Security Behavioural Threshold Analysis in Practice: An Implementation Framework.
Proceedings of the Human Aspects of Information Security and Assurance, 2020

2019
The Epistemological Implications of Critical Complexity Thinking for Operational Research.
Syst., 2019

Behavioural threshold analysis: methodological and practical considerations for applications in information security.
Behav. Inf. Technol., 2019

A Management Decision Support System for Evaluating Information Security Behaviour.
Proceedings of the Information and Cyber Security - 18th International Conference, 2019

Identifying Information Security Risks in a Social Network Using Self-organising Maps.
Proceedings of the Information Security Education. Education in Proactive Information Security, 2019

Theorising on Information Cascades and Sequential Decision-making for Analysing Security Behaviour.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

2018
I shall, we shall, and all others will: paradoxical information security behaviour.
Inf. Comput. Secur., 2018

The Feasibility of Raising Information Security Awareness in an Academic Environment Using SNA.
Proceedings of the Information Security Education - Towards a Cybersecure Society, 2018

2017
The application of behavioural thresholds to analyse collective behaviour in information security.
Inf. Comput. Secur., 2017

A Linguistic Approach to Information Security Awareness Education in a Healthcare Environment.
Proceedings of the Information Security Education for a Global Digital Society, 2017

The Lemming Effect in Information Security.
Proceedings of the Eleventh International Symposium on Human Aspects of Information Security & Assurance, 2017

2016
Theorising on risk homeostasis in the context of information security behaviour.
Inf. Comput. Secur., 2016

Can perceptual differences account for enigmatic information security behaviour in an organisation?
Comput. Secur., 2016

Behavioural Thresholds in the Context of Information Security.
Proceedings of the Tenth International Symposium on Human Aspects of Information Security & Assurance, 2016

A web-based approach to allocating audit resources using the Analytic Hierarchy Process.
Proceedings of the CONF-IRM 2016, 2016

2014
Considering the influence of human trust in practical social engineering exercises.
Proceedings of the 2014 Information Security for South Africa, 2014

2013
Phishing and Organisational Learning.
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013

2012
Filtering spam e-mail with Generalized Additive Neural Networks.
Proceedings of the 2012 Information Security for South Africa, 2012

2011
An assessment of the role of cultural factors in information security awareness.
Proceedings of the Information Security South Africa Conference 2011, 2011

2010
A Vocabulary Test to Assess Information Security Awareness.
Inf. Manag. Comput. Secur., 2010

A framework for evaluating IT security investments in a banking environment.
Proceedings of the Information Security South Africa Conference 2010, 2010

The Use of an Information Security Vocabulary Test to Assess Information Security Awareness - An Exploratory Study.
Proceedings of the South African Information Security Multi-Conference, 2010

2009
Determinants of Password Security: Some Educational Aspects.
Proceedings of the Information Assurance and Security Education and Training, 2009

2008
Consensus ranking - An ICT security awareness case study.
Comput. Secur., 2008

Password Management: Empirical Results from a RSA and USA Study.
Proceedings of the ISSA 2008 Innovative Minds Conference, 2008

2007
Value-focused assessment of ICT security awareness in an academic environment.
Comput. Secur., 2007

Identity Theft - Empirical evidence from a Phishing Exercise.
Proceedings of the New Approaches for Security, 2007

Email Security Awareness - a Practical Assessment of Employee Behaviour.
Proceedings of the Fifth World Conference on Information Security Education, 2007

2006
A prototype for assessing information security awareness.
Comput. Secur., 2006

Value-Focused Assessment of Information Communication and Technology Security Awareness in an Academic Environment.
Proceedings of the Security and Privacy in Dynamic Environments, 2006

A Framework for Evaluating ICT Security Awareness.
Proceedings of the ISSA 2006 from Insight to Foresight Conference, 2006

2005
Measuring Information Security Awareness - A West Africa Gold Mining Environment Case.
Proceedings of the ISSA 2005 New Knowledge Today Conference, 29 June, 2005


  Loading...