Jacques Ophoff

Orcid: 0000-0003-0634-5248

According to our database1, Jacques Ophoff authored at least 39 papers between 2012 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Risk homeostasis and security fatigue: a case study of data specialists.
Inf. Comput. Secur., 2023

Universal Design for Website Authentication: Views and Experiences of Senior Citizens.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, ASE 2023, 2023

The Influence of Interpersonal Factors on Telecommuting Employees' Cybercrime Preventative Behaviours During the Pandemic.
Proceedings of the Human Aspects of Information Security and Assurance, 2023

2022
Reducing Exposure to Hateful Speech Online.
Proceedings of the Intelligent Computing, 2022

Security Fatigue: A Case Study of Data Specialists.
Proceedings of the Human Aspects of Information Security and Assurance, 2022

2021
Accessible authentication: dyslexia and password strategies.
Inf. Comput. Secur., 2021

Cognitive function vs. accessible authentication: insights from dyslexia research.
Proceedings of the W4A '21: 18th Web for All Conference, 2021

Environmental Uncertainty and End-User Security Behaviour: A Study During the COVID-19 Pandemic.
Proceedings of the Information Security Education for Cyber Resilience, 2021

A Brief History and Overview of WISE.
Proceedings of the Information Security Education for Cyber Resilience, 2021

Revealing the Cyber Security Non-Compliance "Attribution Gulf".
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

2020
Caveat Venditor, Used USB Drive Owner.
CoRR, 2020

Exploring the Value of a Cyber Threat Intelligence Function in an Organization.
Proceedings of the Information Security Education. Information Security in Action, 2020

Criticism of the role of trust in e-government services.
Proceedings of the Conference on Information Communications Technology and Society, 2020

Concern for Information Privacy: A Cross-Nation Study of the United Kingdom and South Africa.
Proceedings of the Human Aspects of Information Security and Assurance, 2020

Critical Analysis of Information Security Culture Definitions.
Proceedings of the Human Aspects of Information Security and Assurance, 2020

Dyslexia and Password Usage: Accessibility in Authentication Design.
Proceedings of the Human Aspects of Information Security and Assurance, 2020

2019
The Impact of an Augmented Reality Application on Learning Motivation of Students.
Adv. Hum. Comput. Interact., 2019

Determinants of E-Government Use in Developing Countries: The Influence of Privacy and Security Concerns.
Proceedings of the Conference on Next Generation Computing Applications, 2019

A Descriptive Review and Classification of Organizational Information Security Awareness Research.
Proceedings of the Information and Cyber Security - 18th International Conference, 2019

Lessons Learned from an Organizational Information Security Awareness Campaign.
Proceedings of the Information Security Education. Education in Proactive Information Security, 2019

Using Gamification to Improve Information Security Behavior: A Password Strength Experiment.
Proceedings of the Information Security Education. Education in Proactive Information Security, 2019

Information Security Culture Assessment of Small and Medium-Sized Enterprises in Tanzania.
Proceedings of the Information and Communication Technologies for Development. Strengthening Southern-Driven Cooperation as a Catalyst for ICT4D, 2019

2018
Mitigating the Ransomware Threat: A Protection Motivation Theory Approach.
Proceedings of the Information Security - 17th International Conference, 2018

Investigating the Knowledge-Behaviour Gap in Mitigating Personal Information Compromise.
Proceedings of the Twelfth International Symposium on Human Aspects of Information Security & Assurance, 2018

2017
Organizational information privacy strategy and the impact of the PoPI act.
Proceedings of the 2017 Information Security for South Africa, 2017

Employee Information Security Beliefs in the Home Environment.
Proceedings of the Eleventh International Symposium on Human Aspects of Information Security & Assurance, 2017

Factors Influencing the Use of Privacy Settings in Location-Based Social Networks.
Proceedings of the Eleventh International Symposium on Human Aspects of Information Security & Assurance, 2017

The Influence of Organizational Commitment on Information Security Policy Compliance.
Proceedings of the Eleventh International Symposium on Human Aspects of Information Security & Assurance, 2017

2016
A Review of Information Privacy and Its Importance to Consumers and Organizations.
Informing Sci. Int. J. an Emerg. Transdiscipl., 2016

The Threats that Insiders Pose to Critical Infrastructure – a South African Perspective.
Proceedings of the Tenth International Symposium on Human Aspects of Information Security & Assurance, 2016

Understanding the Adoption of Wearable Technology in South African Organisations.
Proceedings of the CONF-IRM 2016, 2016

Factors influencing the intention to adopt NFC mobile payments - A South African perspective.
Proceedings of the CONF-IRM 2016, 2016

2015
Security awareness and adoption of security controls by smartphone users.
Proceedings of the 2015 Second International Conference on Information Security and Cyber Forensics, 2015

2014
Exploring end-user smartphone security awareness within a South African context.
Proceedings of the 2014 Information Security for South Africa, 2014

Privacy: A review of publication trends.
Proceedings of the 2014 Information Security for South Africa, 2014

A Privacy-Aware Model for Communications Management in the IP Multimedia Subsystem.
Proceedings of the Tenth International Network Conference, 2014

2012
Are University Students Ready to Dump Their Textbooks?: A Survey on Student Attitudes Towards E-Readers and Tablet Computers.
Int. J. Cyber Ethics Educ., 2012

How the Certified Information Systems Security Professional certification supports Digital Forensic processes.
Proceedings of the Ninth International Network Conference (INC 2012), 2012

Investigating the accuracy of base station information for estimating cellphone location.
Proceedings of the 2012 International Conference on Cyber Security, 2012


  Loading...