Keshnee Padayachee

Orcid: 0000-0001-7056-4723

According to our database1, Keshnee Padayachee authored at least 23 papers between 2007 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Understanding the effects of situational crime prevention and personality factors on insider compliance.
J. Inf. Secur. Appl., 2022

An Exploratory Factor Analysis of Personality Factors: An Insider Threat Perspective.
Proceedings of the Human Aspects of Information Security and Assurance, 2022

2021
Joint Effects of Neutralisation Techniques and the Dark Triad of Personality Traits on Gender : An Insider Threat Perspective.
Proceedings of the Conference on Information Communications Technology and Society, 2021

A Reference Point for Designing a Cybersecurity Curriculum for Universities.
Proceedings of the Human Aspects of Information Security and Assurance, 2021

A Theoretical Underpinning for Examining Insider Attacks Leveraging the Fraud Pentagon.
Proceedings of the Human Aspects of Information Security and Assurance, 2021

2020
Understanding the Relationship Between the Dark Triad of Personality Traits and Neutralization Techniques Toward Cybersecurity Behaviour.
Int. J. Cyber Warf. Terror., 2020

2017
A Snapshot Survey of ICT Integration in South African Schools.
South Afr. Comput. J., 2017

Shared situational awareness in information security incident management.
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017

2016
Internet Mediated Research: Challenges and Issues.
South Afr. Comput. J., 2016

An assessment of opportunity-reducing techniques in information security: An insider threat perspective.
Decis. Support Syst., 2016

2015
Aspectising honeytokens to contain the insider threat.
IET Inf. Secur., 2015

SpotMal: A hybrid malware detection framework with privacy protection for BYOD.
Proceedings of the 2015 Annual Research Conference on South African Institute of Computer Scientists and Information Technologists, 2015

A framework of opportunity-reducing techniques to mitigate the insider threat.
Proceedings of the 2015 Information Security for South Africa, 2015

A survey of honeypot research: Trends and opportunities.
Proceedings of the 10th International Conference for Internet Technology and Secured Transactions, 2015

2013
A conceptual opportunity-based framework to mitigate the insider threat.
Proceedings of the 2013 Information Security for South Africa, 2013

Cloud security and compliance concerns: Demystifying stakeholders' roles and responsibilities.
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013

Engendering an e-safety awareness culture within the South African context.
Proceedings of the AFRICON 2013, Pointe aux Piments, Mauritius, September 9-12, 2013, 2013

2012
Evaluating usage control deterrents.
South Afr. Comput. J., 2012

Taxonomy of compliant information security behavior.
Comput. Secur., 2012

2009
Adapting usage control as a deterrent to address the inadequacies of access controls.
Comput. Secur., 2009

2007
Enhancing Optimistic Access Controls with Usage Control.
Proceedings of the Trust, 2007

An Aspect-Oriented Approach to Enhancing Multilevel Security with Usage Control: An Experience Report.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007

Instrumentation of AspectJ Programs: An Exploratory Study.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007


  Loading...