Lynette Drevin

Orcid: 0000-0001-9370-8216

According to our database1, Lynette Drevin authored at least 25 papers between 2004 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
The Story of Safety Snail and Her e-Mail: A Digital Wellness and Cybersecurity Serious Game for Pre-School Children.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023

2021
Towards The Development of a Contingent Use of Systems Development Methodologies Model.
Proceedings of the Information Systems Development: Crossing Boundaries between Development and Operations (DevOps) in Information Systems (ISD2021 Proceedings), 2021

A Brief History and Overview of WISE.
Proceedings of the Information Security Education for Cyber Resilience, 2021

Children's Awareness of Digital Wellness: A Serious Games Approach.
Proceedings of the Information Security Education for Cyber Resilience, 2021

A Wolf, Hyena, and Fox Game to Raise Cybersecurity Awareness Among Pre-school Children.
Proceedings of the Human Aspects of Information Security and Assurance, 2021

2020
A Unified Approach to Anomaly Detection.
Proceedings of the Machine Learning, Optimization, and Data Science, 2020

2019
Key elements of an information security culture in organisations.
Inf. Comput. Secur., 2019

Identifying Information Security Risks in a Social Network Using Self-organising Maps.
Proceedings of the Information Security Education. Education in Proactive Information Security, 2019

2018
The Feasibility of Raising Information Security Awareness in an Academic Environment Using SNA.
Proceedings of the Information Security Education - Towards a Cybersecure Society, 2018

2017
A Linguistic Approach to Information Security Awareness Education in a Healthcare Environment.
Proceedings of the Information Security Education for a Global Digital Society, 2017

2016
An investigation into the security behaviour of tertiary students regarding mobile device security.
Proceedings of the CONF-IRM 2016, 2016

2015
The adversarial threat posed by the NSA to the integrity of the internet.
Proceedings of the 2015 Information Security for South Africa, 2015

Reflections on the Ethical Content of the IT Honours Program Project Module.
Proceedings of the Information Security Education Across the Curriculum, 2015

2011
An assessment of the role of cultural factors in information security awareness.
Proceedings of the Information Security South Africa Conference 2011, 2011

2010
A Vocabulary Test to Assess Information Security Awareness.
Inf. Manag. Comput. Secur., 2010

Using Antenarrative Approaches to Investigate the Perceptions of Information Systems' Actors Regarding Failure and Success.
Proceedings of the Information Systems Development, 2010

The Use of an Information Security Vocabulary Test to Assess Information Security Awareness - An Exploratory Study.
Proceedings of the South African Information Security Multi-Conference, 2010

2009
Determinants of Password Security: Some Educational Aspects.
Proceedings of the Information Assurance and Security Education and Training, 2009

2008
Password Management: Empirical Results from a RSA and USA Study.
Proceedings of the ISSA 2008 Innovative Minds Conference, 2008

2007
Value-focused assessment of ICT security awareness in an academic environment.
Comput. Secur., 2007

Identity Theft - Empirical evidence from a Phishing Exercise.
Proceedings of the New Approaches for Security, 2007

Email Security Awareness - a Practical Assessment of Employee Behaviour.
Proceedings of the Fifth World Conference on Information Security Education, 2007

2006
Value-Focused Assessment of Information Communication and Technology Security Awareness in an Academic Environment.
Proceedings of the Security and Privacy in Dynamic Environments, 2006

A Framework for Evaluating ICT Security Awareness.
Proceedings of the ISSA 2006 from Insight to Foresight Conference, 2006

2004
Learning from information systems failures by using narrative and ante-narrative methods.
South Afr. Comput. J., 2004


  Loading...