Stephen Flowerday
Orcid: 0000-0002-4591-3802
  According to our database1,
  Stephen Flowerday
  authored at least 75 papers
  between 2005 and 2026.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
- 
    on orcid.org
On csauthors.net:
Bibliography
  2026
Malicious insider threats in cybersecurity: A fraud triangle and Machiavellian perspective.
    
  
    Comput. Hum. Behav., 2026
    
  
  2025
  2024
    J. Cybersecur. Priv., September, 2024
    
  
    J. Cybersecur. Priv., 2024
    
  
    Inf. Comput. Secur., 2024
    
  
    Proceedings of the 30th Americas Conference on Information Systems: Elevating Life through Digital Social Entrepreneurship, 2024
    
  
Cybersecurity in the Age of Uncertainty: A Call for Resilient and Antifragile Systems.
    
  
    Proceedings of the 30th Americas Conference on Information Systems: Elevating Life through Digital Social Entrepreneurship, 2024
    
  
    Proceedings of the 30th Americas Conference on Information Systems: Elevating Life through Digital Social Entrepreneurship, 2024
    
  
  2023
Unraveling the behavioral influence of social media on phishing susceptibility: A Personality-Habit-Information Processing model.
    
  
    Inf. Manag., November, 2023
    
  
    Future Internet, May, 2023
    
  
The mediating role of perceived risks and benefits when self-disclosing: A study of social media trust and FoMO.
    
  
    Comput. Secur., March, 2023
    
  
  2022
    Inf. Comput. Secur., 2022
    
  
A smart city qualitative data analysis model: Participatory crowdsourcing of public safety reports in South Africa.
    
  
    Electron. J. Inf. Syst. Dev. Ctries., 2022
    
  
    Behav. Inf. Technol., 2022
    
  
  2021
A system architecture for ensuring interoperability in a South African national electronic health record system.
    
  
    South Afr. Comput. J., 2021
    
  
  2020
Privacy risk and the use of Facebook Apps: A gender-focused vulnerability assessment.
    
  
    Comput. Secur., 2020
    
  
    Comput. Secur., 2020
    
  
Susceptibility to phishing on social network sites: A personality information processing model.
    
  
    Comput. Secur., 2020
    
  
    Comput. Secur., 2020
    
  
    Proceedings of the 26th Americas Conference on Information Systems, 2020
    
  
  2019
    Electron. J. Inf. Syst. Dev. Ctries., 2019
    
  
    Proceedings of the South African Institute of Computer Scientists and Information Technologists, 2019
    
  
    Proceedings of the Conference on Information Communications Technology and Society, 2019
    
  
  2018
    Comput. Secur., 2018
    
  
The Influence of Native Language on Password Composition and Security: A Socioculture Theoretical View.
    
  
    Proceedings of the ICT Systems Security and Privacy Protection, 2018
    
  
Password Policies Adopted by South African Organizations: Influential Factors and Weaknesses.
    
  
    Proceedings of the Information Security - 17th International Conference, 2018
    
  
    Proceedings of the Twelfth International Symposium on Human Aspects of Information Security & Assurance, 2018
    
  
  2017
Factors that influence the usability of a participatory IVR crowdsourcing system in a smart city.
    
  
    South Afr. Comput. J., 2017
    
  
Contemplating human-centred security & privacy research: Suggesting future directions.
    
  
    J. Inf. Secur. Appl., 2017
    
  
  2016
    Inf. Comput. Secur., 2016
    
  
    Electron. J. Inf. Syst. Dev. Ctries., 2016
    
  
    Comput. Secur., 2016
    
  
    Proceedings of the 2016 Information Security for South Africa, 2016
    
  
A feedback loop model to facilitate communication between citizens and local government in Buffalo City.
    
  
    Proceedings of the CONF-IRM 2016, 2016
    
  
    Proceedings of the CONF-IRM 2016, 2016
    
  
  2015
Exploring the relationship between student mobile information security awareness and behavioural intent.
    
  
    Inf. Comput. Secur., 2015
    
  
Building Technology Trust in a Rural Agricultural e-Marketplace: A User Requirements Perspective.
    
  
    Electron. J. Inf. Syst. Dev. Ctries., 2015
    
  
Information Security Behaviour Profiling Framework (ISBPF) for student mobile phone users.
    
  
    Comput. Secur., 2015
    
  
An ethnographic study to assess the enactment of information security culture in a retail store.
    
  
    Proceedings of the 2015 World Congress on Internet Security, 2015
    
  
The Relationship Between Privacy, Information Security and the Trustworthiness of a Crowdsourcing System in a Smart City.
    
  
    Proceedings of the Ninth International Symposium on Human Aspects of Information Security & Assurance, 2015
    
  
  2014
User Acceptance of Telemedicine by Health Care Workers A Case of the Eastern Cape Province, South Africa.
    
  
    Electron. J. Inf. Syst. Dev. Ctries., 2014
    
  
    Comput. Secur., 2014
    
  
    Proceedings of the 2014 World Congress on Internet Security, 2014
    
  
The risk relationship between trust and information sharing in automotive supply chains.
    
  
    Proceedings of the 2014 World Congress on Internet Security, 2014
    
  
Information security in a public safety, participatory crowdsourcing smart city project.
    
  
    Proceedings of the 2014 World Congress on Internet Security, 2014
    
  
    Proceedings of the Internet of Things. IoT Infrastructures, 2014
    
  
Information Security Policy Development and Implementation: A Content Analysis Approach.
    
  
    Proceedings of the Eighth International Symposium on Human Aspects of Information Security & Assurance, 2014
    
  
    Proceedings of the Eighth International Symposium on Human Aspects of Information Security & Assurance, 2014
    
  
  2013
Using Participatory Crowdsourcing in South Africa to Create a Safer Living Environment.
    
  
    Int. J. Distributed Sens. Networks, 2013
    
  
  2012
    Proceedings of the 2012 Information Security for South Africa, 2012
    
  
The enemy within: A behavioural intention model and an information security awareness process.
    
  
    Proceedings of the 2012 Information Security for South Africa, 2012
    
  
    Proceedings of the Advances in Digital Forensics VIII, 2012
    
  
Principal Causes of Information Communication Technology (ICT) Risk Failure in an SME.
    
  
    Proceedings of the 2012 ASE International Conference on Cyber Security, 2012
    
  
  2011
    Proceedings of the Information Security South Africa Conference 2011, 2011
    
  
    Proceedings of the Information Security South Africa Conference 2011, 2011
    
  
Online Social Networks: Enhancing user trust through effective controls and identity management.
    
  
    Proceedings of the Information Security South Africa Conference 2011, 2011
    
  
    Proceedings of the Information Security South Africa Conference 2011, 2011
    
  
    Proceedings of the Information Security South Africa Conference 2011, 2011
    
  
  2010
    Proceedings of the Information Security South Africa Conference 2010, 2010
    
  
    Proceedings of the Information Security South Africa Conference 2010, 2010
    
  
A Conceptual Operational Risk Model for SMEs: Impact on Organisational Information Technology.
    
  
    Proceedings of the Information Security South Africa Conference 2010, 2010
    
  
    Proceedings of the South African Information Security Multi-Conference, 2010
    
  
  2008
    Proceedings of the 2008 Annual Conference of the South African Institute of Computer Scientists and Information Technologists on IT Research in Developing Countries, 2008
    
  
    Proceedings of the ISSA 2008 Innovative Minds Conference, 2008
    
  
  2007
Identification Now and in the Future: Social Grant Distribution Process in South Africa.
    
  
    Proceedings of the New Approaches for Security, 2007
    
  
Identity and access management for the distribution of social grants in South Africa.
    
  
    Proceedings of the 2007 Annual Conference of the South African Institute of Computer Scientists and Information Technologists on IT Research in Developing Countries, 2007
    
  
  2006
    Proceedings of the Security and Privacy in Dynamic Environments, 2006
    
  
  2005
Real-time information integrity = system integrity + data integrity + continuous assurances.
    
  
    Comput. Secur., 2005