Stephen Flowerday

Orcid: 0000-0002-4591-3802

According to our database1, Stephen Flowerday authored at least 65 papers between 2005 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Unraveling the behavioral influence of social media on phishing susceptibility: A Personality-Habit-Information Processing model.
Inf. Manag., November, 2023

Online Privacy Fatigue: A Scoping Review and Research Agenda.
Future Internet, May, 2023

The mediating role of perceived risks and benefits when self-disclosing: A study of social media trust and FoMO.
Comput. Secur., March, 2023

2022
Usability of the login authentication process: passphrases and passwords.
Inf. Comput. Secur., 2022

A smart city qualitative data analysis model: Participatory crowdsourcing of public safety reports in South Africa.
Electron. J. Inf. Syst. Dev. Ctries., 2022

Intensity of Facebook use: a personality-based perspective on dependency formation.
Behav. Inf. Technol., 2022

2021
Understanding the disclosure of personal data online.
Inf. Comput. Secur., 2021

Mediating effects of information security awareness.
Comput. Secur., 2021

2020
A Clark-Wilson and ANSI role-based access control model.
Inf. Comput. Secur., 2020

Privacy risk and the use of Facebook Apps: A gender-focused vulnerability assessment.
Comput. Secur., 2020

Duplicitous social media and data surveillance: An evaluation of privacy risk.
Comput. Secur., 2020

Evaluating the strength of a multilingual passphrase policy.
Comput. Secur., 2020

Susceptibility to phishing on social network sites: A personality information processing model.
Comput. Secur., 2020

Passphrase and keystroke dynamics authentication: Usable security.
Comput. Secur., 2020

Evaluating the Usability of a Multilingual Passphrase Policy.
Proceedings of the 26th Americas Conference on Information Systems, 2020

2019
The bring-your-own-device unintended administrator: A perspective from Zimbabwe.
Electron. J. Inf. Syst. Dev. Ctries., 2019

PoPI Compliance through Access Control of Electronic Health Records.
Proceedings of the South African Institute of Computer Scientists and Information Technologists, 2019

Deliver Security Awareness Training, then Repeat: {Deliver; Measure Efficacy}.
Proceedings of the Conference on Information Communications Technology and Society, 2019

2018
Is the responsibilization of the cyber security risk reasonable and judicious?
Comput. Secur., 2018

The Influence of Native Language on Password Composition and Security: A Socioculture Theoretical View.
Proceedings of the ICT Systems Security and Privacy Protection, 2018

Password Policies Adopted by South African Organizations: Influential Factors and Weaknesses.
Proceedings of the Information Security - 17th International Conference, 2018

The BYOD Information Security Challenge for CIOs.
Proceedings of the Twelfth International Symposium on Human Aspects of Information Security & Assurance, 2018

2017
Factors that influence the usability of a participatory IVR crowdsourcing system in a smart city.
South Afr. Comput. J., 2017

Contemplating human-centred security & privacy research: Suggesting future directions.
J. Inf. Secur. Appl., 2017

Human-centred cyber security.
J. Inf. Secur. Appl., 2017

2016
Why don't UK citizens protest against privacy-invading dragnet surveillance?
Inf. Comput. Secur., 2016

The Usability of IVRs for Smart City Crowdsourcing in Developing Cities.
Electron. J. Inf. Syst. Dev. Ctries., 2016

Information security policy development and implementation: The what, how and who.
Comput. Secur., 2016

Social network phishing: Becoming habituated to clicks and ignorant to threats?
Proceedings of the 2016 Information Security for South Africa, 2016

A feedback loop model to facilitate communication between citizens and local government in Buffalo City.
Proceedings of the CONF-IRM 2016, 2016

A crowdsourcing, smart city model for a developing country.
Proceedings of the CONF-IRM 2016, 2016

2015
Exploring the relationship between student mobile information security awareness and behavioural intent.
Inf. Comput. Secur., 2015

Building Technology Trust in a Rural Agricultural e-Marketplace: A User Requirements Perspective.
Electron. J. Inf. Syst. Dev. Ctries., 2015

Information Security Behaviour Profiling Framework (ISBPF) for student mobile phone users.
Comput. Secur., 2015

An ethnographic study to assess the enactment of information security culture in a retail store.
Proceedings of the 2015 World Congress on Internet Security, 2015

The Relationship Between Privacy, Information Security and the Trustworthiness of a Crowdsourcing System in a Smart City.
Proceedings of the Ninth International Symposium on Human Aspects of Information Security & Assurance, 2015

2014
User Acceptance of Telemedicine by Health Care Workers A Case of the Eastern Cape Province, South Africa.
Electron. J. Inf. Syst. Dev. Ctries., 2014

Smartphone information security awareness: A victim of operational pressures.
Comput. Secur., 2014

Controls for protecting critical information infrastructure from cyberattacks.
Proceedings of the 2014 World Congress on Internet Security, 2014

The risk relationship between trust and information sharing in automotive supply chains.
Proceedings of the 2014 World Congress on Internet Security, 2014

Information security in a public safety, participatory crowdsourcing smart city project.
Proceedings of the 2014 World Congress on Internet Security, 2014

Motivating Citizens to Contribute to the Smart City: A Public Safety Case Study.
Proceedings of the Internet of Things. IoT Infrastructures, 2014

Information Security Policy Development and Implementation: A Content Analysis Approach.
Proceedings of the Eighth International Symposium on Human Aspects of Information Security & Assurance, 2014

Linking student information security awareness and behavioural intent.
Proceedings of the Eighth International Symposium on Human Aspects of Information Security & Assurance, 2014

2013
Using Participatory Crowdsourcing in South Africa to Create a Safer Living Environment.
Int. J. Distributed Sens. Networks, 2013

2012
Information confidentiality and the Chinese Wall Model in Government tender fraud.
Proceedings of the 2012 Information Security for South Africa, 2012

The enemy within: A behavioural intention model and an information security awareness process.
Proceedings of the 2012 Information Security for South Africa, 2012

A Log File Digital Forensic Model.
Proceedings of the Advances in Digital Forensics VIII, 2012

Principal Causes of Information Communication Technology (ICT) Risk Failure in an SME.
Proceedings of the 2012 ASE International Conference on Cyber Security, 2012

2011
Information Security Competence Test with Regards to Password Management.
Proceedings of the Information Security South Africa Conference 2011, 2011

An assessment of the role of cultural factors in information security awareness.
Proceedings of the Information Security South Africa Conference 2011, 2011

Online Social Networks: Enhancing user trust through effective controls and identity management.
Proceedings of the Information Security South Africa Conference 2011, 2011

Privacy: In pursuit of Information security awareness.
Proceedings of the Information Security South Africa Conference 2011, 2011

An adaptation of the awareness boundary model towards smartphone security.
Proceedings of the Information Security South Africa Conference 2011, 2011

2010
Phishing within E-Commerce: A Trust and Confidence Game.
Proceedings of the Information Security South Africa Conference 2010, 2010

Towards a Standardised Digital Forensic Process: E-mail Forensics.
Proceedings of the Information Security South Africa Conference 2010, 2010

A Conceptual Operational Risk Model for SMEs: Impact on Organisational Information Technology.
Proceedings of the Information Security South Africa Conference 2010, 2010

A model to measure the maturity of smartphone security at software consultancies.
Proceedings of the South African Information Security Multi-Conference, 2010

2008
A model for eliciting user requirements specific to South African rural areas.
Proceedings of the 2008 Annual Conference of the South African Institute of Computer Scientists and Information Technologists on IT Research in Developing Countries, 2008

A User Centric Model for Online Identity and Access Management.
Proceedings of the ISSA 2008 Innovative Minds Conference, 2008

2007
Identification Now and in the Future: Social Grant Distribution Process in South Africa.
Proceedings of the New Approaches for Security, 2007

Identity and access management for the distribution of social grants in South Africa.
Proceedings of the 2007 Annual Conference of the South African Institute of Computer Scientists and Information Technologists on IT Research in Developing Countries, 2007

2006
Continuous auditing technologies and models: A discussion.
Comput. Secur., 2006

Trust: An Element of Information Security.
Proceedings of the Security and Privacy in Dynamic Environments, 2006

2005
Real-time information integrity = system integrity + data integrity + continuous assurances.
Comput. Secur., 2005


  Loading...