Follow
Stephen Flowerday
Stephen Flowerday
Professor - School of Cyber Studies
Verified email at utulsa.edu
Title
Cited by
Cited by
Year
Information security policy development and implementation: The what, how and who
SV Flowerday, T Tuyikeze
computers & security 61, 169-183, 2016
1612016
Continuous auditing technologies and models: A discussion
S Flowerday, AW Blundell, R Von Solms
Computers & security 25 (5), 325-331, 2006
1472006
Effects of electronic health record implementation and barriers to adoption and use: a scoping review and qualitative analysis of the content
CH Tsai, A Eghdam, N Davoody, G Wright, S Flowerday, S Koch
Life 10 (12), 327, 2020
1442020
Smartphone information security awareness: A victim of operational pressures
S Allam, SV Flowerday, E Flowerday
Computers & Security 42, 56-65, 2014
1282014
Susceptibility to phishing on social network sites: A personality information processing model
ED Frauenstein, S Flowerday
Computers & security 94, 101862, 2020
1102020
Real-time information integrity= system integrity+ data integrity+ continuous assurances
S Flowerday, R Von Solms
Computers & Security 24 (8), 604-613, 2005
1102005
Ignorance to awareness: Towards an information security awareness process
T Gundu, SV Flowerday
SAIEE Africa Research Journal 104 (2), 69-79, 2013
109*2013
An assessment of the role of cultural factors in information security awareness
HA Kruger, L Drevin, S Flowerday, T Steyn
2011 Information Security for South Africa, 1-7, 2011
82*2011
Continuous auditing: verifying information integrity and providing assurances for financial reports
S Flowerday, R Von Solms
Computer Fraud & Security, 12-16, 2005
622005
Is the responsibilization of the cyber security risk reasonable and judicious?
K Renaud, S Flowerday, M Warkentin, P Cockshott, C Orgeron
Computers & Security 78, 198-211, 2018
522018
Successful IT governance in SMES: an application of the Technology-Organisation-Environment theory
O Olutoyin, S Flowerday
South African Journal of Information Management 18 (1), 1-8, 2016
522016
Health information systems to improve health care: A telemedicine case study
L Cilliers, SV Flowerday
South African Journal of Information Management 15 (1), 5, 2013
502013
Duplicitous social media and data surveillance: An evaluation of privacy risk
K Van der Schyff, S Flowerday, S Furnell
Computers & Security 94, 101822, 2020
492020
Information Security Behaviour Profiling Framework (ISBPF) for student mobile phone users
B Ngoqo, SV Flowerday
Computers & Security 53, 132-142, 2015
482015
Trust: An element of information security
S Flowerday, R Von Solms
IFIP International Information Security Conference, 87-98, 2006
462006
Information security in a public safety, participatory crowdsourcing smart city project
L Cilliers, S Flowerday
World Congress on Internet Security (WorldCIS-2014), 36-41, 2014
43*2014
User acceptance of telemedicine by health care workers a case of the eastern cape province, South Africa
L Cilliers, S Flowerday
The Electronic Journal of Information Systems in Developing Countries 65 (1 …, 2014
422014
Contributing factors to increased susceptibility to social media phishing attacks
HJ Parker, SV Flowerday
South African Journal of Information Management 22 (1), 1-10, 2020
372020
The usability of IVRs for smart city crowdsourcing in developing cities
T Breetzke, SV Flowerday
The Electronic Journal of Information Systems in Developing Countries 73 (1 …, 2016
372016
Exploring the relationship between student mobile information security awareness and behavioural intent
B Ngoqo, SV Flowerday
Information & Computer Security 23 (4), 406-420, 2015
37*2015
The system can't perform the operation now. Try again later.
Articles 1–20