Follow
Stephen Flowerday
Stephen Flowerday
Professor - School of Cyber Studies
Verified email at utulsa.edu
Title
Cited by
Cited by
Year
Information security policy development and implementation: The what, how and who
SV Flowerday, T Tuyikeze
computers & security 61, 169-183, 2016
1612016
Continuous auditing technologies and models: A discussion
S Flowerday, AW Blundell, R Von Solms
Computers & security 25 (5), 325-331, 2006
1462006
Effects of electronic health record implementation and barriers to adoption and use: a scoping review and qualitative analysis of the content
CH Tsai, A Eghdam, N Davoody, G Wright, S Flowerday, S Koch
Life 10 (12), 327, 2020
1432020
Smartphone information security awareness: A victim of operational pressures
S Allam, SV Flowerday, E Flowerday
Computers & Security 42, 56-65, 2014
1282014
Susceptibility to phishing on social network sites: A personality information processing model
ED Frauenstein, S Flowerday
Computers & security 94, 101862, 2020
1102020
Real-time information integrity= system integrity+ data integrity+ continuous assurances
S Flowerday, R Von Solms
Computers & Security 24 (8), 604-613, 2005
1102005
Ignorance to awareness: Towards an information security awareness process
T Gundu, SV Flowerday
SAIEE Africa Research Journal 104 (2), 69-79, 2013
108*2013
An assessment of the role of cultural factors in information security awareness
HA Kruger, L Drevin, S Flowerday, T Steyn
2011 Information Security for South Africa, 1-7, 2011
81*2011
Continuous auditing: verifying information integrity and providing assurances for financial reports
S Flowerday, R Von Solms
Computer Fraud & Security, 12-16, 2005
622005
Is the responsibilization of the cyber security risk reasonable and judicious?
K Renaud, S Flowerday, M Warkentin, P Cockshott, C Orgeron
Computers & Security 78, 198-211, 2018
522018
Successful IT governance in SMES: an application of the Technology-Organisation-Environment theory
O Olutoyin, S Flowerday
South African Journal of Information Management 18 (1), 1-8, 2016
522016
Health information systems to improve health care: A telemedicine case study
L Cilliers, SV Flowerday
South African Journal of Information Management 15 (1), 5, 2013
502013
Duplicitous social media and data surveillance: An evaluation of privacy risk
K Van der Schyff, S Flowerday, S Furnell
Computers & Security 94, 101822, 2020
492020
Information Security Behaviour Profiling Framework (ISBPF) for student mobile phone users
B Ngoqo, SV Flowerday
Computers & Security 53, 132-142, 2015
472015
Trust: An element of information security
S Flowerday, R Von Solms
IFIP International Information Security Conference, 87-98, 2006
462006
Information security in a public safety, participatory crowdsourcing smart city project
L Cilliers, S Flowerday
World Congress on Internet Security (WorldCIS-2014), 36-41, 2014
43*2014
User acceptance of telemedicine by health care workers a case of the eastern cape province, South Africa
L Cilliers, S Flowerday
The Electronic Journal of Information Systems in Developing Countries 65 (1 …, 2014
422014
The usability of IVRs for smart city crowdsourcing in developing cities
T Breetzke, SV Flowerday
The Electronic Journal of Information Systems in Developing Countries 73 (1 …, 2016
372016
Exploring the relationship between student mobile information security awareness and behavioural intent
B Ngoqo, SV Flowerday
Information & Computer Security 23 (4), 406-420, 2015
37*2015
Absorptive capacity: Relevancy for large and small enterprises
JR Ndiege, ME Herselman, SV Flowerday
South African Journal of Information Management (SAJIM) 14 (1), 1-9, 2012
372012
The system can't perform the operation now. Try again later.
Articles 1–20