Conference Papers

Skip Navigation LinksHome : Conference Papers
  1. Cilliers, L. & Flowerday, S.V., McLean, S. . (2016) A crowdsourcing, smart city model for a developing country. Presented at the International Conference on Information Resource Management (Conf-IRM) 18-20 May, Cape Town, South Africa. . . ISBN 978-0-473-35594-4.

  2. Frauenstein, E.D. & Flowerday S.V. . (2016) Social Network Phishing: Becoming Habituated to Clicks and Ignorant to Threats?. Presented at Information Security South Africa (ISSA), 17-18 August, Johannesburg, South Africa. . .

  3. Gopeni, A., Wayi, N. & Flowerday, S.V. . (2016) A feedback loop model to facilitate communication between citizens and local government in Buffalo City. Presented at the International Conference on Information Resource Management (Conf-IRM) 18-20 May, Cape Town, South Africa. . . ISBN 978-0-473-35594-4.

  4. Cilliers, L. & Flowerday, S.V. . (2015) The relationship between privacy, information security and the trustworthiness of a crowdsourcing system in a smart city. Presented at the 9th International Symposium on Human Aspects of Information Security and Assurance (HAISA) 1–3 July, Mytilene, Greece. . . ISBN: 978-1-84102-388-5.

  5. Greig, A. Renaud, K. & Flowerday, S. . (2015) An Ethnographic Study to Assess the Enactment of Information Security Culture in a Retail Store. Presented at the World Congress on Internet Security (WorldCIS) 19-21 October, Dublin, Ireland.. .

  6. Renaud, K. Flowerday. S. Othmane, L.B. & Volkamer, M. . (2015) “I Am Because We Are”: Developing and Nurturing an African Digital Security Culture. Presented at African Cyber Citizenship Conference (ACCC 2015) 2-4 November, Port Elizabeth, South Africa.. .

  7. Bayaga, A. & Flowerday, S.V. . (2014) Evaluating IT models and performance: Case of SMEs. Presented at the 26th Southern African Institute of Management Scientists (SAIMS), 14–17 September, South Africa. . . ISBN: 978-0-86970-784-5.

  8. Cilliers, L. & Flowerday, S.V. . (2014) Information security in a public safety, participatory crowdsourcing Smart City project. Presented at the World Congress on Internet Security (WorldCIS), 8–10 December, London, United Kingdom. . . ISBN: 978-1-908320-41-1. https://doi.org/10.1109/WorldCIS.2014.7028163

  9. Ngoqo, B. & Flowerday, S.V. . (2014) Linking student information security awareness and behavioural intent. Presented at the 8th International Symposium on Human Aspects of Information Security and Assurance (HAISA) 10–12 July, Plymouth, United Kingdom. . . ISBN: 978-1-84102-375-5.

  10. Ngoqo, B. & Flowerday, S.V. . (2014) Student information security behavioural intent: Assessing the actions and intentions of students in a developmental university. Presented at 7th International Conference of Education, Research and Innovation (iCERi), 17–19 November, Seville, Spain. . . ISBN: 978-84-617-2484-0.

  11. Piderit, R. & Flowerday, S.V. . (2014) Establishing trust in automotive supply chains: A South African case. Presented at the 26th Southern African Institute of Management Scientists (SAIMS), 14–17 September, South Africa. . . ISBN: 978-0-86970-784-5.

  12. Piderit, R. & Flowerday, S.V. . (2014) The risk relationship between trust and information sharing in automotive supply chains. Presented at the World Congress on Internet Security (WorldCIS), 8–10 December, London, United Kingdom. . . ISBN: 978-1-908320-41-4. https://doi.org/10.1109/WorldCIS.2014.7028171

  13. Tsegaye, T. & Flowerday, S.V. . (2014) Controls for protecting critical information infrastructure from cyberattacks. Presented at the World Congress on Internet Security (WorldCIS), 8–10 December, London, United Kingdom. . . ISBN: 978-1-908320-41-1. https://doi.org/10.1109/WorldCIS.2014.7028160

  14. Tuyikeze, T. & Flowerday, S.V. . (2014) Information security policy development and implementation: A content analysis approach. Presented at the 8th International Symposium on Human Aspects of Information Security and Assurance (HAISA) 10–12 July, Plymouth, United Kingdom. . . ISBN: 978-1-84102-375-5.

  15. Bayaga, A. Flowerday, S.V. & Cilliers, L. . (2013) Valuing information technology (IT) and operational risk management. Presented at ICT for Africa 2013, Harare, Zimbabwe, 20–23 February. . . ISBN: 978-9956-27-022-9.

  16. Cilliers, L. & Flowerday, S.V. . (2013) Trust in a crowd-sourcing system in order to improve public safety. 15th Annual Conference on World Wide Applications, Cape Town, South Africa, 10-13 September 2013. . . ISBN: 978-0-620-59570-4.

  17. Cilliers, L. Flowerday, S.V. & Satt, A. . (2013) Can information security produce trust in a public safety Smart City project? . Presented at Joint International Conference on Engineering Education and Research and International Conference on Information Technology, Cape Town, South Africa, 8–12 December. . . ISBN: 978-0-9922041-3-6.

  18. Isabirye, N. Flowerday, S.V. & Von Solms, R. . (2013) A developing country market model for voice-based information services. 15th Annual Conference on World Wide Applications, Cape Town, South Africa, 10-13 September 2013. . . ISBN: 978-0-620-59570-4.

  19. Ngoqo, B. & Flowerday, S.V. . (2013) Teaching information security concepts: An observational study of student mobile phone users. Presented at Joint International Conference on Engineering Education and Research and International Conference on Information Technology, Cape Town, South Africa, 8–12 December. . . ISBN: 978-0-9922041-3-6.

  20. Piderit, R. Flowerday, S.V. & Satt, A. . (2013) Identifying Barriers to Citizen Participation in Public Safety Crowdsourcing in East London.. Presented at Joint International Conference on Engineering Education and Research and International Conference on Information Technology, Cape Town, South Africa, 8–12 December.. . ISBN: 978-0-9922041-3-6.

  21. Tuyikeze, T. & Flowerday, S.V. . (2013) An information security policy maturity model (ISPMM). Presented at Joint International Conference on Engineering Education and Research and International Conference on Information Technology, Cape Town, South Africa, 8–12 December. . . ISBN: 978-0-9922041-3-6.

  22. Bayaga, A. & Flowerday, S.V. . (2012) Principal causes of information communication technology (ICT) risk failure in an SME. Presented at the ASE International Conference on Cyber Security, Washington DC, USA, 14–16 December. . . ISBN 978-0-7695-4938-5/12. https://doi.org/10.1109/CyberSecurity.2012.26

  23. Cilliers, L. & Flowerday, S.V. . (2012) Critical success factors for the successful implementation of telemedicine in the Eastern Cape, South Africa. IST Africa 2012. Dar es Salaam, Tanzania. . . ISBN: 978-1-905824-34-2.

  24. Gundu, T. & Flowerday, S.V. . (2012) The enemy within: A behavioural intention model and an information security awareness process. Presented at Information Security South Africa, Johannesburg, South Africa, 15–17 Aug. . . ISBN 978-1-4673-2158-7. https://doi.org/10.1109/ISSA.2012.6320437

  25. Rama, S. Flowerday, S.V. & Boucher, D. . (2012) Information confidentiality and the Chinese Wall model in government tender fraud. Presented at Information Security South Africa, Johannesburg, South Africa, 15–17 Aug. . . ISBN 978-1-4673-2159-4. https://doi.org/10.1109/ISSA.2012.6320438

  26. Allam, S. & Flowerday, S.V. . (2011) An adaptation of the awareness boundary model towards smartphone security. Presented at Information Security South Africa, Johannesburg, South Africa, 15–17 Aug. . . ISBN 978-1-4577-1482-5. https://doi.org/10.1109/ISSA.2011.6027527

  27. Boucher, D. & Flowerday, S.V.. (2011) Privacy: In pursuit of information security awareness. Information Security for South Africa (ISSA) 2011. .

  28. Cilliers, L. & Flowerday, S.V. . (2011) Will computer literacy affect telemedicine acceptance among health care workers? . Presented at Research Network for e-Skills (ReSNES), East London, South Africa, 3–4 Nov. . . ISBN 978-0-620-51804-8.

  29. Galpin, R. & Flowerday, S. . (2011) Online social networks: Enhancing user trust through effective controls and identity management. Presented at Information Security South Africa, Johannesburg, South Africa, 15–17 Aug. . . ISBN 978-1-4577-1482-5. https://doi.org/10.1109/ISSA.2011.6027520

  30. Grobler, M. Flowerday, S. Von Solms. R. & Venter H. . (2011) Cyber awareness initiatives in South Africa: A national perspective. Presented at the First IFIP TC9/TC11 Southern African Cyber Security Awareness (SACSAW), Gaborone, Botswana. May. . . ISBN 978-0-620-50050-0.

  31. Kruger, H. Flowerday, S.V. Drevin, L. & Steyn, T. . (2011) An assessment of the role of cultural factors in information security awareness. Presented at Information Security South Africa, Johannesburg, South Africa, 15-17 Aug. . . ISBN 978-1-4577-1482-5. https://doi.org/10.1109/ISSA.2011.6027505

  32. Ngoqo, B. & Flowerday, S. . (2011) Governing the internet technology adoption process for the small and medium hospitality enterprise (SMHE). Presented at the 4th International Conference of Engineering and Business Education, Cape Town, South Africa, 21–23 Nov. . . ISBN 978-0-620-52121-5.

  33. Ngoqo, B. Flowerday, S.V. & Herselman, M. . (2011) Small hospitality enterprises and the internet: An IT governance model for conducting business online. Presented at South African Institute Management Sciences (SAIMS), Durban, South Africa, 11–14 Sep. . . ISBN 978-1-86840-723-1.

  34. Piderit, R. Xazela, M. & Flowerday, S.V. . (2011) Adoption and use of a learning management system at a university: Environmental factors. Presented at South African Computer Lecturers’ Association, Ballito, South Africa, 6–8 July. . . ISBN 978-1-86840.

  35. Tarwireyi, P. Flowerday, S.V. & Bayaga, A. . (2011) Information security competence test with regards to password management. Presented at Information Security South Africa, Johannesburg, South Africa, 15–17 Aug. . . ISBN 978-1-4577-1482-5. https://doi.org/10.1109/ISSA.2011.6027524

  36. Allam, S. & Flowerday, S.V. . (2010) A model to measure the maturity of smartphone security at software consultancies. Presented at SAISMC, Port Elizabeth, South Africa. . . ISBN: 978-1-84102-256-7.

  37. Bayaga, A. & Flowerday, S.V. . (2010) A conceptual operational risk model for SMEs: Impact on organisational information technology. Presented at Information Security South Africa, Johannesburg, South Africa, 6–8 July. . . ISBN 978-1-4244-5494-5. https://doi.org/10.1109/ISSA.2010.5588329

  38. Lalla, H. & Flowerday, S.V.. (2010) Towards a standardised digital forensic process: E-mail forensics. Presented at Information Security for South Africa (ISSA) conference, 2010.. .

  39. Megaw, G. & Flowerday, S.V. . (2010) Phishing within e-commerce: A trust and confidence game. Presented at Information Security South Africa, Johannesburg, South Africa, 6–8 July. . . ISBN 978-1-4244-5494-5. https://doi.org/10.1109/ISSA.2010.5588333

  40. Deas, M. & Flowerday, S. . (2008) A user centric model for online identity and access management. Presented at Information Security South Africa, Johannesburg, South Africa. . . ISBN 978-1-86854-693-0.

  41. Isabirye, N. & Flowerday, S.V. . (2008) A model for eliciting user requirements specific to South African rural areas. Presented at SAICSIT, Wilderness, South Africa.. . ISBN 978-1-60558-286-3. https://doi.org/10.1145/1456659.1456674

  42. Flowerday, S. & Ranga, G. . (2007) Identification now and in the future: Social grant distribution process in South Africa. Presented at IFIPSec/2007 (TC11 WG 9.6/11.7), Johannesburg, South Africa.. . ISBN 978-0-387-72366-2.

  43. Ranga, G. & Flowerday, S.V. . (2007) Identity and access management for the distribution of social grants in South Africa. Presented at SAICSIT, Port Alfred, South Africa. . . ISBN 978-1-59593-938-8. https://doi.org/10.1145/1292491.1292506

  44. Flowerday, S.V. & Von Solms, R. . (2006) Trust: An element of information security. Presented at IFIPSec, Karlstad, Sweden and published by Springer Boston. . . ISBN 0-387-33405-x. https://doi.org/10.1007/0-387-33406-8_8