Journal Articles

Skip Navigation LinksHome : Journal Publications
  1. Breetzke, T. & Flowerday, S.V.. (2016) The Usability of IVRs for Smart City Crowdsourcing in Developing Cities. The Electronic Journal of Information Systems in Developing Countries (EJISDC)

  2. Flowerday, S.V. & Tuyikeze, T. . (2016) Information Security Policy Development and Implementation: the What, How and Who. Computers & Security https://doi.org/10.1016/j.cose.2016.06.002

  3. Olutoyin, O. & Flowerday, S.V.. (2016) Successful IT Governance in SMEs: An application of the Technology–Organisation–Environment theory. South African Journal of Information Management https://doi.org/10.4102/sajim.v18i1.696

  4. Renaud, K. Flowerday, S.V. English, R. & Volkamer, M. . (2016) Why don't UK citizens protest against privacy-invading dragnet surveillance?. Information & Computer Security https://doi.org/10.1108/ICS-06-2015-0024

  5. Isabirye, N. Flowerday, S.V. Nanavati, A. & Von Solms, R. . (2015) Building technology trust in a rural agricultural e-marketplace: A user requirements perspective. The Electronic Journal of Information Systems in Developing Countries (EJISDC)

  6. Ngoqo, B. & Flowerday, S.V.. (2015) Exploring the relationship between student mobile information security awareness and behavioural intent. Information & Computer Security https://doi.org/10.1108/ICS-10-2014-0072

  7. Ngoqo, B. & Flowerday, S.V.. (2015) Information Security Behaviour Profiling Framework (ISBPF) for student mobile phone users. Computers & Security https://doi.org/10.1016/j.cose.2015.05.011

  8. Allam, S. Flowerday, S.V. & Flowerday, E.V.. (2014) Smartphone information security awareness: A victim of operational pressures. Computers & Security https://doi.org/10.1016/j.cose.2014.01.005

  9. Cilliers, L. & Flowerday, S.V.. (2014) Information privacy concerns in a participatory crowdsourcing Smart City project. Journal of Internet Technology and Secured Transactions doi.org/10.20533/jitst.2046.3723.2014.0036

  10. Cilliers, L. & Flowerday, S.V.. (2014) User acceptance of telemedicine by health care workers: A case of the Eastern Cape Province, South Africa. The Electronic Journal of Information Systems in Developing Countries (EJISDC)

  11. Johl, C. Von Solms, R. & Flowerday, S.V. . (2014) Information technology governance in the context of Higher Education governance in South Africa. South African Journal of Higher Education https://doi.org/10.20853/28-1-328

  12. Ndiege, J.R.A., Herselman, M.E. & Flowerday, S.V.. (2014) Absorptive capacity and ICT adoption strategies for SMEs: A case study in Kenya. The African Journal of Information Systems

  13. Tsegaye, T. & Flowerday, S.V. . (2014) Defending critical information infrastructure from cyberattacks through the use of security controls in layers. International Journal for Information Security Research

  14. Bayaga, A. Flowerday, S.V. & Piderit, R. . (2013) ICT operational risk management (ORM) and performances of a financial SME. The Pakistan Development Review

  15. Bhana, B. Flowerday S.V. & Satt, A.. (2013) Using participatory crowdsourcing in South Africa to create a safer living environment. International Journal of Distributed Sensor Networks https://doi.org/10.1155/2013/907196

  16. Gundu, T. & Flowerday, S.V. . (2013) Ignorance to awareness: Towards an information security awareness process. SAIEE African Research Journal

  17. Johl, C. Von Solms, R. & Flowerday S.V. . (2013) Information technology governance process maturity in Higher Education Institutions in South Africa.. South African Journal of Higher Education

  18. Mgijima, B. & Flowerday, S.V. . (2013) Internet success for the small and medium hospitality enterprise: Influence of the owner or manager. African Journal of Business Management

  19. Ndiege, J.R.A., Herselman, M.E. & Flowerday, S.V. . (2012) Absorptive capacity: relevancy for large and small enterprises. South African Journal of Information Management https://doi.org/10.4102/sajim.v14i1.520

  20. Ndiege, J.R.A., Herselman, M.E. & Flowerday, S.V. . (2012) Information and communication technologies within small and medium enterprises in developing economies. African Journal of Business Management https://doi.org/10.5897/AJBM11.2866

  21. Piderit, R. Flowerday, S. & Von Solms, R. . (2011) Enabling information sharing by establishing trust in supply chains: a case study in the South African automotive industry. South African Journal of Information Management https://doi.org/10.4102/sajim.v13i1.473

  22. Flowerday, S.V. & Von Solms, R. . (2007) What constitutes information integrity?. South African Journal of Information Management https://doi.org/10.4102/sajim.v9i4.201

  23. Flowerday, S.V. Blundell, A.W. & Von Solms, R. . (2006) Continuous auditing technologies and models: A discussion. Computers & Security https://doi.org/10.1016/j.cose.2006.06.004

  24. Flowerday, S.V. & Von Solms, R. . (2005) Real-time information integrity system integrity data integrity continuous assurances. Computers & Security https://doi.org/10.1016/j.cose.2005.08.004