• Van der Schyff, K., & Flowerday, S.
    2019
    Social media surveillance: A personality-driven behaviour model.
    S A Journal of Information Management. (accepted and waiting to be published)
  • Musarurwa, A., Flowerday, S., Cilliers, L.
    2019
    The bring-your-own-device unintended administrator: A perspective from Zimbabwe
    E J Information Systems Developing Countries
  • Maoneke, P., & Flowerday, S.
    2018
    Password Policies Adopted by South African Organizations: Influential Factors and Weaknesses.
    Springer Nature Switzerland AG
  • Musarurwa, A., Flowerday, S. & Cilliers, L
    2018
    An information security behavioral model for the BYOD
    SA Journal of Information Management,
  • Renaud, R., Flowerday, S., Warkentin, M., Cockshott, P., & Orgeron, C.
    2018
    Is the Responsibilization of Cyber Security Risk Reasonable and Judicious?
    Computers & Security
  • Cilliers, L., & Flowerday, S.
    2017
    Factors that influence the usability of a participatory IVR crowdsourcing system in a smart city
    South African Computer Journal
  • Bayaga, A., Flowerday, S.V. & Cilliers, L.
    2017
    IT Risk and Chaos Theory: Effect on the performance of South African SMEs
    Journal of Systemics, Cybernetics and Informatics
  • Olaitan, O., & Flowerday, S.
    2017
    Critical success factors in introducing performance measurement metrics for small and medium-sized enterprises (SMEs)
    Int. J. of Education Economics and Development
  • Renaud, K. & Flowerday, S.V.
    2017
    Contemplating Human-Centred Security & Privacy Research
    Journal of Information Security and Applications
  • Bosha, E., Cilliers, L., & Flowerday, S.
    2017
    Incentive Theory for a Participatory Crowdsourcing Project in a Developing Country
    SA Journal of Information Management
  • Breetzke, T. & Flowerday, S.V
    2016
    The Usability of IVRs for Smart City Crowdsourcing in Developing Cities
    The Electronic Journal of Information Systems in Developing Countries (EJISDC)
  • Flowerday, S.V. & Tuyikeze, T.
    2016
    Information Security Policy Development and Implementation: the What, How and Who. Computers & Security
    Elsevier
  • Olutoyin, O. & Flowerday, S.V.
    2016
    Successful IT Governance in SMEs: An application of the Technology–Organisation–Environment theory.
    South African Journal of Information Management
  • Renaud, K. Flowerday, S.V. English, R. & Volkamer, M.
    2016
    Why Don’t UK Citizens Protest Against Privacy-Invading Dragnet Surveillance?
    Information & Computer Security
  • Isabirye, N. Flowerday, S.V. Nanavati, A. & Von Solms, R.
    2015
    Building technology trust in a rural agricultural e-marketplace: A user requirements perspective.
    The Electronic Journal of Information Systems in Developing Countries (EJISDC)
  • Ngoqo, B. & Flowerday, S.V.
    2015
    Exploring the relationship between student mobile information security awareness and behavioural intent.
    Information & Computer Security
  • Ngoqo, B. & Flowerday, S.V.
    2015
    Information Security Behaviour Profiling Framework (ISBPF) for student mobile phone users
    Computers & Security
  • Allam, S. Flowerday, S.V. & Flowerday, E.V.
    2014
    Smartphone information security awareness: A victim of operational pressures.
    Computers & Security
  • Cilliers, L. & Flowerday, S.V.
    2014
    Information privacy concerns in a participatory crowdsourcing Smart City project
    Journal of Internet Technology and Secured Transactions
  • Cilliers, L. & Flowerday, S.V.
    2014
    User acceptance of telemedicine by health care workers: A case of the Eastern Cape Province, South Africa
    The Electronic Journal of Information Systems in Developing Countries (EJISDC)
  • Johl, C. Von Solms, R. & Flowerday, S.V.
    2014
    Information technology governance in the context of Higher Education governance in South Africa.
    South African Journal of Higher Education
  • Ndiege, J.R.A., Herselman, M.E. & Flowerday, S.V.
    2014
    Absorptive capacity and ICT adoption strategies for SMEs: A case study in Kenya
    The African Journal of Information Systems
  • Tsegaye, T. & Flowerday, S.V.
    2014
    Defending critical information infrastructure from cyberattacks through the use of security controls in layers.
    International Journal for Information Security Research
  • Tsegaye, T. & Flowerday, S.V.
    2014
    Defending critical information infrastructure from cyberattacks through the use of security controls in layers.
    International Journal for Information Security Research
  • Bayaga, A. Flowerday, S.V. & Piderit, R.
    2013
    ICT operational risk management (ORM) and performances of a financial SME
    The Pakistan Development Review
  • Gundu, T. & Flowerday, S.V.
    2013
    Ignorance to awareness: Towards an information security awareness process
    SAIEE African Research Journal
  • Johl, C. Von Solms, R. & Flowerday S.V.
    2013
    Information technology governance process maturity in Higher Education Institutions in South Africa
    South African Journal of Higher Education
  • Mgijima, B. & Flowerday, S.V.
    2013
    Internet success for the small and medium hospitality enterprise: Influence of the owner or manager
    African Journal of Business Management
  • Ndiege, J.R.A., Herselman, M.E. & Flowerday, S.V.
    2012
    Absorptive capacity: relevancy for large and small enterprises
    South African Journal of Information Management
  • Ndiege, J.R.A., Herselman, M.E. & Flowerday, S.V.
    2012
    Information and communication technologies within small and medium enterprises in developing economies
    African Journal of Business Management
  • Piderit, R. Flowerday, S. & Von Solms, R.
    2011
    Enabling information sharing by establishing trust in supply chains: a case study in the South African automotive industry
    South African Journal of Information Management
  • Flowerday, S.V. & Von Solms, R.
    2007
    What constitutes information integrity?
    South African Journal of Information Management
  • Flowerday, S.V. Blundell, A.W. & Von Solms, R.
    2006
    Continuous auditing technologies and models: A discussion.
    Information Management
  • Flowerday, S.V. & Von Solms, R.
    2005
    Real-time information integrity system integrity data integrity continuous assurances. Computers & Security
    Computers & Security