• Musarurwa, A., & Flowerday, S
    2019
    Information Privacy and BYOD: a case study of a Zimbabwean bank
    Presented at 18th Annual Security Conference: Securing the Interconnected World, 29-30 April 2019 in Las Vegas, USA
  • Gundu, T., Flowerday, S., & Renaud, K.
    2019
    Deliver Security Awareness Training, then Repeat: {Deliver; Measure Efficacy}
    In the proceedings of the 3rd ICTAS Conference (Information Communication Technology and Society), 6-8 March, in Durban, South Africa
    978-1-5386-7365-2/19/
  • Maoneke, P., Flowerday, S. & Isabirye, N.
    2018
    The Influence of Native Language on Password Composition and Security: A Socioculture Theoretical View
    In the Proceedings of the 33rd IFIP TC 11 International Conference, SEC 2018 Held at the 24th IFIP World Computer Congress, WCC, September 18–20, 2018 in Poznan, Poland
  • Maoneke, P., & Flowerday, S.
    2018
    Password Policies Adopted by South African Organisations: Influential Factors and Weaknesses
    In the Proceedings of Information Security South Africa (ISSA), 15-16 August 2018 in Pretoria, South Africa
  • Musarurwa, A., & Flowerday, S.
    2018
    The BYOD Information Security Challenge for CIOs
    In the proceedings of the Twelfth International Symposium on Human Aspects of Information Security & Assurance, 29-31 August 2018 in Dundee, Scotland, UK
    978-0-244-40254-9
  • Van der Schyff, K. & Flowerday, S.
    2018
    The development of a personality-driven social media dataveillance behaviour model for South Africa
    Presented at IFIP 8.11/11.13 Dewald Roode Information Security Research Workshop, June 2018 in Cape Town, South Africa
  • Piderit, R., Flowerday, S. & Ngono, M.
    2018
    A Model on How Physical Security Informs Cyber Security
    In the proceedings of the African Conference on Information Systems & Technology, 9-10 July 2018 in Cape Town, South Africa
    2467-8988
  • Dube, E., & Flowerday, S.
    2018
    Towards a holistic information security framework for Small and Medium Enterprises
    On the proceedings of The International conference on Computers, Data Management and Technology Applications (ICCDMTA' 2017), 28-29 January 2017, Cairo, Egypt
    978-1-5386-4427-0/18
  • Bayaga, A., Flowerday, S.V. & Cilliers, L.
    2017
    IT Risk and Chaos Theory: Effect on the performance of South African SMEs
    In the Conference proceedings of 20th World Multi-Conference on Systemics, Cybernetics and Informatics: WMSCI 2017, 8-11 July 2017, Florida, USA
  • Maoneke, P., Flowerday, S. & Isabirye, N.
    2017
    A model for usable and secure passphrases by multilingual user groups
    Presented at 16th Annual Security Conference: Discourses in Cyber Security, 18-20 April 2017 in Las Vegas, USA
  • Musarurwa, A., Flowerday, S. & Cilliers, L.
    2017
    Individual traits that determine the BYOD IS culture: A case study of the banking sector in Zimbabwe
    Presented at 16th Annual Security Conference: Discourses in Cyber Security, 18-20 April 2017 in Las Vegas, USA
  • Cilliers, L. & Flowerday, S.V., McLean, S.
    2016
    A smart city model for a developing country
    Presented at the International Conference on Information Resource Management (Conf-IRM) 18-20 May, Cape Town, South Africa
    978-0-473-35594-4
  • Frauenstein, E.D. & Flowerday S.V.
    2016
    Social Network Phishing: Becoming Habituated to Clicks and Ignorant to Threats?
    Presented at Information Security South Africa (ISSA), 17-18 August, Johannesburg, South Africa
    978-15090-2473-9/16
  • Gopeni, A., Wayi, N. & Flowerday, S.V.
    2016
    A feedback loop model to facilitate communication between citizens and local government in Buffalo City
    Presented at the International Conference on Information Resource Management (Conf-IRM) 18-20 May, Cape Town, South Africa
    978-0-473-35594-4
  • Cilliers, L. & Flowerday, S.V.
    2015
    The relationship between privacy, information security and the trustworthiness of a crowdsourcing system in a smart city
    Presented at the 9th International Symposium on Human Aspects of Information Security and Assurance (HAISA) 1-3 July, Mytilene, Greece
    978-1-84102-388-5
  • Greig, A. Renaud, K. & Flowerday, S.
    2015
    An Ethnographic Study to Assess the Enactment of Information Security Culture in a Retail Store
    Presented at the World Congress on Internet Security (WorldCIS) 19-21 October, Dublin, Ireland
  • Renaud, K. Flowerday. S. Othmane, L.B. & Volkamer, M.
    2015
    "I Am Because We Are" Developing and Nurturing African Digital Security Culture
    Presented at African Cyber Citizenship Conference (ACCC 2015) 2-4 November, Port Elizabeth, South Africa
  • Bayaga, A. & Flowerday, S.V.
    2014
    Evaluating IT models and performance: Case of SMEs
    Presented at the 26th Southern African Institute of Management Scientists (SAIMS), 14-17 September, South Africa
    978-0-86970-784-5
  • Cilliers, L. & Flowerday, S.V.
    2014
    Information security in a public safety, participatory crowdsourcing Smart City project
    Presented at the World Congress on Internet Security (WorldCIS), 8-10 December, London, United Kingdom
    978-1-908320-41-1
  • Ngoqo, B. & Flowerday, S.V.
    2014
    Student information security behavioural intent: Assessing the actions and intentions of students in a developmental university
    Presented at 7th International Conference of Education, Research and Innovation (iCERi), 17-19 November, Seville, Spain
    978-84-617-2484-0
  • Piderit, R. & Flowerday, S.V.
    2014
    Establishing trust in automotive supply chains: A South African case
    Presented at the 26th Southern African Institute of Management Scientists (SAIMS), 14-17 September, South Africa
    978-0-86970-784-5
  • Piderit, R. & Flowerday, S.V.
    2014
    The risk relationship between trust and information sharing in automotive supply chains
    Presented at the World Congress on Internet Security (WorldCIS), 8-10 December, London, United Kingdom
    978-1-908320-41-4
  • Tsegaye, T. & Flowerday, S.V.
    2014
    Controls for protecting critical information infrastructure from cyber attacks
    Presented at the World Congress on Internet Security (WorldCIS), 8-10 December, London, United Kingdom
    978-1-908320-41-1
  • Tuyikeze, T. & Flowerday, S.V.
    2014
    Information security policy development and implementation: A content analysis approach
    Presented at the 8th International Symposium on Human Aspects of Information Security and Assurance (HAISA) 10-12 July, Plymouth, United Kingdom
    978-1-84102-375-5
  • Piderit, R. Flowerday, S.V. & McLean, S.
    2014
    Motivating citizens to contribute to the Smart City: A public safety case study
    Presented at Mobility IoT (Internet of Things) 2014, Rome, Italy
  • Ngoqo, B. & Flowerday, S.V.
    2014
    Linking student information security awareness and behavioural intent
    Presented at the 8th International Symposium on Human Aspects of Information Security and Assurance (HAISA) 10–12 July, Plymouth, United Kingdom
    978-184102-375-5
  • Bayaga, A. Flowerday, S.V. & Cilliers, L.
    2013
    Valuing information technology (IT) and operational risk management
    Presented at ICT for Africa 2013, Harare, Zimbabwe, 20-23 February
    978-9956-27-022-9
  • Cilliers, L. & Flowerday, S.V.
    2013
    Trust in a crowd-sourcing system in order to improve public safety
    15th Annual Conference on World Wide Applications, Cape Town, South Africa, 10-13 September
    978-0-620-59570-4
  • Cilliers, L. Flowerday, S.V. & Satt, A.
    2013
    Can information security produce trust in a public safety Smart City project?
    Presented at Joint International Conference on Engineering Education and Research and International Conference on Information Technology, Cape Town, South Africa, 8-12 December
    978-0-9922041-3-6
  • Isabirye, N. Flowerday, S.V. & Von Solms, R.
    2013
    A developing country market model for voice-based information services
    15th Annual Conference on World Wide Applications, Cape Town, South Africa, 10-13 September
    978-0-620-59570-4
  • Ngoqo, B. & Flowerday, S.V.
    2013
    Teaching information security concepts: An observational study of student mobile phone users
    Presented at Joint International Conference on Engineering Education and Research and International Conference on Information Technology, Cape Town, South Africa, 8-12 December
    978-0-9922041-3-6
  • Piderit, R. Flowerday, S.V. & Satt, A.
    2013
    Identifying Barriers to Citizen Participation in Public Safety Crowdsourcing in East London
    Presented at Joint International Conference on Engineering Education and Research and International Conference on Information Technology, Cape Town, South Africa, 8-12 December
    978-0-9922041-3-6
  • Tuyikeze, T. & Flowerday, S.V.
    2013
    An information security policy maturity model (ISPMM)
    Presented at Joint International Conference on Engineering Education and Research and International Conference on Information Technology, Cape Town, South Africa, 8-12 December
    978-0-9922041-3-6
  • Bayaga, A. & Flowerday, S.V.
    2012
    Principal causes of information communication technology (ICT) risk failure in an SME
    Presented at the ASE International Conference on Cyber Security, Washington DC, USA, 14-16 December
    978-0-7695-4938-5/12
  • Cilliers, L. & Flowerday, S.V.
    2012
    Critical success factors for the successful implementation of telemedicine in the Eastern Cape, South Africa
    Presented at IST Africa 2012. Dar es Salaam, Tanzania
    978-1-905824-34-2
  • Gundu, T. & Flowerday, S.V.
    2012
    The enemy within: A behavioural intention model and an information security awareness process
    Presented at Information Security South Africa, Johannesburg, South Africa, 15-17 Aug
    978-1-4673-2158-7
  • Rama, S. Flowerday, S.V. & Boucher, D.
    2012
    Information confidentiality and the Chinese Wall model in government tender fraud
    Presented at Information Security South Africa, Johannesburg, South Africa, 15-17 Aug
    978-1-4673-2159-4
  • Lalla, H. Flowerday, S.V. Sanyamahwe, T. & Tarwireyi, P.
    2012
    A log file digital forensic model. Eighth IFIP WG 11.9
    Presented at the International Conference on Digital Forensics, Pretoria
    978-3-642-33961-5
  • Allam, S. & Flowerday, S.V.
    2011
    An adaptation of the awareness boundary model towards smartphone security
    Presented at Information Security South Africa, Johannesburg, South Africa, 15-17 Aug
    ISBN 978-1-4577-1482-5
  • Boucher, D. & Flowerday, S.V.
    2011
    Privacy: In pursuit of information security awareness
    Information Security for South Africa (ISSA) 2011
  • Cilliers, L. & Flowerday, S.V.
    2011
    Will computer literacy affect telemedicine acceptance among health care workers?
    Presented at Research Network for e-Skills (ReSNES), East London, South Africa, 3-4 Nov
    978-0-620-51804-8
  • Galpin, R. & Flowerday, S.
    2011
    Online social networks: Enhancing user trust through effective controls and identity management
    Presented at Information Security South Africa, Johannesburg, South Africa, 15-17 Aug
    978-1-4577-1482-5
  • Grobler, M. Flowerday, S. Von Solms. R. & Venter H.
    2011
    Cyber awareness initiatives in South Africa: A national perspective
    Presented at the First IFIP TC9/TC11 Southern African Cyber Security Awareness (SACSAW), Gaborone, Botswana, May
    978-0-620-50050-0
  • Kruger, H. Flowerday, S.V. Drevin, L. & Steyn, T.
    2011
    An assessment of the role of cultural factors in information security awareness
    Presented at Information Security South Africa, Johannesburg, South Africa, 15-17 Aug
    978-1-4577-1482-5
  • Ngoqo, B. & Flowerday, S.
    2011
    Governing the internet technology adoption process for the small and medium hospitality enterprise
    Presented at the 4th International Conference of Engineering and Business Education, Cape Town, South Africa, 21-23 Nov
    978-0-620-52121-5
  • Ngoqo, B. Flowerday, S.V. & Herselman, M.
    2011
    Small hospitality enterprises and the internet: An IT governance model for conducting business online
    Presented at South African Institute Management Scientist (SAIMS), Durban, South Africa, 11-14 Sep
    978-1-86840-723-1
  • Tarwireyi, P. Flowerday, S.V. & Bayaga, A.
    2011
    Information security competence test with regard to password management
    Presented at Information Security South Africa, Johannesburg, South Africa, 15-17 Aug
    978-1-4577-1482-5
  • Piderit, R. Xazela, M. & Flowerday, S.V.
    2011
    Adoption and use of a learning management system at a university: Environmental factors
    Presented at South African Computer Lecturers’ Association, Ballito, South Africa, 6–8 July
    978-1-86840
  • Allam, S. & Flowerday, S.V.
    2010
    A model to measure the maturity of smartphone security at software consultancies
    Presented at SAISMC, Port Elizabeth, South Africa
    978-1-84102-256-7
  • Bayaga, A. & Flowerday, S.V.
    2010
    A conceptual risk model for SMEs: Impact on organisational information technology
    Presented at Information Security South Africa, Johannesburg, South Africa, 6-8 July
    978-1-4244-5494-5
  • Lalla, H. & Flowerday, S.V.
    2010
    Towards a standardised digital forensic process: E-mail forensics
    Presented at Information Security for South Africa (ISSA) conference, 2010
  • Megaw, G. & Flowerday, S.V.
    2010
    Phishing within e-commerce: A confidence game
    Presented at Information Security South Africa, Johannesburg, South Africa, 6-8 July
    978-1-4244-5494-5
  • Deas, M. & Flowerday, S.
    2008
    A user centric model for online identity and access management
    Presented at Information Security South Africa, Johannesburg, South Africa
    978-1-86854-693-0
  • Isabirye, N. & Flowerday, S.V.
    2008
    A model for eliciting user requirements specific to South African rural areas
    Presented at SAICSIT, Wilderness, South Africa
    978-1-60558-286-3
  • Flowerday, S. & Ranga, G.
    2007
    Identification now and in the future: Social grant distribution process in South Africa
    Presented at IFIPSec/2007 (TC11 WG 9.6/11.7), Johannesburg, South Africa
    978-0-387-72366-2
  • Ranga, G. & Flowerday, S.V.
    2007
    Identity and access management for the distribution of social grants in South Africa
    Presented at SAICSIT, Port Alfred, South Africa
    978-1-59593-938-8
  • Flowerday, S.V. & Von Solms, R.
    2006
    Trust: An element of information security
    Presented at IFIPSec, Karlstad, Sweden
    0-387-33405-x