• Cilliers, L. & Flowerday, S.V., McLean, S.
    2016
    A crowdsourcing, smart city model for a developing country
    Presented at the International Conference on Information Resource Management (Conf-IRM) 18-20 May, Cape Town, South Africa. . .
    978-0-473-35594-4
  • Frauenstein, E.D. & Flowerday S.V.
    2016
    Social Network Phishing: Becoming Habituated to Clicks and Ignorant to Threats?
    Presented at Information Security South Africa (ISSA), 17-18 August, Johannesburg, South Africa.
  • Gopeni, A., Wayi, N. & Flowerday, S.V.
    2016
    A feedback loop model to facilitate communication between citizens and local government in Buffalo City
    Presented at the International Conference on Information Resource Management (Conf-IRM) 18-20 May, Cape Town, South Africa
    978-0-473-35594-4
  • Cilliers, L. & Flowerday, S.V.
    2015
    The relationship between privacy, information security and the trustworthiness of a crowdsourcing system in a smart city.
    Presented at the 9th International Symposium on Human Aspects of Information Security and Assurance (HAISA) 1–3 July, Mytilene, Greece
    978-1-84102-388-5
  • Greig, A. Renaud, K. & Flowerday, S.
    2015
    An Ethnographic Study to Assess the Enactment of Information Security Culture in a Retail Store
    Presented at the World Congress on Internet Security (WorldCIS) 19-21 October, Dublin, Ireland.. .
  • Renaud, K. Flowerday. S. Othmane, L.B. & Volkamer, M.
    2015
    I Am Because We Are: Developing and Nurturing an African Digital Security Culture.
    Presented at African Cyber Citizenship Conference (ACCC 2015) 2-4 November, Port Elizabeth, South Africa.. .
  • Bayaga, A. & Flowerday, S.V.
    2014
    Evaluating IT models and performance
    Case of SMEs. Presented at the 26th Southern African Institute of Management Scientists (SAIMS), 14–17 September, South Africa
    978-0-86970-784-5
  • Cilliers, L. & Flowerday, S.V.
    2014
    Information security in a public safety, participatory crowdsourcing Smart City project
    Presented at the World Congress on Internet Security (WorldCIS), 8–10 December, London, United Kingdom
    978-1-84102-375-5
  • Ngoqo, B. & Flowerday, S.V.
    2014
    Student information security behavioural intent: Assessing the actions and intentions of students in a developmental university
    Presented at 7th International Conference of Education, Research and Innovation (iCERi), 17–19 November, Seville, Spain
    978-84-617-2484-0
  • Piderit, R. & Flowerday, S.V.
    2014
    Establishing trust in automotive supply chains: A South African case
    Presented at the 26th Southern African Institute of Management Scientists (SAIMS), 14–17 September, South Africa
    978-0-86970-784-5
  • Piderit, R. & Flowerday, S.V.
    2014
    The risk relationship between trust and information sharing in automotive supply chains
    Presented at the World Congress on Internet Security (WorldCIS), 8–10 December, London, United Kingdom
    978-1-908320-41-4
  • Tsegaye, T. & Flowerday, S.V.
    2014
    Controls for protecting critical information infrastructure from cyberattacks
    Presented at the World Congress on Internet Security (WorldCIS), 8–10 December, London, United Kingdom
    978-1-908320-41-1
  • Tsegaye, T. & Flowerday, S.V.
    2014
    Controls for protecting critical information infrastructure from cyberattacks
    Presented at the World Congress on Internet Security (WorldCIS), 8–10 December, London, United Kingdom
    978-1-908320-41-1
  • Tuyikeze, T. & Flowerday, S.V.
    2014
    Information security policy development and implementation: A content analysis approach
    Presented at the 8th International Symposium on Human Aspects of Information Security and Assurance (HAISA) 10–12 July, Plymouth, United Kingdom
    978-1-84102-375-5
  • Bayaga, A. Flowerday, S.V. & Cilliers, L.
    2013
    Valuing information technology (IT) and operational risk management
    Presented at ICT for Africa 2013, Harare, Zimbabwe, 20–23 February
    978-9956-27-022-9
  • Cilliers, L. & Flowerday, S.V.
    2013
    Trust in a crowd-sourcing system in order to improve public safety
    15th Annual Conference on World Wide Applications, Cape Town, South Africa, 10-13 September 2013
    978-0-620-59570-4
  • Cilliers, L. Flowerday, S.V. & Satt, A.
    2013
    Can information security produce trust in a public safety Smart City project?
    Presented at Joint International Conference on Engineering Education and Research and International Conference on Information Technology, Cape Town, South Africa, 8–12 December
    978-0-9922041-3-6
  • Isabirye, N. Flowerday, S.V. & Von Solms, R.
    2013
    A developing country market model for voice-based information services
    15th Annual Conference on World Wide Applications, Cape Town, South Africa, 10-13 September 2013
    978-0-620-59570-4
  • Ngoqo, B. & Flowerday, S.V.
    2013
    Teaching information security concepts: An observational study of student mobile phone users
    Presented at Joint International Conference on Engineering Education and Research and International Conference on Information Technology, Cape Town, South Africa, 8–12 December
    978-0-9922041-3-6
  • Piderit, R. Flowerday, S.V. & Satt, A.
    2013
    Identifying Barriers to Citizen Participation in Public Safety Crowdsourcing in East London
    Presented at Joint International Conference on Engineering Education and Research and International Conference on Information Technology, Cape Town, South Africa, 8–12 December
    978-0-9922041-3-6
  • Tuyikeze, T. & Flowerday, S.V.
    2013
    An information security policy maturity model (ISPMM)
    Presented at Joint International Conference on Engineering Education and Research and International Conference on Information Technology, Cape Town, South Africa, 8–12 December
    978-0-9922041-3-6
  • Bayaga, A. & Flowerday, S.V.
    2012
    Principal causes of information communication technology (ICT) risk failure in an SME
    Presented at the ASE International Conference on Cyber Security, Washington DC, USA, 14–16 December
    978-0-7695-4938-5/12
  • Cilliers, L. & Flowerday, S.V.
    2012
    Critical success factors for the successful implementation of telemedicine in the Eastern Cape, South Africa
    IST Africa 2012. Dar es Salaam, Tanzania
    978-1-905824-34-2
  • Gundu, T. & Flowerday, S.V.
    2012
    The enemy within: A behavioural intention model and an information security awareness process
    Presented at Information Security South Africa, Johannesburg, South Africa, 15–17 Aug
    978-1-4673-2158-7
  • Rama, S. Flowerday, S.V. & Boucher, D.
    2012
    Information confidentiality and the Chinese Wall model in government tender fraud
    Presented at Information Security South Africa, Johannesburg, South Africa, 15–17 Aug
    978-1-4673-2159-4
  • Allam, S. & Flowerday, S.V.
    2011
    An adaptation of the awareness boundary model towards smartphone security
    Presented at Information Security South Africa, Johannesburg, South Africa, 15–17 Aug
    ISBN 978-1-4577-1482-5
  • Boucher, D. & Flowerday, S.V.
    2011
    Privacy: In pursuit of information security awareness
    Information Security for South Africa (ISSA) 2011
  • Cilliers, L. & Flowerday, S.V.
    2011
    Will computer literacy affect telemedicine acceptance among health care workers?
    resented at Research Network for e-Skills (ReSNES), East London, South Africa, 3–4 Nov
    978-0-620-51804-8
  • Galpin, R. & Flowerday, S.
    2011
    Online social networks: Enhancing user trust through effective controls and identity management
    Presented at Information Security South Africa, Johannesburg, South Africa, 15–17 Aug
    978-1-4577-1482-5
  • Grobler, M. Flowerday, S. Von Solms. R. & Venter H.
    2011
    Cyber awareness initiatives in South Africa: A national perspective
    Presented at the First IFIP TC9/TC11 Southern African Cyber Security Awareness (SACSAW), Gaborone, Botswana. May
    978-0-620-50050-0
  • Kruger, H. Flowerday, S.V. Drevin, L. & Steyn, T.
    2011
    An assessment of the role of cultural factors in information security awareness
    Presented at Information Security South Africa, Johannesburg, South Africa, 15-17 Aug
    978-1-4577-1482-5
  • Ngoqo, B. & Flowerday, S.
    2011
    Governing the internet technology adoption process for the small and medium hospitality enterprise (SMHE)
    Presented at the 4th International Conference of Engineering and Business Education, Cape Town, South Africa, 21–23 Nov
    978-0-620-52121-5
  • Ngoqo, B. Flowerday, S.V. & Herselman, M.
    2011
    Small hospitality enterprises and the internet: An IT governance model for conducting business online
    Presented at South African Institute Management Sciences (SAIMS), Durban, South Africa, 11–14 Sep
    978-1-86840-723-1
  • Tarwireyi, P. Flowerday, S.V. & Bayaga, A.
    2011
    Information security competence test with regards to password management
    Presented at Information Security South Africa, Johannesburg, South Africa, 15–17 Aug
    978-1-4577-1482-5
  • Tarwireyi, P. Flowerday, S.V. & Bayaga, A.
    2011
    Information security competence test with regards to password management
    Presented at Information Security South Africa, Johannesburg, South Africa, 15–17 Aug
    978-1-4577-1482-5
  • Allam, S. & Flowerday, S.V.
    2010
    A model to measure the maturity of smartphone security at software consultancies
    Presented at SAISMC, Port Elizabeth, South Africa
    978-1-84102-256-7
  • Bayaga, A. & Flowerday, S.V.
    2010
    A conceptual operational risk model for SMEs: Impact on organisational information technology
    Presented at Information Security South Africa, Johannesburg, South Africa, 6–8 July
    978-1-4244-5494-5
  • Lalla, H. & Flowerday, S.V.
    2010
    Towards a standardised digital forensic process: E-mail forensics
    Presented at Information Security for South Africa (ISSA) conference, 2010
  • Megaw, G. & Flowerday, S.V.
    2010
    Phishing within e-commerce: A trust and confidence game
    Presented at Information Security South Africa, Johannesburg, South Africa, 6–8 July
    978-1-4244-5494-5
  • Deas, M. & Flowerday, S.
    2008
    A user centric model for online identity and access management
    Presented at Information Security South Africa, Johannesburg, South Africa
    978-1-86854-693-0
  • Isabirye, N. & Flowerday, S.V.
    2008
    A model for eliciting user requirements specific to South African rural areas
    Presented at SAICSIT, Wilderness, South Africa
    978-1-60558-286-3
  • Flowerday, S. & Ranga, G.
    2007
    dentification now and in the future: Social grant distribution process in South Africa
    Presented at IFIPSec/2007 (TC11 WG 9.6/11.7), Johannesburg, South Africa
    978-0-387-72366-2
  • Ranga, G. & Flowerday, S.V.
    2007
    Identity and access management for the distribution of social grants in South Africa. Presented at SAICSIT, Port Alfred, South Africa
    Presented at SAICSIT, Port Alfred, South Africa
    978-1-59593-938-8
  • Flowerday, S.V. & Von Solms, R.
    2006
    Trust: An element of information security
    Presented at IFIPSec, Karlstad, Sweden
    0-387-33405-x. https://doi.org/10.1007/0-387-33406-8_8