From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The Threats that Insiders Pose to Critical Infrastructure – a South African Perspective., , и . HAISA, стр. 279-289. University of Plymouth, (2016)Environmental Uncertainty and End-User Security Behaviour: A Study During the COVID-19 Pandemic., , и . World Conference on Information Security Education, том 615 из IFIP Advances in Information and Communication Technology, стр. 111-125. Springer, (2021)Investigating the Knowledge-Behaviour Gap in Mitigating Personal Information Compromise., и . HAISA, стр. 236-245. University of Plymouth, (2018)How the Certified Information Systems Security Professional certification supports Digital Forensic processes., , и . INC, стр. 63-72. University of Plymouth, (2012)Understanding the Adoption of Wearable Technology in South African Organisations., , и . CONF-IRM, стр. 5. (2016)Mitigating the Ransomware Threat: A Protection Motivation Theory Approach., и . ISSA (Revised Selected Papers), том 973 из Communications in Computer and Information Science, стр. 163-175. Springer, (2018)Lessons Learned from an Organizational Information Security Awareness Campaign., и . World Conference on Information Security Education, том 557 из IFIP Advances in Information and Communication Technology, стр. 129-142. Springer, (2019)Security awareness and adoption of security controls by smartphone users., , , и . InfoSec, стр. 99-104. IEEE, (2015)Determinants of E-Government Use in Developing Countries: The Influence of Privacy and Security Concerns., и . NextComp, стр. 1-7. IEEE, (2019)Exploring end-user smartphone security awareness within a South African context., и . ISSA, стр. 1-7. IEEE, (2014)