Author of the publication

Deploying Design Science Research in Graduate Computing Studies in South Africa.

, , , and . AMCIS, Association for Information Systems, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Predicting technology acceptance and adoption by the elderly: a qualitative study., and . SAICSIT, volume 338 of ACM International Conference Proceeding Series, page 210-219. ACM, (2008)Deploying Design Science Research in Graduate Computing Studies in South Africa., , , and . AMCIS, Association for Information Systems, (2015)Pictures or questions?: examining user responses to association-based authentication., and . BCS HCI, page 98-107. ACM, (2010)The many faces of active cyber., , and . Netw. Secur., 2019 (2): 20 (2019)Age-appropriate password "best practice" ontologies for early educators and parents., and . Int. J. Child Comput. Interact., (2020)Smart home cybersecurity awareness and behavioral incentives., , , and . Inf. Comput. Secur., 31 (5): 545-575 (2023)Accessible authentication: dyslexia and password strategies., , and . Inf. Comput. Secur., 29 (4): 604-624 (2021)Cybersecurity Insights Gleaned from World Religions., and . Comput. Secur., (September 2023)Why do People Adopt or Reject Smartphone Security Tools?, and . HAISA, page 135-144. University of Plymouth, (2016)Positioning Diplomacy Within a Strategic Response to the Cyber Conflict Threat., , and . STAST, volume 13176 of Lecture Notes in Computer Science, page 131-152. Springer, (2021)