Author of the publication

Validating an information privacy governance questionnaire to measure the perception of employees.

, , and . Inf. Comput. Secur., 29 (5): 761-786 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving the information security culture through monitoring and implementation actions illustrated through a case study., and . Comput. Secur., (2015)Consumer perception of electronic-commerce., , and . South Afr. Comput. J., (2001)Defining and identifying dominant information security cultures and subcultures., and . Comput. Secur., (2017)Information security culture and information protection culture: A validated assessment instrument., and . Comput. Law Secur. Rev., 31 (2): 243-256 (2015)Validation of an Information Privacy Perception Instrument at a Zimbabwean University., , and . HAISA, volume 593 of IFIP Advances in Information and Communication Technology, page 300-314. Springer, (2020)Validating an information privacy governance questionnaire to measure the perception of employees., , and . Inf. Comput. Secur., 29 (5): 761-786 (2021)A model for managing trust. International Journal of Manpower, 23 (8): 754-769 (2002)A conceptual privacy governance framework., , and . ICTAS, page 1-6. IEEE, (2019)A conceptual framework for a student personal information privacy culture at universities in Zimbabwe., , and . ICICIS, volume 12 of Kalpa Publications in Computing, page 143-156. EasyChair, (2019)An Information Security Culture Model Validated with Structural Equation Modelling., and . HAISA, page 11-21. University of Plymouth, (2015)