Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using Participatory Crowdsourcing in South Africa to Create a Safer Living Environment., , and . IJDSN, (2013)Motivating Citizens to Contribute to the Smart City: A Public Safety Case Study., , and . IoT360 (2), volume 151 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 131-136. Springer, (2014)An assessment of the role of cultural factors in information security awareness., , , and . ISSA, ISSA, Pretoria, South Africa, (2011)PoPI Compliance through Access Control of Electronic Health Records., and . SAICSIT, page 21:1-21:9. ACM, (2019)The bring-your-own-device unintended administrator: A perspective from Zimbabwe., , and . Electron. J. Inf. Syst. Dev. Ctries., (2019)Why don't UK citizens protest against privacy-invading dragnet surveillance?, , , and . Inf. Comput. Secur., 24 (4): 400-415 (2016)Real-time information integrity = system integrity + data integrity + continuous assurances., and . Comput. Secur., 24 (8): 604-613 (2005)Continuous auditing technologies and models: A discussion., , and . Comput. Secur., 25 (5): 325-331 (2006)The Relationship Between Privacy, Information Security and the Trustworthiness of a Crowdsourcing System in a Smart City., and . HAISA, page 243-255. University of Plymouth, (2015)A User Centric Model for Online Identity and Access Management., and . ISSA, page 1-21. ISSA, Pretoria, South Africa, (2008)