Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving the information security culture through monitoring and implementation actions illustrated through a case study., and . Comput. Secur., (2015)Information security culture and information protection culture: A validated assessment instrument., and . Comput. Law Secur. Rev., 31 (2): 243-256 (2015)Consumer perception of electronic-commerce., , and . South Afr. Comput. J., (2001)Defining and identifying dominant information security cultures and subcultures., and . Comput. Secur., (2017)Validation of an Information Privacy Perception Instrument at a Zimbabwean University., , and . HAISA, volume 593 of IFIP Advances in Information and Communication Technology, page 300-314. Springer, (2020)Validating an information privacy governance questionnaire to measure the perception of employees., , and . Inf. Comput. Secur., 29 (5): 761-786 (2021)A model for managing trust. International Journal of Manpower, 23 (8): 754-769 (2002)A conceptual framework for a student personal information privacy culture at universities in Zimbabwe., , and . ICICIS, volume 12 of Kalpa Publications in Computing, page 143-156. EasyChair, (2019)A conceptual privacy governance framework., , and . ICTAS, page 1-6. IEEE, (2019)An Information Security Culture Model Validated with Structural Equation Modelling., and . HAISA, page 11-21. University of Plymouth, (2015)