


default search action
Jacques Ophoff
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Tim Wright, Zainab Ruhwanya
, Jacques Ophoff
:
Using the theory of interpersonal behaviour to explain employees' cybercrime preventative behaviour during the pandemic. Inf. Comput. Secur. 32(4): 436-458 (2024) - [c37]Dominic Button, Jacques Ophoff
, Alastair Irons
, Sharon McDonald
:
"Probably Put Some Sort of Fear in": Investigating the Role of Heuristics in Cyber Awareness Messaging for Small to Medium Sized Enterprises. HAISA (2) 2024: 101-115 - [c36]Lukas Smith, Suzanne Prior
, Jacques Ophoff
:
Investigating the Accessibility and Usability of Multi-factor Authentication for Young People. HCI (61) 2024: 129-135 - [c35]Nicole Carle, Jacques Ophoff
:
Using Visual Cues to Enhance Phishing Education for Children. World Conference on Information Security Education 2024: 21-35 - [c34]Suzanne Prior
, Jacques Ophoff
:
Lessons Learnt from Using Educational Phishing Materials with UK Primary School Children. World Conference on Information Security Education 2024: 36-49 - 2023
- [j5]Anusha Bhana, Jacques Ophoff
:
Risk homeostasis and security fatigue: a case study of data specialists. Inf. Comput. Secur. 31(3): 267-280 (2023) - [c33]Tim Wright, Zainab Ruhwanya
, Jacques Ophoff
:
The Influence of Interpersonal Factors on Telecommuting Employees' Cybercrime Preventative Behaviours During the Pandemic. HAISA 2023: 445-458 - [c32]Jacques Ophoff
, Karen Vera Renaud
:
Universal Design for Website Authentication: Views and Experiences of Senior Citizens. ASEW 2023: 46-53 - 2022
- [c31]Anusha Bhana, Jacques Ophoff
:
Security Fatigue: A Case Study of Data Specialists. HAISA 2022: 275-284 - [c30]Jack Bowker, Jacques Ophoff
:
Reducing Exposure to Hateful Speech Online. SAI (3) 2022: 630-645 - 2021
- [j4]Karen Renaud
, Graham Johnson
, Jacques Ophoff
:
Accessible authentication: dyslexia and password strategies. Inf. Comput. Secur. 29(4): 604-624 (2021) - [c29]Jacques Ophoff, Karen Renaud:
Revealing the Cyber Security Non-Compliance "Attribution Gulf". HICSS 2021: 1-10 - [c28]Matt Bishop
, Lynette Drevin
, Lynn Futcher
, Wai Sze Leung
, Natalia G. Miloslavskaya
, Erik L. Moore
, Jacques Ophoff
, Suné von Solms
:
A Brief History and Overview of WISE. World Conference on Information Security Education 2021: 3-9 - [c27]Popyeni Kautondokwa
, Zainab Ruhwanya
, Jacques Ophoff
:
Environmental Uncertainty and End-User Security Behaviour: A Study During the COVID-19 Pandemic. World Conference on Information Security Education 2021: 111-125 - [c26]Jacques Ophoff
, Graham Johnson
, Karen Renaud
:
Cognitive function vs. accessible authentication: insights from dyslexia research. W4A 2021: 19:1-19:5 - 2020
- [c25]Adéle da Veiga
, Jacques Ophoff
:
Concern for Information Privacy: A Cross-Nation Study of the United Kingdom and South Africa. HAISA 2020: 16-29 - [c24]Karen Renaud
, Graham Johnson
, Jacques Ophoff
:
Dyslexia and Password Usage: Accessibility in Authentication Design. HAISA 2020: 259-268 - [c23]Zainab Ruhwanya
, Jacques Ophoff
:
Critical Analysis of Information Security Culture Definitions. HAISA 2020: 353-365 - [c22]Anass Bayaga, Michael Kyobe, Jacques Ophoff
:
Criticism of the role of trust in e-government services. ICTAS 2020: 1-6 - [c21]Anzel Berndt, Jacques Ophoff
:
Exploring the Value of a Cyber Threat Intelligence Function in an Organization. WISE 2020: 96-109 - [i1]James Conacher, Karen Renaud, Jacques Ophoff:
Caveat Venditor, Used USB Drive Owner. CoRR abs/2006.11354 (2020)
2010 – 2019
- 2019
- [j3]Tasneem Khan, Kevin Johnston, Jacques Ophoff
:
The Impact of an Augmented Reality Application on Learning Motivation of Students. Adv. Hum. Comput. Interact. 2019: 7208494:1-7208494:14 (2019) - [c20]Zainab Ruhwanya
, Jacques Ophoff
:
Information Security Culture Assessment of Small and Medium-Sized Enterprises in Tanzania. ICT4D (1) 2019: 776-788 - [c19]Juan-Marc Scrimgeour, Jacques Ophoff
:
Lessons Learned from an Organizational Information Security Awareness Campaign. World Conference on Information Security Education 2019: 129-142 - [c18]Jacques Ophoff
, Frauke Dietz:
Using Gamification to Improve Information Security Behavior: A Password Strength Experiment. World Conference on Information Security Education 2019: 157-169 - [c17]Gershon Hutchinson, Jacques Ophoff
:
A Descriptive Review and Classification of Organizational Information Security Awareness Research. ISSA 2019: 114-130 - [c16]Anass Bayaga, Jacques Ophoff
:
Determinants of E-Government Use in Developing Countries: The Influence of Privacy and Security Concerns. NextComp 2019: 1-7 - 2018
- [c15]Jasmine Scott, Jacques Ophoff:
Investigating the Knowledge-Behaviour Gap in Mitigating Personal Information Compromise. HAISA 2018: 236-245 - [c14]Jacques Ophoff
, Mcguigan Lakay:
Mitigating the Ransomware Threat: A Protection Motivation Theory Approach. ISSA (Revised Selected Papers) 2018: 163-175 - 2017
- [c13]Val A. Hooper, Jacques Ophoff:
The Influence of Organizational Commitment on Information Security Policy Compliance. HAISA 2017: 114-125 - [c12]Joseph Omidosu, Jacques Ophoff:
Employee Information Security Beliefs in the Home Environment. HAISA 2017: 167-176 - [c11]Henry Oladimeji, Jacques Ophoff:
Factors Influencing the Use of Privacy Settings in Location-Based Social Networks. HAISA 2017: 215-224 - [c10]Marc Pelteret, Jacques Ophoff
:
Organizational information privacy strategy and the impact of the PoPI act. ISSA 2017: 56-65 - 2016
- [j2]Marc Pelteret, Jacques Ophoff
:
A Review of Information Privacy and Its Importance to Consumers and Organizations. Informing Sci. Int. J. an Emerg. Transdiscipl. 19: 277-301 (2016) - [c9]Devon Neill, Jean-Paul Van Belle, Jacques Ophoff:
Understanding the Adoption of Wearable Technology in South African Organisations. CONF-IRM 2016: 5 - [c8]Pierre Jenkins, Jacques Ophoff:
Factors influencing the intention to adopt NFC mobile payments - A South African perspective. CONF-IRM 2016: 45 - [c7]Daryll Heneke, Jacques Ophoff, Adrie Stander:
The Threats that Insiders Pose to Critical Infrastructure – a South African Perspective. HAISA 2016: 279-289 - 2015
- [c6]Fayyaadh Parker, Jacques Ophoff
, Jean-Paul Van Belle, Ross Karia:
Security awareness and adoption of security controls by smartphone users. InfoSec 2015: 99-104 - 2014
- [c5]Jacques Ophoff, Reinhardt A. Botha:
A Privacy-Aware Model for Communications Management in the IP Multimedia Subsystem. INC 2014: 117-126 - [c4]Charlie Hinde, Jacques Ophoff
:
Privacy: A review of publication trends. ISSA 2014: 1-7 - [c3]Jacques Ophoff
, Mark Robinson:
Exploring end-user smartphone security awareness within a South African context. ISSA 2014: 1-7 - 2012
- [j1]Mark van Heerden, Jacques Ophoff, Jean-Paul Van Belle
:
Are University Students Ready to Dump Their Textbooks?: A Survey on Student Attitudes Towards E-Readers and Tablet Computers. Int. J. Cyber Ethics Educ. 2(3): 15-44 (2012) - [c2]Liam Smit, Adrie Stander
, Jacques Ophoff
:
Investigating the accuracy of base station information for estimating cellphone location. CyberSec 2012: 88-93 - [c1]Samantha Rule, Adrie Stander, Jacques Ophoff:
How the Certified Information Systems Security Professional certification supports Digital Forensic processes. INC 2012: 63-72
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-04 22:12 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint