default search action
Adéle da Veiga
Person information
- affiliation: University of South Africa, Johannesburg
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Kudakwashe Maguraushe, Adéle da Veiga, Nico Martins:
A personal information privacy perceptions model for university students. Inf. Secur. J. A Glob. Perspect. 33(4): 394-424 (2024) - [c28]Alisa Dayanand, Adéle da Veiga:
Privacy Policies on Websites: A Case Study in the Financial Industry in South Africa. HAISA (2) 2024: 147-167 - [c27]Dzunani Makhuvele, Adéle da Veiga:
Analysing Websites Privacy Policies: A Study of E-commerce Websites in South Africa. HAISA (2) 2024: 168-183 - 2023
- [j18]Adéle da Veiga:
A model for information security culture with creativity and innovation as enablers - refined with an expert panel. Inf. Comput. Secur. 31(3): 281-303 (2023) - [j17]Elmarie Kritzinger, Adéle da Veiga, Wynand van Staden:
Measuring organizational information security awareness in South Africa. Inf. Secur. J. A Glob. Perspect. 32(2): 120-133 (2023) - [j16]Adéle da Veiga, Steven Furnell, Yuxiang Hong, Merrill Warkentin:
Introduction to the special issue on insider threats in cybersecurity. J. Inf. Secur. Appl. 79: 103585 (2023) - [c26]Armand Vorster, Adéle da Veiga:
Proposed Guidelines for Website Data Privacy Policies and an Application Thereof. HAISA 2023: 192-210 - [c25]Tebogo Kesetse Lejaka, Adéle da Veiga, Marianne Loock:
Towards Roles and Responsibilities in a Cyber Security Awareness Framework for South African Small, Medium, and Micro Enterprises (SMMEs). HAISA 2023: 211-224 - 2022
- [j15]Adéle da Veiga:
A study on information privacy concerns and expectations of demographic groups in South Africa. Comput. Law Secur. Rev. 47: 105769 (2022) - [j14]Adéle da Veiga, Marianne Loock, Karen Renaud:
Cyber4Dev-Q: Calibrating cyber awareness in the developing country context. Electron. J. Inf. Syst. Dev. Ctries. 88(1) (2022) - [c24]Adéle da Veiga, Elisha O. Ochola, Mathias Mujinga, Emilia Mwim:
Investigating Data Privacy Evaluation Criteria and Requirements for e-Commerce Websites. ARTIIS (2) 2022: 297-307 - [c23]Morena Abiel Tsoeu, Adéle da Veiga:
A Cyber4Dev Security Culture Model. ARTIIS (2) 2022: 339-351 - [c22]Victor Reppoh, Adéle da Veiga:
Cyber4Dev Security Culture Model for African Countries. HAISA 2022: 173-185 - [c21]Adéle da Veiga:
A Model for Information Security Culture with Innovation and Creativity as Enablers. HAISA 2022: 186-196 - 2021
- [j13]Yotamu Gangire, Adéle da Veiga, Marlien Herselman:
Assessing information security behaviour: a self-determination theory perspective. Inf. Comput. Secur. 29(4): 625-646 (2021) - [j12]Paulus Swartz, Adéle da Veiga, Nico Martins:
Validating an information privacy governance questionnaire to measure the perception of employees. Inf. Comput. Secur. 29(5): 761-786 (2021) - [c20]Adéle da Veiga, Elisha O. Ochola, Mathias Mujinga, Keshnee Padayachee, Emilia Mwim, Elmarie Kritzinger, Marianne Loock, Pheeha Machaka:
A Reference Point for Designing a Cybersecurity Curriculum for Universities. HAISA 2021: 46-62 - [c19]Charles Mawutor Ocloo, Adéle da Veiga, Jan H. Kroeze:
A Conceptual Information Security Culture Framework for Higher Learning Institutions. HAISA 2021: 63-80 - 2020
- [j11]Adéle da Veiga, Liudmila V. Astakhova, Adele Botha, Marlien Herselman:
Defining organisational information security culture - Perspectives from academia and industry. Comput. Secur. 92: 101713 (2020) - [j10]Adéle da Veiga, Ruthea Vorster, Fudong Li, Nathan L. Clarke, Steven M. Furnell:
Comparing the protection and use of online personal information in South Africa and the United Kingdom in line with data protection requirements. Inf. Comput. Secur. 28(3): 399-422 (2020) - [j9]Benson Zenda, Ruthea Vorster, Adéle da Veiga:
Protection of personal information: An experiment involving data value chains and the use of personal information for marketing purposes in South Africa. South Afr. Comput. J. 32(1) (2020) - [c18]Adéle da Veiga, Jacques Ophoff:
Concern for Information Privacy: A Cross-Nation Study of the United Kingdom and South Africa. HAISA 2020: 16-29 - [c17]Yotamu Gangire, Adéle da Veiga, Marlien Herselman:
Information Security Behavior: Development of a Measurement Instrument Based on the Self-determination Theory. HAISA 2020: 144-157 - [c16]Kudakwashe Maguraushe, Adéle da Veiga, Nico Martins:
Validation of an Information Privacy Perception Instrument at a Zimbabwean University. HAISA 2020: 300-314
2010 – 2019
- 2019
- [c15]Kudakwashe Maguraushe, Adéle da Veiga, Nico Martins:
A conceptual framework for a student personal information privacy culture at universities in Zimbabwe. ICICIS 2019: 143-156 - [c14]Yotamu Gangire, Adéle da Veiga, Marlien Herselman:
A conceptual model of information security compliant behaviour based on the self-determination theory. ICTAS 2019: 1-6 - [c13]Tebogo Kesetse Lejaka, Adéle da Veiga, Marianne Loock:
Cyber security awareness for small, medium and micro enterprises (SMMEs) in South Africa. ICTAS 2019: 1-6 - [c12]Paulus Swartz, Adéle da Veiga, Nico Martins:
A conceptual privacy governance framework. ICTAS 2019: 1-6 - [c11]Khangwelo Muronga, Marlien Herselman, Adele Botha, Adéle da Veiga:
An Analysis of Assessment Approaches and Maturity Scales used for Evaluation of Information Security and Cybersecurity User Awareness and Training Programs: A Scoping Review. NextComp 2019: 1-6 - 2018
- [j8]Adéle da Veiga:
An information privacy culture instrument to measure consumer privacy expectations and confidence. Inf. Comput. Secur. 26(3): 338-364 (2018) - [j7]Adéle da Veiga:
An approach to information security culture change combining ADKAR and the ISCA questionnaire to aid transition to the desired culture. Inf. Comput. Secur. 26(5): 584-612 (2018) - [c10]Adéle da Veiga, Ruthea Vorster, Fudong Li, Nathan L. Clarke:
A Comparison of compliance with data privacy requirements in two countries. ECIS 2018: 86 - [c9]Adéle da Veiga:
An online information privacy culture: A framework and validated instrument to measure consumer expectations and confidence. ICTAS 2018: 1-6 - 2017
- [j6]Adéle da Veiga, Nico Martins:
Defining and identifying dominant information security cultures and subcultures. Comput. Secur. 70: 72-94 (2017) - [c8]Adéle da Veiga:
The influence of data protection regulation on the information security culture of an organisation - A case study comparing legislation and offices across jurisdictions. HAISA 2017: 65-79 - [c7]Adéle da Veiga:
An Information Privacy Culture Index Framework and Instrument to Measure Privacy Perceptions across Nations: Results of an Empirical Study. HAISA 2017: 188-201 - [c6]Adéle da Veiga, Ruthea Vorster, Colin Pilkington, Hanifa Abdullah:
Compliance with the protection of personal information act and consumer privacy expectations: A comparison between the retail and medical aid industry. ISSA 2017: 16-23 - 2016
- [j5]Adéle da Veiga:
Comparing the information security culture of employees who had read the information security policy and those who had not: Illustrated through an empirical study. Inf. Comput. Secur. 24(2): 139-151 (2016) - [c5]Neriyan Nadasen, Colin Pilkington, Adéle da Veiga:
Personal information value chains in the South African insurance industry - an experiment. CONF-IRM 2016: 28 - [c4]Paulus Swartz, Adéle da Veiga:
PoPI Act - opt-in and opt-out compliance from a data value chain perspective: A South African insurance industry experiment. ISSA 2016: 9-17 - 2015
- [j4]Adéle da Veiga, Nico Martins:
Information security culture and information protection culture: A validated assessment instrument. Comput. Law Secur. Rev. 31(2): 243-256 (2015) - [j3]Adéle da Veiga, Nico Martins:
Improving the information security culture through monitoring and implementation actions illustrated through a case study. Comput. Secur. 49: 162-176 (2015) - [c3]Nico Martins, Adéle da Veiga:
An Information Security Culture Model Validated with Structural Equation Modelling. HAISA 2015: 11-21 - [c2]Adéle da Veiga:
The Influence of Information Security Policies on Information Security Culture: Illustrated through a Case Study. HAISA 2015: 22-33 - [c1]Adéle da Veiga:
An Information Security Training and Awareness Approach (ISTAAP) to Instil an Information Security-Positive Culture. HAISA 2015: 95-107 - 2010
- [j2]Adéle da Veiga, Jan H. P. Eloff:
A framework and assessment instrument for information security culture. Comput. Secur. 29(2): 196-207 (2010)
2000 – 2009
- 2007
- [j1]Adéle da Veiga, Jan H. P. Eloff:
An Information Security Governance Framework. Inf. Syst. Manag. 24(4): 361-372 (2007)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-17 21:53 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint