Taxonomy of compliant information security behavior K Padayachee Computers & Security 31 (5), 673-680, 2012 | 259 | 2012 |
A snapshot survey of ICT integration in South African schools K Padayachee South African Computer Journal 29 (2), 36-65, 2017 | 171 | 2017 |
The myths and realities of generational cohort theory on ICT integration in education: A South African perspective K Padayachee The African Journal of Information Systems 10 (1), 4, 2017 | 84 | 2017 |
An interpretive study of software risk management perspectives. K Padayachee | 78 | 2002 |
A survey of honeypot research: Trends and opportunities RM Campbell, K Padayachee, T Masombuka 2015 10th international conference for internet technology and secured …, 2015 | 67 | 2015 |
An assessment of opportunity-reducing techniques in information security: An insider threat perspective K Padayachee Decision Support Systems 92, 47-56, 2016 | 66 | 2016 |
Internet mediated research: Challenges and issues K Padayachee South African Computer Journal 28 (2), 2016 | 26 | 2016 |
Aspectising honeytokens to contain the insider threat K Padayachee IET Information Security 9 (4), 240-247, 2015 | 23 | 2015 |
An insider threat neutralisation mitigation model predicated on cognitive dissonance (ITNMCD) K Padayachee South African Computer Journal 56 (1), 50-79, 2015 | 18 | 2015 |
A conceptual opportunity-based framework to mitigate the insider threat K Padayachee 2013 Information Security for South Africa, 1-8, 2013 | 16 | 2013 |
Adapting usage control as a deterrent to address the inadequacies of access controls K Padayachee, JHP Eloff computers & security 28 (7), 536-544, 2009 | 16 | 2009 |
Utilizing e-commerce and m-commerce applications to address the effect of global warming K Padayachee E-leader, Krakow, 2008 | 16 | 2008 |
The factors that influence customer e-services adoption K Persad, K Padayachee South African Computer Journal 56, 80-106, 2015 | 15 | 2015 |
Engendering an e-safety awareness culture within the South African context E Kritzinger, K Padayachee 2013 Africon, 1-5, 2013 | 15 | 2013 |
A stepwise framework towards ICT integration in education: A South African perspective K Padayachee 2016 International Conference on Advances in Computing and Communication …, 2016 | 12 | 2016 |
A privacy preserving context-aware insider threat prediction and prevention model predicated on the components of the fraud diamond S Mekonnen, K Padayachee, M Meshesha 2015 Annual Global Online Conference on Information and Computer Technology …, 2015 | 11 | 2015 |
Teaching safe and secure usage of ICTs in South African schools E Kritzinger, K Padayachee Retrieved online on 23, 2010 | 11 | 2010 |
A framework of opportunity-reducing techniques to mitigate the insider threat K Padayachee 2015 Information Security for South Africa (ISSA), 1-8, 2015 | 10 | 2015 |
An aspect-oriented model to monitor misuse K Padayachee, JHP Eloff Innovations and advanced techniques in computer and information sciences and …, 2007 | 9 | 2007 |
Enhancing optimistic access controls with usage control K Padayachee, JHP Eloff International Conference on Trust, Privacy and Security in Digital Business …, 2007 | 8 | 2007 |