I shall, we shall, and all others will: paradoxical information security behaviour DP Snyman, H Kruger, WD Kearney Information & Computer Security 26 (3), 290-305, 2018 | 28 | 2018 |
The application of behavioural thresholds to analyse collective behaviour in information security D Snyman, H Kruger Information & Computer Security 25 (2), 152-164, 2017 | 25 | 2017 |
Spelling Checker-based Language Identification for the Eleven Official South African Languages W Pienaar, D Snyman Twenty-First Annual Symposium of the Pattern Recognition Association of …, 2010 | 18 | 2010 |
Cross-Lingual Genre Classification for Closely Related Languages D Snyman, G van Huyssteen, W Daelemans Twenty-Third Annual Symposium of the Pattern Recognition Association of …, 2012 | 14* | 2012 |
Children's awareness of digital wellness: A serious games approach J Allers, GR Drevin, DP Snyman, HA Kruger, L Drevin IFIP Advances in Information and Communication Technology, 95-110, 2021 | 13 | 2021 |
Cost-effective biometric authentication using Leap Motion and IoT devices LP Shahim, DP Snyman, JV Du Toit, HA Kruger Tenth International Conference on Emerging Security Information, Systems and …, 2016 | 13 | 2016 |
Behavioural threshold analysis: methodological and practical considerations for applications in information security D Snyman, H Kruger Behaviour & Information Technology 38 (11), 1088-1106, 2019 | 11 | 2019 |
The lemming effect in information security DP Snyman, HA Kruger, WD Kearney Proceedings of the eleventh International Symposium on Human Aspects of …, 2017 | 8 | 2017 |
A Wolf, Hyena, and Fox game that tells pre-school children about cybersecurity DP Snyman, GR Drevin, HA Kruger, L Drevin, J Allers IFIP Advances in Information and Communication Technology, 2021 | 7* | 2021 |
External contextual factors in information security behaviour DP Snyman, HA Kruger 6th International Conference on Information Systems Security and Privacy …, 2020 | 6 | 2020 |
Behavioural thresholds in the context of information security DP Snyman, HA Kruger Tenth International Symposium on Human Aspects of Information Security …, 2016 | 6 | 2016 |
Automatic Genre Classification for Resource Scarce Languages D Snyman, G van Huyssteen, W Daelemans Twenty-Second Annual Symposium of the Pattern Recognition Association of …, 2011 | 6 | 2011 |
Collective information security behaviour: a technology-driven framework DP Snyman, H Kruger Information & Computer Security 29 (4), 589-603, 2021 | 5 | 2021 |
Optical Polling for Behavioural Threshold Analysis in Information Security D Snyman, H Kruger International Conference on Information and Knowledge Engineering (IKE'17 …, 2017 | 5 | 2017 |
Comparing support vector machine and multinomial naive Bayes for named entity classification of South African languages W Fourie, JV Du Toit, DP Snyman PRASA, 2014 | 4 | 2014 |
Linking gamification, ludology and pedagogy: Principles to design a serious game J Esterhuizen, DP Snyman, L Drevin, GR Drevin 19th International Conference on Cognition and Exploratory Learning in …, 2022 | 3 | 2022 |
Information security behavioural threshold analysis in practice: An implementation framework DP Snyman, HA Kruger IFIP Advances in Information and Communication Technology: Proceedings of …, 2020 | 3 | 2020 |
A management decision support system for evaluating information security behaviour DP Snyman, HA Kruger Communications in Computer and Information Science 1166, 1-13, 2020 | 3 | 2020 |
Theorising on Information Cascades and Sequential Decision-making for Analysing Security Behaviour D Snyman, H Kruger 5th International Conference on Information Systems Security and Privacy …, 2019 | 3 | 2019 |
The story of Safety Snail and her email: A digital wellness serious game for pre-school children GR Drevin, DP Snyman, HA Kruger, L Drevin, J Allers 9th International Conference on Information Systems Security and Privacy …, 2023 | 1* | 2023 |