Information security policy compliance model in organizations NS Safa, R Von Solms, S Furnell computers & security 56, 70-82, 2016 | 674 | 2016 |
Information security conscious care behaviour formation in organizations NS Safa, M Sookhak, R Von Solms, S Furnell, NA Ghani, T Herawan Computers & Security 53, 65-78, 2015 | 531 | 2015 |
An information security knowledge sharing model in organizations NS Safa, RV Solms Computers in Human Behavior 57, 442e451, 2016 | 371 | 2016 |
Fog vehicular computing: Augmentation of fog computing using vehicular cloud computing M Sookhak, FR Yu, Y He, H Talebian, NS Safa, N Zhao, MK Khan, ... IEEE Vehicular Technology Magazine 12 (3), 55-64, 2017 | 213 | 2017 |
The evolution of blockchain: A bibliometric study M Dabbagh, M Sookhak, NS Safa IEEE Access 7, 19212-19221, 2019 | 193 | 2019 |
A customer loyalty formation model in electronic commerce NS Safa, MA Ismail Economic Modelling 35, 559-564, 2013 | 164 | 2013 |
Motivation and opportunity based model to reduce information security insider threats in organisations NS Safa, C Maple, T Watson, R Von Solms Journal of information security and applications 40, 247-257, 2018 | 161 | 2018 |
Human aspects of information security in organisations NS Safa, R von Solms, L Futcher Computer Fraud & Security 2016 (2), 15-18, 2016 | 127 | 2016 |
Blockchain and smart contract for access control in healthcare: A survey, issues and challenges, and open issues M Sookhak, MR Jabbarpour, N Sohrabi Safa, FR Yud Journal of Network and Computer Applications, 2021 | 123 | 2021 |
Deterrence and prevention-based model to mitigate information security insider threats in organisations NS Safa, C Maple, S Furnell, MA Azad, C Perera, M Dabbagh, M Sookhak Future Generation Computer Systems 97, 587-597, 2019 | 119 | 2019 |
Customers repurchase intention formation in e-commerce NS Safa, R Von Solms South African Journal of Information Management 18 (1), 1-9, 2016 | 114 | 2016 |
A LogitBoost-based Algorithm for Detecting Known and Unknown Web Attacks MH Kamarudin, C Maple, T Watson, NS Safa IEEE Access 1 (99), 1-20, 2017 | 110 | 2017 |
A survey of empirical performance evaluation of permissioned blockchain platforms: Challenges and opportunities M Dabbagh, KK RaymondChoo, A Beheshti, M Tahir, NS Safa Computers and Security, 2021 | 108 | 2021 |
A multivariant secure framework for smart mobile health application NSS Shariq Aziz Butt, Tauseef Jamal, Muhammad Ajmal Azad, Arshad Ali Transactions on Emerging Telecommunications Technologies, 1-18, 2019 | 64* | 2019 |
Human errors in the information security realm–and how to fix them NS Safa, C Maple Computer Fraud & Security 2016 (9), 17-20, 2016 | 42 | 2016 |
A review on artificial intelligence methodologies for the forecasting of crude oil price AYGTH Haruna Chiroma, Sameem Abdul-kareem, Ahmad Shukri Mohd Noor, Adamu I ... Intelligent Automation & Soft Computing, 1-14, 2016 | 42* | 2016 |
Trust, satisfaction, and loyalty formation in electronic commerce MA Ismail, NS Safa Journal of Industrial and Intelligent Information Vol 2 (3), 2014 | 40 | 2014 |
An artificial neural network classification approach for improving accuracy of customer identification in e-Commerce NS Safa, NA Ghani, MA Ismail Malaysian Journal of Computer Science (MJCS) 27 (3), 171-185, 2014 | 33 | 2014 |
Incremental Algorithm for Association Rule Mining Under Dynamic Threshold I Aqra, NA Ghani, C Maple, J Machado, NS Safa Applied Sciences 9 (24), 2019 | 30 | 2019 |
Information security collaboration formation in organisations N Sohrabi Safa, C Maple, T Watson, S Furnell IET Information Security 12 (3), 238-245, 2018 | 20 | 2018 |