Conceptualising improvisation in information systems security K Njenga, I Brown European journal of information systems 21 (6), 592-607, 2012 | 77 | 2012 |
We Want To Do It Our Way: The Neutralisation Approach to Managing Information Systems Security by Small Businesses K Njenga, P Jordaan African Journal of Information Systems 8 (1), 42 - 63, 2016 | 33 | 2016 |
Social media information security threats: Anthropomorphic emoji analysis on social engineering K Njenga IT Convergence and Security 2017: Volume 2, 185-192, 2018 | 26 | 2018 |
The Role of Job Satisfaction in Turnover and Turn-Away Intention of IT Staff in South Africa B Scholtz, JP Van Belle, K Njenga, A Serenko, P Palvia Interdisciplinary Journal of Information, Knowledge, and Management 14, 77-97, 2019 | 21 | 2019 |
On Rational Choice, Risk and Utility in Mobile Banking K Njenga, S Ndlovu The African Journal of Information and Communication 13, 42-61, 2013 | 21* | 2013 |
An investigation of enablers and inhibitors of IT governance implementation: A case study of a South African enterprise K Letsoalo, I Brown, KN Njenga Proceedings of the ITG International Conference, 27-35, 2006 | 13 | 2006 |
Understanding Internal Information Systems Security Policy Violations as Paradoxes K Njenga Interdisciplinary Journal of Information, Knowledge, and Management 12, 2017 | 12 | 2017 |
Mobile and Wireless Technology 2015 KJ Kim, N Wattanapongsakorn Springer Berlin Heidelberg, 2015 | 11* | 2015 |
On privacy calculus and underlying consumer concerns influencing mobile banking subscriptions K Njenga, S Ndlovu 2012 Information Security for South Africa, 1-9, 2012 | 11 | 2012 |
Information Security Policy Violation: The Triad of Internal Threat Agent Behaviors M van den Bergh, K Njenga 1st International Conference on the Internet, Cyber Security, and …, 2016 | 9 | 2016 |
Innovation in tax administration: Digitizing tax payments, trust and information security risk F Maphumula, K Njenga Open Innovation Conference, IEEE, 2019 | 8 | 2019 |
Predicting communication constructs towards determining information security policies compliance T Rantao, K Njenga South African Journal of Information Management 22 (1), 1-10, 2020 | 7 | 2020 |
Information Systems Security Policy Violation: Systematic Literature Review on Behavior Threats by Internal Agents K Njenga International Conference On Information Resources Management (Conf-IRM), 1 -13, 2016 | 7 | 2016 |
Conceptualising the Effect of the Black Economic Empowerment Score‐Card on IT Governance M Mohapi, K Njenga The Electronic Journal of Information Systems in Developing Countries 54 (1 …, 2012 | 7 | 2012 |
On Trust and Security Risk: Mobile Commerce Acceptance and Readiness in Sudan K Njenga, S Salih International Conference on Mobile and Wireless Technology, 41-50, 2019 | 6 | 2019 |
On rational choice, risk and utility in mobile banking. Sustainable e-Government and e-Business Innovations (E K Njenga, S Ndlovu Leadership, 1-9, 2012 | 6 | 2012 |
Phishing Attack Victims and the Effect on Work Engagement MJ Werner, K Njenga Digital-for-Development: Enabling Transformation, Inclusion and …, 2023 | 4 | 2023 |
Information Systems Security in Small and Medium-Sized Enterprises: Emerging Cybersecurity Threats in Turbulent Times K Njenga Book - Nova Science Publishers, https://doi.org/10.52305 …, 2022 | 4 | 2022 |
Top IT issues for employers of South African graduates JP Van Belle, B Scholtz, K Njenga, A Serenko, P Palvia Annual Conference of the Southern African Computer Lecturers' Association …, 2019 | 4 | 2019 |
Information Security Policy Violations: A Grounded Theory Approach to Counterfactual Balance and Tensions K Njenga, PB Lowry Dewald Roode Workshop in Information Systems Security 2018, IFIP WG 8.11 …, 2018 | 4 | 2018 |