Follow
Jacques Ophoff
Jacques Ophoff
Division of Cybersecurity, Abertay University
Verified email at abertay.ac.uk
Title
Cited by
Cited by
Year
The Impact of an Augmented Reality Application on Learning Motivation of Students
T Khan, K Johnston, J Ophoff
Advances in Human-Computer Interaction 2019 (Article ID 7208494), 2019
2462019
The Use of Mobile Phones by South African University Students
D North, K Johnston, J Ophoff
Issues in Informing Science and Information Technology 11, 115-138, 2014
1052014
Towards a Method for Mobile Learning Design
G Stanton, J Ophoff
Issues in Informing Science and Information Technology (IISIT) 10, 501-523, 2013
772013
Exploring end-user smartphone security awareness within a South African context
J Ophoff, M Robinson
2014 Information Security for South Africa, 1-7, 2014
412014
Security Awareness and Adoption of Security Controls by Smartphone Users
F Parker, J Ophoff, R Karia, JP Van Belle
Second International Conference on Information Security and Cyber Forensics …, 2015
402015
A Review of Information Privacy and Its Importance to Consumers and Organizations
M Pelteret, J Ophoff
Informing Science: The International Journal of an Emerging Transdiscipline …, 2016
292016
A Model of Fundamental Components for an e‑Government Crowdsourcing Platform
K Cupido, J Ophoff
The Electronic Journal of e-Government 12 (2), 141-156, 2014
292014
A Descriptive Literature Review and Classification of Insider Threat Research
J Ophoff, A Jensen, J Sanderson-Smith, M Porter, K Johnston
Proceedings of Informing Science & IT Education Conference (InSITE) 2014 …, 2014
282014
Factors influencing the intention to adopt NFC mobile payments–A South African perspective
P Jenkins, J Ophoff
232016
Goodness, god, and evil
DE Alexander
Bloomsbury Publishing, 2012
192012
Our building is smarter than your building: The use of competitive rivalry to reduce energy consumption and linked carbon footprint
C McGibbon, J Ophoff, JP Van Belle
Knowledge Management & E-Learning: An International Journal 6 (4), 464-471, 2014
17*2014
Determining Key Factors that Lead to the Adoption of Password Managers
R Maclean, J Ophoff
2018 International Conference on Intelligent and Innovative Computing …, 2018
162018
Exploring the Impact of Cyber Incivility in the Workplace
J Ophoff, T Machaka, A Stander
Proceedings of Informing Science & IT Education Conference (InSITE) 2015 …, 2015
152015
YouTube as an academic tool for ICT lecturers
S Roodt, C de Villiers, K Johnston, J Ophoff, D Peier
Proceedings of the e-Skills for Knowledge Production and Innovation …, 2014
142014
A Conceptual Model of Critical Success Factors for an e-Government Crowdsourcing Solution
K Cupido, J Ophoff
Proceedings of the 14th European Conference on eGovernment ECEG 2014, 77-84, 2014
122014
An analysis of base station location accuracy within mobile-cellular networks
L Smit, A Stander, J Ophoff
Int. J. Cyber Secur. Digit. Forensics (IJCSDF) 1 (4), 272-279, 2012
102012
A theory-based review of information security behavior in the organization and home context
J Omidosu, J Ophoff
2016 International Conference on Advances in Computing and Communication …, 2016
92016
Aspects of digital forensics in South Africa
A Irons, J Ophoff
Interdisciplinary Journal of Information, Knowledge, and Management 11, 273-283, 2016
92016
Using gamification to improve information security behavior: a password strength experiment
J Ophoff, F Dietz
IFIP World Conference on Information Security Education, 157-169, 2019
82019
Information security culture assessment of small and medium-sized enterprises in Tanzania
Z Ruhwanya, J Ophoff
International Conference on Social Implications of Computers in Developing …, 2019
82019
The system can't perform the operation now. Try again later.
Articles 1–20