Jacques Ophoff
Jacques Ophoff
Division of Cyber Security, Abertay University
Verified email at abertay.ac.uk
Cited by
Cited by
The Impact of an Augmented Reality Application on Learning Motivation of Students
T Khan, K Johnston, J Ophoff
Advances in Human-Computer Interaction 2019 (Article ID 7208494), 2019
The Use of Mobile Phones by South African University Students
D North, K Johnston, J Ophoff
Issues in Informing Science and Information Technology 11, 115-138, 2014
Towards a Method for Mobile Learning Design
G Stanton, J Ophoff
Issues in Informing Science and Information Technology (IISIT) 10, 501-523, 2013
Security Awareness and Adoption of Security Controls by Smartphone Users
F Parker, J Ophoff, R Karia, JP Van Belle
Second International Conference on Information Security and Cyber Forensics …, 2015
Exploring end-user smartphone security awareness within a South African context
J Ophoff, M Robinson
2014 Information Security for South Africa, 1-7, 2014
A Descriptive Literature Review and Classification of Insider Threat Research
J Ophoff, A Jensen, J Sanderson-Smith, M Porter, K Johnston
Proceedings of Informing Science & IT Education Conference (InSITE) 2014 …, 2014
A Model of Fundamental Components for an e‑Government Crowdsourcing Platform
K Cupido, J Ophoff
The Electronic Journal of e-Government 12 (2), 141-156, 2014
A Review of Information Privacy and Its Importance to Consumers and Organizations
M Pelteret, J Ophoff
Informing Science: The International Journal of an Emerging Transdiscipline …, 2016
Factors influencing the intention to adopt NFC mobile payments-A South African perspective.
P Jenkins, J Ophoff
CONF-IRM, 45, 2016
Goodness, god, and evil
DE Alexander
Bloomsbury Publishing, 2012
Our building is smarter than your building: The use of competitive rivalry to reduce energy consumption and linked carbon footprint
C McGibbon, J Ophoff, JP Van Belle
Knowledge Management & E-Learning: An International Journal 6 (4), 464-471, 2014
YouTube as an academic tool for ICT lecturers
S Roodt, C de Villiers, K Johnston, J Ophoff, D Peier
Proceedings of the e-Skills for Knowledge Production and Innovation …, 2014
Determining Key Factors that Lead to the Adoption of Password Managers
R Maclean, J Ophoff
2018 International Conference on Intelligent and Innovative Computing …, 2018
A Conceptual Model of Critical Success Factors for an e-Government Crowdsourcing Solution
K Cupido, J Ophoff
Proceedings of the 14th European Conference on eGovernment ECEG 2014, 77-84, 2014
An analysis of base station location accuracy within mobile-cellular networks
L Smit, A Stander, J Ophoff
Int. J. Cyber Secur. Digit. Forensics (IJCSDF) 1 (4), 272-279, 2012
Exploring the Impact of Cyber Incivility in the Workplace
J Ophoff, T Machaka, A Stander
Proceedings of Informing Science & IT Education Conference (InSITE) 2015 …, 2015
Aspects of digital forensics in South Africa
A Irons, J Ophoff
Interdisciplinary Journal of Information, Knowledge, and Management 11, 273-283, 2016
Cloud Computing Adoption for Business Development: A TOE Perspective
O Abrahams, J Ophoff, G Mwalemba
Proceedings of the 9th IDIA conference, 463-476, 2015
Mitigating the ransomware threat: a protection motivation theory approach
J Ophoff, M Lakay
International Information Security Conference, 163-175, 2018
Information security culture assessment of small and medium-sized enterprises in Tanzania
Z Ruhwanya, J Ophoff
International Conference on Social Implications of Computers in Developing …, 2019
The system can't perform the operation now. Try again later.
Articles 1–20