Jacques Ophoff
Jacques Ophoff
Division of Cyber Security, Abertay University
Verified email at abertay.ac.uk
Title
Cited by
Cited by
Year
The Use of Mobile Phones by South African University Students
D North, K Johnston, J Ophoff
Issues in Informing Science and Information Technology 11, 115-138, 2014
882014
Towards a Method for Mobile Learning Design
G Stanton, J Ophoff
Issues in Informing Science and Information Technology (IISIT) 10, 501-523, 2013
672013
The Impact of an Augmented Reality Application on Learning Motivation of Students
T Khan, K Johnston, J Ophoff
Advances in Human-Computer Interaction 2019 (Article ID 7208494), 2019
592019
Exploring end-user smartphone security awareness within a South African context
J Ophoff, M Robinson
2014 Information Security for South Africa, 1-7, 2014
352014
Security Awareness and Adoption of Security Controls by Smartphone Users
F Parker, J Ophoff, R Karia, JP Van Belle
Second International Conference on Information Security and Cyber Forensics …, 2015
332015
A Descriptive Literature Review and Classification of Insider Threat Research
J Ophoff, A Jensen, J Sanderson-Smith, M Porter, K Johnston
Proceedings of Informing Science & IT Education Conference (InSITE) 2014 …, 2014
212014
A Model of Fundamental Components for an e‑Government Crowdsourcing Platform
K Cupido, J Ophoff
The Electronic Journal of e-Government 12 (2), 141-156, 2014
192014
Goodness, god, and evil
DE Alexander
Bloomsbury Publishing, 2012
132012
A Review of Information Privacy and Its Importance to Consumers and Organizations
M Pelteret, J Ophoff
Informing Science: The International Journal of an Emerging Transdiscipline …, 2016
112016
Factors influencing the intention to adopt NFC mobile payments-A South African perspective.
P Jenkins, J Ophoff
CONF-IRM, 45, 2016
112016
Our building is smarter than your building: The use of competitive rivalry to reduce energy consumption and linked carbon footprint
C McGibbon, J Ophoff, JP Van Belle
Knowledge Management & E-Learning: An International Journal 6 (4), 464-471, 2014
11*2014
A Conceptual Model of Critical Success Factors for an e-Government Crowdsourcing Solution
K Cupido, J Ophoff
Proceedings of the 14th European Conference on eGovernment ECEG 2014, 77-84, 2014
102014
An analysis of base station location accuracy within mobile-cellular networks
L Smit, A Stander, J Ophoff
Int. J. Cyber Secur. Digit. Forensics (IJCSDF) 1 (4), 272-279, 2012
102012
Exploring the Impact of Cyber Incivility in the Workplace
J Ophoff, T Machaka, A Stander
Proceedings of Informing Science & IT Education Conference (InSITE) 2015 …, 2015
92015
YouTube as an academic tool for ICT lecturers
S Roodt, C de Villiers, K Johnston, J Ophoff, D Peier
Proceedings of the e-Skills for Knowledge Production and Innovation …, 2014
92014
Issues in Migrating Legacy Systems to the Cloud
T Khanye, J Ophoff, K Johnston
8th International Conference on Cloud Computing, Data Science & Engineering, 2018
62018
Cloud Computing Adoption for Business Development: A TOE Perspective
O Abrahams, J Ophoff, G Mwalemba
Proceedings of the 9th IDIA conference, 463-476, 2015
62015
A theory-based review of information security behavior in the organization and home context
J Omidosu, J Ophoff
2016 International Conference on Advances in Computing and Communication …, 2016
52016
Aspects of digital forensics in South Africa
A Irons, J Ophoff
Interdisciplinary Journal of Information, Knowledge, and Management 11, 273-283, 2016
52016
Information security culture assessment of small and medium-sized enterprises in Tanzania
Z Ruhwanya, J Ophoff
International Conference on Social Implications of Computers in Developing …, 2019
32019
The system can't perform the operation now. Try again later.
Articles 1–20