A prototype for assessing information security awareness HA Kruger, WD Kearney Computers & security 25 (4), 289-296, 2006 | 706 | 2006 |
A vocabulary test to assess information security awareness H Kruger, L Drevin, T Steyn Information Management & Computer Security 18 (5), 316-327, 2010 | 171 | 2010 |
Value-focused assessment of ICT security awareness in an academic environment L Drevin, HA Kruger, T Steyn Computers & Security 26 (1), 36-43, 2007 | 141 | 2007 |
Can perceptual differences account for enigmatic information security behaviour in an organisation? WD Kearney, HA Kruger computers & security 61, 46-58, 2016 | 74 | 2016 |
An assessment of the role of cultural factors in information security awareness HA Kruger, L Drevin, S Flowerday, T Steyn 2011 Information Security for South Africa, 1-7, 2011 | 74 | 2011 |
Consensus ranking–An ICT security awareness case study HA Kruger, WD Kearney computers & security 27 (7-8), 254-259, 2008 | 65 | 2008 |
A Framework for Evaluating ICT Security Awareness. HA Kruger, L Drevin, T Steyn ISSA, 1-11, 2006 | 36 | 2006 |
Theorising on risk homeostasis in the context of information security behaviour WD Kearney, HA Kruger Information & Computer Security 24 (5), 496-513, 2016 | 35 | 2016 |
Considering the influence of human trust in practical social engineering exercises WD Kearney, HA Kruger 2014 Information Security for South Africa, 1-6, 2014 | 34 | 2014 |
Identity theft—Empirical evidence from a Phishing exercise T Steyn, HA Kruger, L Drevin New Approaches for Security, Privacy and Trust in Complex Environments …, 2007 | 33 | 2007 |
A combined AHP-GP model to allocate internal auditing time to projects HA Krüger, JM Hattingh ORiON 22 (1), 59-76, 2006 | 33 | 2006 |
I shall, we shall, and all others will: paradoxical information security behaviour DP Snyman, H Kruger, WD Kearney Information & Computer Security 26 (3), 290-305, 2018 | 28 | 2018 |
The application of behavioural thresholds to analyse collective behaviour in information security D Snyman, H Kruger Information & Computer Security 25 (2), 152-164, 2017 | 25 | 2017 |
An empirical assessment of factors impeding effective password management H Kruger, T Steyn, B Dawn Medlin, L Drevin Journal of Information Privacy and Security 4 (4), 45-59, 2008 | 23 | 2008 |
Email security awareness—A practical assessment of employee behaviour H Kruger, L Drevin, T Steyn Fifth World Conference on Information Security Education: Proceedings of the …, 2007 | 23 | 2007 |
Determinants of internal audit efficiency HA Kruger, PJ Steyn, W Kearney South African Journal of Business Management 33 (3), 53-62, 2002 | 20 | 2002 |
Phishing and organisational learning WD Kearney, HA Kruger Security and Privacy Protection in Information Processing Systems: 28th IFIP …, 2013 | 19 | 2013 |
A framework for good corporate governance and organisational learning: an empirical study WD Kearney, HA Kruger SDIWC (Society of Digital Information and Wireless Communications), 2013 | 18 | 2013 |
Intensity of Facebook use: a personality-based perspective on dependency formation K Van der Schyff, S Flowerday, H Kruger, N Patel Behaviour & Information Technology 41 (1), 198-214, 2022 | 16 | 2022 |
Measuring information security awareness: A West Africa gold mining environment case study HA Kruger, WD Kearney | 16* | 2005 |