Jacques Ophoff

Senior Lecturer, PhD (Information Technology)

  • Source: Scopus
  • Calculated based on no. of publications stored in Pure and citations from Scopus
20122021

Research activity per year

If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • 2021

    A brief history and overview of WISE

    Bishop, M., Drevin, L., Futcher, L., Leung, W. S., Miloslavskaya, N., Moore, E. L., Ophoff, J. & von Solms, S., 7 Jul 2021, (E-pub ahead of print) Information Security Education for Cyber Resilience: 14th IFIP WG 11.8 World Conference, WISE 2021, Virtual Event, June 22–24, 2021 : proceedings. Drevin, L., Miloslavskaya, N., Leung, W. S. & von Solms, S. (eds.). Cham: Springer, p. 3-9 7 p. (IFIP Advances in Information and Communication Technology; vol. 615).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Cognitive function vs. accessible authentication: insights from dyslexia research

    Ophoff, J., Johnson, G. & Renaud, K., 19 Apr 2021, W4A '21: proceedings of the 18th International Web for All conference. New York: Association for Computing Machinery (ACM), 5 p. 19

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    46 Downloads (Pure)
  • Environmental uncertainty and end-user security behaviour: a study during the COVID-19 pandemic

    Kautondokwa, P., Ruhwanya, Z. & Ophoff, J., 16 Aug 2021, Information security education for cyber resilience: 14th IFIP WG 11.8 world conference, WISE 2021, virtual event, June 22–24, 2021, proceedings. Drevin, L., Miloslavskaya, N., Leung, W. S. & von Solms, S. (eds.). Cham: Springer, p. 111-125 15 p. (IFIP Advances in Information and Communication Technology Series; vol. 615).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    41 Downloads (Pure)
  • Revealing the cyber security non-compliance “attribution gulf”

    Ophoff, J. & Renaud, K., 5 Jan 2021, Proceedings of the 54th Annual Hawaii International Conference on System Sciences. Bui, T. X. (ed.). Honolulu, HI: University of Hawaii at Manoa, p. 4557-4566 10 p. (Proceedings of the 54th Annual Hawaii International Conference on System Sciences).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    28 Downloads (Pure)
  • 2020

    A descriptive review and classification of organizational information security awareness research

    Hutchinson, G. & Ophoff, J., 8 Mar 2020, Information and cyber security: 18th International conference, ISSA 2019, Johannesburg, South Africa, August 15, 2019, proceedings. Venter, H., Loock, M., Coetzee, M., Eloff, M. & Eloff, J. (eds.). Cham: Springer, p. 114-130 17 p. (Communications in Computer and Information Science (CCIS); vol. 1166).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    1 Citation (Scopus)
    194 Downloads (Pure)
  • Concern for information privacy: a cross-nation study of the United Kingdom and South Africa

    Da Veiga, A. & Ophoff, J., 21 Aug 2020, Human Aspects of Information Security and Assurance: 14th IFIP WG 11.12 International Symposium, HAISA 2020, Mytilene, Lesbos, Greece, July 8–10, 2020, Proceedings. Clarke, N. & Furnell, S. (eds.). Cham: Springer, p. 16-29 14 p. (IFIP Advances in Information and Communication Technology (IFIPAICT); vol. 593).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    153 Downloads (Pure)
  • Critical analysis of information security culture definitions

    Ruhwanya, Z. & Ophoff, J., 21 Aug 2020, Human Aspects of Information Security and Assurance: 14th IFIP WG 11.12 International Symposium, HAISA 2020, Mytilene, Lesbos, Greece, July 8–10, 2020, Proceedings. Clarke, N. & Furnell, S. (eds.). Cham: Springer, p. 353-365 13 p. (IFIP Advances in Information and Communication Technology (IFIPAICT); vol. 593).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    169 Downloads (Pure)
  • Criticism of the role of trust in e-government services

    Bayaga, A., Kyobe, M. & Ophoff, J., 30 Apr 2020, 2020 Conference on Information Communications Technology and Society (ICTAS): proceedings. Piscataway: Institute of Electrical and Electronics Engineers Inc., 6 p. 9082482

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Cyberhate: profiling of potential targets

    Manqola, T., Garbutt, M. & Ophoff, J., 11 Sep 2020, Evolving human and organizational practices in the intelligent age: proceedings of the 2020 Conf-IRM conference. Janczewski, L., Mills, A. & Klein, R. (eds.). p. 107-120 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Dyslexia and password usage: accessibility in authentication design

    Renaud, K., Johnson, G. & Ophoff, J., 21 Aug 2020, Human Aspects of Information Security and Assurance: 14th IFIP WG 11.12 International Symposium, HAISA 2020, Mytilene, Lesbos, Greece, July 8–10, 2020, Proceedings. Clarke, N. & Furnell, S. (eds.). Cham: Springer, p. 259-268 10 p. (IFIP Advances in Information and Communication Technology; vol. 593).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    1 Citation (Scopus)
    270 Downloads (Pure)
  • Exploring the value of a cyber threat intelligence function in an organization

    Berndt, A. & Ophoff, J., 15 Sep 2020, Information security education. Information security in action: 13th IFIP WG 11.8 World conference, WISE 13, Maribor, Slovenia, September 21–23, 2020, proceedings. Drevin, L., Von Solms, S. & Theocharidou, M. (eds.). Cham: Springer, p. 96-109 14 p. (IFIP Advances in Information and Communication Technology; vol. 579).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    148 Downloads (Pure)
  • Investigating customer-facing security features on South African e-commerce websites

    Brandreth, D. & Ophoff, J., 19 Dec 2020, Information and Cyber Security: 19th International Conference, ISSA 2020, Pretoria, South Africa, August 25–26, 2020, Revised Selected Papers. Venter, H., Loock, M., Coetzee, M., Eloff, M., Eloff, J. & Botha, R. (eds.). Cham: Springer, p. 144-159 16 p. (Communications in Computer and Information Science; vol. 1339).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    54 Downloads (Pure)
  • The technological panopticon: electronic monitoring and surveillance within the workplace: employee turbulence through perceptions of privacy infringement

    Hinde, C. & Ophoff, J., 28 Sep 2020, Proceedings of 2020 IFIP 8.11/11.13 Dewald Roode Information Security Research Workshop. Vance, A. (ed.). IFIP Working Group 8.11/11.13, 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    157 Downloads (Pure)
  • 2019

    Determinants of e-government use in developing countries: the influence of privacy and security concerns

    Bayaga, A. & Ophoff, J., 28 Oct 2019, Conference proceedings: Next Generation Computing Applications 2019, NextComp 2019, 19-21 September 2019 Mauritius. IEEE , 7 p. 8883653

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    96 Downloads (Pure)
  • Determining key factors that lead to the adoption of password managers

    Maclean, R. & Ophoff, J., 7 Jan 2019, 2018 International Conference on Intelligent and Innovative Computing Applications, ICONIC 2018. Institute of Electrical and Electronics Engineers Inc., 7 p. 8601223

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    2 Citations (Scopus)
    97 Downloads (Pure)
  • Factors influencing compliance with newly implemented information security policies

    Ophoff, J. & Regensberg, M., 4 Oct 2019, Proceedings of 2019 IFIP 8.11/11.13 Dewald Roode Information Security Research Workshop. Vance, A. (ed.). IFIP Working Group 8.11/11.13, 23 p. 1

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Lessons learned from an organizational information security awareness campaign

    Scrimgeour, J. M. & Ophoff, J., 19 Jun 2019, Information security education: education in proactive information security: 12th IFIP WG 11.8 world conference WISE 12, Lisbon, Portugal, June 25–27, 2019, proceedings. Drevin, L. & Theocharidou, M. (eds.). Cham: Springer, p. 129-142 14 p. (IFIP Advances in Information and Communication Technology (IFIPAICT); vol. 557).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    1 Citation (Scopus)
    73 Downloads (Pure)
  • Mitigating the ransomware threat: a protection motivation theory approach

    Ophoff, J. & Lakay, M., 25 Jan 2019, Information security: 17th International conference, ISSA 2018, Pretoria, South Africa, August 15–16, 2018, revised selected papers. Venter, H., Loock, M., Coetzee, M., Eloff, M. & Eloff, J. (eds.). Cham: Springer, p. 163-175 13 p. (Communications in Computer and Information Science (CCIS); vol. 973).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    2 Citations (Scopus)
    126 Downloads (Pure)
  • Modeling inertia causatives: validating in the password manager adoption context

    Renaud, K. & Ophoff, J., 4 Oct 2019, Proceedings of 2019 IFIP 8.11/11.13 Dewald Roode Information Security Research Workshop. Vance, A. (ed.). IFIP Working Group 8.11/11.13, 14 p. 14

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    143 Downloads (Pure)
  • Online security behaviour: factors influencing intention to adopt two-factor authentication

    Holmes, M. & Ophoff, J., 3 Feb 2019, Proceedings of the 14th International conference on cyber warfare and security, ICCWS 2019. van der Waag-Cowling, N. & Leenen, L. (eds.). Reading: Academic Conferences and Publishing International Limited, p. 123-132 10 p. (Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    2 Citations (Scopus)
    187 Downloads (Pure)
  • Using gamification to improve information security behavior: a password strength experiment

    Ophoff, J. & Dietz, F., 19 Jun 2019, Information security education: education in proactive information security: 12th IFIP WG 11.8 world conference WISE 12, Lisbon, Portugal, June 25–27, 2019, proceedings. Drevin, L. & Theocharidou, M. (eds.). Cham: Springer, p. 157-169 13 p. (IFIP Advances in Information and Communication Technology (IFIPAICT); vol. 557).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    2 Citations (Scopus)
    102 Downloads (Pure)
  • 2018

    Investigating adoption factors of wearable technology in health and fitness

    Rubin, A. & Ophoff, J., 15 Nov 2018, 2018 Open Innovations Conference: conference theme: "Re-creating society through disruptive digital transformation" : dates: 3 - 5 October 2018, venue: University of Witwatersrand, Johannesburg, South Africa. Ouma, C. (ed.). IEEE , p. 176-186 11 p. 8535831

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    2 Citations (Scopus)
    309 Downloads (Pure)
  • Investigating the knowledge-behaviour gap in mitigating personal information compromise

    Scott, J. & Ophoff, J., 9 Sep 2018, Proceedings of the Twelfth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2018). Clarke, N. & Furnell, S. (eds.). Plymouth: Univerisity of Plymouth, p. 236-245 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    44 Downloads (Pure)
  • Issues in migrating legacy systems to the cloud

    Khanye, T., Ophoff, J. & Johnston, K., 23 Aug 2018, Proceedings of the 8th International Conference Confluence 2018 on Cloud Computing, Data Science and Engineering. IEEE , p. 694-699 6 p. 8443029

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    1 Citation (Scopus)
    82 Downloads (Pure)
  • 2017

    Organizational information privacy strategy and the impact of the PoPI Act

    Pelteret, M. & Ophoff, J., 1 Aug 2017, 2017 Information Security for South Africa: proceedings of the 2017 ISSA conference. Venter, H. S., Loock, M., Coetzee, M., Eloff, M. M. & Eloff, J. H. P. (eds.). IEEE , p. 56-65 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    1 Citation (Scopus)
    86 Downloads (Pure)
  • 2016

    A theory-based review of information security behavior in the organization and home context

    Omidosu, J. & Ophoff, J., Nov 2016, Proceedings of 2016 Third International conference on advances in computing, communication and engineering, ICACCE 2016, 28-29 November 2016, Durban, South Africa. Kumar, V., Singh, U. G. & Sudarsan, S. D. (eds.). IEEE , p. 225-231 7 p. 8073752

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    1 Citation (Scopus)
    164 Downloads (Pure)
  • 2015

    Security awareness and adoption of security controls by smartphone users

    Parker, F., Ophoff, J., Van Belle, J. P. & Karia, R., 1 Nov 2015, 2015 Second International Conference on Information Security and Cyber Forensics, (InfoSec 2015), Cape Town, South Africa, 15-17 November 2015. Piscataway, NJ: IEEE , p. 99-104 6 p. 7435513

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    21 Citations (Scopus)
  • 2014

    A conceptual model of critical success factors for an e-Government crowdsourcing solution

    Cupido, K. & Ophoff, J., 12 Jun 2014, Proceedings of the 14th European Conference on eGovernment, ECEG 2014. Ionas, A. (ed.). Reading: Academic Conferences and Publishing International Limited, p. 77-84 8 p. (Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    5 Citations (Scopus)
    56 Downloads (Pure)
  • A privacy-aware model for communications management in the IP multimedia subsystem

    Ophoff, J. & Botha, R. A., 1 Jul 2014, Proceedings of the 10th International Network Conference, INC 2014. Dowland, P. S., Furnell, S. M. & Ghita, B. V. (eds.). Plymouth: Univerisity of Plymouth, p. 117-126 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    34 Downloads (Pure)
  • Exploring end-user smartphone security awareness within a South African context

    Ophoff, J. & Robinson, M., 14 Nov 2014, 2014 Information Security for South Africa: proceedings of the ISSA 2014 conference. Venter, H. S., Loock, M., Coetzee, M. & Eloff, M. M. (eds.). IEEE , p. 95-101 7 p. 6950500

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    20 Citations (Scopus)
  • Privacy: a review of publication trends

    Hinde, C. & Ophoff, J., 10 Nov 2014, 2014 Information security for South Africa: proceedings of the ISSA 2014 conference. Venter, H. S., Loock, M., Coetzee, M. & Eloff, M. M. (eds.). IEEE , p. 88-94 7 p. 6950499

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    27 Downloads (Pure)
  • 2012

    How the certified information systems security professional certification supports digital forensic processes

    Rule, S., Stander, A. & Ophoff, J., 4 May 2012, Proceedings of the 9th International Network Conference, (INC 2012). Botha, R. A., Dowland, P. S. & Furnell, S. M. (eds.). Plymouth: Univerisity of Plymouth, p. 63-72 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    32 Downloads (Pure)
  • Investigating the accuracy of base station information for estimating cellphone location

    Smit, L., Stander, A. & Ophoff, J., 1 Oct 2012, 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, (CyberSec 2012), Kuala Lumpur, Malaysia, 26-28 June 2012: proceedings. IEEE , p. 88-93 6 p. 6246171

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)