Peer-reviewed publications from 2014 onward.

Journal Articles or Book Chapters

Irons, A. & Ophoff, J. (2016). Aspects of digital forensics in South Africa. Interdisciplinary Journal of Information, Knowledge, and Management, 11, 273-283. Retrieved from

Pelteret, M. & Ophoff, J. (2016). A review of information privacy and its importance to consumers and organizations. Informing Science: the International Journal of an Emerging Transdiscipline, 19, 277-301. Retrieved from

Stander, A. & Ophoff, J. (2016). Cyber Security in Civil Aviation. Imam Journal of Applied Sciences (IJAS), 1(1), 23-26.

Cupido, K. & Ophoff, J. (2015). A Conceptual Model of Critical Success Factors for an e‐Government Crowdsourcing Solution. In S. Singh & W. Castelnovo (Eds.), Leading Issues in e-Government Research, Vol 2 (259-274). Academic Conferences and Publishing International Limited.

Cupido, K. & Ophoff, J. (2014). A model of fundamental components for an e-Government crowdsourcing platform. Electronic Journal of e-Government (EJEG), 12(2), 142-157. ISSN 1479-439X.

McGibbon, C., Ophoff, J. & Van Belle, J-P. (2014). Our building is smarter than your building: The use of competitive rivalry to reduce energy consumption and linked carbon footprint. Knowledge Management & E-Learning (KMEL), 6(4), 464-471. ISSN 2073-7904.

North, D., Johnston, K. & Ophoff, J. (2014). The use of mobile phones by South African university students. Issues in Informing Science and Information Technology (IISIT), 11 (2014), 115-138. Retrieved from

Conference Proceedings

Omidosu, J. & Ophoff, J. (2016). A Theory-Based Review of Information Security Behavior in the Organization and Home Context. In Proceedings of the Third IEEE International Conference of Advances in Computing, Communication & Engineering (ICACCE-2016), Durban, South Africa.

Heneke, D., Ophoff, J. & Stander, A. (2016). The Threats that Insiders Pose to Critical Infrastructure – a South African Perspective. In Proceedings of the Tenth International Symposium on the Human Aspects of Information Security & Assurance (HAISA 2016), Frankfurt, Germany.

Jenkins, P. & Ophoff, J. (2016). Factors influencing the intention to adopt NFC mobile payments – A South African perspective. In Proceedings of the International Conference on Information Resources Management (Conf-IRM), Cape Town, South Africa.

Neill, D., Van Belle, J-P. & Ophoff, J. (2016). Understanding the Adoption of Wearable Technology in South African Organisations. In Proceedings of the International Conference on Information Resources Management (Conf-IRM), Cape Town, South Africa.

Parker, F., Ophoff, J., Karia, R. & Van Belle, J-P. (2015). Security Awareness and Adoption of Security Controls by Smartphone Users. In Proceedings of the Second International Conference on Information Security and Cyber Forensics (InfoSec2015), Cape Town, South Africa, 99-104.

Abrahams, O., Ophoff, J. & Mwalemba, G. (2015). Cloud Computing Adoption for Business Development: A TOE Perspective. In Proceedings of the 9th IDIA conference, Zanzibar, Tanzania, 463-476.

Soeker, I. & Ophoff, J. (2015). Mobile Phone Costs: Exploring the relationship between Information Overload and Attention. In Proceedings of the African Cyber Citizenship Conference 2015, Port Elizabeth, South Africa, 122-135.

Ophoff, J. & Janowski, M. (2015). Gamification as a Driver of Individual Information Security Behavior. In Proceedings of the IFIP WG8.11/WG11.13 Dewald Roode Information Security Workshop, October 2015, Delaware, USA.

Ophoff, J., Machaka, T. & Stander, A. (2015). Exploring the Impact of Cyber Incivility in the Workplace. In Proceedings of the 2015 Informing Science and IT Education Conference (InSITE 2015), June/July 2015, Tampa, USA, 493-504. Retrieved from

Machine, D. & Ophoff, J. (2014). Understanding what motivates participation on crowdsourcing platforms. In Proceedings of the e-Skills for Knowledge Production and Innovation Conference 2014, Cape Town, South Africa, 191-200. Retrieved from

Roodt, S., de Villiers, C., Johnston, K., Ophoff, J. & Peier, D. (2014). YouTube as an academic tool for ICT lecturers. In Proceedings of the e-Skills for Knowledge Production and Innovation Conference 2014, Cape Town, South Africa, 389-399. Retrieved from

Stanton, G. & Ophoff, J. (2014). Strategizing for mobile learning: A holistic approach for designing mobile learning. In Proceedings of the e-Skills for Knowledge Production and Innovation Conference 2014, Cape Town, South Africa, 449-466. Retrieved from

Ophoff, J. & Robinson, M. (2014). Exploring End-User Smartphone Security Awareness within a South African context. In Proceedings of the 2014 Information Security for South Africa (ISSA 2014) Conference, August 2014, Johannesburg, South Africa.

Hinde, C. & Ophoff, J. (2014). Privacy: A Review of Publication Trends. In Proceedings of the 2014 Information Security for South Africa (ISSA 2014) Conference, August 2014, Johannesburg, South Africa.

Ophoff, J. & Botha, R. (2014). A privacy-aware model for communications management in the IP multimedia subsystem. In Proceedings of the 10th International Network Conference (INC 2014), 117-126. July 2014, Plymouth, United Kingdom.

Cupido, K. & Ophoff, J. (2014). A Conceptual Model of Critical Success Factors for an e-Government Crowdsourcing Solution. In Proceedings of the 14th European Conference on eGovernment (ECEG 2014), June 2014, Brasov, Romania.

Ophoff, J., Jensen, A., Sanderson-Smith, J., Porter, M. & Johnston, K. (2014). A Descriptive Literature Review and Classification of Insider Threat Research. In Proceedings of the 2014 Informing Science and IT Education Conference (InSITE 2014), June/July 2014, Wollongong, Australia.

Ophoff, J. & Johnston, K. (2014). Student Perceptions of Online Learning. In Proceedings of the 43rd Conference of the Southern African Computer Lecturers’ Association – ICT Education in the Cyber World (SACLA 2014), June 2014, Port Elizabeth, South Africa.