A framework of anti‐phishing measures aimed at protecting the online consumer's identity R Butler The Electronic Library 25 (5), 517-533, 2007 | 56 | 2007 |
Beyond King III: Assigning accountability for IT governance in South African enterprises R Butler, MJ Butler South African Journal of Business Management 41 (3), 33-45, 2010 | 49 | 2010 |
Assessing the information quality of phishing-related content on financial institutions’ websites R Butler, M Butler Information & Computer Security 26 (5), 514-532, 2018 | 22 | 2018 |
Using guest lecturers to address the gap between theory and practice in auditing studies at a South African university-a case study R Butler, SPJ Von Wielligh Southern African Journal of Accountability and Auditing Research 13 (1), 47-56, 2012 | 17 | 2012 |
Investigation of phishing to develop guidelines to protect the Internet consumer's identity against attacks by phishers R Butler South African journal of information management 7 (3), 2005 | 14 | 2005 |
A systematic literature review of the factors affecting smartphone user threat avoidance behaviour R Butler Information & Computer Security 28 (4), 555-574, 2020 | 13 | 2020 |
Investigating the possibility to use differentiated authentication based on risk profiling to secure online banking M Butler, R Butler Information & Computer Security 23 (4), 421-434, 2015 | 13 | 2015 |
The password practices applied by South African online consumers: Perception versus reality R Butler, M Butler South African Journal of Information Management 17 (1), 1-11, 2015 | 12 | 2015 |
An assessment of the human factors affecting the password performance of South African online consumers. R Butler, MJ Butler HAISA, 150-161, 2014 | 12 | 2014 |
Some password users are more equal than others: Towards customisation of online security initiatives R Butler, M Butler South African Journal of Information Management 20 (1), 1-10, 2018 | 10 | 2018 |
An analysis of service‐oriented architecture (SOA) to determine the impact on the activities performed by the external auditor of a SOA service consumer R Butler Meditari Accountancy Research 16 (2), 13-30, 2008 | 10 | 2008 |
The influence of mobile operating systems on user security behavior M Butler, R Butler 2021 IEEE 5th International Conference on Cryptography, Security and Privacy …, 2021 | 3 | 2021 |
Avoid the hook in the phisherman's bait R Butler Accountancy SA, 2005 | 2 | 2005 |
An analysis of the prevalence of proper password practices among South African employees R Butler Southern African Journal of Accountability and Auditing Research 18 (1), 35-47, 2016 | | 2016 |
Improving internet banking security by using differentiated authentication based on risk profiling. MJ Butler, R Butler HAISA, 137-149, 2014 | | 2014 |
The role of guess lectureres in Auditing Education at a South African university-A case study SPJ Von Wielligh, R Butler | | 2013 |
Implementing the New Companies Act-the next step (part 1). R Butler Accountancy SA, 2011 | | 2011 |
Audit implications of formalising management commentary SPJ Von Wielligh, R Butler Accountancy SA, 2007 | | 2007 |
B2B suppliers: Addressing the repudiation of orders in an open account system R Butler Meditari: Research Journal of the School of Accounting Sciences 12 (2), 21-39, 2004 | | 2004 |
B2B and the supplier: preventing repudiation of orders in an open account system R Butler Stellenbosch: University of Stellenbosch, 2003 | | 2003 |