Follow
Fungai Bhunu Shava
Fungai Bhunu Shava
Namibia University of Science and Technology
Verified email at nust.na
Title
Cited by
Cited by
Year
How advanced persistent threats exploit humans
M Bere, F Bhunu-Shava, A Gamundani, I Nhamu
International Journal of Computer Science Issues (IJCSI) 12 (6), 170, 2015
302015
Factors affecting user experience with security features: A case study of an academic institution in Namibia
FB Shava, D Van Greunen
2013 Information Security for South Africa, 1-8, 2013
182013
ICTs use and cyberspace risks faced by adolescents in Namibia
PB Maoneke, FB Shava, AM Gamundani, M Bere-Chitauro, I Nhamu
Proceedings of the Second African Conference for Human Computer Interaction …, 2018
132018
A gap analysis of the ISO/IEC 27000 standard implementation in Namibia
DJ Tjirare, FB Shava
2017 IST-Africa Week Conference (IST-Africa), 1-10, 2017
72017
Forward feature selection for DDoS detection on cross-plane of software defined network using hybrid deep learning
LS Matsa, GA Zodi-Lusilao, F Bhunu-Shava
2021 3rd International Multidisciplinary Information Technology and …, 2021
62021
Bring Your Own Device (BYOD) Information Security Risks: Case of Lesotho
MP Morolong, FB Shava, AM Gamundani
International Conference on Cyber Warfare and Security, 346-XVI, 2020
62020
A Secure Cloud Adoption Framework (SCAF) for the Namibian Government Information Technology Departments
EN Nghihalwa, FB Shava
2018 Second World Conference on Smart Trends in Systems, Security and …, 2018
62018
An assessment of cloud computing readiness in the Namibian government's Information Technology departments
E Nghihalwa, FB Shava
2018 19th IEEE Mediterranean Electrotechnical Conference (MELECON), 92-97, 2018
62018
Designing user security metrics for a security awareness at Higher and Tertiary Institutions
FB Shava, D Van Greunen
Proceedings of the 8th International Development Informatics Association …, 2014
62014
Review of sensitive data leakage through Android applications in a bring your own device (BYOD) workplace
M MOROLONG, A GAMUNDANI, FB SHAVA
2019 IST-Africa Week Conference (IST-Africa), 1-8, 2019
52019
An assessment of BYOD control in higher learning institutions: a Namibian perspective
S MUSARURWA, AM GAMUNDANI, FB SHAVA
2019 IST-Africa Week Conference (IST-Africa), 1-9, 2019
52019
Towards the use of Participatory Methods in Cybersecurity research in rural Africa: A grassroots Approach
GT Nhinda, FB Shava
2021 3rd International Multidisciplinary Information Technology and …, 2021
42021
Assessing Patterns of Cybercrimes Associated with Online Transactions in Namibia Banking Institutions’ Cyberspace
EL Nawa, M Chitauro, FB Shava
2021 3rd International Multidisciplinary Information Technology and …, 2021
42021
Chatbot driven web-based platform for online safety and sexual exploitation awareness and reporting in Namibia
MN Rita, FB Shava
2021 International Conference on Artificial Intelligence, Big Data …, 2021
42021
A secure smart city infrastructure framework for E-service delivery within a developing country: A case of windhoek in Namibia
LR Erastus, NR Jere, FB Shava
Proceedings of Fifth International Congress on Information and Communication …, 2020
42020
An analysis of children’s online activities and behaviours that expose them to cybercrimes
J Kahimise, FB Shava
2019 27th Telecommunications Forum (TELFOR), 1-4, 2019
42019
A security model for Namibian Government Services
L Erastus, N Jere, FB Shava
2017 IST-Africa Week Conference (IST-Africa), 1-11, 2017
42017
Exploring challenges of biometric technology adoption: A namibian review
LR Erastus, N Jere, FB Shava
2015 International Conference on Emerging Trends in Networks and Computer …, 2015
42015
Tech4Good: Artificial intelligence powered chatbots with child online protection in mind
F Bhunu Shava, MN Rita, M Chitauro
Available at SSRN 4331466, 2022
32022
Designing an email security awareness program for state-owned enterprises in namibia
MP Morolong, FB Shava, VG Shilongo
IOT with Smart Systems: Proceedings of ICTIS 2021, Volume 2, 679-688, 2022
32022
The system can't perform the operation now. Try again later.
Articles 1–20