Keshnee Padayachee

600 total citations
34 papers, 377 citations indexed

About

Keshnee Padayachee is a scholar working on Information Systems, Sociology and Political Science and Education. According to data from OpenAlex, Keshnee Padayachee has authored 34 papers receiving a total of 377 indexed citations (citations by other indexed papers that have themselves been cited), including 23 papers in Information Systems, 19 papers in Sociology and Political Science and 7 papers in Education. Recurrent topics in Keshnee Padayachee's work include Information and Cyber Security (16 papers), Cybercrime and Law Enforcement Studies (10 papers) and Crime Patterns and Interventions (5 papers). Keshnee Padayachee is often cited by papers focused on Information and Cyber Security (16 papers), Cybercrime and Law Enforcement Studies (10 papers) and Crime Patterns and Interventions (5 papers). Keshnee Padayachee collaborates with scholars based in South Africa, Ethiopia and South Sudan. Keshnee Padayachee's co-authors include Elmarie Kritzinger, Jan H. P. Eloff and Million Meshesha and has published in prestigious journals such as Decision Support Systems, Computers & Security and Journal of Information Security and Applications.

In The Last Decade

Keshnee Padayachee

33 papers receiving 344 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Keshnee Padayachee South Africa 9 271 114 90 67 56 34 377
Elmarie Kritzinger South Africa 11 341 1.3× 117 1.0× 118 1.3× 68 1.0× 67 1.2× 39 452
Julie J.C.H. Ryan United States 10 165 0.6× 79 0.7× 35 0.4× 24 0.4× 35 0.6× 29 335
Diana Burley United States 9 130 0.5× 22 0.2× 51 0.6× 31 0.5× 29 0.5× 27 290
Abdulrahman Mirza Saudi Arabia 10 156 0.6× 51 0.4× 70 0.8× 68 1.0× 11 0.2× 32 354
Felix Nti Koranteng Ghana 12 107 0.4× 44 0.4× 136 1.5× 38 0.6× 37 0.7× 18 359
Vishal Shah United States 10 135 0.5× 43 0.4× 59 0.7× 13 0.2× 38 0.7× 16 304
Daniel McDonald United States 10 138 0.5× 40 0.4× 44 0.5× 31 0.5× 21 0.4× 26 342
Kerry-Lynn Thomson South Africa 8 341 1.3× 140 1.2× 126 1.4× 13 0.2× 38 0.7× 16 429
Moneer Alshaikh Saudi Arabia 9 184 0.7× 74 0.6× 58 0.6× 30 0.4× 20 0.4× 15 262
Iraklis Paraskakis Greece 12 222 0.8× 106 0.9× 49 0.5× 129 1.9× 11 0.2× 43 439

Countries citing papers authored by Keshnee Padayachee

Since Specialization
Citations

This map shows the geographic impact of Keshnee Padayachee's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Keshnee Padayachee with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Keshnee Padayachee more than expected).

Fields of papers citing papers by Keshnee Padayachee

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Keshnee Padayachee. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Keshnee Padayachee. The network helps show where Keshnee Padayachee may publish in the future.

Co-authorship network of co-authors of Keshnee Padayachee

This figure shows the co-authorship network connecting the top 25 collaborators of Keshnee Padayachee. A scholar is included among the top collaborators of Keshnee Padayachee based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Keshnee Padayachee. Keshnee Padayachee is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Padayachee, Keshnee, et al.. (2023). Technology-Based Strategies Predicated on Self-Regulated Learning in a Flipped Computer Programming Classroom. 22(1). 400–408. 1 indexed citations
2.
Padayachee, Keshnee. (2022). Understanding the effects of situational crime prevention and personality factors on insider compliance. Journal of Information Security and Applications. 70. 103338–103338. 2 indexed citations
3.
Padayachee, Keshnee, et al.. (2020). A Coordinated Communication & Awareness Approach for Information Security Incident Management: An Empirical Study on Ethiopian Organizations. DigitalCommons - Kennesaw State University (Kennesaw State University). 12(2). 1. 1 indexed citations
5.
Padayachee, Keshnee. (2017). The myths and realities of Generational Cohort Theory on ICT Integration in Education: A South African Perspective. DigitalCommons - Kennesaw State University (Kennesaw State University). 10(1). 4. 20 indexed citations
6.
Padayachee, Keshnee. (2017). A Snapshot Survey of ICT Integration in South African Schools. South African Computer Journal. 29(2). 49 indexed citations
7.
Padayachee, Keshnee, et al.. (2015). A survey of honeypot research: Trends and opportunities. 208–212. 33 indexed citations
8.
Padayachee, Keshnee. (2015). A framework of opportunity-reducing techniques to mitigate the insider threat. 1–8. 7 indexed citations
9.
Padayachee, Keshnee, et al.. (2015). Evaluating the Effectiveness of Lego Robots in Engaged Scholarship. 16–20. 4 indexed citations
10.
Padayachee, Keshnee. (2015). An Insider Threat Neutralization Mitigation Model Predicated On Cognitive Dissonance (ITNMCD). South African Computer Journal. 56. 5 indexed citations
11.
Padayachee, Keshnee. (2014). Aspectising honeytokens to contain the insider threat. IET Information Security. 9(4). 240–247. 15 indexed citations
12.
Padayachee, Keshnee. (2013). A conceptual opportunity-based framework to mitigate the insider threat. 1–8. 11 indexed citations
13.
Padayachee, Keshnee. (2012). Taxonomy of compliant information security behavior. Computers & Security. 31(5). 673–680. 113 indexed citations
14.
Padayachee, Keshnee & Jan H. P. Eloff. (2012). Evaluating Usage Control Deterrents. South African Computer Journal. 48. 1 indexed citations
15.
Padayachee, Keshnee & Elmarie Kritzinger. (2010). Teaching safe and secure usage of ICTs in South African schools. Unisa Institutional Repository (University of South Africa). 4 indexed citations
16.
Padayachee, Keshnee & Jan H. P. Eloff. (2009). Adapting usage control as a deterrent to address the inadequacies of access controls. Computers & Security. 28(7). 536–544. 4 indexed citations
17.
Padayachee, Keshnee, et al.. (2008). A Taxonomy Of Aspect-Oriented Security. Review of Business Information Systems (RBIS). 12(1). 89–102. 1 indexed citations
18.
Padayachee, Keshnee & Jan H. P. Eloff. (2007). An Aspect-Oriented Approach to Enhancing Multilevel Security with Usage Control: An Experience Report. Unisa Institutional Repository (University of South Africa). 1060–1065.
19.
Padayachee, Keshnee & Jan H. P. Eloff. (2006). An aspect-oriented implementation of e-consent to foster trust. Unisa Institutional Repository (University of South Africa). 164–169. 3 indexed citations
20.
Padayachee, Keshnee. (2002). An interpretive study of software risk management perspectives. 118–127. 28 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026