Institutional Repository

Browsing Research Outputs (School of Computing) by Title

Browsing Research Outputs (School of Computing) by Title

Sort by: Order: Results:

  • Lubbe, S.; Singh, S. (Wageningen Academic Publishers, 2009-08-24)
    Taking as point of departure research on different preferential thinking styles that humans employ, the authors argue that there is no assurance that a particular decision arrived at by a person employing a particular ...
  • Howard, Grant (2016-06)
    This paper proposes an IS theory of reciprocal change. The research problem addressed in the paper is the absence of an IS theory that explains the reciprocity of change within IS. The questions that the paper answers is, ...
  • Mtsweni, Jabu; Biermann, Elmarie; Pretorius, Laurette (2014)
    The benefits of incorporating Semantic Web Services in web applications are well documented. However, both the real-world implementation and adoption of these services are still rather limited in practice. This is despite ...
  • Les Labuschagne, Carl Marnewick, Maria Jakovljevic (Document Transformation Technologies cc South Africa; uj.ac.za, 2008)
    The success rate of IT projects remains questionable as do the benefits that an organization receive from any IT projects. The 2006 CHAOS report states that only one of the IT projects is a success and contribute to overall ...
  • Howard, Grant (Academic Conferences and Publishing International Limited (ACPI), 2017-03-16)
    Information Technology (IT) is indispensable to modern, competitive organisations and is instrumental in the many changes experienced by these organisations. The paper argues that IT-related organisational change follows ...
  • Becker, Daphne; De Villiers, M.R. (Ruth) (2008)
    This paper introduces the computer-aided instruction (CAI) tutorial Karnaugh, outlining its design, development and evaluation. Karnaugh is used for supplementary learning in the module Computer Systems: Fundamental Concepts. ...
  • Havenga, Marietjie; Mentz, Elsa; De Villiers, M.R. (Ruth) (2008)
    Third year Computer Science students were studied in order to determine which knowledge, skills and strategies they used during an object-oriented programming task. Quantitative and qualitative methods were used to analyse ...
  • De Villiers, M.R. (Ruth) (2006)
    Outcomes-based education (OBE) is the educational paradigm currently advocated in South Africa. This paper proposes the Hexa-C Metamodel (HCMm) as a learning theory foundation for the design and development of e-learning ...
  • Van Biljon, Judy; Dembskey, Evan (2011-10-26)
    Developing countries such as South Africa have underdeveloped human resources. Teaching with information communication technology (ICT) as enabling technology has often been proposed as an approach to maximize the development ...
  • De Villiers, M.R. (Ruth); Becker, Daphne; Adebesin, Tawakkaltu Funmilola (2012)
    E-learning tutorials provide engaging learning activities and feedback assupplementary study material for distance learners. Relations is an interactive, CD-based, multi-media tutorial, custom-built to foster mathematical ...
  • Ronald Mitchell Campbell (2014-03-20)
    The purpose of this study is to identify the legal and ethical issues involved with the deployment of a computer system defence implementation known as a honeypot. During the course of this research reference shall be made ...
  • Twinomurinzi, Hossana; Bon, Anna; Jordaan, Dolf; Schryver, Tom De (2012)
    Continuous technological innovations in ICTs have unleashed many new educational practices worldwide. Most higher education institutions nowadays use different kinds of Elearning. In this paper we will show that constraining ...
  • Twinomurinzi, Hossana; Ojo, Rosemary Bukola (2010)
    The ability for a government administrator to make just, fair and reasonable decisions, better known as administrative decision making, is dependent on the information flow between the administrator and a citizen. South ...
  • Ramgovind, S.; Eloff, M.M.; Smith, E. (Information Security for South Africa, 2010-08-02)
    Cloud computing has elevated IT to newer limits by offering the market environment data storage and capacity with flexible scalable computing processing power to match elastic demand and supply, whilst reducing capital ...
  • Maphosa, M; Eloff, M.M. (2012-09-17)
    Businesses and organisations are undertaking innovative projects to gain competitive advantage in the market. Research into innovative project management has been biased towards how innovative projects are managed to the ...
  • Kroeze, Jan H; Bothma, T.J.D.; Matthee, M.C. (2011)
    The article focuses on the conversion of linguistic data between an XML data cube and a three-dimensional array structure in Visual Basic 6 in order to eventually facilitate data access and manipulation. After a ...
  • Lubbe, Sam; Klopper, Rembrandt; Rugbeer, Hemduth (2007)
    The study that is reported here investigated password security and related issues at a South African tertiary institution. The main reason was to investigate why password security is such a problem for students. This was ...
  • Marin, Mike A; Lotriet, Hugo; Van Der Poll, John A (SAICSIT, 2014-09-29)
    In 2014, the Object Management Group (OMG) published the Case Management Modeling and Notation (CMMN) ver- sion 1.0 speci cation, which is a new process modeling spec- i cation to complement its Business Process Modeling ...
  • Marin, Mike A; Lotriet, Hugo; Van Der Poll, John A (SAICSIT, 2015-09-28)
    The Case Management Modeling and Notation (CMMN) speci cation, published by the Object Management Group (OMG) in 2014, describes a declarative style for modeling business processes. The declarative nature of CMMN is ...
  • Van Biljon, Judy; Van Dyk, Tobie; Gelderblom, Helene (2010-11)
    Mobile phones in South Africa have enjoyed an unprecedented technology adoption rate due to their accessibility and usefulness. This prolific adoption of mobile phones diverts attention from their limitations which include ...

Search UnisaIR


Browse

My Account