Institutional Repository

Browsing Research Outputs (School of Computing) by Title

Browsing Research Outputs (School of Computing) by Title

Sort by: Order: Results:

  • Les Labuschagne, Carl Marnewick, Maria Jakovljevic (Document Transformation Technologies cc South Africa; uj.ac.za, 2008)
    The success rate of IT projects remains questionable as do the benefits that an organization receive from any IT projects. The 2006 CHAOS report states that only one of the IT projects is a success and contribute to overall ...
  • Howard, Grant (Academic Conferences and Publishing International Limited (ACPI), 2017-03-16)
    Information Technology (IT) is indispensable to modern, competitive organisations and is instrumental in the many changes experienced by these organisations. The paper argues that IT-related organisational change follows ...
  • Becker, Daphne; De Villiers, M.R. (Ruth) (2008)
    This paper introduces the computer-aided instruction (CAI) tutorial Karnaugh, outlining its design, development and evaluation. Karnaugh is used for supplementary learning in the module Computer Systems: Fundamental Concepts. ...
  • Havenga, Marietjie; Mentz, Elsa; De Villiers, M.R. (Ruth) (2008)
    Third year Computer Science students were studied in order to determine which knowledge, skills and strategies they used during an object-oriented programming task. Quantitative and qualitative methods were used to analyse ...
  • De Villiers, M.R. (Ruth) (2006)
    Outcomes-based education (OBE) is the educational paradigm currently advocated in South Africa. This paper proposes the Hexa-C Metamodel (HCMm) as a learning theory foundation for the design and development of e-learning ...
  • Van Biljon, Judy; Dembskey, Evan (2011-10-26)
    Developing countries such as South Africa have underdeveloped human resources. Teaching with information communication technology (ICT) as enabling technology has often been proposed as an approach to maximize the development ...
  • De Villiers, M.R. (Ruth); Becker, Daphne; Adebesin, Tawakkaltu Funmilola (2012)
    E-learning tutorials provide engaging learning activities and feedback assupplementary study material for distance learners. Relations is an interactive, CD-based, multi-media tutorial, custom-built to foster mathematical ...
  • Ronald Mitchell Campbell (2014-03-20)
    The purpose of this study is to identify the legal and ethical issues involved with the deployment of a computer system defence implementation known as a honeypot. During the course of this research reference shall be made ...
  • Twinomurinzi, Hossana; Bon, Anna; Jordaan, Dolf; Schryver, Tom De (2012)
    Continuous technological innovations in ICTs have unleashed many new educational practices worldwide. Most higher education institutions nowadays use different kinds of Elearning. In this paper we will show that constraining ...
  • Twinomurinzi, Hossana; Ojo, Rosemary Bukola (2010)
    The ability for a government administrator to make just, fair and reasonable decisions, better known as administrative decision making, is dependent on the information flow between the administrator and a citizen. South ...
  • Ramgovind, S.; Eloff, M.M.; Smith, E. (Information Security for South Africa, 2010-08-02)
    Cloud computing has elevated IT to newer limits by offering the market environment data storage and capacity with flexible scalable computing processing power to match elastic demand and supply, whilst reducing capital ...
  • Maphosa, M; Eloff, M.M. (2012-09-17)
    Businesses and organisations are undertaking innovative projects to gain competitive advantage in the market. Research into innovative project management has been biased towards how innovative projects are managed to the ...
  • Kroeze, Jan H; Bothma, T.J.D.; Matthee, M.C. (2011)
    The article focuses on the conversion of linguistic data between an XML data cube and a three-dimensional array structure in Visual Basic 6 in order to eventually facilitate data access and manipulation. After a ...
  • Lubbe, Sam; Klopper, Rembrandt; Rugbeer, Hemduth (2007)
    The study that is reported here investigated password security and related issues at a South African tertiary institution. The main reason was to investigate why password security is such a problem for students. This was ...
  • Marin, Mike A; Lotriet, Hugo; Van Der Poll, John A (SAICSIT, 2014-09-29)
    In 2014, the Object Management Group (OMG) published the Case Management Modeling and Notation (CMMN) ver- sion 1.0 speci cation, which is a new process modeling spec- i cation to complement its Business Process Modeling ...
  • Marin, Mike A; Lotriet, Hugo; Van Der Poll, John A (SAICSIT, 2015-09-28)
    The Case Management Modeling and Notation (CMMN) speci cation, published by the Object Management Group (OMG) in 2014, describes a declarative style for modeling business processes. The declarative nature of CMMN is ...
  • Van Biljon, Judy; Van Dyk, Tobie; Gelderblom, Helene (2010-11)
    Mobile phones in South Africa have enjoyed an unprecedented technology adoption rate due to their accessibility and usefulness. This prolific adoption of mobile phones diverts attention from their limitations which include ...
  • Da Veiga, Adele (Emerald, 2023-02-01)
    information security culture. A model is proposed to encourage creativity and innovation as part of the information security culture. Design/methodology/approach – The study first applied a theoretical approach with a ...
  • Da Veiga, Adele (Springer, Cham, 2022-07-06)
    This research aims to elicit a conceptual understanding of creativity and innovation to enable a totally aligned information security culture. Stimulating the creativity and innovation of employees in an organisation can ...
  • Martins, Nico (MCB University Press, 2002)
    The study, representing 6,528 employees, investigates the relationship of the “big five” personality dimensions and managerial practices to the dimension of trust relationships between managers and employees, and also the ...

Search UnisaIR


Browse

My Account