Institutional Repository

Browsing Institute of Corporate Citizenship by Type "Article"

UnisaIR/Manakin Repository

Browsing Institute of Corporate Citizenship by Type "Article"

Sort by: Order: Results:

  • Sukhoo, Aneerav; Barnard, Andries; Eloff, M.M.; Van der Poll, John A; Motah, Mahendrenath (Information Science Institute, 2005)
    Software project management probably is a sector that has witnessed the highest rate of project failure in the world. This is not the case with project management concerned with other disciplines due to better management ...
  • Padayachee, Keshnee; Eloff, J.H.P. (2007)
    The aim of this paper is to document experiences with augmenting multilevel security with usage control at the application level within the aspect-oriented paradigm. Multilevel access control is an access control policy ...
  • Eloff, J.H.P.; Padayachee, Keshnee; Bishop, J. (2010)
    There is a duality between access control and information flow control as both mechanisms are concerned with the flow of information. However, information flow control is more than access control, as an illegal flow might ...
  • Padayachee, Keshnee; Eloff, J.H.P. (2006)
    As society becomes increasingly dependent on software, there is an increasing expectation of information systems to protect the individual’s right to privacy. The process of attaining electronic consent (e-Consent) may ...
  • Padayachee, K.; Eloff, J.H.P. (2006)
    The efficacy of the aspect-oriented paradigm has been well established within several areas of software security as aspect-orientation facilitates the abstraction of these security-related tasks to reduce code complexity. ...
  • Barnard, Andries; Eloff, M.M.; Sukhoo, Aneerav; Van der Poll, John A. (Information Science Institute, 2005)
    It is sometimes very difficult for an organization to adopt a specific software project management methodology in a short space of time. It requires sufficient time, adequate financial support and skilled human resources ...
  • Dlamini, M.T.; Eloff, M.M.; Eloff, J.H.P.; Hone, K. (Information Security South Africa (ISSA), 2009-07)
    The entire business landscape finds itself on the verge of a recession because of ongoing global economic turmoil. Thus, there is a heightened need to minimise and mitigate business risk and scrutinise information spending ...
  • Smith, Elme; Eloff, J.H.P. (Intelligent Systems and their Applications, IEEE, 2000-04)
    Human observation and intuition form the basis of any risk assessment. The authors propose a cognitive fuzzy modeling approach to risk assessment in health care institutions, building on fuzzy logic's great potential in ...
  • Eccles, N.S.; Pillay, V.; De Jongh, D. (University of South Africa, 2009)
    This paper explores the relationships between a publicly available measure of corporate accountability (the Accountability Rating™) and a range of other corporate variables for the largest 50 companies in South Africa. The ...
  • Padayachee, Keshnee; Eloff, J.H.P. (2007)
    With the advent of agile programming, lightweight software processes are being favoured over the highly formalized approaches of the past. Likewise access control may benefit from a less prescriptive approach with an ...
  • Kritzinger, E.; Von Solms, S.H. (2008)
    This paper introduces information security within the educational environments that utilize electronic resources. The education environment experienced a paradigm shift over the last several years, due to the rapid growth ...
  • Ramgovind, S.; Eloff, M.M.; Smith, E. (Information Security for South Africa, 2010-08-02)
    Cloud computing has elevated IT to newer limits by offering the market environment data storage and capacity with flexible scalable computing processing power to match elastic demand and supply, whilst reducing capital ...
  • Maphosa, M; Eloff, M.M. (2012-09-17)
    Businesses and organisations are undertaking innovative projects to gain competitive advantage in the market. Research into innovative project management has been biased towards how innovative projects are managed to the ...
  • Eccles, N.S.; Viviers, S. (2011)
    The aim of this paper was to reflect on the origins and meanings of names describing investment practices that integrate a consideration of environmental, social and corporate governance issues in the academic literature. ...
  • Kritzinger, E.; Smith, E. (2009-06)
    Human-related information security breaches within organizations are primarily caused by employees who have not been made aware of the importance of protecting the information they work with. Information security awareness ...
  • Hattas, Mahier; Eloff, M.M. (2011-09-13)
    Digital Data Collection in South Africa is continuously evolving as technology and infrastructural networks gain momentum with respect to its development. In-field data collection is critical for any national government ...
  • Sukhoo, A.; Barnard, A.; Eloff, M.M.; Van der Poll, J.A. (PMSA, 2004-05)
    Developing countries are very often faced with a shortage of skilled staff, difficult economic and social conditions, weak political institutions, deeply rooted cultural and religious beliefs that all have an impact ...
  • Wangwe, Carina Kabajunga; Eloff, Maria Margaretha; Venter, Lucas (2012)
    The government of Tanzania adopted an e-Government strategy in 2009 that is aimed at improving efficiency in government and providing better services to citizens. Information security is identified as one of the requirements ...
  • Dagada, R.; Eloff, M.M.; Venter, L.M. (Information Security for South Africa (ISSA), 2009)
    South Africa has myriad laws that address information security related issues. One such law is the Electronic Communications and Transactions Act of 2002 (ECTA), which is highly regarded internationally. A study, which ...
  • Sukhoo, A.; Barnard, A.; Eloff, M.M.; Van der Poll, J.A. (PMSA, 2004-05)
    Currently software projects are considered by some as being no different from traditional engineering projects. Software project management methodologies are developed with a generic concept in mind as is the case with ...

Search UnisaIR


Browse

My Account