Dagada, Rabelani; Eloff, M.M.; Venter, L.M.(Information Security for South Africa (ISSA), 2009)
South Africa has myriad laws that address information security related issues.
One such law is the Electronic Communications and Transactions Act of 2002
(ECTA), which is highly regarded internationally. A study, which ...
Machanick, Philip(Computer Society of South Africa (on behalf of SAICSIT), 1985)
After a brief look at how the notion of the stored program is applied by
programmers in the area of Artificial Intelligence (Al), we shall look at a
specific Al tool: a production svstem. The discussion is at a ...
The first few chapters of the dissertation will catalogue what is known regarding z-ideals in
commutative rings with identity. Some special attention will be paid to z-ideals in function
rings to show how the presence ...
Information and Communication Technologies (ICTs) are capable of expanding access to quality education, educational resources, and also provide teachers with new skills. Nevertheless, a majority of rural public schools ...
This comparative study into the integration of technology into teaching and learning, examines cases of computer use and e-learning in Science classrooms in two Southern African states, namely, South Africa (SA) and the ...
Formal specification of software systems has been very promising. Critics against the end
results of formal methods, that is, producing quality software products, is certainly rare. Instead,
reasons have been formulated ...
Specification plays a vital role in software engineering to facilitate the development of highly dependable software. The importance of specification in software development is to serve, amongst others, as a communication ...
The Semantic Web, as the foreseen successor of the current Web, is
envisioned to be a semantically enriched information space usable by machines
or agents that perform sophisticated tasks on behalf of their users.
The ...
Knowledge management has roots in a variety of disciplines, such as philosophy,
psychology, social sciences, management sciences and computing. As a result, a wide
variety of theories and definitions of knowledge and ...
In the 21st century, information security has become the heartbeat of any organisation. One of the best-known methods of tightening and continuously improving security on an information system is to uniquely and efficiently ...
The arrival of outcomes-based education (OBE) in South African means that we have to change the way in which we assess our learners. Coupled with this change comes a move to larger classes where individual assessment has ...
Odhiambo, M.O.; Amimo-Rayolla, P. O.; Kurien, A.M.(AFRICON, 2009-09-23)
As the telecommunications industry evolves towards a converged IP-Core network the role of cellular/wireless broadband technologies in achieving Long Term Evolution (LTE) must be greatly evaluated. This would in effect ...
The road of development through Information and Communication technology (ICT4D) is
lined with deep potholes and dead ends since little is done to “accumulate either knowledge or practical guidance” (Heeks and Bailur, ...
Jokonya, Osden; Kroeze, Jan H; Van der Poll , John Andrew(SAICSIT, 2012-10)
Information Technology (IT) adoption challenges facing organizations are too complex to be resolved using only one methodology. Most existing Information Technology (IT) adoption models such as the Technology Acceptance ...
This study develops and applies a conceptual framework that can be used to evaluate dynamic Web platforms in order to determine a platform for teaching Web application development in tertiary institutions. The framework ...
Sukhoo, A.; Barnard, A.; Eloff, M.M.; Van der Poll, J.A.(PMSA, 2004-05)
Currently software projects are considered by some as being no different from traditional engineering
projects. Software project management methodologies are developed with a generic concept in mind as is
the case with ...
Mujinga, Mathias; Eloff, Mariki M; Kroeze, Jan H(South African Computer Journal, 2019-07-27)
The paper presents a validated socio-technical information security (STInfoSec) framework for the development of online information security (InfoSec) applications. The framework addresses both social and technical aspects ...
The continuing financial losses incurred by individuals and companies due to identity information being phished are necessitating more innovative approaches to solving the problem of phishing attacks at the company level. ...