Formal specification of software systems has been very promising. Critics against the end
results of formal methods, that is, producing quality software products, is certainly rare. Instead,
reasons have been formulated ...
Specification plays a vital role in software engineering to facilitate the development of highly dependable software. The importance of specification in software development is to serve, amongst others, as a communication ...
The Semantic Web, as the foreseen successor of the current Web, is
envisioned to be a semantically enriched information space usable by machines
or agents that perform sophisticated tasks on behalf of their users.
The ...
Knowledge management has roots in a variety of disciplines, such as philosophy,
psychology, social sciences, management sciences and computing. As a result, a wide
variety of theories and definitions of knowledge and ...
In the 21st century, information security has become the heartbeat of any organisation. One of the best-known methods of tightening and continuously improving security on an information system is to uniquely and efficiently ...
The arrival of outcomes-based education (OBE) in South African means that we have to change the way in which we assess our learners. Coupled with this change comes a move to larger classes where individual assessment has ...
Odhiambo, M.O.; Amimo-Rayolla, P. O.; Kurien, A.M.(AFRICON, 2009-09-23)
As the telecommunications industry evolves towards a converged IP-Core network the role of cellular/wireless broadband technologies in achieving Long Term Evolution (LTE) must be greatly evaluated. This would in effect ...
The road of development through Information and Communication technology (ICT4D) is
lined with deep potholes and dead ends since little is done to “accumulate either knowledge or practical guidance” (Heeks and Bailur, ...
Jokonya, Osden; Kroeze, Jan H; Van der Poll , John Andrew(SAICSIT, 2012-10)
Information Technology (IT) adoption challenges facing organizations are too complex to be resolved using only one methodology. Most existing Information Technology (IT) adoption models such as the Technology Acceptance ...
This study develops and applies a conceptual framework that can be used to evaluate dynamic Web platforms in order to determine a platform for teaching Web application development in tertiary institutions. The framework ...
Sukhoo, A.; Barnard, A.; Eloff, M.M.; Van der Poll, J.A.(PMSA, 2004-05)
Currently software projects are considered by some as being no different from traditional engineering
projects. Software project management methodologies are developed with a generic concept in mind as is
the case with ...
Mujinga, Mathias; Eloff, Mariki M; Kroeze, Jan H(South African Computer Journal, 2019-07-27)
The paper presents a validated socio-technical information security (STInfoSec) framework for the development of online information security (InfoSec) applications. The framework addresses both social and technical aspects ...
The continuing financial losses incurred by individuals and companies due to identity information being phished are necessitating more innovative approaches to solving the problem of phishing attacks at the company level. ...
Web Services propose a framework for the standardisation of interfaces and
interaction, and for publishing software componen1S as services on the Internet By
using this framework, composite servi<:es that make use of ...
MASEMOLA, S.S. (THABO); De Villiers, M.R. (Ruth)(2006)
Testing has been conducted in a controlled usability laboratory on an interactive e-learning application that teaches mathematical skills in a cognitive domain. The study obtained performance measures and identified usability ...
Project success is vitally important for companies to execute and achieve their strate-gies, as well as carry out their visions. Today, more than ever before, companies oper-ate under tremendous strain to deliver results ...
Chipangura, Baldreck; Van Biljon, Judy; Botha, Adele(Progressio, 2012)
Developing countries in general, and South Africa in particular has shown phenomenal growth in the mobile cellular technology sector. Providing mobile cellular access to information and services has ushered a new era of ...
A vast range of controls/countermeasures exists for implementing security on information systems connected to the Internet. For the practitioner attempting to implement an integrated solution between trading partners ...
Several technologies and languages exist for the development and implementation of distributed systems. Furthermore, several models for teaching computer programming and teaching programming in a distance-based educational ...