Institutional Repository

Browsing 2001 National Research and Development Conference by Issue Date

Browsing 2001 National Research and Development Conference by Issue Date

Sort by: Order: Results:

  • Hazelhurst, S (2001)
    The use of IP filtering to improve system security is well established, and although limited in what it can achieve has proved to be efficient and effective. In the design of a security policy there is always a trade-off ...
  • De Ridder, C; Pretorius, L; Barnard, A (2001)
    With the advent of the lnformation Age and global connectivity, the ethical use of Information and Communication Technologies (/CI) has become essential. As the drive towards the establishment of a so-called IT profession ...
  • Wong, B; Marsden, G (2001)
    With the continuing growth of the Internet, an increasing number of organisations are incorporating the Web into their business activities. The appeal of a site to users in terms of both attractiveness and usability ...
  • Van Zyl, J; Walker, AJ (2001)
    The notion of patterns has been used in many different disciplines, and the software industry is no exception. There are many books written, academic research done and practical examples available of where patterns have ...
  • Casanueva, J; Blake, E (2001)
    Presence in Collaborative Virtual Environments (CVEs) can be divided into personal presence and co-presence. Personal presence is having a feeling of "being there" in the CVE oneself. Co-presence is having a feeling that ...
  • Burford, DJ; Blake, EH (2001)
    Facial expressions form an important part of human to human communication. In order to exploit the fall potential of computer networks and the Internet for communication and interaction, provision should be made for conveying ...
  • Lutu, PEN (2001)
    Data mining is the process of extracting informative patterns from data stored in a database or data warehouse. Decision tree induction algorithms, from the area of machine learning are well suited for building classification ...
  • Dixie, CH; Wesson, JL (2001)
    Research is underway at the University of Port Elizabeth (UPE) to establish a framework for introductory IT courses to match the needs of future graduates of diverse programmes from the Faculties of Arts, Building Sciences, ...
  • Renaud, K (2001)
    This paper discusses issues pertaining to mechanisms which can be used to change the behaviour of Java classes at runtime. The proxy mechanism will be compared to and contrasted with other standard approaches to this ...
  • Franken, J; Stander, A; Booley, Z; Isaacs, Z; Rose, R (2001)
    Designers of mobile systems continue to focus on transferring the typical workstation environment as prevalent on the desktop PC to mobile devices. The lack of specific focus on the requirements of the wireless platforms ...
  • Botha, M; Von Solms, R (2001)
    Computer crime and more particularly computer hacking has become increasingly active in today's business environment. Proof of this statement is a survey completed by the Computer Security Institute and the FBI which ...
  • Cloete, E; Miller, MG (2001)
    In this paper we consider the consequences of e-learning design and implementation on the working processes and on the roles to be fulfilled in the usually cyclic process of course development and exploitation. We analyse ...
  • Machanick, P (2001)
    Increasingly aggressive pipelining achieves diminishing returns. Simultaneous Multi-threading (SMT) attempts to exploit the fact that functional units are frequently idle. This paper argues the case for keeping the processor ...
  • Van der Poll, JA; Kotze, P (2001)
    A formal specification of a multi-level marketing (MLM} business is presented. Specifying a MLM business boils down to specifying properties of and operations on mathematical forests and trees. The usefulness of the ...
  • Von Solms, E; Eloff, JHP (2001)
    Information is a very valuable resource and must be protected against harmful attacks from inside as well as outside the organization. As a resource, information is the lifeline of many organizations and is therefore vital ...
  • Stander, A; Van Zee, P; Wang, Y-J (2001)
    Automatic teller machines (ATM) are an intermediate stage in the progression of banking technology. This intermediate stage is expected to remain until user perceptions of electronic banking have improved. ATM transaction ...
  • Smith, DC; Becker, M; Burns-Howell, J; Kyriakides, J (2001)
    The use of teams within organisations is becoming more prevalent as teams have been identified as an efficient work unit of human capital. This research identified 17 team effectiveness characteristics and, using a sample ...
  • Thomas, TA; Brown, S (2001)
    Group activities are important for students in order to develop the skills they will need for working with other people when they get into industry. The Internet offers an exciting environment for students to practise these ...
  • Cohen, JF (2001)
    The validity of managerial activities such as strategic planning have come under increasing scrutiny in recent years. In particular, the validity of information systems strategic planning (ISSP) within South African ...
  • Hart, ML; Davies, K; Barker-Goldie, E-J; Theron, A (2001)
    This research describes a study into the adoption of data mining (DM) techniques and tools in industry. They are seen by most companies interviewed as strategically important, with key applications varying per sector, but ...

Search UnisaIR


Browse

My Account