Project success is vitally important for companies to execute and achieve their strate-gies, as well as carry out their visions. Today, more than ever before, companies oper-ate under tremendous strain to deliver results ...
Knowledge Management aims to improve organisational performance and it marks the beginning of organisational transformation. The two types of knowledge managed are respectively categorised “tacit” and “explicit.” This ...
nformation security (InfoSec) policies are widely used by institutions as a form of InfoSec control measure to protect their information assets. InfoSec policies are commonly documented in natural language, which is prone ...
Information security (InfoSec) policies are widely used by institutions as a form of InfoSec control measure to protect their information assets. InfoSec policies are commonly documented in natural language, which is prone ...
Open source products such as software development tools and server applications are gaining popularity among expert users. There is however a notable lag in adoption of desktop open source software among ordinary users ...
The growing need for computer software in different sectors of activity, (health, agriculture,
industries, education, aeronautic, science and telecommunication) together with the
increasing reliance of the society as a ...
In the 21st century, information security has become the heartbeat of any organisation. One of the best-known methods of tightening and continuously improving security on an information system is to uniquely and efficiently ...
Information and Communication Technologies (ICTs) are capable of expanding access to quality education, educational resources, and also provide teachers with new skills. Nevertheless, a majority of rural public schools ...
Introductory programming failure rate among students is high worldwide, including in
South Africa. The failure rate remains a subject for investigation due to a high number of
students who find learning to program ...
This study explores complexity metrics for business artifact process models described by Case Management Model and Notation (CMMN). Process models are usually described using Business Process Management (BPM), which is a ...
A large amount of information is contained in textual records, which originate from a variety of sources such as handwritten records and digital media like audio and video files. The information contained in these records ...
Specification plays a vital role in software engineering to facilitate the development of highly dependable software. The importance of specification in software development is to serve, amongst others, as a communication ...
In developing countries, the mobile phone market has matured in terms of subscription, penetration and mobile centric1
services. In turn, people have integrated mobile phones into their daily lives. The interaction ...
This study aims to identify the quality of knowledge management practices and
success factors of non-governmental organisations in Malawi, and their influence on
the knowledge management process.
A questionnaire-based ...
Ontologies are foundational to, and upper ontologies provide semantic integration across, the Semantic Web. Multilingualism has been shown to be a key challenge to the development of the Semantic Web, and is a particular ...
This research examined lecturers’ perspectives on the academic use of Facebook, specifically for teaching, in a higher education institution in Gauteng, South Africa. A survey research design was followed, and semi-structured ...
Non-relational database management systems address some of the limitations relational database management systems have when storing large volumes of unstructured, user generated text-based data in distributed environments. ...
This study was motivated by the need to overcome the pedagogical hindrances experienced by introductory object-oriented programming students in order to address the high attrition rate evident among novice programmers in ...
Historically, progress in technology development has continually created new opportunities for criminal activities which, in turn, have triggered the need for the development of new security-sensitive systems. Organisations ...
Data quality is one of many challenges experienced in electronic healthcare (e-health) services in South Africa. The collection of data with substandard data quality leads to inappropriate information for health and ...