Items in UNISA Institutional Repository are protected by copyright, with all rights reserved, unless otherwise indicated. Please acknowledge publications according to acceptable standards and norms.
Business intelligence (BI) reports are vital for the success of the banking industry, since these reports give data-based insights to the end-user groups from different business units to inform operational, strategic and ...
In an era marked by technological reliance and the escalating frequency of cyberattacks, prioritising cybersecurity has become imperative for organisations, particularly in the financial sector. The safeguarding of financial ...
The ever-present need for business transformations, be it digital, market changes and agility has compelled organisations to analyse and elect their optimal business capabilities. Business capabilities provide the link ...
Higher education institutions (HEIs) create, disseminate, share, and exchange knowledge through relationships among people, processes, and technologies. Knowledge sharing (KS) in academia enables people within institutions ...
Technology continues to evolve at a rapid rate, resulting in financial institutions adopting technological developments across multiple products and services, including mobile banking applications. The design of these ...
Government Printing Works (GPW) has a long history of creating and publishing national documents such as birth certificates, passports, and identification documents. If these records are compromised in any manner, South ...
Portfolio analysis is benefiting from the surge of alternative sources of data coupled with new modelling frameworks, introduced by machine-learning. I collected alternative data and applied new frameworks (machine-learning ...
Density-based algorithms are effective in the detection of clusters with arbitrary shapes and outliers even when information about the number of clusters is not available. Parameter specification in data stream clustering ...
Da Veiga, Adele; Loock, Marianne(Cham: Springer Nature Switzerland, 2023-07)
Internet users including Small, Medium and Micro Enterprises
(SMMEs) can access a variety of global opportunities through cyberspace however
SMMEs are also targets of cyber-attacks, although they do not have adequate
...
Vorster, Armand; Da Veiga, Adele(Cham: Springer Nature Switzerland, 2023-10)
Business-to-consumer (B2C) e-commerce websites have recently increased in South Africa. The extent of addressing privacy requirements in B2C e-commerce websites is still in its infancy in South Africa with the Protection ...
Da Veiga, Adele(Cham: Springer Nature Switzerland, 2023-10)
Consumers today are pushing for greater transparency over the potential collection and use of their personal information (PI). It is key for organizations dealing with consumer PI to address privacy concerns and challenges. ...
Maguraushe, Kudakwashe; Da Veiga, Adele; Martins, Nico(Taylor and Francis, 2024-03-24)
This study aims to address the lack of personal information privacy policies in Zimbabwean universities by proposing and validating a Student Personal Information Privacy Perception (SPIPP) model. The model helps institutions ...
Introductory programming can be challenging for educators to teach and students to learn. Some students struggle to comprehend introductory programming topics like the uses of assignment, decisions, loops, functions and ...
The introduction of electronic-participation initiatives in a form of involving community in various countries yielded positive results as compared to traditional mechanisms; more people are engaging government departments ...
information security culture. A model is proposed to encourage creativity and innovation as part of the information security culture. Design/methodology/approach – The study first applied a theoretical approach with a ...
As the velocity and volume of data breaches increases, information security is a
cornerstone to the sustainability of business functionality in organisations. The
focus of traditional information security has been to ...
Information and Communication Technology (ICT) can be defined as a form of technology that provides access to information through platforms of telecommunication. Risk management is a process of identifying, assessing, and ...
Poor management attitude has been identified as the major challenge to software
project management. Lack of knowledge and understanding of other pertinent risk
factor dimensions in software projects (such as potential ...
Across the world, governments and local authorities are releasing open data with the conviction that the action of publishing open data may result in a new untapped asset that can promote positive social change and economic ...
Information Security Incident Management is an essential process within an organisational
context, as it provides a strategic approach towards monitoring and containing incidents and
vulnerabilities. The coordination ...