Institutional Repository

Browsing School of Computing by Title

Browsing School of Computing by Title

Sort by: Order: Results:

  • Byron-Moore, S.P. (Computer Society of South Africa (on behalf of SAICSIT), 1987)
    Any distractions in the working environment can affect the quality and quantity of output. For example, noise may disturb a person's thought processes and lead to errors. In addition, the programmer is subject to other, ...
  • Mueller, C.S.M. (South African Institute of Computer Scientists and Information Technologists, 1990)
    Induction has been used as a major tool in mathematics in proving theorems. This paper explores whether it has an equally important role in formulating programs. There are those who advocate that induction should be used ...
  • Jansen van Rensburg, M (South African Computer Society (SAICSIT), 1999)
    This article provides a description of the current state of Object Orientation in South African companies. It forms part of an MSc research report, looking at the pitfalls and guidelines in the transition to 00. The problems ...
  • Le Roux, M (1996)
    Thoughts are exchanged on Project Management in practice, specifically regarding projects analysed and systems developed with the Composer by IEF CASE tool. The information engineering methodology (IEM) that is being ...
  • Enoch, Clive N. (2013-06)
    The recent global financial crisis, regulatory and compliance requirements placed on organisations, and the need for scientific research in the project portfolio management discipline were factors that motivated this ...
  • Van der Vyver, Thelma (1997-11)
    In classical propositional logic (CPL) logical reasoning is formalised as logical entailment and can be computed by means of tableau and resolution proof procedures. Unfortunately CPL is not expressive enough and using ...
  • Hazelhurst, S (2001)
    The use of IP filtering to improve system security is well established, and although limited in what it can achieve has proved to be efficient and effective. In the design of a security policy there is always a trade-off ...
  • McDonald, T (Computer Society of South Africa (on behalf of SAICSIT), 1988)
    In contrast to other countries, South Africa has sadly lacked a computer network for researchers. This paper starts with previous efforts to establish a national network for researchers and gives possible reasons for ...
  • Mwim, Emilia; Kritzinger, Elmarie (ACCC, 2014-11)
    The digital divide has been a problem since the early days of information and communication technology (ICT) and it manifests itself in many forms, for example in a lack of access to the Internet, inadequate ICT skills and ...
  • Vorster, Armand; Da Veiga, Adele (Cham: Springer Nature Switzerland, 2023-10)
    Business-to-consumer (B2C) e-commerce websites have recently increased in South Africa. The extent of addressing privacy requirements in B2C e-commerce websites is still in its infancy in South Africa with the Protection ...
  • Von Solms, S.H.; De Villiers, D.P. (Computer Society of South Africa (on behalf of SAICSIT), 1988)
    The operations in the Take/Grant Protection Model are formalised using theory and results from the discipline of formal languages. A Protection Graph Rewriting Grammar is defined, which generates protection graphs consistent ...
  • Van der Poel, K.G.; Bryson, I.R. (Computer Society of South Africa (on behalf of SAICSIT), 1986)
    The principles of protection of private information have gradually been defined during the last decades. The US Privacy Act of 1974 regulates practices of the federal government. Two committees of the UK government ...
  • Kritzinger, Pieter S. (Computer Society of South Africa (on behalf of SAICSIT), 1988)
    Performance analyses of data communication systems do not always rely on a detailed analysis of the underlying protocols. Those analyses which do, usually rely on an analysis of the protocol state transition graph. These ...
  • Kritzinger, PS (1987)
    Performance analyses of data communication systems do not always rely on a detailed analysis of the underlying protocols. Those analyses which do, usually rely on an analysis of the protocol state transition graph. These ...
  • Roos, Jan (Computer Society of South Africa (on behalf of SAICSIT), 1987)
    ESTELLE is being developed by the International Standards Organisation (ISO), Technical Committee (TC) 97, Sub-committee (SC) 21, Working Group (WG) 1, Formal Definition Technique (FDT) Subgroup B to fulfil the need for ...
  • Punt, JL (1987)
    This paper discusses a protocol validation system. The input to the system is a protocol definition specified in the specification language ESTELLE. The ESTELLE specification is the input to a translator program which ...
  • Kritzinger, E.; Smith, E. (2009-06)
    Human-related information security breaches within organizations are primarily caused by employees who have not been made aware of the importance of protecting the information they work with. Information security awareness ...
  • Ferreira, Nadia; Coetzee, Melinde (Unisa, 2010)
    The aim of the study was to explore the way in which people from various gender, age, ethnic, marital and job level groups differ in terms of their psychological career resources (as measured by the Psychological Career ...
  • Frangopoulos, E.D.; Eloff, M.M.; Venter, L.M. (2013)
    A psychosocial risk at the workplace is a well-researched subject from a managerial and organizational point of view. However, the relation of psychosocial risks to Information Security has not been formally studied to the ...
  • Unknown author (2019)

Search UnisaIR


Browse

My Account