Research Outputs (School of Computing): Recent submissions

  • Padayachee, K.; Eloff, J.H.P. (2006)
    The efficacy of the aspect-oriented paradigm has been well established within several areas of software security as aspect-orientation facilitates the abstraction of these security-related tasks to reduce code complexity. ...
  • Padayachee, Keshnee; Eloff, Jan H. P. (2007)
    The aim of this paper is to document experiences with augmenting multilevel security with usage control at the application level within the aspect-oriented paradigm. Multilevel access control is an access control policy ...
  • Padayachee, Keshnee; Eloff, J.H.P. (2007)
    With the advent of agile programming, lightweight software processes are being favoured over the highly formalized approaches of the past. Likewise access control may benefit from a less prescriptive approach with an ...
  • Padayachee, Keshnee; Eloff, Jan H. P. (2006)
    As society becomes increasingly dependent on software, there is an increasing expectation of information systems to protect the individual’s right to privacy. The process of attaining electronic consent (e-Consent) may ...
  • Padayachee, Keshnee (2009)
    This paper reports on an exploratory study investigating the feasibility of using aspect-oriented constructs to instrument objects for the purposes of code obfuscation. With Java programs it is difficult to protect the ...
  • Barnard, Andries; Eloff, M.M.; Sukhoo, Aneerav; Van der Poll, John A. (Information Science Institute, 2005)
    It is sometimes very difficult for an organization to adopt a specific software project management methodology in a short space of time. It requires sufficient time, adequate financial support and skilled human resources ...
  • Sukhoo, Aneerav; Barnard, Andries; Eloff, Mariki; Van der Poll, John Andrew; Motah, Mahendrenath (Information Science Institute, 2005)
    Software project management probably is a sector that has witnessed the highest rate of project failure in the world. This is not the case with project management concerned with other disciplines due to better management ...
  • Kroeze, Jan H; Lotriet, Hugo; Mavetera, Nehemiah; Pfaff, Mark S.; Postma, Dirk J.v.R; Sewchurran, Kosheek; Topi, Heikki (Association for Information Systems, 2011-05)
    This article builds on a panel on Humanities-Enriched Information Systems presented at the 2010 European Conference on Information Systems (ECIS), held in Pretoria, South Africa, June 6–9, 2010. The aim of the panel discussion ...
  • Kritzinger, E.; Von Solms, S.H. (2010)
    We are currently living in an age, where the use of the Internet has become second nature to millions of people. Not only do businesses depend on the Internet for all types of electronic transactions, but more and more ...
  • Kritzinger, E.; Smith, E. (2008)
    The purpose of this paper is to present a conceptual view of an Information Security Retrieval and Awareness (ISRA) model that can be used by industry to enhance information security awareness among employees. A common ...
  • Kritzinger, E.; Smith, E. (2009-06)
    Human-related information security breaches within organizations are primarily caused by employees who have not been made aware of the importance of protecting the information they work with. Information security awareness ...
  • Smith, E.; Kritzinger, E.; Oosthuizen, H.J.; Von Solms, S.H. (2005-05)
    Information Security has been established as a growing discipline around the globe. There is however, a shortage of Information Security professionals in industry and a lack of Information Security awareness in organizations. ...
  • Kritzinger, E.; Von Solms, S.H. (2008)
    This paper introduces information security within the educational environments that utilize electronic resources. The education environment experienced a paradigm shift over the last several years, due to the rapid growth ...
  • Eloff, J.H.P.; Padayachee, Keshnee; Bishop, J. (2010)
    There is a duality between access control and information flow control as both mechanisms are concerned with the flow of information. However, information flow control is more than access control, as an illegal flow might ...
  • Padayachee, Keshnee; Kritzinger, Elmarie (2010)
    This paper posits that the safety and security concerns while interacting with information communication technology (ICT) devices should be considered as a social skill for school learners. Teaching these concerns specifically ...
  • Marnewick, C.; Labuschagne, L. (University of South Africa, 2009-12-03)
    Organisations initiate and execute projects at an ever-increasing rate in order to achieve their strategic intentions. Many of these, however, find it difficult to measure the contribution that these projects make towards ...
  • Smith, Elme; Eloff, J.H.P. (Intelligent Systems and their Applications, IEEE, 2000-04)
    Human observation and intuition form the basis of any risk assessment. The authors propose a cognitive fuzzy modeling approach to risk assessment in health care institutions, building on fuzzy logic's great potential in ...
  • Ramgovind, S.; Eloff, M.M.; Smith, E. (Information Security for South Africa, 2010-08-02)
    Cloud computing has elevated IT to newer limits by offering the market environment data storage and capacity with flexible scalable computing processing power to match elastic demand and supply, whilst reducing capital ...
  • Sonnekus, R.; Labuschagne, L. (2004-05)
    Good project management is often considered the make or break of many an IT project. As a discipline,project management has grown significantly, with standards, methodologies, international best practice and bodies of ...
  • Van Biljon, Judy; Kotze, P. (SACLA, 2007-07-01)
    Mobile learning (mLearning) is a buzzword in education due to the widespread adoption and prolific use of mobile phones worldwide. Contextualisation, location and culturalisation are important issues in designing and ...

Search UnisaIR


Browse

My Account