Authors: Bala, Siviwe Gladstone
Contributors: Van Biljon, Judith Arnoldine, Herselman, Marlien
Subject Terms: Open data, Critical realism, Affordances, Socioeconomic development, Tourism, 338.47910285, Tourism -- South Africa -- Gauteng -- Data processing -- Case studies, Tourism -- Information technology -- South Africa -- Gauteng -- Case studies, Information storage and retrieval systems -- Tourism -- Case studies, Linked data -- South Africa -- Gauteng -- Case studies, Tourism -- South Africa -- Gauteng -- Computer network resources -- Case studies, UCTD
File Description: 1 online resource (x, 146 leaves) : illustrations (some color), color graph; application/pdf
Relation: https://hdl.handle.net/10500/30453
Availability: https://hdl.handle.net/10500/30453
Authors: Netshishivhe, Thetshelesani Angel
Contributors: Chimbo, Bester, Motsi, Lovemore
Subject Terms: Cyber-security, District Health Information System, Healthcare centres, Technology threat avoidance, Tshwane District, 610.285580968227, Information storage and retrieval systems -- Medical care -- Security measures -- South Africa -- City of Tshwane Metropolitan Municipality, Clinics -- South Africa -- City of Tshwane Metropolitan Municipality -- Administration -- Case studies, Computer security -- South Africa -- City of Tshwane Metropolitan Municipality -- Case studies, Computer networks -- Security measures -- South Africa -- City of Tshwane Metropolitan Municipality -- Case studies, Data protection -- South Africa -- City of Tshwane Metropolitan Municipality -- Case studies
File Description: 1 online resource (xi, 174 leaves) : black and white illustrations, color graphs; application/pdf
Relation: https://hdl.handle.net/10500/30223
Availability: https://hdl.handle.net/10500/30223
Authors: Mahlatsi, Lehlohonolo Wonderboy
Contributors: Lekubu, Bernard Khotso
Subject Terms: Threat, Risk, Vulnerability, Legal mandate, Exploit, Impact, Information security, South African Government Departments, Cybersecurity, Counter-intelligence, Classified information, 352.379096822, National security -- South Africa -- Gauteng -- Evaluation, Public utilities – Protection -- South Africa -- Gauteng -- Evaluation, Terrorism -- South Africa -- Gauteng -- Prevention -- Evaluation, Computer networks -- Security measures -- South Africa -- Gauteng -- Evaluation, Computer security -- Government policy -- South Africa -- Gauteng -- Evaluation, UCTD
File Description: 1 online resource (xii, 248 leaves) : color illustrations, color graph; application/pdf
Relation: https://hdl.handle.net/10500/30200
Availability: https://hdl.handle.net/10500/30200
Authors: Makitla, Mokone Ishmael
Contributors: Mtsweni, Jabu Saul
Subject Terms: Semantic Web services monitoring, Service oriented computing, Ontologies, Quality of service, Monitoring information exchange, Collaborative monitoring, 025.0427, Semantic Web, Web services, OWL (Web ontology language), Electronic data processing -- Distributed processing, Service-oriented architecture (Computer science), Computer networks -- Monitoring, UCTD
File Description: 1 online resource (xvi, 159 leaves) : illustrations (chiefly color); application/pdf
Relation: https://hdl.handle.net/10500/30401
Availability: https://hdl.handle.net/10500/30401
Authors: Bonehill, Jason Frederick
Contributors: Martins, Nico
Subject Terms: HRIS, organisational success factors, Measures of organisational success, Indicators, Organisational performance, PLS-SEM, Driver constructs, Organisational learning, Job satisfaction, Organisational commitment, Knowledge management, 658.300285, Organizational commitment, Personnel management -- Computer network resources, Organizational change, Leadership -- Psychological aspects
File Description: 1 online resource (xxiii, 372 leaves) : color illustrations; application/pdf
Relation: https://hdl.handle.net/10500/29732
Availability: https://hdl.handle.net/10500/29732
Authors: Owoade Ayoade Akeem
Contributors: Osunmakinde, Isaac O.
Subject Terms: Wireless network, Multiple failures, Rerouting, Resilience, Enhanced Genetic Algorithm (EGA), Ant Colony System (ACS), Traffic flows, Attack, Optimal path, Restoration, 005.8, Computer security, Computer networks -- Security measures, Information storage and retrieval systems -- Security measures, Information technology -- Security measures
File Description: 1 online resource (xxii, 177 leaves) : illustrations, graphs (chiefly color); application/pdf
Relation: https://hdl.handle.net/10500/29577
Availability: https://hdl.handle.net/10500/29577
Authors: Appanah, Christopher David
Contributors: Geldenhuys, J. (Judith)
Subject Terms: Business judgment rule, Corporate cyber breaches, Cyber-attack, Data breaches in companies, Delictual liability of directors, Duties of directors, Duty of care, Skill and diligence, Financial impact of cyber breaches, Information technology/ IT governance, Liability of directors, 346.31, Directors of corporations -- Legal status, laws, etc. -- South Africa, Liability, Professional -- South Africa, Computer networks -- Security measures -- South Africa, Data protection -- Law and legislation -- South Africa, Intellectual property -- South Africa, Computer security -- Law and legislation -- South Africa
File Description: 1 online resource (vii, 81 leaves); application/pdf
Relation: https://hdl.handle.net/10500/29220
Availability: https://hdl.handle.net/10500/29220
Authors: Kalichurn, Shane
Contributors: Ochola, Elisha O.
Subject Terms: AODV protocol, Black Hole attack, DSR protocol, Mobile Ad-Hoc networks, OLSR protocol, MANET routing protocol comparison, Mobility model comparison, MANET security issues, Random Waypoint Model, NS2 simulation, 004.6, Ad hoc networks (Computer networks), Ad hoc networks (Computer networks) -- Access control, Routing (Computer network management), Routing protocols (Computer network protocols)
File Description: 1 online resource (xiii, 117 leaves) : illustrations, color graphs; application/pdf
Relation: https://hdl.handle.net/10500/29223
Availability: https://hdl.handle.net/10500/29223
Authors: Plessis, Anthony Graham
Contributors: Nenzhelele, Tshilidzi Eric
Subject Terms: Mining, Cybersecurity, Data breaches, Hacking, Policies, Procedures, Auditable controls, Data, Information, Communication, Network, Technology, Mining and mineral resources -- Computer networks -- Security measures -- South Africa, Data security -- South Africa, Computer security -- South Africa, Database security -- South Africa, Computer networks -- Security measures -- South Africa, Computer security -- Management -- South Africa, Information technology -- Management -- South Africa
File Description: 1 online resource (xix, 311 leaves); 005.870968; application/pdf
Relation: https://hdl.handle.net/10500/28935
Availability: https://hdl.handle.net/10500/28935
Authors: Popoola, Olumuyiwa Oluwole
Contributors: Basdeo, Vinesh
Subject Terms: Admissibility, Conscription, Data, Interoperability, Law enforcement agency or officer, Limitation, Non-compartmentalisation, Non-passworded compartmentalised, Online communication, Online criminal investigation, Privacy, Proportionality, Protection, Risk, Robotic online criminal investigation, Secrecy of online communication, Standard of proof, 345.52068, Electronic evidence -- South Africa, Electronic discovery (Law) -- South Africa, Computer crimes -- Investigation -- South Africa, Computer networks -- Access control -- South Africa, Computer networks -- Security measures -- South Africa, Right of -- South Africa
File Description: 1 online resource (xxxix, 688, 137 leaves); application/pdf
Relation: https://hdl.handle.net/10500/30082
Availability: https://hdl.handle.net/10500/30082
Authors: Mutsagondo, Samson
Contributors: Ngulube, Patrick, Minishi-Majanja, M.
Subject Terms: Electronic records, Electronic records management, Email, Email management, Email management framework, Email usage, Official email, Public service, Records management, Zimbabwe’s central government, 025.174096891, Electronic mail systems -- Zimbabwe, Electronic records -- Zimbabwe, Electronic records -- Computer networks -- Zimbabwe, Electronic records -- Government policy -- Zimbabwe, Electronic public records -- Zimbabwe -- Management, Government information -- Zimbabwe -- Management, Electronic mail systems -- Zimbabwe -- Computer programs
File Description: 1 online resource (xviii, 304 leaves; charts, tables, photographs (chiefly color); application/pdf
Relation: http://hdl.handle.net/10500/27425
Availability: http://hdl.handle.net/10500/27425
Authors: Maguraushe, Kudakwashe
Contributors: Veiga, Adéle da, Martins, Nico
Subject Terms: Confirmatory factor analysis, Correctness expectations, Diagnostic instrument, Exploratory factor analysis, External awareness, Individual awareness, Practice confidence, Perceptions, Personal information, Privacy, Privacy education, Privacy expectations, Instrument, Structural equation modelling, University confidence, 005.807116891, Zimbabwe Data Protection Act, Universities and colleges -- Security measures -- Zimbabwe, Computer networks -- Security measures -- Zimbabwe, Personal information management -- Zimbabwe, Information storage and retrieval systems -- Zimbabwe -- Students, Data protection -- Law and legislation -- Zimbabwe, Information storage and retrieval systems -- Zimbabwe -- Privacy, Right of
File Description: 1 online resource (xviii, 365 leaves) : illustrations, graphs (chiefly color); application/pdf
Relation: http://hdl.handle.net/10500/27557
Availability: http://hdl.handle.net/10500/27557
Authors: Mashoko, Douglas
Contributors: Mohangi, K.
Subject Terms: Academic performance, Adolescence, COVID-19, Fear of Missing Out, Identity, Information communication and technology, Psychosocial, Social learning, Social media, Well-being, 373.13346754096891, Social media in education -- Zimbabwe -- Masvingo -- Case studies, Teenagers -- Zimbabwe -- Masvingo -- Psychology -- Case studies, High school students -- Zimbabwe -- Masvingo -- Psychology -- Case studies, High school teaching -- Zimbabwe -- Masvingo -- Computer network resources -- Case studies, Academic achievement -- Zimbabwe -- Masvingo -- Case studies
File Description: 1 online resource (372 leaves) : illustrations (some color), color graphs, color map; application/pdf
Relation: https://hdl.handle.net/10500/28798
Availability: https://hdl.handle.net/10500/28798
Authors: Moyo, Moses
Contributors: Loock, Marianne
Subject Terms: Technology adoption process, Cloud business intelligence, Decision-making, Cloud computing, Operational-use-evaluation, Prior-operational-use evaluation, Security evaluation framework, Security vulnerability, Small and medium enterprises, Software-as-a-Service, 005.80968, Small Business -- Computer networks -- Security measures -- South Africa, Small business -- Information technology -- South Africa, Computer security -- South Africa, Cloud computing -- South Africa, Information technology -- Security measures -- South Africa
File Description: 1 online resource (xix, 344 leaves) : illustrations, graphs (chiefly color); application/pdf
Relation: https://hdl.handle.net/10500/28794
Availability: https://hdl.handle.net/10500/28794
Authors: De Villiers, Mary Ruth, Pretorius, Marco Cobus
Subject Terms: eLearning, Evaluation, Facebook group, Online discussion forums, Qualitative analysis, 378.173467540968, Social media in education -- South Africa, Electronic discussion groups -- South Africa, Group work in education -- Computer networks -- South Africa, Education, Higher -- South Africa -- Computer-assisted instruction, Distance education -- South Africa -- Computer-assisted instruction, Facebook (Electronic resource), University of South Africa -- Students -- Attitudes, Graduate students -- South Africa -- Attitudes
File Description: 1 online resource (pages 63-73); application/pdf
Relation: De Villiers, M.R. & Pretorius, M.C. 2012. Academic group and forum on Facebook, In: Proceedings of The 6th European Conference on Information Management and Evaluation – ECIME 2012 held at the University College Cork 13-14 September 2012, p63-67; http://hdl.handle.net/10500/13203
Availability: http://hdl.handle.net/10500/13203
Authors: Maboe, Kefiloe Adolphina
Subject Terms: Information communication technologies, Health, 613.0285, International Conference on Information Communication Technologies in Health (8th : 2010 : Samos, Greece), Health -- Data processing -- Congresses, Health -- Computer network resources -- Congresses
File Description: 1 online resource (pages 107-108); application/pdf
Relation: Maboe, K.A. (2010) 8th International Conference on Information Communication Technologies in Health : Samos Island, Greece : 15-17 July 2010 : conference reports. Africa Journal of Nursing and Midwifery (12)2 pp. 107-108; http://hdl.handle.net/10520/EJC19348; http://hdl.handle.net/10500/9086
Authors: De Villiers, Mary Ruth
Subject Terms: E-learning, Facebook, Interaction, Online discussions, Social networking sites, Study groups, 378.173467540968, Facebook (Electronic resource), Social media in education -- South Africa, Electronic discussion groups -- South Africa, Group work in education -- Computer networks -- South Africa, Education, Higher -- South Africa -- Computer-assisted instruction, Distance education -- South Africa -- Computer-assisted instruction, University of South Africa -- Students -- Attitudes, Graduate students -- South Africa -- Attitudes
File Description: 1 online resource (pages 173-190) : color portrait; application/pdf
Relation: De Villiers, M.R. (2010). Academic use of a Group on Facebook: Initial findings and perceptions. In: Proceedings of the 2010 Informing Science and IT Education (InSITE) Conference. Cassino, Italy, June 2010; http://hdl.handle.net/10500/13225
Availability: http://hdl.handle.net/10500/13225
Authors: Padayachee, Keshnee
Subject Terms: Aspect-oriented programming, Code obfuscation, 005.8, Computer security -- Software, Application software-- Computer programs, Computer networks -- Security measures
File Description: 1 online resource (5 leaves); application/msword
Relation: Padayachee, K. 2009, Aspect-Oriented Code Obfuscation. South Africa: University of Pretoria; http://hdl.handle.net/10500/4929
Availability: http://hdl.handle.net/10500/4929
Authors: Chengetanai, Gibson
Contributors: Osunmakinde, Isaac O.
Subject Terms: Q-PSO, QUACS, Stability factor, Congestion metric, Cluster head, Routing optimisation, Overall congestion metric, Ant colony optimisation, Particle swarm optimisation, Pheromone evaporation, Network lifetime, Queuing theory, 004.685, Mobile computing, Swarm intelligence, Ad hoc networks (Computer networks)
File Description: 1 online resource (xiv, 182 leaves) : illustrations (some color), graphs (some color); application/pdf
Relation: https://hdl.handle.net/10500/28017
Availability: https://hdl.handle.net/10500/28017
Authors: Porogo, Keneilwe Margret
Contributors: Kalusopa, Trywell
Subject Terms: Botswana public service, Digital maturity capability, Digital continuity, Digital records, Digital preservation, E-government, 025.84096883, Digital preservation -- Botswana -- Case studies, Electronic government information -- Botswana -- Case studies, Government publications -- Digitization -- Botswana -- Case studies, Government publications -- Botswana -- Computer network resource -- Case studies, Internet in public administration -- Botswana -- Case studies
File Description: 1 online resource (xiii, 225 leaves) : color illustrations, color graphs; application/pdf
Relation: http://hdl.handle.net/10500/27542
Availability: http://hdl.handle.net/10500/27542