School of Computing


Publications

This page is not necessarily up to date.

JOURNAL PUBLICATION/S

T. Horne; L. Pretorius (June, 2003)
Time Structures In Temporal Logic
South African Computer Journal

Nienaber, RC; Barnard, A (January, 2008)
A Generic Agent Framework To Support Various Software Project Management Processes.
Interdisciplinary Journal of Information, Knowledge and management
(2)
pp 149-162

Dlamini M; Eloff J.H.P.; M. Eloff (2009)
Information Security: The Moving Target,
Computers & Security
(28) 3-4
pp 189-198

K. Padayachee; Eloff JHP (2009)
Adapting Usage Control As A Deterrent To Address The Inadequacies Of Access Controls,
Computers and. Security
(28) 7
pp 536-544

Lynn Stevenson; Arina Britz; Tertia Horne (2008)
Kt And S4 Satisfiability In A Constraint Logic Environment
Lecture Notes in Artificial Intelligence
(5351)
pp 370-381

MENTZJC; P. Kotze; A. van der Merwe (2008)
Searching For The Technology In University Of Technology
SACJ
(42)

Lynn Stevenson; A. Britz; T. Horne (2008)
K4 And S4 Satisfiability In A Constraint Logic Environment
Lecture Notes in Artificial Intelligence
(5351)
pp 370-381

K. Padayachee; Wakaba N. (2008)
A Taxonomy Of Aspect-oriented Security,
Review of Business Information Systems – First Quarter 2008, Vol. 12, No. 1, The Clute Institute for Academic Research (Littleton, Colorado USA)
pp 89 -102

T. Horne; E. Naude (2007)
Poor Through-put Rates Of Distance Learners In Computing Courses: Is Continuous Assessment The Answer?
South African Journal of Higher Education
(21) 2

C Rambowan; S. Lubbe; R Klopper (2007)
Perceptions Of Members In A South African Rural Community About The Prospects Of Becoming A Digital Village
Alternation
(12) 2
pp 178-210

C Rambowan; S. Lubbe; R Klopper (2007)
Perceptions Of Members In A South African Rural Community About The Prospects Of Becoming A Digital Village
Alternation
(12) 2
pp 178-210

G Embaye; R Klopper; S. Lubbe (2007)
The Effective Use Of Computer Systems At The University Of Kwazulu-natal
Alternation
(12) 2
pp 159-177

BK Ngubane; S. Lubbe (2007)
Information Heaven: Online Information Access For Rural Communities
Alternation
(12) 2
pp 53-78

L Worrall; R Klopper; S. Lubbe (2007)
The Phd: Pitfalls And Pathways
Alternation
(12) 2
pp 260-282

G Embaye; S. Lubbe; R Klopper (2007)
The Effective Use Of Computer Systems At The University Of Kwazulu-natal
Alternation
(12) 2
pp 159-177

B Ngubane; S. Lubbe (2007)
Information Heaven: Online Information Access For Rural Communities
Alternation
(12) 2
pp 53-78

L Worrall; R Klopper; S. Lubbe (2007)
The Phd: Pitfalls And Pathways
Alternation
(12) 2
pp 260-282

R. de Villiers (2007)
An Action Research Appraoch To The Design, Development And Evaluation Of An Interactive E-learning Tutorial In A Cognitive Domain.
Journal of Information Technology Education
(6)
pp 455-479

Sukhoo A; Barnard A; M. Eloff; A. van der Poll (2007)
An Evolutionary Software Project Management Maturity Model For Mauritius,
Interdisciplinary Journal of Information, Knowledge, and Management,
(2)
pp 99-118

Sukhoo, A; A. Barnard; M. Eloff; A. van der Poll (2006)
An Assessment Of Software Project Management Maturity In Mauritius
Issues in Informing Science and Information Technology
(2)
pp 671-690

Sukhoo, A; A. Barnard; M. Eloff; A. van der Poll; (2006)
Accommodating Soft Skills In Software Project Management
Issues in Informing Science and Information Technology
(2)
pp 691-704

P van Staaden; S. Lubbe (2006)
A Case Study On The Selection And Evaluation Of Software For An Internet Organisation
The Electronic Journal of Business Research Methods
(4) 1
pp 57-66

Bosch, SE; L. Pretorius (2006)
A Finite-state Approach To Linguistic Constraints In Zulu Morphological Analysis
In Africa in the Long Run: Festschrift in the Honour of Professor Arvi Hurskainen Harjula L & Ylnk, M (eds) Studia Orientalia
(103)
pp 205-227

Gerber, A; A. Barnard; A. van der Merwe (2006)
A Semantic Web Status Model
Integrated Design and Process Sciences
(Special Issue) IDPT 2006
pp 473-482

E. Smith; Oosthuizen, H.J. (2005)
Attitudes Of Entry-level University Students Towards Computers: A Comparative Study
Computers & Education Journal
(44)

R. Nienaber; A. Barnard (2005)
Software Quality Management Supported By Software Agent Technology
Issues in Informing Science and Information Technology
(2)
pp 659-670

A. van der Merwe; P. Kotze; Johannes Cronje (2005)
The Functionality Of A Requirements Elicitation Procedure Developed Within The Higher Education Domain
Alternation
(12.1b)
pp 489-514

S. Lubbe; Mr P L Mkhize (2005)
Just Because You Can, Doesn’t Mean That You Should!
Alternation
(Vol 12) 1b

R Sewlal; S. Lubbe (2005)
Establishing A New University Information Systems And Technology Department: The Relationship Between Is&t, Bis And Im
Alternation
(12) 1b

M Buthelezi; S. Lubbe; R Klopper (2005)
Telecentres: Islands In A Sea With No Ship In Sight
A
(12) 1b

M Sikhakhane; S. Lubbe; R Klopper (2005)
The Digital Divide And Access To Information And Communication Technologies
Alternation
(12) 1b

S. Lubbe; M Marimuthu (2005)
Only The Flexible Will Survive
Alternation
(12) 1b

S. Lubbe; Prof L Worrall; Prof R Klopper (2005)
Challenges In Postgraduate Research: How Doctorates Come Off The Rails
Alternation
(12) 1b

R Harypursat; S. Lubbe; R Klopper (2005)
An Investigation Into The Thinking Styles Of Information Systems And Technology Students
Alternation
(12) 1b

M Sikhakhane; S. Lubbe (2005)
Preliminaries Into Problems To Access Information – The Digital Divide And Rural Communities
SA Journal of Information Management
(7) 3

L. Pretorius; A. Barnard (2005)
Ethical Decision-making Skills For Responsible Citizens Of Cyberspace: Quo Vadis?
Alternation
(12)
pp 171-196

Jones, J; Prinsloo, D; ; Bosch,SE (2005)
Development Of Reuseable Resources For Human Language Technologies (hlt) Applications:practice And Experience
South African Journal of African Languages
(25)
pp 141-159

Pretorius, R; ; E. Viljoen (2005)
A Finite-state Morphological Analysis Of Setswana Nouns
South African Journal of African Languages
(25)
pp 48-58

R. de Villiers; Cronje J.C (2005)
Six Learning Theory Perspectives On A Web-based Learning Environment
South African Journal of Higher Education
(19) 3
pp 444-466

R. de Villiers (2005)
E-learning Artefacts: Are They Based On Learning Theory?
Alternation
(12) 1b
pp 345-371

Eloff J.H.P., ; M. Eloff (2005)
Information Security Architecture
Computer Fraud & Security
(2005) 11
pp 10-16

A. van der Merwe; L. Pretorius; Cloete, E (2004)
A Requirements Elicitation Process Modelling Technique For Incorporation Of E-learning As A Core Learning Strategy
Journal of Integrated Design and Process Science
(8) 2
pp 1-16

A. van der Merwe; Seker, R (2004)
Mobile Phishing (communication With The Editor)
South African Computer Journal
(33)
pp 112-113

Seker, R; A. van der Merwe; P. Kotze; Tanic, M.M.; (2004)
Assessment Of Coupling And Cohesion For Component-based Software By Using Shannon Languages
Journal of Integrated Design and Process Science
(8) 4
pp 33-43

L. Pretorius; A. Barnard (2004)
E-mail And Misinformation: A South African Case Study
Informing Science journal
(7)
pp 47-66

L. Pretorius; A. Barnard; Cloete, E (2004)
Design Issues In Ethical Agent Computing
Computers and Society, Magazine of the ACM; also available at: http://www.computersandsociety.org/sigcas_ofthefuture2/sigcas/index.cfm
(32) 8

R. Nienaber; Cloete, E; A. Barnard (2004)
Software Project Risk Management Supported By Agent Technology
The Business Review Journal
(2) 1
pp 452-459

SCHOEMA; Cloete, E (2004)
Design Concepts For Mobile Agents
African Computer Journal
pp 13-24

S. Lubbe (2004)
Management Information Searching For Decision-making
SA Journal of Information Management
(6) 3

S. Lubbe (2004)
The Impact Of It Investment In Rsa E-commerce Sme Organisations
Electronic Journal of IS Evaluation
(7) 1
pp 49-56

S. Lubbe (2004)
From Postgrad To Professional: Useful Tips For Choosing And Executing A Doctoral Thesis
Electronic Journal of Business Research Methods
(2) 2
pp 129 -134

S. Lubbe (2004)
Software Piracy – Some Aspects For South African Managers To Keep In Mind
South African Journal of Economic and Management Sciences
(6) 4
pp 785-801

S. Lubbe (2003)
A Case Study Methodology In The Information Technology (it) Field
SA Journal of Information Management
(5) 4
pp e-jnl

S. Lubbe (2003)
The Development Of A Case Study Methodology In The Information Technology (it) Field: A Step By Step Approach
Ubiquity
(4) 27
pp e-jnl

S. Lubbe (2003)
Documentation Standards For E-commerce 0rganisations
Information Systems Control Journal
pp 24-26

S. Lubbe (2003)
From Postgraduate To Professional
Ubiquity
(4) 18

L. Pretorius; Bosch,SE (2003)
Enabling Computer Interaction In The Indigenous Languages Of Southern Africa: The Central Role Of Computational Morphology
Interactions of the ACM
(10)
pp 56-63

L. Pretorius; Bosch,SE (2003)
Finite-state Computational Morphology: An Analyzer Prototype For Zulu
Machine Translation Special issue on finite-state language resources and language processing
(18)
pp 195-216

L. Pretorius; Bosch,SE (2003)
Computational Aids For Zulu Natural Language Processing
Southern African Linguistics and Applied Language Studies, Special issue: Language technology in Southern Africa: resources and applications
(21)
pp 267-282

E. Smith; Eloff, J.H.P. (2002)
A Prototype For Assessing Information-technology Risks In Health Care
Computers & Security
(21) 3
pp 266-284

A. Barnard; Ehlers, EM (2002)
Combining Context Provisions With Graph Grammar Rewriting Rules: The Three-dimensional Case
South African Computer Journal (SACJ)
(8)
pp 11-20

L. Pretorius; Bosch,SE (2002)
Finite-state Computational Morphology - Treatment Of The Zulu Noun
South African Computer Journal
(28)
pp 30-38

Bosch, SE; L. Pretorius (2002)
The Significance Of Computational Morphological Analysis For Zulu Lexicography
South African Journal of African Languages
(22)
pp pp 11-20

E. Smith; Eloff, J.H.P. (2001)
A New Approach To Risk Management In The Health-care Domain
South African Computer Journal (SACJ)
pp 2-11

E. Smith; Eloff, J.H.P. (2000)
Using Cognitive Fuzzy Modelling For Enhanced Risk Assessment In A Health-care Institution
IEEE Intelligent Systems & their applications
(15) 2
pp 69-75

M. Eloff; Von Solms, S.H (2000)
Information Security Management: A Hierarchical Framework For Various Approaches
Computers & Security
(19 ) 3
pp 243-256

S. Lubbe; D Remenyi; J van Heerden (2000)
Some Ad Hoc Information System Issues In South Africa For The New Millennium And Suggestions As To How To Deal With Them
The Journal - IT for Development
(9)
pp 163 – 174

S. Lubbe (2000)
It Investment Approaches In Namibia: Six Case Studies
IT for Development
(9)
pp 3 – 10

E. Smith; Eloff, J.H.P. (1999)
Security In Health-care Information Systems – Current Trends
International Journal of Medical Informatics (former International Journal of Biomedical Computing)
(54 ) 1
pp 39-54

A. Barnard; Ehlers, EM (1999)
A Comparative Study Of Random Context Structure Grammars And Structure Graph Grammars
Combinatorics, Graph Theory and Algorithms
(8) 1
pp 59-68

S. Lubbe; D Remenyi (1999)
Management Of Information Technology Evaluation - The Development Of A Managerial Thesis
Journal of Logistics and Information Management
(1) 2
pp 145 – 156

S. Lubbe; G Armstrong (1998)
End-user Computing And The Need For An Information Systems Department In An Organisation
VITAL
(11) 1
pp 4 – 12

L. Pretorius (1998)
Applied Lambda Calculus: Using A Type Theory Based Proof Assistant
South African Computer Journal
(21)

A. van der Merwe; Labuschagne, W (1997)
theory Meets Practice: Using Smith's Normal Normalization In Complex Systems.
South African Computer Journal
(20)
pp 44-48

S. Lubbe; R Eggett; N Hawkes (1997)
Determining The Significance Of Decision Criteria In The Selection Of It Investments In South Africa
¬ Vista Occasional Papers
(5) 1
pp 36-49

S. Lubbe (1996)
Computer Crime And The Measures Of Detection And Prevention Of Such Crime
VITAL
(10) 12
pp 19-31

S. Lubbe; G Parker (1995)
The Profit Impact Of It
The Journal of Information Technology
(1) 10
pp 44 - 51

S. Lubbe; R Eggett; N Hawkes (1995)
Determining The Significance Of Decision Criteria In The Selection Of It Investments In South Africa
IT for Development
(6)
pp 125 - 138

S. Lubbe (1994)
The Profit Impact Of It
SA Jnl of Business Management
(25) 2
pp 71 - 77

A. Barnard; Ehlers, EM; Hattingh, JH (1993)
Structure Graphs And Structure Graphs Grammars
Information Sciences
(73) 4
pp 235-271

Zucker, J; L. Pretorius (1993)
Introduction To Computability Theory
South African Computer Journal
(9)
pp pp 3-30

S. Lubbe (1992)
Examining The Approach Used For It Investment Decisions By Practitioners Responsible For It Planning In Namibia
The African Computing Journal
(1) 1
pp 12-27

L. Pretorius; Eyre, D (1987)
Spline-gauss Rules And The Nystrm Method For Solving Integral Equations In Quantum Scattering
Journal of Computational and Applied Mathematics
(18)
pp 235-247

Rolfes, L (1980)
A Numerical Method For The Calculation Of The Average Drawdown In A Fully-penetrating Observation Well In An Unconfined Aquifer
Water Resources Research
(16)
pp 887-890

Laurie, DP; Rolfes, L (1979)
Computation Of Gaussian Quadrature Rules From Modified Moments
Journal of Computational and Applied Mathematics
(5)
pp 235-243

Laurie, DP; Rolfes, L (1979)
Computation Of Gaussian Quadrature Rules From Modified Moments
Journal of Computational and Applied Mathematics
(5)
pp 235-243

Bosch, SE; ; L. Pretorius Towards Machine-readable Lexicons For South African Bantu Languages
Nordic Journal of African Studies
( Submitted)

J. Gelderblom Ooptutor: A Cbl System For Introductory Object-oriented Programming
SIGCSE Bulletin
(32) 2
















PEER REVIEWED CONFERENCE PROCEEDING PUBLICATION/S

Nienaber R.c; Smith E (September 2009)
Adapting The Software Project Management Supported By Software Agents (spmsa) Model To Pmbok2004 Guidelines.
WSKS2009.
Crete, Greece
Springer Lecture Notes in Artificial Intelligence.
pp Vol. 5736, ISBN 978-3-642-04753-4

T. Horne; E. Naude (June 2003)
Investigating Suggestions For Improving The Pass Rates Of Is Students
INSITE
Pori, Finland

Nienaber RC; Smith E; Barnard A; Van Zyl T (April 10-13, 2008)
Software Agent Technology Supporting Risk Management In Spm.
International Conference on Applied Computing, IADIS2008
Algarve, Portugal

Nienaber RC; Smith E (24-26 June, 2009)
Enhancing And Supporting Spm: The Software Project Management Supported By Software Agents Model.
2009 ICBIM: International Conference on Business Information Management,
Paris, France
Proceedings of the World Academy of Science, Engineering and Technology. Vol 54. pp. 531-540. Paris France. ISSN 2070-3724.

Nienaber RC; Barnard A (22-25 June, 2007)
Towards A Software Agent Technology Framework Supporting Software Project Management
InSITE2007 Conference, Informing Science & IT Education
Llubljana, Slovenia

J. L. Smuts; P. Kotze; A. van der Merwe; LOOCKM (2010)
Information Systems Outsourcing Issues In The Communication Technology Sector
IADIS Information Systems 2010 (IS 2010) International Conference
Porto, Portugal

Frangopoulos E.D.; M. Eloff; VENTELM (2010)
Psychological Considerations In Social Engineering,
IADIS International Information Systems 2010 (IS 2010) Conference
Porto, Portugal
pp 247-257

Smuts, H; van der Merwe, A; Kotze, P.; LOOCKM (2010)
Critical Success Factors For Information Systems Outsourcing Management: A Software Development Lifecycle View.
SAICSIT 2010 Conference
Bela Bela, South Africa

Kritzinger, E; K. Padayachee (2010)
Implementing M-learning Within A Distance Based University, Xi International Conference On Engineering And Technology Education
Ilhéus, Bahia – Brazil

Nienaber RC; Smith E (2009)
Enhancing And Supporting Spm: The Software Project Management Supported By Software Agents Model.
ICBIM 2009, International Conference on Business Information Management
Paris, France

Van der Merwe, Alta; Kotze, Paula (2009)
A Systematic Approach For The Identification Of Process Reference Models
IASTED International Conference on Software Engineering
Innsbruck, Austria

A. van der Merwe; P. Kotze (2009)
A Systematic Approach For The Identification Of Process Reference Models
IASTED International Conference on Software Engineering
Innsbruck

Smuts, H; van der Merwe, A; LOOCKM (2009)
Key Characteristics In Selecting Software Tools For Knowledge Management
11th International Conference on Enterprise Information Systems
Milan, Italy

Jacobs, D; P. Kotze; A. van der Merwe (2009)
Towards An Enterprise Repository Framework
The 1st International Workshop on Advanced Enterprise Repositories
Milan, Italy

Gerber, AJ; A. van der Merwe (2009)
Towards The Use Of Formal Ontologies In Enterprise Architecture Framework Repositories
The 1st International Workshop on Advanced Enterprise Repositories (AER 2009)
Milan, Italy

Mbaya, I; Gerber, AJ; A. van der Merwe (2009)
Requirements Of A Security Framework For The Semantic Web
IASTED International Conference on Software Engineering, IASTED 2009
Innsbruck, Austria

J. Gelderblom; P. Kotze (2009)
Ten Design Lessons From The Literature On Child Development And Children’s Use Of Technology.
Interaction Design for Children
Como, Italy
ACM

J. L. Smuts; A. van der Merwe; LOOCKM; P. Kotze (2009)
A Framework And Methodology For Knowledge Management System Implementation
SAICSIT 2009: The 15th Annual Conference of the South African Institute of Computer Scientists and Information Technologists
Vaal River, South Africa

Dlamini, M.T. ; M. Eloff; Eloff, J.H.P.; Hone, K. (2009)
Bc3i – Towards Requirements Specification For Preparing An Information Security Budget,
ISSA 2009 Conference
Johannesburg, SA
pp pp 53 - 67

Dagada R; M. Eloff; VENTELM (2009)
Too Many Laws But Very Little Progress! Is South African Highly Acclaimed Information Security Legislation Redundant?
ISSA 2009 Conference
Johannesburg, SA
pp 327-346

Dlamini M.T.; M. Eloff; Eloff, J.H.P (2009)
Internet Of Things: Emerging And Future Scenarios From An Information Security Perspective
SATNAC 2009: Convergence - 21st Century Lifestyle Enabler Conference
Royal Swazi Spa, Ezulwini, Swaziland

Eloff, J.H.P., ; M. Eloff; Dlamini, M.T.; Zielinski M.P. (2009)
Internet Of People, Things And Services - The Convergence Of Security, Trust And Privacy,
The Convergence of Security, Trust and Privacy, 3rd CompanionAble Workshop – IoPTS,
Novotel Brussels – Brussels,

Wangwe, C.; M. Eloff; VENTELM (2009)
E-government Readiness: An Information Security Perspective From East Africa,
IST-Africa 2009 Conference
Uganda

K. Padayachee (2009)
Aspect-oriented Code Obfuscation, In: Proceedings Of The 2009 International Conference On Software Technology And Engineering
Chennai, India
pp 252-257

T. Horne; A. van der Poll (2008)
Planning As Model Checking: The Performance Of Prob Vs Nusmv
Proceedins of the SAICSIT conference
Wilderness
pp 114-123

Gerber, AJ; A. van der Merwe; Barnard, A (2008)
The Usefulness Of An Abstracted Semantic Web Architecture
European Semantic Web Conference 2008, ESWC’08
Tenerife
Springer Verlag

Chapman, M; A. van der Merwe (2008)
Contemplating Systematic Software Reuse In A Small Project-centric Company
SAICSIT 2008
Wilderness

Van Wyk, E.A; R. de Villiers (2008)
Usability Context Analysis For Virtual Reality Training In South African Miners
SAICSIT 2008
ACM
pp 276-285

Tertia Horne; A. van der Poll (2008)
Planning As Model Checking: The Performance Of Prob Vs Nusmv
SAICSIT
Wilderness
pp 114-123

J. Gelderblom; P. Kotze (2008)
Designing Technology For Children: What We Can Learn From Theories Of Cognitive Development. Proceedings Of Saicsit 2008, October 2008, Wilderness, South Africa.
SAICSIT 2008
Wilderness, South Africa

Chimbo, B; J. Gelderblom (2008)
The Suitability Of American Storytelling Software For South African Diversity. Proceedings Of Amsterdam.
IADIS MCCSIS
Amsterdam

Frangopoulos E.D; M. Eloff; VENTELM (2008)
Social Aspects Of Information Security
ISSA 2008 Innovative Minds Conference
Johannesburg, South Africa,
pp pp 275-308

Wangwe, C.; M. Eloff; VENTELM (2008)
A Proposed Implementation Of Saml V2.0 In An E Government Setting
IST-Africa 2008 Conference & Exhibition,
Windhoek, Namibia

Gerber, AJ; A. Barnard; A. van der Merwe (2007)
Towards A Semantic Web Layered Architecture
The International Association of Science and Technology for Development
Innsbruck
ACTA Press
pp 353-362

Hewett, R; Kijsanayothin, P; A. van der Merwe (2007)
Predicting Order Of Likelihood Of Defective Software Modules
International Conference on Software Engineering & Knowledge Engineering
Boston, Massachusets
Knowledge Systems Institute
pp 93-98

A. van der Merwe; Caroll, M (2007)
An Information Systems Auditors Profile
Ninth International Conference on Enterprise Information Systems
Funchal, Portugal
pp 390-397

Singh, S; S. Lubbe; G Naidoo; R Klopper (2007)
Towards A Hypothetical E-government Solution: A South African Perspective
ECEG
Den Hague, The Netherlands
Academic Conferences
pp e-publication

G Hall; S. Lubbe; Singh, S (2007)
From Conception To Demise: Implications For Users Of Information Systems In Changing A Parastatal In Kwazulu-natal, South Africa
ECEG
Den Hague, The Netherlands
Academic Conferences
pp e-publication

Gerber, AJ; A. van der Merwe; Alberts, R (2007)
Implications Of Rapid Development Methodologies
CSITEd 2007
Mauritius

A. van der Merwe; P. Kotze (2007)
Criteria Used In Selecting Effective Requirements Elicitation Procedures
SAICSIT 2007
Fish River Sun
pp 162-171

A. van der Merwe; P. Kotze; Gerber, AJ (2007)
Generic Process Model Structures: Towards A Standard Notation For Abstract Representations
SAICSIT 2007
Fish River Sun
pp 172-180

SCHOEMA; VENTELM; Cloete,E. (2007)
Agent-oriented Framework For Constructing Mobile Agent Systems
IADIS International Conference Applied Computing 2007
Salamanca, Spain
IADIS Press
pp 289–296

Ssemugabi, S.; R. de Villiers (2007)
Usability And Learning: A Framework For Evaluation Of Web-based E-learning Applications
ED-Media 2007
Vancouva, Canada
pp 906-913

Ssemugabi, S.; R. de Villiers (2007)
A Comparative Study Of Two Usability Evaluation Methods Using A Web-based E-learning Application.
SAICSIT 2007
ACM

Sukhoo, A.; Barnard, A.; M. Eloff; A. van der Poll (2007)
An Evolutionary Software Project Management Maturity Model For Mauritius
2007 Informing Science and Information Technology Conference, InSITE 2007
Ljubljana, Slovenia

K. Padayachee; Eloff, J.H.P (2007)
An Aspect-oriented Approach To Enhancing Multilevel Security With Usage Control: An Experience Report, In: Iageng: Lecture Notes In Engineering And Computer Science Volume 1 - International, Conference On Software Engineering
Hong Kong
Hong Kong: Newswood Ltd. International Association of Engineers
pp 1060 - 1065

K. Padayachee (2007)
Instrumentation Of Aspectj Programs: An Exploratory Study, In: Iageng: Lecture Notes In Engineering And Computer Science Volume 1 - International, Conference On Software Engineering
Hong Kong: Newswood Ltd
pp 1077 -1081

K. Padayachee; Wakaba. N. (2007)
A Taxonomy Of Aspect-oriented Security, Proceedings Of The 2007 European Applied Business Conference
Venice, Italy

K. Padayachee; Eloff J.H.P. (2007)
Enhancing Optimistic Access Controls With Usage Control, In: Lecture Notes In Computer Science: Trust, Privacy And Security In Digital Business, Volume 4657
Regensburg, Germany
Springer (Germany),
pp 75 – 82

A. van der Merwe; Maneschijn, D (2006)
Guidelines In Selecting An E-learning Development Model
IADIS Applied Computing 2006
San Sebastian, Spain
pp 161-168

Gerber, A; A. Barnard; A. van der Merwe (2006)
Design And Evaluation Criteria For Layered Architectures
The Fourth International Workshop on Modelling, Simulation, Verification and Validation of Enterprise Information Systems
Cyprus
pp 163-172

A. van der Merwe; P. Kotze; Cronje, J (2006)
The Usefulness Of A Generic Process Model Structure
The Fourth International Workshop on Modelling, Simulation, Verification and Validation of Enterprise Information Systems
Cyprus
pp 86-96

Alberts, R; A. van der Merwe; Pretorius, H (2006)
Using Quality Requirements To Systematically Develop A National Accessibility Portal
International Science and Technology Conference 2006
Vanderbijlpark
VUT
pp 153-166

M. Eloff; Ormiston K. (2006)
Denial-of-service & Distributed Denial-of-service On The Internet,
6TH Annual International Information Security South Africa (ISSA) from Insight to Foresight Conference
Johannesburg

DRIDDC; D. G. Kourie; B. W. Watson (2006)
Firemusat:meeting The Challenge To Detect Microsatellites In Dna
South African Institute of Computer Scientists and Information Technologists
South Africa

SE Bosch; L. Pretorius; J Jones (2006)
Towards Machine-readable Lexicons For South African Bantu Languages
Proceedings of the fifth International Conference on Language Resources and Evaluation, LREC 2006
Genoa, Italy, May 23-26

SE Bosch; J Jones; L. Pretorius; W Anderson (2006)
Resource Development For South African Bantu Languages: Computational Morphological Analysers And Machine-readable Lexicons
Proceedings of the fifth International Conference on Language Resources and Evaluation, LREC 2006, Workshop on networking the development of language resources for African languages
Genoa, Italy, May 22

M Radovan; L. Pretorius (2006)
Facial Animation In A Nutshell: Past, Present And Future
Proceedings, SAICSIT 2006 International Conference
Erindale, Somerset West, South Africa, October 9-11

PL Mkhize; S. Lubbe (2006)
An Investigation Into The Effectiveness Of Ict Supported Learning System Usage In South African Tertiary Institutions
ECEL
Winchester

S. Lubbe; R Klopper (2006)
A Framework Of Factors Affecting Information Quality Provided To Ceos: A Theoretical Review Approach
IBIMA
Bonn

S. Lubbe (2006)
Management Information Searching For Leadership And Governance
ECMLG
Paris

R Klopper; S. Lubbe (2006)
A Framework Of Factors For Determining The Degree Of E-readiness In The Constituent Sectors Of Emerging Societies
IBiMA Conference in Brescia, Italy organised by the IBiMA Committee
Brescia

V Ramharuk; S. Lubbe; R Klopper (2006)
Health Information Systems: An Investigation In How To Use It To Support Healthcare In A Developing Country
IBiMA Conference in Brescia, Italy organised by the IBiMA Committee
Brescia, Italy

A. Britz; T. Horne (2006)
A Constraint-based Decision Procedure For The Desciption Logic Alcn
SAICSIT
Somerset West, RSA

R. de Villiers (2006)
Multi-method Evaluations: Case Studies Of An Interactive Practice Environment
InSITE Conference
Manchester

Masemola, S.S; R. de Villiers (2006)
Towards A Framework For Usability Testing Of Interactive E-learning Applications In Cognitive Domaind, Illustrated By A Case Study
SAICSIT 2006
ACM
pp 187-197

R. de Villiers (2006)
A Learning Theory Approach To Support Outcomes-based E-learning.
CITTE 2006
Pretoria

K. Padayachee; J.H.P. Eloff (2006)
The Next Challenge: Aspect-oriented Programming, In: The Sixth Iasted International Conference On Modelling, Simulation, And Optimization (mso 2006) Acta Press
Gaborone, Botswana
pp 123-127

Eloff J.H.P (2006)
Aspect-oriented Implementation Of E-consent To Foster Trust, In: Saicsit 2006: Service-oriented Software And Systems
Cape Town, South Africa
pp 164-169

K. Padayachee; Eloff J.H.P. (2006)
Aspect-oriented Implementation Of E-consent To Foster Trust, In: Saicsit 2006: Service-oriented Software And Systems
Cape Town, South Africa
pp 164-169

K. Padayachee; Eloff, J.H.P (2006)
An Aspect-oriented Model To Monitor Misuse, International Joint Conferences On Computer, Information, And Systems Sciences, And Engineering, In: Innovations And Advanced Techniques In Computer And Information Sciences And Engineering
Springer (Netherlands),
pp 273 -278

E. Smith; Kritzinger, E; Oosthuizen, H.J.; Von Solms, S.H. (2005)
Information Security Education: Bridging The Gap Between Academic Institutions And Industry
The Forth World Conference on Information Security Education
Moscow, Russia

E. Smith; Eloff, J.H.P. (2005)
A New Perspective On Risk Assessment Techniques
The INC2005 Fifth International Network Conference
Samos Island, Greece

van der Merwe, A; LOOCKM; Dabrowski, M (2005)
Characteristics And Responsibilities Involved In A Phishing Attack
Winter International Symposium on Information and Communication Technologies
Cape Town
pp 249-254

A. van der Merwe; Seker, R; GERBEAJ (2005)
Phishing In The System Of Systems Settings: Mobile Technology
2005 IEEE International Conference on Systems, Man and Cybernetics
Waikoloa, Hawaii
pp 492-498

A. Barnard; L. Pretorius (2005)
Ethical Design Issues In Cyberspace
Winter International Symposium on Information and Communication Technologies Conference proceedings
Cape Town, South Africa
Trinity College Dublin
pp 236-242

Frangopoulos E.D,; VENTELM; M. Eloff (2005)
Secure Authentication Combined With Anonymity: The End Of An Oxymoron
5TH Annual International Information Security South Africa (ISSA) conference
Johannesburg, South Africa

Sukhoo A; A. Barnard; M. Eloff; A. van der Poll (2005)
An Assessment Of Software Project Management Maturity In Mauritius
InSITE2005 conference

Sukhoo A; A. Barnard; M. Eloff; A. van der Poll; (2005)
Accommodating Soft Skills In Software Project Management
InSITE2005 conference

A. Barnard; L. Pretorius (2005)
Ethical Design Issues In Cyberspace
Proceedings of the 4th International Symposium on Information and Communication Technologies, WISICT05, pp 236-242
Cape Town, January 3-6

L. Pretorius; A. Barnard (2005)
Ethical Issues In Web Services: A Layered Approach
Conference proceedings of ETHICOMP 2005: Looking back to the future, The Eight ETHICOMP International Conference on the Social and Ethical Impacts of Information and Communication Technologies
Linkping, Sweden, September 12-15

S. Lubbe; R Klopper; B Ngubane (2005)
The Nearest Some Of Us Will Ever Come To Information Heaven
IBIMA
CAIRO

S. Lubbe; R Harypursat (2005)
Think Styles As A Function Of Leadership For Ict Professionals
ECMLG
Reading

LOOCKM; J. H. P. Eloff (2005)
Investigating The Usage Of The Chinese Wall Security Policy Model For Data Mining.
WISICT 2005: The 4th International Symposium on Information and Communication Technologies.
Cape Town, South Africa

LOOCKM; J. H. P. Eloff (2005)
A New Access Control Model Based On The Chinese Wall Security Policy Model
ISSA 2005: The 5th annual Information Security for South Africa conference
Johannesburg, South Africa

K. Padayachee; Eloff J.H.P (2005)
The Next Challenge: Aspect-oriented Programming, Sacla 2005
Kasane, Botswana

A. van der Merwe; Mennega, N (2004)
key Characteristics In Developing A Long-term, Web-enabled Career guidance Service.
ED-MEDIA 2004-World Conference on Educational Multimedia, Hypermedia &Telecommunications
Lugano, Switzerland
pp 5265-5272

A. van der Merwe; Cronje, J (2004)
the Educational Value Chain As A Modelling Tool In Re-engineering Efforts
3rd International Symposium on Information and Communication Technologies
Las Vegas, Nevada
pp 122-127

E. Smith (2004)
Information Security Education: A Framework For A Curriculum
The IADIS International Conference e-Society 2004
Avila, Spain
pp 331-338

A. van der Merwe; J Cronje; P. Kotze (2004)
The Functionality Of A Requirements Elicitation Procedure Developed For Process Modelling Within The Higher Education Application Domain
South African Computer Lecturers Association
Durban, South Africa
pp 895-918

Van der Merwe, DP; L. Pretorius; A. Barnard (2004)
Cyberethics And The South African Electronic Communications And Transactions Act
Challenges for the Citizen of the Information Society: Proceedings of the seventh International ETHICOMP conference
Syros, Greece
University of the Aegean
pp 860-870

L. Pretorius; A. Barnard (2004)
E-mail And Misinformation: A South African Case Study
Informing Science & Information Technology Education Joint Conference: InSITE2004 conference proceedings
Rockhampton, Qld, Australia
Informing Science Institute
pp 123-142

Sukhoo, A; A. Barnard; M. Eloff; A. van der Poll (2004)
Towards A Framework For Evaluating Strengths And Weaknesses Of Software Projects
Proceedings of the Project Management South Africa Global Knowledge conference,
Gallagher Estate, Midrand, South Africa
PMSA
pp 193-199

Sukhoo, A; A. Barnard; M. Eloff; A. van der Poll (2004)
A Survey Of Project Management Tools, Techniques And Methodologies Used In Mauritius: The Current Status
Proceedings of Project Management South Africa Global Knowledge conference,
Gallagher Estate, Midrand, South Africa
PMSA
pp 320-329

Kritzinger, E; Von Solms, SH (2004)
The Nokis Model - A Model For Non-technical Aspects Of Information Security
10th International Conference on Information Systems Analysis and Synthesis
United States of America

Kritzinger, E; Von Solms, SH (2004)
Five Non-technical Pillars Of Network Information Security
8th IFIP TC6- TC11 Conference on Communications and Multimedia Security
UK

A. Barnard; E Cloete; L. Pretorius (2004)
A Framework For Performing Security And Ethical Analyses In Agent Computing
Proceedings of ETHICOMP 2004, 7th ETHICOMP Conference, Vol 1 pp 81-93
Syros, Greece, April 14-16

D J van der Merwe; L. Pretorius; A. Barnard (2004)
Cyberethics And The South African Electronic Communications And Transactions Act
Proceedings of ETHICOMP 2004, 7th ETHICOMP Conference, Vol 2 pp 860-870
Syros, Greece, April 14-16

SE Bosch; L. Pretorius (2004)
Software Tools For Morphological Tagging Of Zulu Corpora And Lexicon Development
Proceedings of the 4th International Language Resources and Evaluation Conference, LREC 2004, VI pp 1251-1254
Lisbon, Portugal, May 24-30

L. Pretorius; A. Barnard (2004)
E-mail And Misinformation: A South African Case Study
Proceedings of INSITE 2004, Informing Science and Information Technology Education Joint Conference
Rockhampton, Australia, June 25-28

L. Pretorius; A. Barnard (2004)
Ethical Decision-making Skills For Responsible Citizens Of Cyberspace: Quo Vadis?
SACLA 2004 Conference Proceedings
Durban, July 4-6

S. Lubbe (2004)
Panel: Mistakes In Postgraduate Research – Why Doctorates Come Off The Rail?
ECBRM
Reading

R. de Villiers (2004)
Usability Evaluation Of An E-learning Tutoria: Criteria, Questions, And Case Study
SAICSIT
ACM
pp 284-291

J. Gelderblom (2004)
Designing Software For Young Children: Theoretically Grounded Guidelines
Interaction Design for Children
University of Maryland, USA

M. Eloff; JHP Eloff (2003)
Information Security Management System: Processes And Products
IFIP Sec 2003
Athens, Greece
Kluwer
pp 10

A. van der Merwe (2003)
A Requirements Elicitation Methodology For Educational Process Modeling
Fourth International Conference on Information Communication Technologies in Education.
Samos, Greece
pp 359-366

Cloete, E; A. van der Merwe; L. Pretorius (2003)
A Process Modelling Approach To Requirements Elicitation To Incorporate E-learning As A Core Learning Strategy
Seventh World Conference on Integrated Design and Process Technology
Austin, Texas
pp 359-365

Barnard, A; DRIDDC; L. Pretorius; Cohen, E (2003)
Integrating Computer Ethics Into The Computing Curriculum: A Framework For Implementation
Informing Science + Information Technology Education Joint Conference: InSITE 2003 conference proceedings
Pori, Finland
University of the Aegean
pp 265-279

E. Smith; Oosthuizen, H.J. (2003)
An Investigation Of The Attitudes Of Entry-level University Students Towards Computers
SACLA 2003
Pilaensberg

Cloete, E; L. Pretorius; A. Barnard (2003)
Agent Architecture: Investigating Associated Security And Ethical Concerns
Computing and Philosophy Conference: CAP 2003 Australia
Canberra, Australia

SCHOEMA; Cloete, E (2003)
Architectural Components For The Efficient Design Of Mobile Agents
IT Research in Developing Countries, SAICSIT 2003
Fourways, South-Africa
SAICSIT
pp 45-58

Kritzinger, E; Von Solms, SH (2003)
Information Security Education In Non-technical Aspects Of It
The Learning Conference. Institute of Education, International Journal of Learning
Lodon, UK

SE Bosch; L. Pretorius; L van Huysteen (2003)
Computational Morphological Analysis As An Aid For Term Extraction
Terminology in Advanced Management Applications, 6th International conference: Conference Proceedings
Johannesburg, February 17-21

SE Bosch; L. Pretorius (2003)
Building A Computational Morphological Analyser/generator For Zulu Using The Xerox Finite-state Tools
10th Conference of the European Chapter of the Association for Computational Linguistics, EACL 2003, Proceedings of the Workshop on Finite-State Methods in Natural Language Processing
Budapest, Hungary, April 12-17

A. Barnard; DRIDDC; L. Pretorius; E Cohen (2003)
Integrating Computer Ethics Into The Computing Curriculum: A Framework For Implementation
Proceedings of the Informing Science and Information Technology Education Joint Conference
Pori, June 24-27

W Berkatt; A. Barnard; L. Pretorius (2003)
Evaluating Technological Solutions To On-line Privacy Problems Using Fip And Hci Principles
Proceedings of the ETC 2003 Sixth Annual Ethics and Technology Conference
Boston, June 27-28

E Cloete; L. Pretorius; A. Barnard (2003)
Agent Architecture: Investigating Associated Security And Ethical Concerns
Proceedings of Computers and Philosophy Conference CAP 2003
Canberra, Australia, October 31 November 2

A J van der Merwe; E Cloete; L. Pretorius (2003)
A Requirements Elicitation Methodology For Educational Process Modeling
Proceedings of IDPT 2003, The seventh world conference on integrated design & process technology
Austin, Texas, VSA, December 3-6

S. Lubbe; S Warden (2003)
Organisational Performance And It Investment Intensity In Rsa E-commerce Organizations – A Pilot Study
IBIMA
CAIRO

R. de Villiers; Dersley, R. (2003)
Emerging Technology For Emerging Peoples: Evaluation Of An African Aids-awareness Training System
ED-Media 2003
Honolulu

R. de Villiers (2003)
Foundation For Structure: A Learning Theory Approach To Instructional Design For E-learning.
Proceedings of the Learning Conference 2003
Common Grounds Publications
pp 595-607

Nienaber, RC; Cloete, E (2003)
A Software Agent Framework For The Support Of Software Project Management.
SAICSIT 2003
Midrand, JHB
pp 16-23

Gaby Ford; J. Gelderblom (2003)
The Effects Of Culture On Performance Achieved Through The Use Of Human-computer Interaction
SAICSIT
Midrand, South Africa

Nienaber RC; Cloete E (2003)
A Software Agent Framework For The Support Of Software Project Management.
SAICSIT
Midrand, SA

Kritzinger, E; Strous, LAM (2002)
Information Security: A Corporate Governance Issue
Proceedings of the 5th Working Conference on Integrity and Internal Control in Information Systems
Bonn, Germany

L. Pretorius; A. Barnard; DRIDDC (2002)
Introducing Computer Ethics Into The Computing Curriculum: Two Very Different Experiments
SACLA 2002 Conference Proceedings
East London, June 27-29

L. Pretorius; SE Bosch (2002)
Regular Expressions: Enabling The Development Of Computational Aids For Zulu Natural Language Processing
SAICSIT 2002 International Conference Proceedings
Port Elizabeth, September

LOOCKM; J. H. P. Eloff (2002)
Information Security Issues In Data Mining
ISSA 2002: The Second annual Information Security for South Africa conference
Muldersdrift
pp 30

DRIDDC; L. Pretorius; A. Barnard (2001)
Towards Teaching Computer Ethics
Hardware, Software and Peopleware: Proceedings of the International Conference of the South African Institute of Computer Scientists and Information Technologists (SAICSIT)
Pretoria
UNISA Press
pp 102 - 110

E. Smith; Eloff, J.H.P. (2001)
Transaction Based Risk Analysis - Using Cognitive Fuzzy Techniques
The First annual Information Security for South Africa conference (ISSA 2001
Magaliesberg

E. Smith; Eloff, J.H.P. (2001)
Transaction Based Risk Analysis - Using Cognitive Fuzzy Techniques
The IFIP TC-11 8th Annual Working Conference on Information Security Management & Small Systems Security
Las Vegas
pp 141-156

Renaud, K.V.; E. Smith (2001)
Passwords – Can’t Live With Them, Can’t Live Without Them
The 2nd South African conference on Human-Computer Interaction (CHISA2001)
Pretoria

A. Barnard; Ehlers, EM (2001)
Combining Context Provisions With Graph Grammar Rewriting Rules: The Three-dimensional Case
Hardware, Software and Peopleware: Proceedings of the International Conference of the South African Institute of Computer Scientists and Information Technologists (SAICSIT)
Pretoria
Unisa Press
pp 54-63

Kritzinger, E; Eloff, JHP (2001)
Information Security Development Trends
SAICSIT
Pretoria, South Africa

A. Barnard; DRIDDC; L. Pretorius (2001)
Teaching Computer Ethics As Part Of Computer Science And Information Systems Curricula
SACLA 2001 Conference Proceedings
Bronkhorstspruit, June 27-29

DRIDDC; L. Pretorius; A. Barnard (2001)
Towards Teaching Computer Ethics
SAICSIT 2001 International Conference Proceedings
Pretoria, September

L. Pretorius; SE Bosch (2001)
Finite-state Computational Morphology - Treatment Of The Zulu Noun
SAICSIT 2001 International Conference Proceedings
Pretoria, September

Kritzinger, E; Von Solms, S.H (2000)
Information Security Management Through Measurement
Proceedings of the 15th International Conference on Information Security
Beijing, China

Kritzinger, E; Von Solms, S.H (2000)
Information Security Management Through Measurement
Proceedings of the 15th International Conference on Information Security
Beijing, China

S. Lubbe; D Remenyi; F Meiring; B Smith (1999)
Some Information System Issues In South Africa And Suggestions As To How To Deal With Them During The Next Millennium
SAICSIT
Wits University - Jhb

R. de Villiers (1999)
Applying The Hexa-c Metamodel Of Instructional Theory And Design Educational Web Applications
World conference on the WWW and Internet
Honolulu
pp 1447-1450

E. Smith (1998)
Current Security Trends In Health-care Information Systems With Specific Emphasis On Risk Analysis
Information Security ’98 Conference
Sandton

E. Smith; Eloff, J.H.P. (1998)
Modelling Risks In A Health-care Institution
The IFIP TC11 14th international conference on Information Security (SEC’98) as part of the Proceedings of the XV. IFIP World Computer Congress
Vienna & Budapest
pp 592-598

A. van der Merwe; Labuschagne, W (1996)
Theory Meets Practic: Using Smith's Normalization In Complex Systems.
SAICSIT 1996 : Annual Conference of the South African Institute of Computer Scientists and Information Technologists
Durban

R. de Villiers; P. Kotze (1996)
Software Engineering Development Methodologies Applied To Computer-aided Instruction
SAICSIT
Durban

R. de Villiers; P. Kotze (1996)
Factors Underlying The Design And Development Of Interactive Computer-based Learning And Instructional Systems
CBE/CBT conference
UNISA, Pretoria

Nienaber RC; Smith E; Barnard A; Van Zyl T (10 -13 April)
Software Agent Technology Supporting Risk Management In Spm.
The International Applied Computing Conference, IADIS 2008,
Algarve, Portugal

Nienaber RC; Barnard A ( 22-26 June, 2007)
Towards A Software Agent Technology Framework Supporting Software Project Management. (best Paper Award).
InSITE2007 Conference, Informing Science & IT Education,
Llubljana, Slovenia


NON-PEER REVIEWED CONFERENCE PROCEEDING PUBLICATION/S

T. Horne; E. Naude (July, 2002)
Investigating Suggestions For Improving The Pass Rates Of Distance Learners
SACLA
Fish River Sun, RSA

K. Padayachee (2008)
Utilizing E-commerce And M-commerce Applications To Address The Effect Of Global Warming, Http://www.g-casa.com, Issn 1935-4819
Krakow
Chinese American Scholars Association

R Harypursat; Singh, S; S. Lubbe (2007)
Thinking Styles Of Agriculturalists
College of Agriculture and Environmental Sciences Symposium
Pretoria

E. Naude; T. Horne (2005)
Students Cheating In Assignments: How Does This Affect Examination Results?
SACLA
Kasane, Botswana

LOOCKM; J. H. P. Eloff (2002)
Information Security Issues In Data Mining
Presented at the Post Graduate Research Symposium at SAICSIT 2002
Port Elizabeth, South Africa

SCHOEMA (2001)
A New Approach To Assessing End-user Computing
31st SACLA Conference
Bronkhorstspruit, SA
SACLA
pp 119-227

LOOCKM; A. L. Steenkamp (1994)
A Knowledge Support System For Object-oriented Design
SACLA 94: The 24th Southern African Computer Lecturers Conference
Magoebaskloof

LOOCKM; A. L. Steenkamp (1994)
Knowledge-based Support For Object-oriented Design
Ninth Annual Masters and PhD Students in Computer Science Conference
Stellenbosch
pp 128-141

S. Lubbe; JF Nel (1993)
The Profit Impact Of It
The 8th National Conference for Masters and PhD students in Computer Science in Pretoria (UNISA)
Pretoria




CONFERENCE PRESENTATION/S

Nienaber RC; Cloete E; Barnard A (August, 2004)
Software Project Risk Management Supported By Agent Technology.
The Global Business and Economic Conference
Istanbul, Turkey

SCHOEMA; VENTELM; Cloete,E (2007)
Agent-oriented Framework For Constructing Mobile Agent Systems
IADIS International Conference Applied Computing 2007
Salamanca, Spain

SCHOEMA (2006)
Agent-oriented Framework For Constructing Mobile Agent Systems: A Summary
School of Computing Postgraduate Conference
Unisa, Pretoria

E. Smith; Eloff, J.H.P. (2005)
A New Perspective On Risk Assessment Techniques
INC2005 Fifth International Network Conference
Samos Island, Greece

A. van der Merwe; P. Kotze; Cronje, J (2005)
Selecting A Qualitative Research Approach For Information Systems Research
South African Computer Lecturers Association
Kasane, Botswana

R. Nienaber; A. Barnard (2005)
Software Quality Management Supported By Software Agent Technology
INSITE2005, Informing Science + Information Technology Education Joint Conference
Northern Arizona University; Flagstaff, Arizona, USA

Halland, K; de Villiers, M R; Aron, L (2005)
Academic Performance Of Postgraduate Assistants
SACLA
Kasane, Botswana

SCHOEMA (2005)
Agent Oriëntasie – Waarom, Wat En Wanneer?
SA Akademie vir Wetenskap en Kuns
Pretoria

Halland, K; Malan, K M (2004)
Affective Aspects In Learning And Teaching Programming
SACLA
Hillcrest, KZN

Malan, K; Halland, K (2004)
Examples That Can Do Harm In Learning Programming
OOPSLA
Vancouver, BC

E. Smith (2004)
Information Security Education: A Framework For A Curriculum
Proceedings of the IADIS International Conference e-Society 2004
Avila, Spain

A. Barnard; Cloete, E; L. Pretorius (2004)
A Framework For Performing Security And Ethical Analyses In Agent Computing
ETHICOMP 2004 conference
University of the Aegean; Syros, Greece

L. Pretorius; A. Barnard (2004)
E-mail And Misinformation: A South African Case Study
IS2004, Informing Science + Information Technology Education Joint Conference
Central University of Queensland; Rockhampton, Qld, Australia

Halland, K; Matyila, P M (2004)
Using Discussion Groups For Distance Education
SACLA
Hillcrest, KZN

EJ Naude; MR de Villiers; D Becker (2004)
From November To January: Can Students Improve Enough To Pass?
SACLA
Durban

E. Naude; T. Horne (2004)
The Role Played By Assignments In Computer Programming Education
SAARMSTE
Cape Town

PL Mkhize; S. Lubbe (2004)
Just Because You Can Does Not Mean That You Should Start An E-learning Initiative
SACLA
Durban

R Sewlal; S. Lubbe (2004)
The Merging Of Three Departments To Start Afresh In An Academic Environment,
SACLA
Durban

I Naicker; S. Lubbe (2004)
E-cheating
SACLA
Durban

Halland, K; Malan, K M (2003)
Bad Examples For Teaching Programming
SACLA
Pilanesberg

Halland, K; Malan, K M (2003)
Reflections By Teachers Learning To Program
SAICSIT
Midrand

E. Smith; Oosthuizen, H.J. (2003)
An Investigation Of The Attitudes Of Entry-level University Students Towards Computers
SACLA
Pilansberg

Berkatt, WA; A. Barnard; L. Pretorius (2003)
Technological Solutions To On-line Privacy Problems Using Fip And Hci Principles
Sixth Annual Ethics and Technology Conference
Boston College; Boston (Ma.), USA

Cloete, E.; A. Barnard; L. Pretorius (2003)
Agent Architecture: Investigating Associated Security And Ethical Concerns
The Computing and Philosophy Conference: CAP 2003
Australian National University; Canberra, Australia

MR de Villiers; D Becker (2003)
Content + Communication + Motivation = Better Distance Education
SACLA
Pilansberg

S. Lubbe; G Erwin (2003)
The Creation Of A Commercial Software Development Company (sdo) In A Developing Country For Outsourcing Purposes
ITiRA
Queensland

S. Lubbe (2003)
The Alignment Of Internet Commercial Operations With Information Technology With Organisational Operations – A Literature Review
HICSS-36
Hawaii

S. Lubbe; AM Singh (2003)
The Quality Of Information On The Internet
WWW Conference, UDW
Durban

S. Lubbe; AM Singh (2003)
Mistakes Doctoral Students Make – A Recurring Situation
SACLA
Pilanesburg

S. Lubbe (2002)
Strategic Alignment Of E-commerce Organisations
- 2nd International Workshop on New Models of Business: Managerial Aspects and Enabling Technology School of Management
St Petersburg

E. Smith; Eloff, J.H.P. (2001)
Transaction Based Risk Analysis - Using Cognitive Fuzzy Techniques
ISSA 2001: The First annual Information Security for South Africa conference (ISSA 2001)
Magaliesberg

Renaud, K.V.; E. Smith (2001)
Passwords – Can’t Live With Them, Can’t Live Without Them
CHISA2001 – The 2nd South African Conference on Human-Computer Interaction
University of Pretoria

A. Barnard; Ehlers, EM (2001)
Combining Context Provisions With Graph Grammar Rewriting Rules: The Three-dimensional Case
International Conference of the South African Institute of Computer Scientists and Information Technologists
Pretoria, South Africa

SCHOEMA (2001)
A New Approach To Assessing End-user Computing
31st SACLA Conference
Bronkhorstspruit, SA

A. van der Merwe; E Cloete (2000)
Structure And Techniques Used In A Distance Virtual Learning Implementations
International Conference on Technology and Education
Potchefstroom

A. Barnard; Ehlers, EM (2000)
Graphs And Graph Grammars To Model Chemical Structures
Annual conference of the South African Mathematical Society
University of South Africa; Pretoria, South Africa

E. Smith; Eloff, J.H.P. (1999)
Rimahcof: A Risk Management Model For Health Care – Using Cognitive Fuzzy Techniques
The second information technology research indaba of the Rand Afrikaans University
RAU

K. Padayachee (1999)
Software Risk Analysis Techniques
Golden Gate, South Africa

E. Smith (1998)
Current Security Trends In Health-care Information Systems With Specific Emphasis On Risk Analysis
Information Security ’98 Conference
Sandton

E. Smith; Eloff, J.H.P. (1998)
Modelling Risks In A Health-care Institution
IFIP TC11 14th international conference on Information Security (SEC?98) as part of the World Computer Congress
Vienna & Budapest

E. Smith; Eloff, J.H.P. (1998)
Modelling It Risks In A Health-care Environment
The first information technology research indaba of the Rand Afrikaans University
RAU

A. Barnard; Ehlers, EM (1998)
Formalisms On Graph Automata
Annual conference of the South African Mathematical Society
Rand Afrikaans University; Johannesburg, South Africa

A. Barnard; Ehlers, EM (1997)
Structure Graph Languages
Joint international conference of the American Mathematical Society, South African Mathematical Society and S.A.M.S.A
University of Pretoria; Pretoria, South Africa

A. Barnard; Ehlers, EM (1996)
A Comparative Study Of Random Context Structure Grammars And Structure Graph Grammars
Eighth International Conference on Graph Theory, Combinatorics, Algorithms and Applications
University of Western Michigan; Kalamazoo, USA

A. Barnard (1996)
Some Results Of Structure Graph Grammar Languages
Invited lecture: Department of Mathematics and Computer Science colloquium series
Indiana State-Purdue State University; Fort Wayne Campus, Fort Wayne, Indiana, USA

S. Lubbe; M Hart (1995)
The Impact Of It On The Financial Structures Of Organisations In A Developing Country
International Conference on Information Technology and Development
Johannesburg

S. Lubbe; JF Nel (1994)
Determining The Significance Of Decision Criteria In The Selection Of It Investments In South Africa
CISNA
Cape Town

JF Nel; S. Lubbe (1993)
Organisational Performance And It Investment Intensity In Rsa Companies
8th National Conference for Masters and PhD students in Computer Science in Pretoria (UNISA)
Pretoria

A. Barnard; Ehlers, EM (1992)
The Combination Of Rule Bounded And Global Contexts In Structure Graph Grammars
Annual conference of the South African Mathematical Society
University of Cape Town; Cape Town, South Africa

A. Barnard; Hatting, JH; Ehlers, EM (1991)
Structure Graphs And Structure Graphs Grammars
250th International Conference on Graph Theory
University of Natal; Durban, SA

BOOKS/CHAPTERS

J. L. Smuts; A. van der Merwe; LOOCKM Key characteristics relevant for selecting knowledge management software tools, Knowledge Management and Innovation
2009
IGI Global

S. Lubbe Managing ICT Investments in Successful Enterprises
2007
Idea Group
Herschey
pp 250
ISBN: 978-159140802-4

R. de Villiers Advanced Principles of Effective e-Learning
2007
Informing Science Press
Santa Rosa, CA
pp 1-25

Barrow, J; Miller, L; Malan, K; Gelderblom, H Introducing Delphi Programming: Theory through practice
2005
Oxford University Press.

S. Lubbe Strategic Alignment of organizational strategies
2004
Idea Group
Herschey
pp 2622 – 2626
ISBN: 1 – 59140 – 553 – X

S. Lubbe; Dr S Pather Key Indicators of Successful Internet Commerce: A South African Case study
2003
Idea Group
Herschey
pp 135-153, Chapter 9
ISBN: 1591400430

S. Lubbe The economic and social impacts of e-Commerce
2003
Idea Group
Herschey
pp Editor of Book
ISBN: 1591400430

S. Lubbe The theory behind the economic role of managing the strategic alignment of organization while creating new markets
2003
Idea Group
Herschey
pp 69-94, Chapter 5
ISBN: 1591400430

Kerry Pearlson; S. Lubbe Case Study on the creation of a commercial software development company (SDC) in a developing country - CASE CD to accompany Managing and Using Information Systems
2001
McGraw-Hill
new York
pp e-publication
ISBN: 0-471-32001-3

S. Lubbe The Theory Behind the Role of Leverage and the Strategic alignment of Organisations while creating New Markets (Internet marketing and E-Commerce). – Chapter in Book: Internet Marketing Research: Theory and Practice
2001
Idea Group
Herschey
pp 187-208
ISBN: 1-878289-97-7

S. Lubbe IT Investment in Developing Countries: An Assessment and Practical Guideline
1999
Idea Group
Herschey
pp 232
ISBN: 1 878289 55 1

R. de Villiers Lecture notes in computer science: Computer-aided learning and instruction in science and engineering
1996
Springer-Verlag
Berlin





THESIS/DISSERTATION PUBLICATION/S

Gouws, PM (2010)
Route Planner For The Visual Exploration Of Warehouse Data
Msc UNISA

SCHOEMA (2006)
An Approach To Facilitating The Training Of Mobile Agent Programmers And Encouraging The Progression To An Agent-oriented Paradigm
MSc (Computer Science) Unisa

E. Smith (2000)
Smith, E.: Information Security In Health-care Systems: A New Approach To It Risk Management
RAU

T. Horne (1999)
Temporal Logics
MSc, University of South Africa

E. Smith (1993)
Die Ontleding Van Ritopwekking In Stedelike Gebiede Deur Rekenaargrafika Voorstelling – ‘n Besluitnemingsondersteuningstelsel
PU for CHE