PublicationsThis page is not necessarily up to date. JOURNAL PUBLICATION/ST. Horne; L. Pretorius (June, 2003) Time Structures In Temporal Logic South African Computer Journal Nienaber, RC; Barnard, A (January, 2008) A Generic Agent Framework To Support Various Software Project Management Processes. Interdisciplinary Journal of Information, Knowledge and management (2) pp 149-162 Dlamini M; Eloff J.H.P.; M. Eloff (2009) Information Security: The Moving Target, Computers & Security (28) 3-4 pp 189-198 K. Padayachee; Eloff JHP (2009) Adapting Usage Control As A Deterrent To Address The Inadequacies Of Access Controls, Computers and. Security (28) 7 pp 536-544 Lynn Stevenson; Arina Britz; Tertia Horne (2008) Kt And S4 Satisfiability In A Constraint Logic Environment Lecture Notes in Artificial Intelligence (5351) pp 370-381 MENTZJC; P. Kotze; A. van der Merwe (2008) Searching For The Technology In University Of Technology SACJ (42) Lynn Stevenson; A. Britz; T. Horne (2008) K4 And S4 Satisfiability In A Constraint Logic Environment Lecture Notes in Artificial Intelligence (5351) pp 370-381 K. Padayachee; Wakaba N. (2008) A Taxonomy Of Aspect-oriented Security, Review of Business Information Systems – First Quarter 2008, Vol. 12, No. 1, The Clute Institute for Academic Research (Littleton, Colorado USA) pp 89 -102 T. Horne; E. Naude (2007) Poor Through-put Rates Of Distance Learners In Computing Courses: Is Continuous Assessment The Answer? South African Journal of Higher Education (21) 2 C Rambowan; S. Lubbe; R Klopper (2007) Perceptions Of Members In A South African Rural Community About The Prospects Of Becoming A Digital Village Alternation (12) 2 pp 178-210 C Rambowan; S. Lubbe; R Klopper (2007) Perceptions Of Members In A South African Rural Community About The Prospects Of Becoming A Digital Village Alternation (12) 2 pp 178-210 G Embaye; R Klopper; S. Lubbe (2007) The Effective Use Of Computer Systems At The University Of Kwazulu-natal Alternation (12) 2 pp 159-177 BK Ngubane; S. Lubbe (2007) Information Heaven: Online Information Access For Rural Communities Alternation (12) 2 pp 53-78 L Worrall; R Klopper; S. Lubbe (2007) The Phd: Pitfalls And Pathways Alternation (12) 2 pp 260-282 G Embaye; S. Lubbe; R Klopper (2007) The Effective Use Of Computer Systems At The University Of Kwazulu-natal Alternation (12) 2 pp 159-177 B Ngubane; S. Lubbe (2007) Information Heaven: Online Information Access For Rural Communities Alternation (12) 2 pp 53-78 L Worrall; R Klopper; S. Lubbe (2007) The Phd: Pitfalls And Pathways Alternation (12) 2 pp 260-282 R. de Villiers (2007) An Action Research Appraoch To The Design, Development And Evaluation Of An Interactive E-learning Tutorial In A Cognitive Domain. Journal of Information Technology Education (6) pp 455-479 Sukhoo A; Barnard A; M. Eloff; A. van der Poll (2007) An Evolutionary Software Project Management Maturity Model For Mauritius, Interdisciplinary Journal of Information, Knowledge, and Management, (2) pp 99-118 Sukhoo, A; A. Barnard; M. Eloff; A. van der Poll (2006) An Assessment Of Software Project Management Maturity In Mauritius Issues in Informing Science and Information Technology (2) pp 671-690 Sukhoo, A; A. Barnard; M. Eloff; A. van der Poll; (2006) Accommodating Soft Skills In Software Project Management Issues in Informing Science and Information Technology (2) pp 691-704 P van Staaden; S. Lubbe (2006) A Case Study On The Selection And Evaluation Of Software For An Internet Organisation The Electronic Journal of Business Research Methods (4) 1 pp 57-66 Bosch, SE; L. Pretorius (2006) A Finite-state Approach To Linguistic Constraints In Zulu Morphological Analysis In Africa in the Long Run: Festschrift in the Honour of Professor Arvi Hurskainen Harjula L & Ylnk, M (eds) Studia Orientalia (103) pp 205-227 Gerber, A; A. Barnard; A. van der Merwe (2006) A Semantic Web Status Model Integrated Design and Process Sciences (Special Issue) IDPT 2006 pp 473-482 E. Smith; Oosthuizen, H.J. (2005) Attitudes Of Entry-level University Students Towards Computers: A Comparative Study Computers & Education Journal (44) R. Nienaber; A. Barnard (2005) Software Quality Management Supported By Software Agent Technology Issues in Informing Science and Information Technology (2) pp 659-670 A. van der Merwe; P. Kotze; Johannes Cronje (2005) The Functionality Of A Requirements Elicitation Procedure Developed Within The Higher Education Domain Alternation (12.1b) pp 489-514 S. Lubbe; Mr P L Mkhize (2005) Just Because You Can, Doesn’t Mean That You Should! Alternation (Vol 12) 1b R Sewlal; S. Lubbe (2005) Establishing A New University Information Systems And Technology Department: The Relationship Between Is&t, Bis And Im Alternation (12) 1b M Buthelezi; S. Lubbe; R Klopper (2005) Telecentres: Islands In A Sea With No Ship In Sight A (12) 1b M Sikhakhane; S. Lubbe; R Klopper (2005) The Digital Divide And Access To Information And Communication Technologies Alternation (12) 1b S. Lubbe; M Marimuthu (2005) Only The Flexible Will Survive Alternation (12) 1b S. Lubbe; Prof L Worrall; Prof R Klopper (2005) Challenges In Postgraduate Research: How Doctorates Come Off The Rails Alternation (12) 1b R Harypursat; S. Lubbe; R Klopper (2005) An Investigation Into The Thinking Styles Of Information Systems And Technology Students Alternation (12) 1b M Sikhakhane; S. Lubbe (2005) Preliminaries Into Problems To Access Information – The Digital Divide And Rural Communities SA Journal of Information Management (7) 3 L. Pretorius; A. Barnard (2005) Ethical Decision-making Skills For Responsible Citizens Of Cyberspace: Quo Vadis? Alternation (12) pp 171-196 Jones, J; Prinsloo, D; ; Bosch,SE (2005) Development Of Reuseable Resources For Human Language Technologies (hlt) Applications:practice And Experience South African Journal of African Languages (25) pp 141-159 Pretorius, R; ; E. Viljoen (2005) A Finite-state Morphological Analysis Of Setswana Nouns South African Journal of African Languages (25) pp 48-58 R. de Villiers; Cronje J.C (2005) Six Learning Theory Perspectives On A Web-based Learning Environment South African Journal of Higher Education (19) 3 pp 444-466 R. de Villiers (2005) E-learning Artefacts: Are They Based On Learning Theory? Alternation (12) 1b pp 345-371 Eloff J.H.P., ; M. Eloff (2005) Information Security Architecture Computer Fraud & Security (2005) 11 pp 10-16 A. van der Merwe; L. Pretorius; Cloete, E (2004) A Requirements Elicitation Process Modelling Technique For Incorporation Of E-learning As A Core Learning Strategy Journal of Integrated Design and Process Science (8) 2 pp 1-16 A. van der Merwe; Seker, R (2004) Mobile Phishing (communication With The Editor) South African Computer Journal (33) pp 112-113 Seker, R; A. van der Merwe; P. Kotze; Tanic, M.M.; (2004) Assessment Of Coupling And Cohesion For Component-based Software By Using Shannon Languages Journal of Integrated Design and Process Science (8) 4 pp 33-43 L. Pretorius; A. Barnard (2004) E-mail And Misinformation: A South African Case Study Informing Science journal (7) pp 47-66 L. Pretorius; A. Barnard; Cloete, E (2004) Design Issues In Ethical Agent Computing Computers and Society, Magazine of the ACM; also available at: http://www.computersandsociety.org/sigcas_ofthefuture2/sigcas/index.cfm (32) 8 R. Nienaber; Cloete, E; A. Barnard (2004) Software Project Risk Management Supported By Agent Technology The Business Review Journal (2) 1 pp 452-459 SCHOEMA; Cloete, E (2004) Design Concepts For Mobile Agents African Computer Journal pp 13-24 S. Lubbe (2004) Management Information Searching For Decision-making SA Journal of Information Management (6) 3 S. Lubbe (2004) The Impact Of It Investment In Rsa E-commerce Sme Organisations Electronic Journal of IS Evaluation (7) 1 pp 49-56 S. Lubbe (2004) From Postgrad To Professional: Useful Tips For Choosing And Executing A Doctoral Thesis Electronic Journal of Business Research Methods (2) 2 pp 129 -134 S. Lubbe (2004) Software Piracy – Some Aspects For South African Managers To Keep In Mind South African Journal of Economic and Management Sciences (6) 4 pp 785-801 S. Lubbe (2003) A Case Study Methodology In The Information Technology (it) Field SA Journal of Information Management (5) 4 pp e-jnl S. Lubbe (2003) The Development Of A Case Study Methodology In The Information Technology (it) Field: A Step By Step Approach Ubiquity (4) 27 pp e-jnl S. Lubbe (2003) Documentation Standards For E-commerce 0rganisations Information Systems Control Journal pp 24-26 S. Lubbe (2003) From Postgraduate To Professional Ubiquity (4) 18 L. Pretorius; Bosch,SE (2003) Enabling Computer Interaction In The Indigenous Languages Of Southern Africa: The Central Role Of Computational Morphology Interactions of the ACM (10) pp 56-63 L. Pretorius; Bosch,SE (2003) Finite-state Computational Morphology: An Analyzer Prototype For Zulu Machine Translation Special issue on finite-state language resources and language processing (18) pp 195-216 L. Pretorius; Bosch,SE (2003) Computational Aids For Zulu Natural Language Processing Southern African Linguistics and Applied Language Studies, Special issue: Language technology in Southern Africa: resources and applications (21) pp 267-282 E. Smith; Eloff, J.H.P. (2002) A Prototype For Assessing Information-technology Risks In Health Care Computers & Security (21) 3 pp 266-284 A. Barnard; Ehlers, EM (2002) Combining Context Provisions With Graph Grammar Rewriting Rules: The Three-dimensional Case South African Computer Journal (SACJ) (8) pp 11-20 L. Pretorius; Bosch,SE (2002) Finite-state Computational Morphology - Treatment Of The Zulu Noun South African Computer Journal (28) pp 30-38 Bosch, SE; L. Pretorius (2002) The Significance Of Computational Morphological Analysis For Zulu Lexicography South African Journal of African Languages (22) pp pp 11-20 E. Smith; Eloff, J.H.P. (2001) A New Approach To Risk Management In The Health-care Domain South African Computer Journal (SACJ) pp 2-11 E. Smith; Eloff, J.H.P. (2000) Using Cognitive Fuzzy Modelling For Enhanced Risk Assessment In A Health-care Institution IEEE Intelligent Systems & their applications (15) 2 pp 69-75 M. Eloff; Von Solms, S.H (2000) Information Security Management: A Hierarchical Framework For Various Approaches Computers & Security (19 ) 3 pp 243-256 S. Lubbe; D Remenyi; J van Heerden (2000) Some Ad Hoc Information System Issues In South Africa For The New Millennium And Suggestions As To How To Deal With Them The Journal - IT for Development (9) pp 163 – 174 S. Lubbe (2000) It Investment Approaches In Namibia: Six Case Studies IT for Development (9) pp 3 – 10 E. Smith; Eloff, J.H.P. (1999) Security In Health-care Information Systems – Current Trends International Journal of Medical Informatics (former International Journal of Biomedical Computing) (54 ) 1 pp 39-54 A. Barnard; Ehlers, EM (1999) A Comparative Study Of Random Context Structure Grammars And Structure Graph Grammars Combinatorics, Graph Theory and Algorithms (8) 1 pp 59-68 S. Lubbe; D Remenyi (1999) Management Of Information Technology Evaluation - The Development Of A Managerial Thesis Journal of Logistics and Information Management (1) 2 pp 145 – 156 S. Lubbe; G Armstrong (1998) End-user Computing And The Need For An Information Systems Department In An Organisation VITAL (11) 1 pp 4 – 12 L. Pretorius (1998) Applied Lambda Calculus: Using A Type Theory Based Proof Assistant South African Computer Journal (21) A. van der Merwe; Labuschagne, W (1997) theory Meets Practice: Using Smith's Normal Normalization In Complex Systems. South African Computer Journal (20) pp 44-48 S. Lubbe; R Eggett; N Hawkes (1997) Determining The Significance Of Decision Criteria In The Selection Of It Investments In South Africa ¬ Vista Occasional Papers (5) 1 pp 36-49 S. Lubbe (1996) Computer Crime And The Measures Of Detection And Prevention Of Such Crime VITAL (10) 12 pp 19-31 S. Lubbe; G Parker (1995) The Profit Impact Of It The Journal of Information Technology (1) 10 pp 44 - 51 S. Lubbe; R Eggett; N Hawkes (1995) Determining The Significance Of Decision Criteria In The Selection Of It Investments In South Africa IT for Development (6) pp 125 - 138 S. Lubbe (1994) The Profit Impact Of It SA Jnl of Business Management (25) 2 pp 71 - 77 A. Barnard; Ehlers, EM; Hattingh, JH (1993) Structure Graphs And Structure Graphs Grammars Information Sciences (73) 4 pp 235-271 Zucker, J; L. Pretorius (1993) Introduction To Computability Theory South African Computer Journal (9) pp pp 3-30 S. Lubbe (1992) Examining The Approach Used For It Investment Decisions By Practitioners Responsible For It Planning In Namibia The African Computing Journal (1) 1 pp 12-27 L. Pretorius; Eyre, D (1987) Spline-gauss Rules And The Nystrm Method For Solving Integral Equations In Quantum Scattering Journal of Computational and Applied Mathematics (18) pp 235-247 Rolfes, L (1980) A Numerical Method For The Calculation Of The Average Drawdown In A Fully-penetrating Observation Well In An Unconfined Aquifer Water Resources Research (16) pp 887-890 Laurie, DP; Rolfes, L (1979) Computation Of Gaussian Quadrature Rules From Modified Moments Journal of Computational and Applied Mathematics (5) pp 235-243 Laurie, DP; Rolfes, L (1979) Computation Of Gaussian Quadrature Rules From Modified Moments Journal of Computational and Applied Mathematics (5) pp 235-243 Bosch, SE; ; L. Pretorius Towards Machine-readable Lexicons For South African Bantu Languages Nordic Journal of African Studies ( Submitted) J. Gelderblom Ooptutor: A Cbl System For Introductory Object-oriented Programming SIGCSE Bulletin (32) 2 PEER REVIEWED CONFERENCE PROCEEDING PUBLICATION/S Nienaber R.c; Smith E (September 2009) Adapting The Software Project Management Supported By Software Agents (spmsa) Model To Pmbok2004 Guidelines. WSKS2009. Crete, Greece Springer Lecture Notes in Artificial Intelligence. pp Vol. 5736, ISBN 978-3-642-04753-4 T. Horne; E. Naude (June 2003) Investigating Suggestions For Improving The Pass Rates Of Is Students INSITE Pori, Finland Nienaber RC; Smith E; Barnard A; Van Zyl T (April 10-13, 2008) Software Agent Technology Supporting Risk Management In Spm. International Conference on Applied Computing, IADIS2008 Algarve, Portugal Nienaber RC; Smith E (24-26 June, 2009) Enhancing And Supporting Spm: The Software Project Management Supported By Software Agents Model. 2009 ICBIM: International Conference on Business Information Management, Paris, France Proceedings of the World Academy of Science, Engineering and Technology. Vol 54. pp. 531-540. Paris France. ISSN 2070-3724. Nienaber RC; Barnard A (22-25 June, 2007) Towards A Software Agent Technology Framework Supporting Software Project Management InSITE2007 Conference, Informing Science & IT Education Llubljana, Slovenia J. L. Smuts; P. Kotze; A. van der Merwe; LOOCKM (2010) Information Systems Outsourcing Issues In The Communication Technology Sector IADIS Information Systems 2010 (IS 2010) International Conference Porto, Portugal Frangopoulos E.D.; M. Eloff; VENTELM (2010) Psychological Considerations In Social Engineering, IADIS International Information Systems 2010 (IS 2010) Conference Porto, Portugal pp 247-257 Smuts, H; van der Merwe, A; Kotze, P.; LOOCKM (2010) Critical Success Factors For Information Systems Outsourcing Management: A Software Development Lifecycle View. SAICSIT 2010 Conference Bela Bela, South Africa Kritzinger, E; K. Padayachee (2010) Implementing M-learning Within A Distance Based University, Xi International Conference On Engineering And Technology Education Ilhéus, Bahia – Brazil Nienaber RC; Smith E (2009) Enhancing And Supporting Spm: The Software Project Management Supported By Software Agents Model. ICBIM 2009, International Conference on Business Information Management Paris, France Van der Merwe, Alta; Kotze, Paula (2009) A Systematic Approach For The Identification Of Process Reference Models IASTED International Conference on Software Engineering Innsbruck, Austria A. van der Merwe; P. Kotze (2009) A Systematic Approach For The Identification Of Process Reference Models IASTED International Conference on Software Engineering Innsbruck Smuts, H; van der Merwe, A; LOOCKM (2009) Key Characteristics In Selecting Software Tools For Knowledge Management 11th International Conference on Enterprise Information Systems Milan, Italy Jacobs, D; P. Kotze; A. van der Merwe (2009) Towards An Enterprise Repository Framework The 1st International Workshop on Advanced Enterprise Repositories Milan, Italy Gerber, AJ; A. van der Merwe (2009) Towards The Use Of Formal Ontologies In Enterprise Architecture Framework Repositories The 1st International Workshop on Advanced Enterprise Repositories (AER 2009) Milan, Italy Mbaya, I; Gerber, AJ; A. van der Merwe (2009) Requirements Of A Security Framework For The Semantic Web IASTED International Conference on Software Engineering, IASTED 2009 Innsbruck, Austria J. Gelderblom; P. Kotze (2009) Ten Design Lessons From The Literature On Child Development And Children’s Use Of Technology. Interaction Design for Children Como, Italy ACM J. L. Smuts; A. van der Merwe; LOOCKM; P. Kotze (2009) A Framework And Methodology For Knowledge Management System Implementation SAICSIT 2009: The 15th Annual Conference of the South African Institute of Computer Scientists and Information Technologists Vaal River, South Africa Dlamini, M.T. ; M. Eloff; Eloff, J.H.P.; Hone, K. (2009) Bc3i – Towards Requirements Specification For Preparing An Information Security Budget, ISSA 2009 Conference Johannesburg, SA pp pp 53 - 67 Dagada R; M. Eloff; VENTELM (2009) Too Many Laws But Very Little Progress! Is South African Highly Acclaimed Information Security Legislation Redundant? ISSA 2009 Conference Johannesburg, SA pp 327-346 Dlamini M.T.; M. Eloff; Eloff, J.H.P (2009) Internet Of Things: Emerging And Future Scenarios From An Information Security Perspective SATNAC 2009: Convergence - 21st Century Lifestyle Enabler Conference Royal Swazi Spa, Ezulwini, Swaziland Eloff, J.H.P., ; M. Eloff; Dlamini, M.T.; Zielinski M.P. (2009) Internet Of People, Things And Services - The Convergence Of Security, Trust And Privacy, The Convergence of Security, Trust and Privacy, 3rd CompanionAble Workshop – IoPTS, Novotel Brussels – Brussels, Wangwe, C.; M. Eloff; VENTELM (2009) E-government Readiness: An Information Security Perspective From East Africa, IST-Africa 2009 Conference Uganda K. Padayachee (2009) Aspect-oriented Code Obfuscation, In: Proceedings Of The 2009 International Conference On Software Technology And Engineering Chennai, India pp 252-257 T. Horne; A. van der Poll (2008) Planning As Model Checking: The Performance Of Prob Vs Nusmv Proceedins of the SAICSIT conference Wilderness pp 114-123 Gerber, AJ; A. van der Merwe; Barnard, A (2008) The Usefulness Of An Abstracted Semantic Web Architecture European Semantic Web Conference 2008, ESWC’08 Tenerife Springer Verlag Chapman, M; A. van der Merwe (2008) Contemplating Systematic Software Reuse In A Small Project-centric Company SAICSIT 2008 Wilderness Van Wyk, E.A; R. de Villiers (2008) Usability Context Analysis For Virtual Reality Training In South African Miners SAICSIT 2008 ACM pp 276-285 Tertia Horne; A. van der Poll (2008) Planning As Model Checking: The Performance Of Prob Vs Nusmv SAICSIT Wilderness pp 114-123 J. Gelderblom; P. Kotze (2008) Designing Technology For Children: What We Can Learn From Theories Of Cognitive Development. Proceedings Of Saicsit 2008, October 2008, Wilderness, South Africa. SAICSIT 2008 Wilderness, South Africa Chimbo, B; J. Gelderblom (2008) The Suitability Of American Storytelling Software For South African Diversity. Proceedings Of Amsterdam. IADIS MCCSIS Amsterdam Frangopoulos E.D; M. Eloff; VENTELM (2008) Social Aspects Of Information Security ISSA 2008 Innovative Minds Conference Johannesburg, South Africa, pp pp 275-308 Wangwe, C.; M. Eloff; VENTELM (2008) A Proposed Implementation Of Saml V2.0 In An E Government Setting IST-Africa 2008 Conference & Exhibition, Windhoek, Namibia Gerber, AJ; A. Barnard; A. van der Merwe (2007) Towards A Semantic Web Layered Architecture The International Association of Science and Technology for Development Innsbruck ACTA Press pp 353-362 Hewett, R; Kijsanayothin, P; A. van der Merwe (2007) Predicting Order Of Likelihood Of Defective Software Modules International Conference on Software Engineering & Knowledge Engineering Boston, Massachusets Knowledge Systems Institute pp 93-98 A. van der Merwe; Caroll, M (2007) An Information Systems Auditors Profile Ninth International Conference on Enterprise Information Systems Funchal, Portugal pp 390-397 Singh, S; S. Lubbe; G Naidoo; R Klopper (2007) Towards A Hypothetical E-government Solution: A South African Perspective ECEG Den Hague, The Netherlands Academic Conferences pp e-publication G Hall; S. Lubbe; Singh, S (2007) From Conception To Demise: Implications For Users Of Information Systems In Changing A Parastatal In Kwazulu-natal, South Africa ECEG Den Hague, The Netherlands Academic Conferences pp e-publication Gerber, AJ; A. van der Merwe; Alberts, R (2007) Implications Of Rapid Development Methodologies CSITEd 2007 Mauritius A. van der Merwe; P. Kotze (2007) Criteria Used In Selecting Effective Requirements Elicitation Procedures SAICSIT 2007 Fish River Sun pp 162-171 A. van der Merwe; P. Kotze; Gerber, AJ (2007) Generic Process Model Structures: Towards A Standard Notation For Abstract Representations SAICSIT 2007 Fish River Sun pp 172-180 SCHOEMA; VENTELM; Cloete,E. (2007) Agent-oriented Framework For Constructing Mobile Agent Systems IADIS International Conference Applied Computing 2007 Salamanca, Spain IADIS Press pp 289–296 Ssemugabi, S.; R. de Villiers (2007) Usability And Learning: A Framework For Evaluation Of Web-based E-learning Applications ED-Media 2007 Vancouva, Canada pp 906-913 Ssemugabi, S.; R. de Villiers (2007) A Comparative Study Of Two Usability Evaluation Methods Using A Web-based E-learning Application. SAICSIT 2007 ACM Sukhoo, A.; Barnard, A.; M. Eloff; A. van der Poll (2007) An Evolutionary Software Project Management Maturity Model For Mauritius 2007 Informing Science and Information Technology Conference, InSITE 2007 Ljubljana, Slovenia K. Padayachee; Eloff, J.H.P (2007) An Aspect-oriented Approach To Enhancing Multilevel Security With Usage Control: An Experience Report, In: Iageng: Lecture Notes In Engineering And Computer Science Volume 1 - International, Conference On Software Engineering Hong Kong Hong Kong: Newswood Ltd. International Association of Engineers pp 1060 - 1065 K. Padayachee (2007) Instrumentation Of Aspectj Programs: An Exploratory Study, In: Iageng: Lecture Notes In Engineering And Computer Science Volume 1 - International, Conference On Software Engineering Hong Kong: Newswood Ltd pp 1077 -1081 K. Padayachee; Wakaba. N. (2007) A Taxonomy Of Aspect-oriented Security, Proceedings Of The 2007 European Applied Business Conference Venice, Italy K. Padayachee; Eloff J.H.P. (2007) Enhancing Optimistic Access Controls With Usage Control, In: Lecture Notes In Computer Science: Trust, Privacy And Security In Digital Business, Volume 4657 Regensburg, Germany Springer (Germany), pp 75 – 82 A. van der Merwe; Maneschijn, D (2006) Guidelines In Selecting An E-learning Development Model IADIS Applied Computing 2006 San Sebastian, Spain pp 161-168 Gerber, A; A. Barnard; A. van der Merwe (2006) Design And Evaluation Criteria For Layered Architectures The Fourth International Workshop on Modelling, Simulation, Verification and Validation of Enterprise Information Systems Cyprus pp 163-172 A. van der Merwe; P. Kotze; Cronje, J (2006) The Usefulness Of A Generic Process Model Structure The Fourth International Workshop on Modelling, Simulation, Verification and Validation of Enterprise Information Systems Cyprus pp 86-96 Alberts, R; A. van der Merwe; Pretorius, H (2006) Using Quality Requirements To Systematically Develop A National Accessibility Portal International Science and Technology Conference 2006 Vanderbijlpark VUT pp 153-166 M. Eloff; Ormiston K. (2006) Denial-of-service & Distributed Denial-of-service On The Internet, 6TH Annual International Information Security South Africa (ISSA) from Insight to Foresight Conference Johannesburg DRIDDC; D. G. Kourie; B. W. Watson (2006) Firemusat:meeting The Challenge To Detect Microsatellites In Dna South African Institute of Computer Scientists and Information Technologists South Africa SE Bosch; L. Pretorius; J Jones (2006) Towards Machine-readable Lexicons For South African Bantu Languages Proceedings of the fifth International Conference on Language Resources and Evaluation, LREC 2006 Genoa, Italy, May 23-26 SE Bosch; J Jones; L. Pretorius; W Anderson (2006) Resource Development For South African Bantu Languages: Computational Morphological Analysers And Machine-readable Lexicons Proceedings of the fifth International Conference on Language Resources and Evaluation, LREC 2006, Workshop on networking the development of language resources for African languages Genoa, Italy, May 22 M Radovan; L. Pretorius (2006) Facial Animation In A Nutshell: Past, Present And Future Proceedings, SAICSIT 2006 International Conference Erindale, Somerset West, South Africa, October 9-11 PL Mkhize; S. Lubbe (2006) An Investigation Into The Effectiveness Of Ict Supported Learning System Usage In South African Tertiary Institutions ECEL Winchester S. Lubbe; R Klopper (2006) A Framework Of Factors Affecting Information Quality Provided To Ceos: A Theoretical Review Approach IBIMA Bonn S. Lubbe (2006) Management Information Searching For Leadership And Governance ECMLG Paris R Klopper; S. Lubbe (2006) A Framework Of Factors For Determining The Degree Of E-readiness In The Constituent Sectors Of Emerging Societies IBiMA Conference in Brescia, Italy organised by the IBiMA Committee Brescia V Ramharuk; S. Lubbe; R Klopper (2006) Health Information Systems: An Investigation In How To Use It To Support Healthcare In A Developing Country IBiMA Conference in Brescia, Italy organised by the IBiMA Committee Brescia, Italy A. Britz; T. Horne (2006) A Constraint-based Decision Procedure For The Desciption Logic Alcn SAICSIT Somerset West, RSA R. de Villiers (2006) Multi-method Evaluations: Case Studies Of An Interactive Practice Environment InSITE Conference Manchester Masemola, S.S; R. de Villiers (2006) Towards A Framework For Usability Testing Of Interactive E-learning Applications In Cognitive Domaind, Illustrated By A Case Study SAICSIT 2006 ACM pp 187-197 R. de Villiers (2006) A Learning Theory Approach To Support Outcomes-based E-learning. CITTE 2006 Pretoria K. Padayachee; J.H.P. Eloff (2006) The Next Challenge: Aspect-oriented Programming, In: The Sixth Iasted International Conference On Modelling, Simulation, And Optimization (mso 2006) Acta Press Gaborone, Botswana pp 123-127 Eloff J.H.P (2006) Aspect-oriented Implementation Of E-consent To Foster Trust, In: Saicsit 2006: Service-oriented Software And Systems Cape Town, South Africa pp 164-169 K. Padayachee; Eloff J.H.P. (2006) Aspect-oriented Implementation Of E-consent To Foster Trust, In: Saicsit 2006: Service-oriented Software And Systems Cape Town, South Africa pp 164-169 K. Padayachee; Eloff, J.H.P (2006) An Aspect-oriented Model To Monitor Misuse, International Joint Conferences On Computer, Information, And Systems Sciences, And Engineering, In: Innovations And Advanced Techniques In Computer And Information Sciences And Engineering Springer (Netherlands), pp 273 -278 E. Smith; Kritzinger, E; Oosthuizen, H.J.; Von Solms, S.H. (2005) Information Security Education: Bridging The Gap Between Academic Institutions And Industry The Forth World Conference on Information Security Education Moscow, Russia E. Smith; Eloff, J.H.P. (2005) A New Perspective On Risk Assessment Techniques The INC2005 Fifth International Network Conference Samos Island, Greece van der Merwe, A; LOOCKM; Dabrowski, M (2005) Characteristics And Responsibilities Involved In A Phishing Attack Winter International Symposium on Information and Communication Technologies Cape Town pp 249-254 A. van der Merwe; Seker, R; GERBEAJ (2005) Phishing In The System Of Systems Settings: Mobile Technology 2005 IEEE International Conference on Systems, Man and Cybernetics Waikoloa, Hawaii pp 492-498 A. Barnard; L. Pretorius (2005) Ethical Design Issues In Cyberspace Winter International Symposium on Information and Communication Technologies Conference proceedings Cape Town, South Africa Trinity College Dublin pp 236-242 Frangopoulos E.D,; VENTELM; M. Eloff (2005) Secure Authentication Combined With Anonymity: The End Of An Oxymoron 5TH Annual International Information Security South Africa (ISSA) conference Johannesburg, South Africa Sukhoo A; A. Barnard; M. Eloff; A. van der Poll (2005) An Assessment Of Software Project Management Maturity In Mauritius InSITE2005 conference Sukhoo A; A. Barnard; M. Eloff; A. van der Poll; (2005) Accommodating Soft Skills In Software Project Management InSITE2005 conference A. Barnard; L. Pretorius (2005) Ethical Design Issues In Cyberspace Proceedings of the 4th International Symposium on Information and Communication Technologies, WISICT05, pp 236-242 Cape Town, January 3-6 L. Pretorius; A. Barnard (2005) Ethical Issues In Web Services: A Layered Approach Conference proceedings of ETHICOMP 2005: Looking back to the future, The Eight ETHICOMP International Conference on the Social and Ethical Impacts of Information and Communication Technologies Linkping, Sweden, September 12-15 S. Lubbe; R Klopper; B Ngubane (2005) The Nearest Some Of Us Will Ever Come To Information Heaven IBIMA CAIRO S. Lubbe; R Harypursat (2005) Think Styles As A Function Of Leadership For Ict Professionals ECMLG Reading LOOCKM; J. H. P. Eloff (2005) Investigating The Usage Of The Chinese Wall Security Policy Model For Data Mining. WISICT 2005: The 4th International Symposium on Information and Communication Technologies. Cape Town, South Africa LOOCKM; J. H. P. Eloff (2005) A New Access Control Model Based On The Chinese Wall Security Policy Model ISSA 2005: The 5th annual Information Security for South Africa conference Johannesburg, South Africa K. Padayachee; Eloff J.H.P (2005) The Next Challenge: Aspect-oriented Programming, Sacla 2005 Kasane, Botswana A. van der Merwe; Mennega, N (2004) key Characteristics In Developing A Long-term, Web-enabled Career guidance Service. ED-MEDIA 2004-World Conference on Educational Multimedia, Hypermedia &Telecommunications Lugano, Switzerland pp 5265-5272 A. van der Merwe; Cronje, J (2004) the Educational Value Chain As A Modelling Tool In Re-engineering Efforts 3rd International Symposium on Information and Communication Technologies Las Vegas, Nevada pp 122-127 E. Smith (2004) Information Security Education: A Framework For A Curriculum The IADIS International Conference e-Society 2004 Avila, Spain pp 331-338 A. van der Merwe; J Cronje; P. Kotze (2004) The Functionality Of A Requirements Elicitation Procedure Developed For Process Modelling Within The Higher Education Application Domain South African Computer Lecturers Association Durban, South Africa pp 895-918 Van der Merwe, DP; L. Pretorius; A. Barnard (2004) Cyberethics And The South African Electronic Communications And Transactions Act Challenges for the Citizen of the Information Society: Proceedings of the seventh International ETHICOMP conference Syros, Greece University of the Aegean pp 860-870 L. Pretorius; A. Barnard (2004) E-mail And Misinformation: A South African Case Study Informing Science & Information Technology Education Joint Conference: InSITE2004 conference proceedings Rockhampton, Qld, Australia Informing Science Institute pp 123-142 Sukhoo, A; A. Barnard; M. Eloff; A. van der Poll (2004) Towards A Framework For Evaluating Strengths And Weaknesses Of Software Projects Proceedings of the Project Management South Africa Global Knowledge conference, Gallagher Estate, Midrand, South Africa PMSA pp 193-199 Sukhoo, A; A. Barnard; M. Eloff; A. van der Poll (2004) A Survey Of Project Management Tools, Techniques And Methodologies Used In Mauritius: The Current Status Proceedings of Project Management South Africa Global Knowledge conference, Gallagher Estate, Midrand, South Africa PMSA pp 320-329 Kritzinger, E; Von Solms, SH (2004) The Nokis Model - A Model For Non-technical Aspects Of Information Security 10th International Conference on Information Systems Analysis and Synthesis United States of America Kritzinger, E; Von Solms, SH (2004) Five Non-technical Pillars Of Network Information Security 8th IFIP TC6- TC11 Conference on Communications and Multimedia Security UK A. Barnard; E Cloete; L. Pretorius (2004) A Framework For Performing Security And Ethical Analyses In Agent Computing Proceedings of ETHICOMP 2004, 7th ETHICOMP Conference, Vol 1 pp 81-93 Syros, Greece, April 14-16 D J van der Merwe; L. Pretorius; A. Barnard (2004) Cyberethics And The South African Electronic Communications And Transactions Act Proceedings of ETHICOMP 2004, 7th ETHICOMP Conference, Vol 2 pp 860-870 Syros, Greece, April 14-16 SE Bosch; L. Pretorius (2004) Software Tools For Morphological Tagging Of Zulu Corpora And Lexicon Development Proceedings of the 4th International Language Resources and Evaluation Conference, LREC 2004, VI pp 1251-1254 Lisbon, Portugal, May 24-30 L. Pretorius; A. Barnard (2004) E-mail And Misinformation: A South African Case Study Proceedings of INSITE 2004, Informing Science and Information Technology Education Joint Conference Rockhampton, Australia, June 25-28 L. Pretorius; A. Barnard (2004) Ethical Decision-making Skills For Responsible Citizens Of Cyberspace: Quo Vadis? SACLA 2004 Conference Proceedings Durban, July 4-6 S. Lubbe (2004) Panel: Mistakes In Postgraduate Research – Why Doctorates Come Off The Rail? ECBRM Reading R. de Villiers (2004) Usability Evaluation Of An E-learning Tutoria: Criteria, Questions, And Case Study SAICSIT ACM pp 284-291 J. Gelderblom (2004) Designing Software For Young Children: Theoretically Grounded Guidelines Interaction Design for Children University of Maryland, USA M. Eloff; JHP Eloff (2003) Information Security Management System: Processes And Products IFIP Sec 2003 Athens, Greece Kluwer pp 10 A. van der Merwe (2003) A Requirements Elicitation Methodology For Educational Process Modeling Fourth International Conference on Information Communication Technologies in Education. Samos, Greece pp 359-366 Cloete, E; A. van der Merwe; L. Pretorius (2003) A Process Modelling Approach To Requirements Elicitation To Incorporate E-learning As A Core Learning Strategy Seventh World Conference on Integrated Design and Process Technology Austin, Texas pp 359-365 Barnard, A; DRIDDC; L. Pretorius; Cohen, E (2003) Integrating Computer Ethics Into The Computing Curriculum: A Framework For Implementation Informing Science + Information Technology Education Joint Conference: InSITE 2003 conference proceedings Pori, Finland University of the Aegean pp 265-279 E. Smith; Oosthuizen, H.J. (2003) An Investigation Of The Attitudes Of Entry-level University Students Towards Computers SACLA 2003 Pilaensberg Cloete, E; L. Pretorius; A. Barnard (2003) Agent Architecture: Investigating Associated Security And Ethical Concerns Computing and Philosophy Conference: CAP 2003 Australia Canberra, Australia SCHOEMA; Cloete, E (2003) Architectural Components For The Efficient Design Of Mobile Agents IT Research in Developing Countries, SAICSIT 2003 Fourways, South-Africa SAICSIT pp 45-58 Kritzinger, E; Von Solms, SH (2003) Information Security Education In Non-technical Aspects Of It The Learning Conference. Institute of Education, International Journal of Learning Lodon, UK SE Bosch; L. Pretorius; L van Huysteen (2003) Computational Morphological Analysis As An Aid For Term Extraction Terminology in Advanced Management Applications, 6th International conference: Conference Proceedings Johannesburg, February 17-21 SE Bosch; L. Pretorius (2003) Building A Computational Morphological Analyser/generator For Zulu Using The Xerox Finite-state Tools 10th Conference of the European Chapter of the Association for Computational Linguistics, EACL 2003, Proceedings of the Workshop on Finite-State Methods in Natural Language Processing Budapest, Hungary, April 12-17 A. Barnard; DRIDDC; L. Pretorius; E Cohen (2003) Integrating Computer Ethics Into The Computing Curriculum: A Framework For Implementation Proceedings of the Informing Science and Information Technology Education Joint Conference Pori, June 24-27 W Berkatt; A. Barnard; L. Pretorius (2003) Evaluating Technological Solutions To On-line Privacy Problems Using Fip And Hci Principles Proceedings of the ETC 2003 Sixth Annual Ethics and Technology Conference Boston, June 27-28 E Cloete; L. Pretorius; A. Barnard (2003) Agent Architecture: Investigating Associated Security And Ethical Concerns Proceedings of Computers and Philosophy Conference CAP 2003 Canberra, Australia, October 31 November 2 A J van der Merwe; E Cloete; L. Pretorius (2003) A Requirements Elicitation Methodology For Educational Process Modeling Proceedings of IDPT 2003, The seventh world conference on integrated design & process technology Austin, Texas, VSA, December 3-6 S. Lubbe; S Warden (2003) Organisational Performance And It Investment Intensity In Rsa E-commerce Organizations – A Pilot Study IBIMA CAIRO R. de Villiers; Dersley, R. (2003) Emerging Technology For Emerging Peoples: Evaluation Of An African Aids-awareness Training System ED-Media 2003 Honolulu R. de Villiers (2003) Foundation For Structure: A Learning Theory Approach To Instructional Design For E-learning. Proceedings of the Learning Conference 2003 Common Grounds Publications pp 595-607 Nienaber, RC; Cloete, E (2003) A Software Agent Framework For The Support Of Software Project Management. SAICSIT 2003 Midrand, JHB pp 16-23 Gaby Ford; J. Gelderblom (2003) The Effects Of Culture On Performance Achieved Through The Use Of Human-computer Interaction SAICSIT Midrand, South Africa Nienaber RC; Cloete E (2003) A Software Agent Framework For The Support Of Software Project Management. SAICSIT Midrand, SA Kritzinger, E; Strous, LAM (2002) Information Security: A Corporate Governance Issue Proceedings of the 5th Working Conference on Integrity and Internal Control in Information Systems Bonn, Germany L. Pretorius; A. Barnard; DRIDDC (2002) Introducing Computer Ethics Into The Computing Curriculum: Two Very Different Experiments SACLA 2002 Conference Proceedings East London, June 27-29 L. Pretorius; SE Bosch (2002) Regular Expressions: Enabling The Development Of Computational Aids For Zulu Natural Language Processing SAICSIT 2002 International Conference Proceedings Port Elizabeth, September LOOCKM; J. H. P. Eloff (2002) Information Security Issues In Data Mining ISSA 2002: The Second annual Information Security for South Africa conference Muldersdrift pp 30 DRIDDC; L. Pretorius; A. Barnard (2001) Towards Teaching Computer Ethics Hardware, Software and Peopleware: Proceedings of the International Conference of the South African Institute of Computer Scientists and Information Technologists (SAICSIT) Pretoria UNISA Press pp 102 - 110 E. Smith; Eloff, J.H.P. (2001) Transaction Based Risk Analysis - Using Cognitive Fuzzy Techniques The First annual Information Security for South Africa conference (ISSA 2001 Magaliesberg E. Smith; Eloff, J.H.P. (2001) Transaction Based Risk Analysis - Using Cognitive Fuzzy Techniques The IFIP TC-11 8th Annual Working Conference on Information Security Management & Small Systems Security Las Vegas pp 141-156 Renaud, K.V.; E. Smith (2001) Passwords – Can’t Live With Them, Can’t Live Without Them The 2nd South African conference on Human-Computer Interaction (CHISA2001) Pretoria A. Barnard; Ehlers, EM (2001) Combining Context Provisions With Graph Grammar Rewriting Rules: The Three-dimensional Case Hardware, Software and Peopleware: Proceedings of the International Conference of the South African Institute of Computer Scientists and Information Technologists (SAICSIT) Pretoria Unisa Press pp 54-63 Kritzinger, E; Eloff, JHP (2001) Information Security Development Trends SAICSIT Pretoria, South Africa A. Barnard; DRIDDC; L. Pretorius (2001) Teaching Computer Ethics As Part Of Computer Science And Information Systems Curricula SACLA 2001 Conference Proceedings Bronkhorstspruit, June 27-29 DRIDDC; L. Pretorius; A. Barnard (2001) Towards Teaching Computer Ethics SAICSIT 2001 International Conference Proceedings Pretoria, September L. Pretorius; SE Bosch (2001) Finite-state Computational Morphology - Treatment Of The Zulu Noun SAICSIT 2001 International Conference Proceedings Pretoria, September Kritzinger, E; Von Solms, S.H (2000) Information Security Management Through Measurement Proceedings of the 15th International Conference on Information Security Beijing, China Kritzinger, E; Von Solms, S.H (2000) Information Security Management Through Measurement Proceedings of the 15th International Conference on Information Security Beijing, China S. Lubbe; D Remenyi; F Meiring; B Smith (1999) Some Information System Issues In South Africa And Suggestions As To How To Deal With Them During The Next Millennium SAICSIT Wits University - Jhb R. de Villiers (1999) Applying The Hexa-c Metamodel Of Instructional Theory And Design Educational Web Applications World conference on the WWW and Internet Honolulu pp 1447-1450 E. Smith (1998) Current Security Trends In Health-care Information Systems With Specific Emphasis On Risk Analysis Information Security ’98 Conference Sandton E. Smith; Eloff, J.H.P. (1998) Modelling Risks In A Health-care Institution The IFIP TC11 14th international conference on Information Security (SEC’98) as part of the Proceedings of the XV. IFIP World Computer Congress Vienna & Budapest pp 592-598 A. van der Merwe; Labuschagne, W (1996) Theory Meets Practic: Using Smith's Normalization In Complex Systems. SAICSIT 1996 : Annual Conference of the South African Institute of Computer Scientists and Information Technologists Durban R. de Villiers; P. Kotze (1996) Software Engineering Development Methodologies Applied To Computer-aided Instruction SAICSIT Durban R. de Villiers; P. Kotze (1996) Factors Underlying The Design And Development Of Interactive Computer-based Learning And Instructional Systems CBE/CBT conference UNISA, Pretoria Nienaber RC; Smith E; Barnard A; Van Zyl T (10 -13 April) Software Agent Technology Supporting Risk Management In Spm. The International Applied Computing Conference, IADIS 2008, Algarve, Portugal Nienaber RC; Barnard A ( 22-26 June, 2007) Towards A Software Agent Technology Framework Supporting Software Project Management. (best Paper Award). InSITE2007 Conference, Informing Science & IT Education, Llubljana, Slovenia NON-PEER REVIEWED CONFERENCE PROCEEDING PUBLICATION/S T. Horne; E. Naude (July, 2002) Investigating Suggestions For Improving The Pass Rates Of Distance Learners SACLA Fish River Sun, RSA K. Padayachee (2008) Utilizing E-commerce And M-commerce Applications To Address The Effect Of Global Warming, Http://www.g-casa.com, Issn 1935-4819 Krakow Chinese American Scholars Association R Harypursat; Singh, S; S. Lubbe (2007) Thinking Styles Of Agriculturalists College of Agriculture and Environmental Sciences Symposium Pretoria E. Naude; T. Horne (2005) Students Cheating In Assignments: How Does This Affect Examination Results? SACLA Kasane, Botswana LOOCKM; J. H. P. Eloff (2002) Information Security Issues In Data Mining Presented at the Post Graduate Research Symposium at SAICSIT 2002 Port Elizabeth, South Africa SCHOEMA (2001) A New Approach To Assessing End-user Computing 31st SACLA Conference Bronkhorstspruit, SA SACLA pp 119-227 LOOCKM; A. L. Steenkamp (1994) A Knowledge Support System For Object-oriented Design SACLA 94: The 24th Southern African Computer Lecturers Conference Magoebaskloof LOOCKM; A. L. Steenkamp (1994) Knowledge-based Support For Object-oriented Design Ninth Annual Masters and PhD Students in Computer Science Conference Stellenbosch pp 128-141 S. Lubbe; JF Nel (1993) The Profit Impact Of It The 8th National Conference for Masters and PhD students in Computer Science in Pretoria (UNISA) Pretoria CONFERENCE PRESENTATION/S Nienaber RC; Cloete E; Barnard A (August, 2004) Software Project Risk Management Supported By Agent Technology. The Global Business and Economic Conference Istanbul, Turkey SCHOEMA; VENTELM; Cloete,E (2007) Agent-oriented Framework For Constructing Mobile Agent Systems IADIS International Conference Applied Computing 2007 Salamanca, Spain SCHOEMA (2006) Agent-oriented Framework For Constructing Mobile Agent Systems: A Summary School of Computing Postgraduate Conference Unisa, Pretoria E. Smith; Eloff, J.H.P. (2005) A New Perspective On Risk Assessment Techniques INC2005 Fifth International Network Conference Samos Island, Greece A. van der Merwe; P. Kotze; Cronje, J (2005) Selecting A Qualitative Research Approach For Information Systems Research South African Computer Lecturers Association Kasane, Botswana R. Nienaber; A. Barnard (2005) Software Quality Management Supported By Software Agent Technology INSITE2005, Informing Science + Information Technology Education Joint Conference Northern Arizona University; Flagstaff, Arizona, USA Halland, K; de Villiers, M R; Aron, L (2005) Academic Performance Of Postgraduate Assistants SACLA Kasane, Botswana SCHOEMA (2005) Agent Oriëntasie – Waarom, Wat En Wanneer? SA Akademie vir Wetenskap en Kuns Pretoria Halland, K; Malan, K M (2004) Affective Aspects In Learning And Teaching Programming SACLA Hillcrest, KZN Malan, K; Halland, K (2004) Examples That Can Do Harm In Learning Programming OOPSLA Vancouver, BC E. Smith (2004) Information Security Education: A Framework For A Curriculum Proceedings of the IADIS International Conference e-Society 2004 Avila, Spain A. Barnard; Cloete, E; L. Pretorius (2004) A Framework For Performing Security And Ethical Analyses In Agent Computing ETHICOMP 2004 conference University of the Aegean; Syros, Greece L. Pretorius; A. Barnard (2004) E-mail And Misinformation: A South African Case Study IS2004, Informing Science + Information Technology Education Joint Conference Central University of Queensland; Rockhampton, Qld, Australia Halland, K; Matyila, P M (2004) Using Discussion Groups For Distance Education SACLA Hillcrest, KZN EJ Naude; MR de Villiers; D Becker (2004) From November To January: Can Students Improve Enough To Pass? SACLA Durban E. Naude; T. Horne (2004) The Role Played By Assignments In Computer Programming Education SAARMSTE Cape Town PL Mkhize; S. Lubbe (2004) Just Because You Can Does Not Mean That You Should Start An E-learning Initiative SACLA Durban R Sewlal; S. Lubbe (2004) The Merging Of Three Departments To Start Afresh In An Academic Environment, SACLA Durban I Naicker; S. Lubbe (2004) E-cheating SACLA Durban Halland, K; Malan, K M (2003) Bad Examples For Teaching Programming SACLA Pilanesberg Halland, K; Malan, K M (2003) Reflections By Teachers Learning To Program SAICSIT Midrand E. Smith; Oosthuizen, H.J. (2003) An Investigation Of The Attitudes Of Entry-level University Students Towards Computers SACLA Pilansberg Berkatt, WA; A. Barnard; L. Pretorius (2003) Technological Solutions To On-line Privacy Problems Using Fip And Hci Principles Sixth Annual Ethics and Technology Conference Boston College; Boston (Ma.), USA Cloete, E.; A. Barnard; L. Pretorius (2003) Agent Architecture: Investigating Associated Security And Ethical Concerns The Computing and Philosophy Conference: CAP 2003 Australian National University; Canberra, Australia MR de Villiers; D Becker (2003) Content + Communication + Motivation = Better Distance Education SACLA Pilansberg S. Lubbe; G Erwin (2003) The Creation Of A Commercial Software Development Company (sdo) In A Developing Country For Outsourcing Purposes ITiRA Queensland S. Lubbe (2003) The Alignment Of Internet Commercial Operations With Information Technology With Organisational Operations – A Literature Review HICSS-36 Hawaii S. Lubbe; AM Singh (2003) The Quality Of Information On The Internet WWW Conference, UDW Durban S. Lubbe; AM Singh (2003) Mistakes Doctoral Students Make – A Recurring Situation SACLA Pilanesburg S. Lubbe (2002) Strategic Alignment Of E-commerce Organisations - 2nd International Workshop on New Models of Business: Managerial Aspects and Enabling Technology School of Management St Petersburg E. Smith; Eloff, J.H.P. (2001) Transaction Based Risk Analysis - Using Cognitive Fuzzy Techniques ISSA 2001: The First annual Information Security for South Africa conference (ISSA 2001) Magaliesberg Renaud, K.V.; E. Smith (2001) Passwords – Can’t Live With Them, Can’t Live Without Them CHISA2001 – The 2nd South African Conference on Human-Computer Interaction University of Pretoria A. Barnard; Ehlers, EM (2001) Combining Context Provisions With Graph Grammar Rewriting Rules: The Three-dimensional Case International Conference of the South African Institute of Computer Scientists and Information Technologists Pretoria, South Africa SCHOEMA (2001) A New Approach To Assessing End-user Computing 31st SACLA Conference Bronkhorstspruit, SA A. van der Merwe; E Cloete (2000) Structure And Techniques Used In A Distance Virtual Learning Implementations International Conference on Technology and Education Potchefstroom A. Barnard; Ehlers, EM (2000) Graphs And Graph Grammars To Model Chemical Structures Annual conference of the South African Mathematical Society University of South Africa; Pretoria, South Africa E. Smith; Eloff, J.H.P. (1999) Rimahcof: A Risk Management Model For Health Care – Using Cognitive Fuzzy Techniques The second information technology research indaba of the Rand Afrikaans University RAU K. Padayachee (1999) Software Risk Analysis Techniques Golden Gate, South Africa E. Smith (1998) Current Security Trends In Health-care Information Systems With Specific Emphasis On Risk Analysis Information Security ’98 Conference Sandton E. Smith; Eloff, J.H.P. (1998) Modelling Risks In A Health-care Institution IFIP TC11 14th international conference on Information Security (SEC?98) as part of the World Computer Congress Vienna & Budapest E. Smith; Eloff, J.H.P. (1998) Modelling It Risks In A Health-care Environment The first information technology research indaba of the Rand Afrikaans University RAU A. Barnard; Ehlers, EM (1998) Formalisms On Graph Automata Annual conference of the South African Mathematical Society Rand Afrikaans University; Johannesburg, South Africa A. Barnard; Ehlers, EM (1997) Structure Graph Languages Joint international conference of the American Mathematical Society, South African Mathematical Society and S.A.M.S.A University of Pretoria; Pretoria, South Africa A. Barnard; Ehlers, EM (1996) A Comparative Study Of Random Context Structure Grammars And Structure Graph Grammars Eighth International Conference on Graph Theory, Combinatorics, Algorithms and Applications University of Western Michigan; Kalamazoo, USA A. Barnard (1996) Some Results Of Structure Graph Grammar Languages Invited lecture: Department of Mathematics and Computer Science colloquium series Indiana State-Purdue State University; Fort Wayne Campus, Fort Wayne, Indiana, USA S. Lubbe; M Hart (1995) The Impact Of It On The Financial Structures Of Organisations In A Developing Country International Conference on Information Technology and Development Johannesburg S. Lubbe; JF Nel (1994) Determining The Significance Of Decision Criteria In The Selection Of It Investments In South Africa CISNA Cape Town JF Nel; S. Lubbe (1993) Organisational Performance And It Investment Intensity In Rsa Companies 8th National Conference for Masters and PhD students in Computer Science in Pretoria (UNISA) Pretoria A. Barnard; Ehlers, EM (1992) The Combination Of Rule Bounded And Global Contexts In Structure Graph Grammars Annual conference of the South African Mathematical Society University of Cape Town; Cape Town, South Africa A. Barnard; Hatting, JH; Ehlers, EM (1991) Structure Graphs And Structure Graphs Grammars 250th International Conference on Graph Theory University of Natal; Durban, SA BOOKS/CHAPTERS J. L. Smuts; A. van der Merwe; LOOCKM Key characteristics relevant for selecting knowledge management software tools, Knowledge Management and Innovation 2009 IGI Global S. Lubbe Managing ICT Investments in Successful Enterprises 2007 Idea Group Herschey pp 250 ISBN: 978-159140802-4 R. de Villiers Advanced Principles of Effective e-Learning 2007 Informing Science Press Santa Rosa, CA pp 1-25 Barrow, J; Miller, L; Malan, K; Gelderblom, H Introducing Delphi Programming: Theory through practice 2005 Oxford University Press. S. Lubbe Strategic Alignment of organizational strategies 2004 Idea Group Herschey pp 2622 – 2626 ISBN: 1 – 59140 – 553 – X S. Lubbe; Dr S Pather Key Indicators of Successful Internet Commerce: A South African Case study 2003 Idea Group Herschey pp 135-153, Chapter 9 ISBN: 1591400430 S. Lubbe The economic and social impacts of e-Commerce 2003 Idea Group Herschey pp Editor of Book ISBN: 1591400430 S. Lubbe The theory behind the economic role of managing the strategic alignment of organization while creating new markets 2003 Idea Group Herschey pp 69-94, Chapter 5 ISBN: 1591400430 Kerry Pearlson; S. Lubbe Case Study on the creation of a commercial software development company (SDC) in a developing country - CASE CD to accompany Managing and Using Information Systems 2001 McGraw-Hill new York pp e-publication ISBN: 0-471-32001-3 S. Lubbe The Theory Behind the Role of Leverage and the Strategic alignment of Organisations while creating New Markets (Internet marketing and E-Commerce). – Chapter in Book: Internet Marketing Research: Theory and Practice 2001 Idea Group Herschey pp 187-208 ISBN: 1-878289-97-7 S. Lubbe IT Investment in Developing Countries: An Assessment and Practical Guideline 1999 Idea Group Herschey pp 232 ISBN: 1 878289 55 1 R. de Villiers Lecture notes in computer science: Computer-aided learning and instruction in science and engineering 1996 Springer-Verlag Berlin THESIS/DISSERTATION PUBLICATION/S Gouws, PM (2010) Route Planner For The Visual Exploration Of Warehouse Data Msc UNISA SCHOEMA (2006) An Approach To Facilitating The Training Of Mobile Agent Programmers And Encouraging The Progression To An Agent-oriented Paradigm MSc (Computer Science) Unisa E. Smith (2000) Smith, E.: Information Security In Health-care Systems: A New Approach To It Risk Management RAU T. Horne (1999) Temporal Logics MSc, University of South Africa E. Smith (1993) Die Ontleding Van Ritopwekking In Stedelike Gebiede Deur Rekenaargrafika Voorstelling – ‘n Besluitnemingsondersteuningstelsel PU for CHE |