Get my own profile
Public access
View all12 articles
4 articles
available
not available
Based on funding mandates
Co-authors
- Nehemiah MaveteraFull Professor of Information Systems, North West UniversityVerified email at nwu.ac.za
- Theo JD BothmaProfessor of Information Science, University of PretoriaVerified email at up.ac.za
- Izak van Zyl (Associate Professor)Cape Peninsula University of TechnologyVerified email at cput.ac.za
- Mathias MujingaSchool of Computing, University of South AfricaVerified email at unisa.ac.za
- M M EloffUnisaVerified email at unisa.ac.za
- Machdel MattheeAssociate Professor in Information Systems, University of PretoriaVerified email at up.ac.za
- Corne J van StadenUniversity of South Africa, College of Science, Engineering & Technology, School of ComputingVerified email at unisa.ac.za
- Judy van BiljonProfessor of Information Systems, University of South AfricaVerified email at unisa.ac.za
- Heikki TopiProfessor of Computer Information Systems, Bentley UniversityVerified email at bentley.edu
- Mark S. PfaffThe MITRE CorporationVerified email at mitre.org
- Dirk PostmaUniversity of South AfricaVerified email at unisa.ac.za
- Olusegun Ademolu AjiginiThe Independent Institute of EducationVerified email at iie.ac.za
- Hugo LotrietProfessor, University of South Africa, School of Computing.Verified email at unisa.ac.za
- Andre Van der PollProfessor, University of South Africa, School of ComputingVerified email at unisa.ac.za
- Paul PrinslooUniversity of South Africa (Unisa)Verified email at unisa.ac.za
- Jackie PhahlamohlakaChief Researcher, Information and Cybersecurity, CSIRVerified email at csir.co.za
- Lisa F SeymourProfessor, Department of Information Systems, University of Cape TownVerified email at uct.ac.za
- Deon du PlessisUniversity of South Africa, College of Science, Engineering & Technology, School of ComputingVerified email at unisa.ac.za
- Pieter JoubertLecturer, University of PretoriaVerified email at up.ac.za