Research Outputs (School of Computing): Recent submissions

  • Steyn, Paul S.; Van der Poll, John A. (2007-06)
    The specification of enterprise information systems using formal specification languages enables the formal verification of these systems. Reasoning about the properties of a formal specification is a tedious task that can ...
  • Van der poll, J.A. (2002)
    Accepted software engineering design principles are well established, but design principles for constructing a formal specification have been relatively rare. In this paper we examine a number of formal specifications ...
  • Kroeze, Jan H; Bothma, T.J.D.; Matthee, M.C. (2011)
    The article focuses on the conversion of linguistic data between an XML data cube and a three-dimensional array structure in Visual Basic 6 in order to eventually facilitate data access and manipulation. After a ...
  • Padayachee, K.; Eloff, J.H.P. (2006)
    The efficacy of the aspect-oriented paradigm has been well established within several areas of software security as aspect-orientation facilitates the abstraction of these security-related tasks to reduce code complexity. ...
  • Padayachee, Keshnee; Eloff, Jan H. P. (2007)
    The aim of this paper is to document experiences with augmenting multilevel security with usage control at the application level within the aspect-oriented paradigm. Multilevel access control is an access control policy ...
  • Padayachee, Keshnee; Eloff, J.H.P. (2007)
    With the advent of agile programming, lightweight software processes are being favoured over the highly formalized approaches of the past. Likewise access control may benefit from a less prescriptive approach with an ...
  • Padayachee, Keshnee; Eloff, Jan H. P. (2006)
    As society becomes increasingly dependent on software, there is an increasing expectation of information systems to protect the individual’s right to privacy. The process of attaining electronic consent (e-Consent) may ...
  • Padayachee, Keshnee (2009)
    This paper reports on an exploratory study investigating the feasibility of using aspect-oriented constructs to instrument objects for the purposes of code obfuscation. With Java programs it is difficult to protect the ...
  • Barnard, Andries; Eloff, M.M.; Sukhoo, Aneerav; Van der Poll, John A. (Information Science Institute, 2005)
    It is sometimes very difficult for an organization to adopt a specific software project management methodology in a short space of time. It requires sufficient time, adequate financial support and skilled human resources ...
  • Sukhoo, Aneerav; Barnard, Andries; Eloff, Mariki; Van der Poll, John Andrew; Motah, Mahendrenath (Information Science Institute, 2005)
    Software project management probably is a sector that has witnessed the highest rate of project failure in the world. This is not the case with project management concerned with other disciplines due to better management ...
  • Kroeze, Jan H; Lotriet, Hugo; Mavetera, Nehemiah; Pfaff, Mark S.; Postma, Dirk J.v.R; Sewchurran, Kosheek; Topi, Heikki (Association for Information Systems, 2011-05)
    This article builds on a panel on Humanities-Enriched Information Systems presented at the 2010 European Conference on Information Systems (ECIS), held in Pretoria, South Africa, June 6–9, 2010. The aim of the panel discussion ...
  • Kritzinger, E.; Von Solms, S.H. (2010)
    We are currently living in an age, where the use of the Internet has become second nature to millions of people. Not only do businesses depend on the Internet for all types of electronic transactions, but more and more ...
  • Kritzinger, E.; Smith, E. (2008)
    The purpose of this paper is to present a conceptual view of an Information Security Retrieval and Awareness (ISRA) model that can be used by industry to enhance information security awareness among employees. A common ...
  • Smith, E.; Kritzinger, E.; Oosthuizen, H.J.; Von Solms, S.H. (2005-05)
    Information Security has been established as a growing discipline around the globe. There is however, a shortage of Information Security professionals in industry and a lack of Information Security awareness in organizations. ...
  • Kritzinger, E.; Von Solms, S.H. (2008)
    This paper introduces information security within the educational environments that utilize electronic resources. The education environment experienced a paradigm shift over the last several years, due to the rapid growth ...
  • Kritzinger, E.; Smith, E. (2009-06)
    Human-related information security breaches within organizations are primarily caused by employees who have not been made aware of the importance of protecting the information they work with. Information security awareness ...
  • Padayachee, Keshnee; Kritzinger, Elmarie (2010)
    This paper posits that the safety and security concerns while interacting with information communication technology (ICT) devices should be considered as a social skill for school learners. Teaching these concerns specifically ...
  • Eloff, J.H.P.; Padayachee, Keshnee; Bishop, J. (2010)
    There is a duality between access control and information flow control as both mechanisms are concerned with the flow of information. However, information flow control is more than access control, as an illegal flow might ...
  • Marnewick, C.; Labuschagne, L. (University of South Africa, 2009-12-03)
    Organisations initiate and execute projects at an ever-increasing rate in order to achieve their strategic intentions. Many of these, however, find it difficult to measure the contribution that these projects make towards ...
  • Smith, Elme; Eloff, J.H.P. (Intelligent Systems and their Applications, IEEE, 2000-04)
    Human observation and intuition form the basis of any risk assessment. The authors propose a cognitive fuzzy modeling approach to risk assessment in health care institutions, building on fuzzy logic's great potential in ...

Search UnisaIR


Browse

My Account