ICICIS 2019: Author IndexAuthor | Papers |
---|
A | Achmat, Luqman | Artificial Intelligence Affordances for Business Innovation: A Systematic Review of Literature | Adeyelure, Dr Tope Samuel | Adoption of Business Intelligence in the South African public social sector Department | Adeyelure, Tope Samuel | An exploratory study on Telemedicine in the South African Public Health Sector: A case of Gauteng Province | Agbedemnab, Peter Awon-Natemi | A Novel Text Encryption and Decryption Scheme using the Genetic Algorithm and Residual Numbers | Alhassan, Mohammed | Understanding the role of ICT in South African Sustainable Manufacturing Practice | Alhassan, Mohammed | A Data-Driven Decision-Making Model for the Third-Party Logistics (3PL) Industry | Anderson, George | Cost Implications for an In-House University Timetabling System Cost Implications for a Discrete Mathematics Intelligent Tutoring System | Ayong, Kenneth | Modeling the adoption of cloud computing to assess South African SMEs: An integrated perspective | B | Baagyere, Edward Yellakuor | A Novel Text Encryption and Decryption Scheme using the Genetic Algorithm and Residual Numbers | Bonne, Karijn | Attitudes of Belgian Companies towards Outsourcing Microwork to Africa | Boucher, Duane | Industry 4.0 Businesses Environments: Fostering Cyber Security Culture in a Culturally Diverse workplace | Brown, Irwin | Artificial Intelligence Affordances for Business Innovation: A Systematic Review of Literature A Synthesis of Literature Review Guidelines from Information Systems Journals | C | Chinyamurindi, Willie Tafadzwa | Determinants of attitudes towards social networking advertising: The role of habit, perceived ease of use and social media capital affinity | Cilliers, Liezel | Privacy in wearable health devices: How does POPIA measure up? Privacy Concerns of Overweight Adults to use Wearable Devices for Sustained Health Monitoring An Investigation of the Level of E-health Literacy in South Africa Determinants of attitudes towards social networking advertising: The role of habit, perceived ease of use and social media capital affinity | Cocquyt, Ilse | Attitudes of Belgian Companies towards Outsourcing Microwork to Africa | D | Da Veiga, Adele | A conceptual framework for a student personal information privacy culture at universities in Zimbabwe | Daabo, Mohammed Ibrahim | A Novel Text Encryption and Decryption Scheme using the Genetic Algorithm and Residual Numbers | Davids, Faghmie | Understanding Business Strategy Factors that Support or Impede Moving Business Capabilities to a Cloud Environment in the Investment Services Industry | G | Garbutt, Malcolm | Attitudes of Belgian Companies towards Outsourcing Microwork to Africa | Geeling, Sharon | A Synthesis of Literature Review Guidelines from Information Systems Journals | Gopane, Thabo J. | Blockchain Technology and Smart Universities | Gundu, Tapiwa | Industry 4.0 Businesses Environments: Fostering Cyber Security Culture in a Culturally Diverse workplace IoT Security and Privacy: Turning on the Human Firewall in Smart Farming | I | Imaja, Itulelo Matiyabu | The potential use of Social Media for Healthcare Advocacy in the Democratic Republic of Congo | J | Jokonya, Osden | Adoption of Business Intelligence in the South African public social sector Department | K | Kabanda, Salah | Challenges in Information and Cybersecurity program offering at Higher Education Institutions | Kalema, Billy Mathias | An exploratory study on Telemedicine in the South African Public Health Sector: A case of Gauteng Province | Katurura, Munyaradzi | Privacy in wearable health devices: How does POPIA measure up? | Kekwaletswe, Ray | Strategic Cloud Computing Framework: South African Context | M | Mabhele, Mncedisi | A Conceptual Model for Institutional Adoption of Learning Technologies in Higher Education | Maduku, Daniel K. | Dimensions of perceived risk of mobile banking apps: An empirical investigation of South African retail banking customers. | Magoro, Hangwani Emmanuel | E-HRM: A Proposed theory based on the Social Cognitive Theory(SCT) | Maguraushe, Kudakwashe | A conceptual framework for a student personal information privacy culture at universities in Zimbabwe | Maronga, Mark | Industry 4.0 Businesses Environments: Fostering Cyber Security Culture in a Culturally Diverse workplace | Maronga, Vimbai | IoT Security and Privacy: Turning on the Human Firewall in Smart Farming | Martins, Nico | A conceptual framework for a student personal information privacy culture at universities in Zimbabwe | Masha, Hosiah | Adoption of Business Intelligence in the South African public social sector Department | Modiba, Nthabiseng | An Ontology Based Model for Cyber Security Awareness Education | Mofokeng, Thabang | Website Information Security and Privacy Concerns in 4IR: The Moderating Role of Trust in B2C e-Commerce | Mogoane, Seapei Nozimbali | Challenges in Information and Cybersecurity program offering at Higher Education Institutions | Moyo, Faith | A Data-Driven Decision-Making Model for the Third-Party Logistics (3PL) Industry | Museba, Tinofirei | The impact of ensemble diversity on learning big data in dynamic environments | N | Naidoo, Rennie | Modeling the adoption of cloud computing to assess South African SMEs: An integrated perspective | Ncube, Zenzo | An Ontology Based Model for Cyber Security Awareness Education | Ndayizigamiye, Patrick | The potential use of Social Media for Healthcare Advocacy in the Democratic Republic of Congo | Njenga, Kennedy | Big data for small businesses: Abstracting security and decision-making tools | Nkgau, Tallman | Cost Implications for an In-House University Timetabling System Cost Implications for a Discrete Mathematics Intelligent Tutoring System | O | Ogundele, Oluwaseyi | Privacy Concerns of Overweight Adults to use Wearable Devices for Sustained Health Monitoring | Ojo, Sunday | An Ontology Based Model for Cyber Security Awareness Education | Oosterwyk, Grant | A Synthesis of Literature Review Guidelines from Information Systems Journals | P | Phahlane, Mampilo | E-HRM: A Proposed theory based on the Social Cognitive Theory(SCT) | Posiliti, Dolly | An Investigation of the Level of E-health Literacy in South Africa | Potgieter, Pieter | The Awareness Behaviour of Students on Cyber Security Awareness by Using Social Media Platforms: A Case Study at Central University of Technology | R | Raseonyana, Wame | Cost Implications for an In-House University Timetabling System | Rice, Ofentse | Cost Implications for a Discrete Mathematics Intelligent Tutoring System | S | Saiod, Abdul Kader | Cloud Integration for eHealth Data | Salih, Sara | Big data for small businesses: Abstracting security and decision-making tools | Scholtz, Brenda | Understanding the role of ICT in South African Sustainable Manufacturing Practice A Data-Driven Decision-Making Model for the Third-Party Logistics (3PL) Industry | Sikhitha, Talifhani | Office 365 SharePoint Online: Establishing Content Security Awareness with End-Users using Campaigns | Solani, Babalwa | Determinants of attitudes towards social networking advertising: The role of habit, perceived ease of use and social media capital affinity | T | Thusi, Philile | Dimensions of perceived risk of mobile banking apps: An empirical investigation of South African retail banking customers. | Toperesu, B-Abee | Impacts and Satisfaction of Using Smartphones for Learning in a University Context | Turpin, Marita | Impacts and Satisfaction of Using Smartphones for Learning in a University Context | Twala, Andrian | Strategic Cloud Computing Framework: South African Context | V | Van Belle, Jean-Paul | Understanding Business Strategy Factors that Support or Impede Moving Business Capabilities to a Cloud Environment in the Investment Services Industry A Conceptual Model for Institutional Adoption of Learning Technologies in Higher Education Impacts and Satisfaction of Using Smartphones for Learning in a University Context Attitudes of Belgian Companies towards Outsourcing Microwork to Africa | Van Greunen, Darelle | Cloud Integration for eHealth Data | v | van Den Bergh, Maureen | Office 365 SharePoint Online: Establishing Content Security Awareness with End-Users using Campaigns |
|
|