4 |
4IR | Website Information Security and Privacy Concerns in 4IR: The Moderating Role of Trust in B2C e-Commerce |
a |
adaptive learning | A Conceptual Model for Institutional Adoption of Learning Technologies in Higher Education |
Adoption | Modeling the adoption of cloud computing to assess South African SMEs: An integrated perspective |
advocacy | The potential use of Social Media for Healthcare Advocacy in the Democratic Republic of Congo |
affordance | Artificial Intelligence Affordances for Business Innovation: A Systematic Review of Literature |
Africa | Attitudes of Belgian Companies towards Outsourcing Microwork to Africa |
Artificial Intelligence | Artificial Intelligence Affordances for Business Innovation: A Systematic Review of Literature Cost Implications for a Discrete Mathematics Intelligent Tutoring System |
attitudes | Determinants of attitudes towards social networking advertising: The role of habit, perceived ease of use and social media capital affinity |
Awareness Behaviour | The Awareness Behaviour of Students on Cyber Security Awareness by Using Social Media Platforms: A Case Study at Central University of Technology |
awareness campaigns | Office 365 SharePoint Online: Establishing Content Security Awareness with End-Users using Campaigns |
b |
Big Data | Cloud Integration for eHealth Data Big data for small businesses: Abstracting security and decision-making tools |
Blockchain | Blockchain Technology and Smart Universities |
business capabilities | Understanding Business Strategy Factors that Support or Impede Moving Business Capabilities to a Cloud Environment in the Investment Services Industry |
Business Intelligence | Adoption of Business Intelligence in the South African public social sector Department |
Business Strategy | Understanding Business Strategy Factors that Support or Impede Moving Business Capabilities to a Cloud Environment in the Investment Services Industry |
Business Trust | Blockchain Technology and Smart Universities |
c |
climate change | Understanding the role of ICT in South African Sustainable Manufacturing Practice |
Cloud based information systems | Office 365 SharePoint Online: Establishing Content Security Awareness with End-Users using Campaigns |
Cloud Computing | Modeling the adoption of cloud computing to assess South African SMEs: An integrated perspective Understanding Business Strategy Factors that Support or Impede Moving Business Capabilities to a Cloud Environment in the Investment Services Industry Cloud Integration for eHealth Data Strategic Cloud Computing Framework: South African Context |
Cloud Integration | Cloud Integration for eHealth Data |
Computer Science Education | Cost Implications for a Discrete Mathematics Intelligent Tutoring System |
concept drift | The impact of ensemble diversity on learning big data in dynamic environments |
conceptual model | Modeling the adoption of cloud computing to assess South African SMEs: An integrated perspective |
Connected Enterprise | Industry 4.0 Businesses Environments: Fostering Cyber Security Culture in a Culturally Diverse workplace |
Contingencies theory | Strategic Cloud Computing Framework: South African Context |
cost analysis | Cost Implications for an In-House University Timetabling System Cost Implications for a Discrete Mathematics Intelligent Tutoring System |
Cryptocurrency | Blockchain Technology and Smart Universities |
cultural diversity | Industry 4.0 Businesses Environments: Fostering Cyber Security Culture in a Culturally Diverse workplace |
Cyber Security | Challenges in Information and Cybersecurity program offering at Higher Education Institutions |
Cyber security awareness | Industry 4.0 Businesses Environments: Fostering Cyber Security Culture in a Culturally Diverse workplace The Awareness Behaviour of Students on Cyber Security Awareness by Using Social Media Platforms: A Case Study at Central University of Technology |
Cyber Security Culture | Industry 4.0 Businesses Environments: Fostering Cyber Security Culture in a Culturally Diverse workplace |
Cybersecurity | IoT Security and Privacy: Turning on the Human Firewall in Smart Farming An Ontology Based Model for Cyber Security Awareness Education |
cybersecurity awareness | An Ontology Based Model for Cyber Security Awareness Education |
cyberspace | A Novel Text Encryption and Decryption Scheme using the Genetic Algorithm and Residual Numbers |
Cynefin Framework | A Data-Driven Decision-Making Model for the Third-Party Logistics (3PL) Industry |
d |
Data Analytics | A Data-Driven Decision-Making Model for the Third-Party Logistics (3PL) Industry |
data integration | Cloud Integration for eHealth Data |
data privacy | Privacy in wearable health devices: How does POPIA measure up? Privacy Concerns of Overweight Adults to use Wearable Devices for Sustained Health Monitoring |
Data Quality | Cloud Integration for eHealth Data |
Data Warehouse | Adoption of Business Intelligence in the South African public social sector Department |
data-driven decision making | A Data-Driven Decision-Making Model for the Third-Party Logistics (3PL) Industry |
decision making | Big data for small businesses: Abstracting security and decision-making tools |
Decryption | A Novel Text Encryption and Decryption Scheme using the Genetic Algorithm and Residual Numbers |
Democratic Republic of Congo | The potential use of Social Media for Healthcare Advocacy in the Democratic Republic of Congo |
diversity | The impact of ensemble diversity on learning big data in dynamic environments |
e |
e-commerce | Website Information Security and Privacy Concerns in 4IR: The Moderating Role of Trust in B2C e-Commerce |
e-health | An Investigation of the Level of E-health Literacy in South Africa |
e-health literacy | An Investigation of the Level of E-health Literacy in South Africa |
e-HRM | E-HRM: A Proposed theory based on the Social Cognitive Theory(SCT) |
e-learning | A Conceptual Model for Institutional Adoption of Learning Technologies in Higher Education |
eHealth | Cloud Integration for eHealth Data |
Electronic Health Records | Cloud Integration for eHealth Data |
Encryption | A Novel Text Encryption and Decryption Scheme using the Genetic Algorithm and Residual Numbers |
end users | Office 365 SharePoint Online: Establishing Content Security Awareness with End-Users using Campaigns |
Ensemble | The impact of ensemble diversity on learning big data in dynamic environments |
Exam Timetabling | Cost Implications for an In-House University Timetabling System |
f |
financial services | Understanding Business Strategy Factors that Support or Impede Moving Business Capabilities to a Cloud Environment in the Investment Services Industry |
Forth Industrial Revolution (4IR) | Industry 4.0 Businesses Environments: Fostering Cyber Security Culture in a Culturally Diverse workplace |
g |
Gauteng Province | An exploratory study on Telemedicine in the South African Public Health Sector: A case of Gauteng Province |
Genetic Algorithm | A Novel Text Encryption and Decryption Scheme using the Genetic Algorithm and Residual Numbers |
global warming | Understanding the role of ICT in South African Sustainable Manufacturing Practice |
guidelines | A Synthesis of Literature Review Guidelines from Information Systems Journals |
h |
Healthcare | The potential use of Social Media for Healthcare Advocacy in the Democratic Republic of Congo |
higher education | A Conceptual Model for Institutional Adoption of Learning Technologies in Higher Education |
Higher Education Institutions | Challenges in Information and Cybersecurity program offering at Higher Education Institutions |
HR | E-HRM: A Proposed theory based on the Social Cognitive Theory(SCT) |
HRM | E-HRM: A Proposed theory based on the Social Cognitive Theory(SCT) |
i |
ICT | Understanding the role of ICT in South African Sustainable Manufacturing Practice |
ICT4D | Attitudes of Belgian Companies towards Outsourcing Microwork to Africa |
impact | Impacts and Satisfaction of Using Smartphones for Learning in a University Context |
Impact sourcing | Attitudes of Belgian Companies towards Outsourcing Microwork to Africa |
Industrial Revolution | Blockchain Technology and Smart Universities |
Industry 4.0 | Industry 4.0 Businesses Environments: Fostering Cyber Security Culture in a Culturally Diverse workplace |
Information privacy culture | A conceptual framework for a student personal information privacy culture at universities in Zimbabwe |
Information Security | Challenges in Information and Cybersecurity program offering at Higher Education Institutions Office 365 SharePoint Online: Establishing Content Security Awareness with End-Users using Campaigns |
Information Systems | A Synthesis of Literature Review Guidelines from Information Systems Journals |
Innovation | Artificial Intelligence Affordances for Business Innovation: A Systematic Review of Literature |
institution-based trust | Dimensions of perceived risk of mobile banking apps: An empirical investigation of South African retail banking customers. |
Intelligent Tutoring Systems | Cost Implications for a Discrete Mathematics Intelligent Tutoring System |
Internet of Things (IoT) | IoT Security and Privacy: Turning on the Human Firewall in Smart Farming |
Investment Industry | Understanding Business Strategy Factors that Support or Impede Moving Business Capabilities to a Cloud Environment in the Investment Services Industry |
l |
learning analytics | A Conceptual Model for Institutional Adoption of Learning Technologies in Higher Education |
learning technologies | A Conceptual Model for Institutional Adoption of Learning Technologies in Higher Education |
literature review | A Synthesis of Literature Review Guidelines from Information Systems Journals |
Loyalty | Website Information Security and Privacy Concerns in 4IR: The Moderating Role of Trust in B2C e-Commerce |
m |
Margin | The impact of ensemble diversity on learning big data in dynamic environments |
methodology | A Synthesis of Literature Review Guidelines from Information Systems Journals |
microwork | Attitudes of Belgian Companies towards Outsourcing Microwork to Africa |
Mobile banking apps | Dimensions of perceived risk of mobile banking apps: An empirical investigation of South African retail banking customers. |
mobile learning | Impacts and Satisfaction of Using Smartphones for Learning in a University Context |
n |
north-south platform work | Attitudes of Belgian Companies towards Outsourcing Microwork to Africa |
o |
obese adults | Privacy Concerns of Overweight Adults to use Wearable Devices for Sustained Health Monitoring |
Office 365 SharePoint Online | Office 365 SharePoint Online: Establishing Content Security Awareness with End-Users using Campaigns |
Ontology | An Ontology Based Model for Cyber Security Awareness Education |
p |
perceived risk | Dimensions of perceived risk of mobile banking apps: An empirical investigation of South African retail banking customers. |
Personal protection of personal information act | Privacy in wearable health devices: How does POPIA measure up? |
POPIA | Privacy in wearable health devices: How does POPIA measure up? |
Prescriptive Model | A Data-Driven Decision-Making Model for the Third-Party Logistics (3PL) Industry |
Privacy | Website Information Security and Privacy Concerns in 4IR: The Moderating Role of Trust in B2C e-Commerce |
Privacy Awareness | A conceptual framework for a student personal information privacy culture at universities in Zimbabwe |
Privacy confidence | A conceptual framework for a student personal information privacy culture at universities in Zimbabwe |
Privacy expectations | A conceptual framework for a student personal information privacy culture at universities in Zimbabwe |
Public Health Sector | An exploratory study on Telemedicine in the South African Public Health Sector: A case of Gauteng Province |
r |
Recycling | Understanding the role of ICT in South African Sustainable Manufacturing Practice |
research synthesis | A Synthesis of Literature Review Guidelines from Information Systems Journals |
Residue Number System | A Novel Text Encryption and Decryption Scheme using the Genetic Algorithm and Residual Numbers |
s |
Satisfaction | Website Information Security and Privacy Concerns in 4IR: The Moderating Role of Trust in B2C e-Commerce Impacts and Satisfaction of Using Smartphones for Learning in a University Context |
Search Algorithms | Cost Implications for an In-House University Timetabling System |
Security | A Novel Text Encryption and Decryption Scheme using the Genetic Algorithm and Residual Numbers Website Information Security and Privacy Concerns in 4IR: The Moderating Role of Trust in B2C e-Commerce Big data for small businesses: Abstracting security and decision-making tools |
Security and Privacy | Industry 4.0 Businesses Environments: Fostering Cyber Security Culture in a Culturally Diverse workplace |
Security and Privacy. | IoT Security and Privacy: Turning on the Human Firewall in Smart Farming |
skills and training | Challenges in Information and Cybersecurity program offering at Higher Education Institutions |
small business | Big data for small businesses: Abstracting security and decision-making tools |
Smart Farming | IoT Security and Privacy: Turning on the Human Firewall in Smart Farming |
Smart Universities | Blockchain Technology and Smart Universities |
Smartphone | Impacts and Satisfaction of Using Smartphones for Learning in a University Context |
SMEs | Modeling the adoption of cloud computing to assess South African SMEs: An integrated perspective |
social capital affinity | Determinants of attitudes towards social networking advertising: The role of habit, perceived ease of use and social media capital affinity |
Social Cognitive Theory (SCT) | E-HRM: A Proposed theory based on the Social Cognitive Theory(SCT) |
Social disclosure | Privacy in wearable health devices: How does POPIA measure up? |
social media | The potential use of Social Media for Healthcare Advocacy in the Democratic Republic of Congo Determinants of attitudes towards social networking advertising: The role of habit, perceived ease of use and social media capital affinity |
social media platforms | The Awareness Behaviour of Students on Cyber Security Awareness by Using Social Media Platforms: A Case Study at Central University of Technology |
Social Networking Sites | Determinants of attitudes towards social networking advertising: The role of habit, perceived ease of use and social media capital affinity |
Social Sector | Adoption of Business Intelligence in the South African public social sector Department |
South Africa | An Investigation of the Level of E-health Literacy in South Africa |
South African higher education | Impacts and Satisfaction of Using Smartphones for Learning in a University Context |
South African IT professional | Strategic Cloud Computing Framework: South African Context |
stakeholder theory | Strategic Cloud Computing Framework: South African Context |
Support Vector Machine | The impact of ensemble diversity on learning big data in dynamic environments |
Sustainable Manufacturing | Understanding the role of ICT in South African Sustainable Manufacturing Practice |
sustained monitoring | Privacy Concerns of Overweight Adults to use Wearable Devices for Sustained Health Monitoring |
t |
Technology | Understanding the role of ICT in South African Sustainable Manufacturing Practice |
Technology-organization-environment Theory | Strategic Cloud Computing Framework: South African Context |
Telemedicine | An exploratory study on Telemedicine in the South African Public Health Sector: A case of Gauteng Province |
third-party logistics | A Data-Driven Decision-Making Model for the Third-Party Logistics (3PL) Industry |
Trust | Modeling the adoption of cloud computing to assess South African SMEs: An integrated perspective Website Information Security and Privacy Concerns in 4IR: The Moderating Role of Trust in B2C e-Commerce |
w |
waste manage-ment | Understanding the role of ICT in South African Sustainable Manufacturing Practice |
wearable devices | Privacy in wearable health devices: How does POPIA measure up? Privacy Concerns of Overweight Adults to use Wearable Devices for Sustained Health Monitoring |