scroll to top
0

Mobile Menu

Header Layout

EBSCO Auth Banner

Let's find your institution. Click here.

Page title

Advanced Search Results For "Keshnee Padayachee"

1 - 10 of 27 results for
 "Keshnee Padayachee"
Results per page:

A Snapshot Survey of ICT Integration in South African Schools

Publication Type:Academic Journal

Source(s):South African Computer Journal, Vol 29, Iss 2 (2017)

Abstract:Information Communication Technology (ICT) integration in the classroom is often viewed as a panacea towards resolving South Africa’s education challenges. However, ICT integration in education in South Africa has been severely limited by operational, ...

View details

Internet Mediated Research: Challenges and Issues

Publication Type:Academic Journal

Source(s):South African Computer Journal, Vol 28, Iss 2 (2016)

Abstract:This article surveys the challenges of and issues associated with conducting internet mediated research. The article explores the use of online platforms and in particular social media platforms for research purposes. Additionally the methodological co...

View details

An Insider Threat Neutralization Mitigation Model Predicated On Cognitive Dissonance (ITNMCD)

Publication Type:Academic Journal

Source(s):South African Computer Journal, Vol 0, Iss 56 (2015)

Abstract:The insider threat concern is a complex issue, as the problem domain intersects the social, technical and socio-technical dimensions. Consequently, counteracting the insider threat involves influencing the insider’s perceptions and behaviour in order t...

View details

The factors that influence customer e-services adoption

Publication Type:Academic Journal

Source(s):South African Computer Journal, Vol 0, Iss 56 (2015)

Abstract:The aim of this paper is to provide an overview of the investigation into customer e-service adoption. The investigation includes a qualitative survey and observation of participants using e-services. E-services are used to attract customers and persua...

View details

Evaluating Usage Control Deterrents

Publication Type:Academic Journal

Source(s):South African Computer Journal, Vol 0, Iss 48 (2012)

Abstract:This paper explores the effectiveness of usage control deterrents. Usage control enables finer-grained control over the usage of objects than do traditional access control models. Deterrent controls are intended to discourage individuals from intention...

View details

A Coordinated Communication & Awareness Approach for Information Security Incident Management: An Empirical Study on Ethiopian Organizations.

Publication Type:Academic Journal

Source(s):African Journal of Information Systems; 2020, Vol. 12 Issue 2, p109-137, 29p

Abstract:Copyright of African Journal of Information Systems is the property of African Journal of Information Systems and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permissi...

View details

The myths and realities of Generational Cohort Theory on ICT Integration in Education: A South African Perspective.

Publication Type:Academic Journal

Source(s):African Journal of Information Systems; 2018, Vol. 10 Issue 1, p54-84, 31p

Abstract:Copyright of African Journal of Information Systems is the property of African Journal of Information Systems and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permissi...

View details

A Snapshot Survey of ICT Integration in South African Schools.

Publication Type:Academic Journal

Source(s):South African Computer Journal; Oct2017, Vol. 29 Issue 2, p36-65, 30p

Abstract:Copyright of South African Computer Journal is the property of South African Computer Journal and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, use...

View details

Internet-mediated research: Challenges and issues.

Publication Type:Academic Journal

Source(s):South African Computer Journal; Dec2016, Vol. 28 Issue 2, p25-45, 21p

Abstract:Copyright of South African Computer Journal is the property of South African Computer Journal and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, use...

View details

An assessment of opportunity-reducing techniques in information security: An insider threat perspective.

Publication Type:Academic Journal

Source(s):Decision Support Systems. Dec2016, Vol. 92, p47-56. 10p.

Abstract:This paper presents an evaluation of extant opportunity-reducing techniques employed to mitigate insider threats. Although both motive and opportunity are required to commit maleficence, this paper focuses on the concept of opportunity. Opportunity is ...

View details

banner_970x250 (970x250)

sponsored