Get my own profile
Public access
View all11 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Kevin Allan JohnstonUniversity of Cape TownVerified email at uct.ac.za
- Karen RenaudDepartment of Computer and Information Sciences, University of StrathclydeVerified email at strath.ac.uk
- Adrie StanderUniversity of Cape TownVerified email at uct.ac.za
- Jean-Paul Van BelleProfessor of Information Systems, University of Cape TownVerified email at uct.ac.za
- Zainab RuhwanyaLecturer and Researcher of Cybersecurity, University of Cape TownVerified email at uct.ac.za
- Graham I. JohnsonAbertay UniversityVerified email at ncr.com
- Reinhardt A. BothaProfessor of Information Technology, Nelson Mandela University, Port ElizabethVerified email at nmmu.ac.za
- Joseph OmidosuUniversity of Cape TownVerified email at myuct.ac.za
- Mark RobinsoniTOO Special RisksVerified email at student.kuleuven.be
- Fayyaadh ParkerVerified email at myuct.ac.za
- Anass BayagaProfessor: MathematicsVerified email at unizulu.ac.za
- Alastair IronsDeputy Vice Chancellor and Professor of Computer Science, Abertay UniversityVerified email at abertay.ac.uk
- Carolyn McGibbonUniversity of Cape TownVerified email at uct.ac.za
- Professor Sumarie RoodtHigher Colleges of TechnologyVerified email at hct.ac.ae
- Carina De VilliersDepartment of Informatics, University of PretoriaVerified email at up.ac.za
- Adéle da Veiga (Martins)School of Computing, UnisaVerified email at unisa.ac.za
- michael kyobeProfessor of Information SystemsVerified email at uct.ac.za
- Gwamaka MwalembaSenior Lecturer, Department of Information Systems, University of Cape TownVerified email at uct.ac.za
- Juan-Marc ScrimgeourBCom Masters in Information Systems, University of Cape TownVerified email at myuct.ac.za
- Giampaolo BellaUniversity of CataniaVerified email at dmi.unict.it