Crea il mio profilo
Accesso pubblico
Visualizza tutto11 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
Kevin Allan JohnstonUniversity of Cape TownEmail verificata su uct.ac.za
Karen RenaudDepartment of Computer and Information Sciences, University of StrathclydeEmail verificata su strath.ac.uk
Adrie StanderUniversity of Cape TownEmail verificata su uct.ac.za
Jean-Paul Van BelleProfessor of Information Systems, University of Cape TownEmail verificata su uct.ac.za
Zainab RuhwanyaLecturer and Researcher of Cybersecurity, University of Cape TownEmail verificata su uct.ac.za
Graham I. JohnsonAbertay UniversityEmail verificata su ncr.com
Reinhardt A. BothaProfessor of Information Technology, Nelson Mandela University, Port ElizabethEmail verificata su nmmu.ac.za
Joseph OmidosuUniversity of Cape TownEmail verificata su myuct.ac.za
Anass BayagaProfessor: MathematicsEmail verificata su unizulu.ac.za
Mark RobinsoniTOO Special RisksEmail verificata su student.kuleuven.be
Fayyaadh ParkerEmail verificata su myuct.ac.za
Alastair IronsDeputy Vice Chancellor and Professor of Computer Science, Abertay UniversityEmail verificata su abertay.ac.uk
Carolyn McGibbonUniversity of Cape TownEmail verificata su uct.ac.za
Adéle da Veiga (Martins)School of Computing, UnisaEmail verificata su unisa.ac.za
Professor Sumarie RoodtHigher Colleges of TechnologyEmail verificata su hct.ac.ae
Carina De VilliersDepartment of Informatics, University of PretoriaEmail verificata su up.ac.za
michael kyobeProfessor of Information SystemsEmail verificata su uct.ac.za
Suzanne PriorLecturer, University of AbertayEmail verificata su abertay.ac.uk
Gwamaka MwalembaSenior Lecturer, Department of Information Systems, University of Cape TownEmail verificata su uct.ac.za
Juan-Marc ScrimgeourBCom Masters in Information Systems, University of Cape TownEmail verificata su myuct.ac.za