• Tsegaye, T.
    2019
    An Access Control Model for a South African National Electronic Health Record System (cum laude)
  • Currin, A.
    2016
    Text Data Analysis for a Smart City Project in a Developing Nation (cum laude)
  • Bosha, E.
    2016
    Influencing Continuous Data Collection for a Public Safety Crowdsourcing Smart City Project
  • Bhana, B.
    2014
    Ensuring High Quality Public Safety Data in Participatory Crowdsourcing: a Smart City Initiative (cum laude)
  • Boucher, D.
    2012
    A Privacy Model for Health Care: In the Pursuit of Electronic Records (cum laude)
  • Gundu, T.
    2012
    Towards an Information Security Awareness Model for SME Engineering Firms in Emerging Economies (cum laude)
  • Rama, S.
    2012
    Managing Information Confidentiality Using Chinese Wall Model to Reduce Corruption in Government (cum laude)
  • Piderit, R.
    2012
    A Model for Enhancing Trust in South African Automotive Supply Chains Through Information Technology
  • Lalla, H.
    2011
    E-mail Forensic Authorship Attribution
  • Galpin, R.
    2011
    Trust and Identity Management Within Online Social Networks
  • Bayanga, A.
    2011
    A Conceptual Operational Risk Model for SMEs: Impact on Organisational Information Technology
  • Sanyamahwe, T.
    2011
    A Digital Forensic Model Using Log Files
  • Williams, Z.
    2011
    Adoption of M-commerce to Improve Efficacy of Construction SMME’s in South Africa
  • Cilliers, L.
    2010
    Critical Success Factors For User Acceptance and Continued Use of Telemedicine in South Africa
  • Ngoqo, B.
    2010
    Small Hospitality Enterprises and the Internet: an IT Governance Model for Conducting Business Online
  • Xazela, W.
    2010
    Adoption of IT Systems by HR Professionals in order to Enhance Efficacy at the University of Fort Hare
  • Ngqubekile, N.
    2010
    Adoption of IT Systems by HR Professionals in order to Enhance Efficacy at the University of Fort Hare
  • Megaw, G.
    2010
    Phishing Within E-Commerce: Reducing the Risk, Increasing the Trust (cum laude)
  • Allam, S.
    2009
    A Model to Measure the Maturity of Smartphone Security at Software Consultancies
  • Mathe, T.
    2009
    Deriving Value from IT Investments Within Boutique Hotels: A Buffalo City Case Study
  • Scott, K.
    2008
    A Strategic Alignment Maturity Assessment Method for Fast Moving Consumer Goods Companies (cum laude)
  • Ranga, G.
    2008
    Towards an Identity and Access Management Model for the South African Social Grant Distribution Process
  • Isabirye, N.
    2008
    A Model for User Requirements Elicitation Specific to South African Rural Areas
  • Blundell, A.
    2006
    Continuous Auditing Technologies and Models (I was co-supervisor)