Supervision Experience: Masters Students

Skip Navigation LinksHome : Masters Students
  1. Isabirye, N. (2017) A Model for User Requirements Elicitation Specific to South African Rural Areas
  2. Currin, A. (2015) Text Data Analysis for a Smart City Project in a Developing Nation (cum laude)
  3. Bosha, E. (2015) Influencing Continuous Data Collection for a Public Safety Crowdsourcing Smart City Project
  4. Bhana, B. (2013) Ensuring High Quality Public Safety Data in Participatory Crowdsourcing: a Smart City Initiative (cum laude)
  5. Boucher, D. (2012) A Privacy Model for Health Care: In the Pursuit of Electronic Records (cum laude)
  6. Gundu, T. (2012) Towards an Information Security Awareness Model for SME Engineering Firms in Emerging Economies (cum laude)
  7. Rama, S. (2012) Managing Information Confidentiality Using Chinese Wall Model to Reduce Corruption in Government (cum laude)
  8. Williams, Z. (2011) Adoption of M-commerce to Improve Efficacy of Construction SMME’s in South Africa
  9. Sanyamahwe, T. (2011) A Digital Forensic Model Using Log Files
  10. Bayanga, A. (2011) A Conceptual Operational Risk Model for SMEs: Impact on Organisational Information Technology
  11. Galphin, R. (2011) Trust and Identity Management Within Online Social Networks
  12. Lalla, H. (2011) E-mail Forensic Authorship Attribution
  13. Megaw, G. (2010) Phishing Within E-Commerce: Reducing the Risk, Increasing the Trust (cum laude)
  14. Ngqubekile, N. (2010) Adoption of IT Systems by HR Professionals in order to Enhance Efficacy at the University of Fort Hare
  15. Xazela, W. (2010) Adoption of IT Systems by HR Professionals in order to Enhance Efficacy at the University of Fort Hare
  16. Ngoqo, B. (2010) Small Hospitality Enterprises and the Internet: an IT Governance Model for Conducting Business Online
  17. Cilliers, L. (2010) Critical Success Factors For User Acceptance and Continued Use of Telemedicine in South Africa
  18. Allam, S. (2009) A Model to Measure the Maturity of Smartphone Security at Software Consultancies
  19. Mathe, T. (2009) Deriving Value from IT Investments Within Boutique Hotels: A Buffalo City Case Study
  20. Scott, K. (2008) A Strategic Alignment Maturity Assessment Method for Fast Moving Consumer Goods Companies (cum laude)
  21. Ranga, G. (2008) Towards an Identity and Access Management Model for the South African Social Grant Distribution Process
  22. Blundell, A. (2006) Continuous Auditing Technologies and Models (I was co-supervisor)
  23. Blundell, A. (2006) Continuous Auditing Technologies and Models (I was co-supervisor)

mini research projects

MTech Information Technology at NMMU

  1. Owen, M. (2009) An Enterprise Information Security Model for a Micro Finance Company: A Case Study

  2. Kilian, R. (2009) Section 404 of the Sarbanes-Oxley Act and How to Ensure Compliance with Specific Reference to TelkomSA

  3. Tansley, N. (2008) A Methodology for Measuring and Monitoring IT Risk (I was co-supervisor)

  4. Deas, M. (2008) Towards a User Centric Model for Identity and Access Management within the Online Environment

  5. Martin, M. (2007) Developing a Model to Determine the Feasibility of a Localised Project Management Office for a National IT company