UJDigispace Repository

Browsing Academy of Computer Science and Software Engineering (ETDs) by Title

Browsing Academy of Computer Science and Software Engineering (ETDs) by Title

Sort by: Order: Results:

  • Von Solms, Rossouw (1993)
    Organizations become daily more dependent on information. Information is captured, processed, stored and distributed by the information resources and services within the organization. These information resources and ...
  • Tvrz, Frankie (2008)
    Mobile handheld devices are moving from being peripheral devices and are now fulfilling functionality provided by laptops and desktops. The capability and functionality of handheld devices have improved. This makes the ...
  • Chetty, Jacqueline (2004)
    The Internet has come a long way from its humble beginnings of being used as a simple way of transporting data within the US army and other academic organizations. With the exploding growth of the Internet and the ...
  • Jordaan, Ansa (2004)
    This dissertation will be limited to the compilation of an Information Security Policy Architecture for a Tertiary Institution. An Information Security Policy Architecture for a Tertiary Institution is probably the most ...
  • Assefa, Sorene (2009)
    Knowledge sharing technique has been revolutionized over the past years, and the use of Information and Communication Technologies (ICTs) is one of the main contributors to this revolution. One of the knowledge sharing ...
  • Van Niekerk, Liesel (2005)
    The small, medium and micro enterprise (SMME) environment of South Africa contributes 42% to the national gross domestic product. This is a high number for a largely under-regulated environment. The corporate governance ...
  • Van der Merwe, Jacobus (1998)
    Many organisations are starting to make large parts of their information resources publicly accessible. For example, many organisations publish information using the Internet. Some organisations allow non-employees to ...
  • Coetzee, Marijke (2001)
    Information can be considered a company’s most valued asset and should be protected as such. In the past, companies allowed very limited access to corporate information. Today, the rapid growth of the Internet increases ...
  • Prinsloo, Jacobus Johannes (1999)
    The present study was undertaken in the realm of the Internet working environment, with its focus on measures by which to secure executable code in the Web-browsing environment. The principal aim of this study was to ...
  • Venter, Diederik Petrus (2003)
    Information constitutes one of an organisation’s most valuable assets. It provides the modern organisation with a competitive edge and in some cases, is a requirement merely to survive. An organisation has to protect its ...
  • Dreyer, Lucas Cornelius Johannes (1996)
    In a society that is becoming increasingly reliant on information, it is necessary for information to be stored efficiently and safely. Database technology is used to store large chunks of information efficiently, while ...
  • Von Solms, Elmarie (2001)
    Information security has become a much discussed subject all over the world in the last few years. This is because information security is no longer a luxury, but a necessity in all organisations. The securing of information ...
  • Scarcella, Vincenzo (2002)
    The automated fabrication of a prototype three-dimensional part from a three-dimensional drawing can be regarded as rapid prototyping. There are two basic types of rapid prototyping: subtractive fabrication and additive ...
  • Janse van Vuuren, Hendrika Francina (1995)
    This study was conducted with the purpose of finding a thorough understanding, within the framework of business management, the integrating of the Information System strategy and Information Technology strategy, into the ...
  • De Bruin, Ludwig (2014)
    Data is generated at an ever-increasing rate and it has become difficult to process or analyse it in its raw form. The most data is generated by processes or measuring equipment, resulting in very large volumes of data ...
  • Van Niekerk, G.J. (2000)
    Layered Manufacturing (LM), also known as "Rapid Prototyping", is that process in terms of which a computer-designed model is created layer by layer with the aid of specific LM hardware. Telemanufacturing constitutes an ...
  • O'Reilly, Grant Blaise (2002)
    Knowledge in organizations today is considered as one of the most important assets the organization possesses. A considerable part of this knowledge is the knowledge possessed by the individuals employed by the organization. ...
  • Zhang, Xiaomei (2003)
    The present research study will be dedicated to expounding an integrated event-based scheduling model, which model will, in turn, be based on an object-oriented method and a knowledge-based methodology. In order to complete ...
  • Hodgkinson, Warren (2005)
    One of the fastest developing areas in the entertainment industry is digital animation. Television programmes and movies frequently use 3D animations to enhance or replace actors and scenery. With the increase in computing ...

Search UJDigispace


Browse

My Account