Browsing Research Articles (Informatics) by Issue Date

Browsing Research Articles (Informatics) by Issue Date

Sort by: Order: Results:

  • Thomas, T.; De Villiers, Carina (Computer Society of South Africa, 2000-11)
    Tertiary institutions in South Africa are faced with dealing with diversity in all its forms in our classrooms. Information Systems, Information Technology and Computer Science students need to learn to work with people ...
  • Leonard, A.C. (Awie) (Southern African Institute for Industrial Engineering, 2002)
    Since the early days of computing, IT professionals have been struggling with their end users (customers) to such an extent that end users became sceptic about the quality of service and support IT professionals can ...
  • Kroeze, J.H. (Jan Hendrik) (Department of Ancient Studies at the University of Stellenbosch, 2002)
    Some hof'al verbs may be semantically related as simple passives to non-causative transitive active qal or hif'il verbs of the same root. If the hif'il is the causative of the qal or nif'al, the hof'al is a causative ...
  • Kroeze, J.H. (Jan Hendrik) (Department of Ancient Studies at the University of Stellenbosch., 2003-07)
    In traditional grammars on the syntax of Biblical Hebrew one often finds sections which describe the various types of clauses, for example, circumstantial, causal, conditional, concessive, comparative, temporal, final and ...
  • Kroeze, J.H. (Jan Hendrik) (Department of Ancient Studies at the University of Stellenbosch, 2004)
    Biblical Hebrew clauses can be and have been studied from many different angles. Over the past forty years much of this knowledge has been captured in various computer software systems and databases. Having all these ...
  • Kroeze, J.H. (Jan Hendrik); Matthee, Machdel C.; Bothma, T.J.D. (Theodorus Jan Daniel) (Department of Knowledge and Information Management, University of Johannesburg, 2004-12)
    When a new discipline emerges, it usually takes some time and a great deal of academic discussion before concepts and terms become standardized. Text mining is one such new discipline. In a groundbreaking article, Untangling ...
  • Kruger, Cornelius Johannes; Snyman, M.M.M. (Maria Magdalena Margaretha); Snyman, Retha (Unisa Press, 2005)
    In the latter part of the nineties, Davenport (1998) emphasised that although many companies were beginning to feel that knowledge was their most valued asset, only a few had actively begun to manage knowledge efficiently ...
  • Phahlamohlaka, L.J. (Letlibe Jacob); Kroeze, J.H. (Jan Hendrik); Phahlamohlaka, Jackie (Unisa Press, 2005-11)
    Although information can currently be regarded as a vehicle of mainly western civilisation and culture, Africans should not merely accept it as such, because that would imply subjugation to anew, techno-cultural colonialism. ...
  • Da Silva, E.M.; Kruger, Cornelius Johannes (Juta, 2005-12)
    Business does not exist in a vacuum. The external environment is either conducive to or stifles business growth. Van Rooyen (2004: 399) points out that 'E-business has important implications for South Africa as an emerging ...
  • Lutu, P.E.N. (Patricia Elizabeth Nalwoga); Engelbrecht, Andries P. (Computer Society of South Africa, 2006-06)
    Sampling of large datasets for data mining is important for at least two reasons. The processing of large amounts of data results in increased computational complexity. The cost of this additional complexity may not be ...
  • King, Nadene; Kruger, Cornelius Johannes; Pretorius, Jaco (Emerald, 2007)
    PURPOSE – Numerous authors contend that there are dissimilarities in the way people, especially those from different cultural backgrounds, interpret or accept knowledge sharing. Ribiere and Sitar argue that, as a result ...
  • Johnson, Roy D.; Lipp, Astrid (Springer, 2007)
    Cognitive mapping has been used to support strategic planning in business. However, the process has seldom been utilized to support strategic planning in nonprofit public organizations, where many reporting lines are less ...
  • Kroeze, J.H. (Jan Hendrik) (Department of Ancient Studies at the University of Stellenbosch, 2007)
    This article focuses on the extraction and exploration of semantic role frameworks via a visual basic 6 program from an xml data cube containing linguistic data of the Hebrew text of Genesis 1:1-2:3. The semantic roles in ...
  • Matthee, Machdel C.; Tobin, Peter K.J.; Van der Merwe, P. (Association for Professional Managers in South Africa, 2007-03)
    This article presents the findings of research that was conducted amongst Enterprise Architecture (EA) practitioners in the South African financial services sector. Due to the duration and cost implications of EA projects, ...
  • Byrne, Elaine; Sahay, Sundeep (Computer Society of South Africa, 2007-06)
    This paper explores the making of generalizations from interpretive research by examining the process of developing a community-based information system (IS) in a rural area in South Africa. Lee and Baskerville’s [1] ...
  • Byrne, Elaine; Lotriet, H.H. (Hugo H.) (Computer Society of South Africa, 2007-06)
    By its very nature education aims to change learners’ knowledge and this inevitably has an impact on the learners’ world views. This paper explores the dilemmas facing Information Systems (IS) educators with respect to ...
  • Naidoo, Rennie; Leonard, A.C. (Awie) (Association for Professional Managers in South Africa, 2007-09)
    This paper examines the interrelationships between perceived usefulness, service quality and loyalty incentives on e-service continuance. The Technology Acceptance Model (TAM) was adapted from the information systems (IS) ...
  • Kruger, Cornelius Johannes; Snyman, M.M.M. (Maria Magdalena Margaretha) (Department of Knowledge and Information Management, University of Johannesburg, 2007-09)
    In a recent article Kruger and Snyman hypothesized that progressions in knowledge management maturity (from a strategic perspective) are directly related to an increased ability to speed up the strategic cycle of imitation, ...
  • Cachia, A.; Kruger, Cornelius Johannes (Association for Professional Managers in South Africa, 2007-12)
    As organizations broaden their organizational boundaries with sourcing practices, it is imperative to identify risk vulnerabilities from a wider perspective than before. Specifically, organizations that make substantial ...
  • Kroeze, J.H. (Jan Hendrik) (Unisa Press, 2008)
    The particle 'et is most often used to mark definite direct objects. It can also be used to mark other verbal extensions, and therefore it has been called an object marker or nota accusativi. This, however, does not ...