Software Development
Browse by
Recent Submissions
-
A User Awareness Model for averting Computer Threats
(2014)One of the major reasons why systems are susceptible to threats in many ways or the other is the lack of the know-how and a follow up system for the education rendered to users, who in most cases are the weakest point for ... -
Development of InfoVis software for digital forensics.
(IEEE, 2012)Information Visualisation techniques are one method that may be used to combat the growing complexity and data sizes associated with digital forensic investigations. This work outlines the processes, challenges, trials ... -
An integrated tool-support for small team meetings in organisations.
(IJCA, 2012)Teams collaborate in different contexts within organisations to share information with its members in achieving their targets. Collaborations with face-to-face meetings are prevalent despite the emergence of numerous tools ... -
Are the financial transactions conducted inside virtual environments truly anonymous? An experimental research from an Australian perspective.
(Emerald, 2012)This paper examines the identity and payment method verification procedures implemented by a number of popular massively multiplayer online games (MMOGs) and online financial service providers (OFSPs) to determine if the ... -
Lessons towards developing an integrated tool-support for small team meetings.
(MECS Publisher, 2012)Teams within organisations meet regularly to review their progress and engage in collaborative activities within a team setting. However, the uptake of tools to support their activities within team meetings is limited. ... -
Digital Forensics Institute in Malaysia: The way forward
(Pario Communications Limited, 2012)This paper analyzes cybercrimes, cyber related crimes and problems encountered in Malaysia. Mitigation efforts are discussed such as digital forensics research and procedures including progress. Comparison is made with ... -
Digital forensics in the Cloud: Research perspectives. Paper presented at the ISC Secure Johannesburg Conference, November 15, 2012.
(2012)I am a researcher in forensic computing carrying out research aimed to develop a sound theoretical and scientific foundation for the discipline, based on principles broadly gained from software engineering. -
Voice Over IP and forensics: A review of recent Australian work. Paper presented at the 1st International Conference on Digital Forensics and Investigation (ICDFI), September 21-23, 2012, Beijing, China.
(2012)The popularity of Voice over the Internet Protocol (VoIP) for providing voice communication over IP networks such as the Internet has resulted in VoIP becoming a global telephony service. VoIP applications convert analogue ... -
Towards appropriate user interface design preserving rural African communication practices.
(IKTC, 2011)Poster presentation: The aim of this research project is to determine current communication structures and discourse practices of listeners in a selected rural community. -
An attempt to merge local and technological paradigms in the digital representation of indigenous knowledge.
(IKTC, 2011)Current technology trends and developments have hardly been informed by African indigenous and rural knowledge systems. Thus either substantial modifications are necessary in adapting technology to the requirements of ... -
A markup language for narrative knowledge annotation, mining and management.
(IKTC, 2011)Narrative knowledge as the name implies, is not naturally bound to any media other than speech. In order to preserve such knowledge and to make it accessible through computer systems: a formal and standardized basis needs ... -
VoIP system using open source software component in tertiary institutions: The case of the University of Namibia.
(Polytechnic of Namibia, Department of Communication., 2007)Governments and their agencies are often challenged by high cost and flexible telephonic, Web based data services. Emerging technologies, such as those of Voice over Internet Protocol (VoIP) that allow convergent systems ...