


default search action
South African Computer Journal, Volume 37
Volume 37, 2006
- Patricia M. Alexander, Jackie Phahlamohlaka:

Amartya Sen's Capability Approach applied to Information Systems research. 1-11 - Wesley Brandi, Martin S. Olivier:

Exposing anonymous network participants via an external attack. 12-18 - Elaine Byrne:

Using action research in information systems design to address change : a South African Health Information Systems case study. 19-29 - Loek G. Cleophas, Bruce W. Watson, Derrick G. Kourie, Andrew Boake, Sergei A. Obiedkov:

TABASCO: using concept-based taxonomies in domain engineering. 30-40 - Roger Elliott, David A. Sewry:

The influence of organisational factors in small tourism businesses on the success of Internet marketing. 41-50 - Leonard Hagger, Ian D. Sanders:

A greedy heuristic for Axial Line Placement in collections of convex polygons. 51-60 - Katherine M. Malan, Gary Marsden:

Extending dynamic queries to handle uncertain data. 61-74 - G. R. K. Sharma, H. P. S. Arya:

Availability and utility of Internet sources of information: farmers' perceptions. 75-80 - Sasa Subotic, Judith Bishop, Stefan Gruner:

Aspect-Oriented Programming for a distributed framework. 81-89 - Colin Tredoux, David Nunez, Oliver F. Oxtoby, Bhavesh Prag:

An evaluation of ID: an eigenface based construction system. 90-97 - Anita Vorster, Les Labuschagne:

A new comparison framework for information security risk analysis methodologies. 98-106

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














