Now showing items 1-6 of 6

    • A bridge over the computer science graduate skill gap 

      Blignaut, Renette; Venter, Isabella M.; Renaud, Karen (2013)
      Universities are increasingly required to respond to the ever evolving needs of an ever more sophisticated and globalised workplace, which requires well-rounded workers with more than mere technical knowledge. Employers ...
    • Cyber security education is as essential as “the three R's” 

      Venter, Isabella M.; Blignaut, Renette J.; Renaud, Karen; Venter, Anja (CELLPRESS, 2019)
      Smartphones have diffused rapidly across South African society and constitute the most dominant information and communication technologies in everyday use. That being so, it is important to ensure that all South Africans know ...
    • Designing mobile phone interfaces for age diversity in South Africa: “One-World” versus diverse “Islands” 

      Renaud, Karen; Blignaut, Renette; Venter, Isabella M. (Springer, 2013)
      Designing for diversity is a laudable aim. How to achieve this, in the context of mobile phone usage by South African seniors, is a moot point. We considered this question from two possible perspectives: universal ...
    • Granny gets smarter but junior hardly notices 

      Blignaut, Renette; Venter, Isabella Margarethe; Renaud, Karen (College of Communication and Information, 2016)
      To ensure that university computing students are sensitized to the needs of diverse user groups, a course project was designed to allow students to get a realistic understanding of the needs and abilities of the older ...
    • A quantification mechanism for assessing adherence to information security governance guidelines 

      Bongiovanni, Ivano; Renaud, Karen; Brydon, Humphrey (Emerald, 2022)
      Boards of Directors and other organisational leaders make decisions about the information security governance systems to implement in their companies. The increasing number of cyber-breaches targeting businesses makes ...
    • Smartphone owners need security advice. How can we ensure they get it? 

      Renaud, Karen; Blignaut, Renette; Venter, Isabella (CONF-IRM and AIS Electronic Library (AISeL), 2016)
      Computer users often behave insecurely, and do not take the precautions they ought to. One reads almost daily about people not protecting their devices, not making backups and falling for phishing messages. This impacts ...