University of South Africa

Displaying 1-7 of 7 results

  • White Papers // Nov 2014

    Identifying User Behavior From Residual Data in Cloud-Based Synchronized Apps

    As the distinction between personal and organizational device usage continues to blur, the combination of applications that interact increases the need to investigate potential security issues. Although security and forensic researchers have been able to recover a variety of artifacts, empirical research has not examined a suite of application artifacts...

    Provided By University of South Africa

  • White Papers // Aug 2011

    Towards Cost-Sensitive Assessment of Intrusion Response Selection

    In recent years, cost-sensitive intrusion response has gained significant interest mainly due to its emphasis on the balance between potential damage incurred by the intrusion and cost of the response. However, one of the challenges in applying this approach is defining consistent and adaptable measurements of these cost factors on...

    Provided By University of South Africa

  • White Papers // Aug 2011

    Security of Cloud Computing: Seeing Through the Fog

    Cloud computing is a new computing paradigm for the provisioning, delivery and consumption of IT resources and services on the Internet. This computing paradigm comes with huge benefits such as cost savings, increased resilience and service availability, improved IT operations efficiency and flexibility. However, most research cites security concerns as...

    Provided By University of South Africa

  • White Papers // Dec 2010

    A Model for Teaching Distributed Computing in a Distance-Based Educational Environment

    Due to the prolific growth in connectivity, the development and implementation of distributed systems receives a lot of attention. Several technologies and languages exist for the development and implementation of such distributed systems; however, teaching students in these new technologies remains a challenge. Even though several models for teaching computer...

    Provided By University of South Africa

  • White Papers // Oct 2010

    Critical Success Factors for Information Systems Outsourcing Management: A Software Development Lifecycle View

    Information Systems (ISs) outsourcing is a serious commitment - a formal relationship underpinned by a contractual agreement, with long-term consequences among two or more organizations. Many organizations end up frustrated as they learn that their attempts at IS outsourcing have failed. However, some failures could be avoided with knowledge of...

    Provided By University of South Africa

  • White Papers // Jul 2010

    A Miniaturisation Technique for a 1.57542 GHz GPS Patch Antenna

    The primary goal of this paper was to cause resonance, 1.57542 GHz, of a microstrip patch antenna reduced in length by a factor of approximately 21 to 5 mm, thus making the antenna length independent of frequency. The results obtained from the physical test, Section V, were satisfactory in that...

    Provided By University of South Africa

  • White Papers // Jun 2010

    Effective Integration of SMS Communication Into a Distance Education Accounting Module

    The University of South Africa (Unisa), as a distance education institution, is continuously challenged to lessen the negative impact distance has on students' learning. The effective use of technologies affords distance education institutions with valuable opportunities to enhance teaching and support students' learning. Using online technologies in the context of...

    Provided By University of South Africa

  • White Papers // Jun 2010

    Effective Integration of SMS Communication Into a Distance Education Accounting Module

    The University of South Africa (Unisa), as a distance education institution, is continuously challenged to lessen the negative impact distance has on students' learning. The effective use of technologies affords distance education institutions with valuable opportunities to enhance teaching and support students' learning. Using online technologies in the context of...

    Provided By University of South Africa

  • White Papers // Aug 2011

    Towards Cost-Sensitive Assessment of Intrusion Response Selection

    In recent years, cost-sensitive intrusion response has gained significant interest mainly due to its emphasis on the balance between potential damage incurred by the intrusion and cost of the response. However, one of the challenges in applying this approach is defining consistent and adaptable measurements of these cost factors on...

    Provided By University of South Africa

  • White Papers // Jul 2010

    A Miniaturisation Technique for a 1.57542 GHz GPS Patch Antenna

    The primary goal of this paper was to cause resonance, 1.57542 GHz, of a microstrip patch antenna reduced in length by a factor of approximately 21 to 5 mm, thus making the antenna length independent of frequency. The results obtained from the physical test, Section V, were satisfactory in that...

    Provided By University of South Africa

  • White Papers // Aug 2011

    Security of Cloud Computing: Seeing Through the Fog

    Cloud computing is a new computing paradigm for the provisioning, delivery and consumption of IT resources and services on the Internet. This computing paradigm comes with huge benefits such as cost savings, increased resilience and service availability, improved IT operations efficiency and flexibility. However, most research cites security concerns as...

    Provided By University of South Africa

  • White Papers // Dec 2010

    A Model for Teaching Distributed Computing in a Distance-Based Educational Environment

    Due to the prolific growth in connectivity, the development and implementation of distributed systems receives a lot of attention. Several technologies and languages exist for the development and implementation of such distributed systems; however, teaching students in these new technologies remains a challenge. Even though several models for teaching computer...

    Provided By University of South Africa

  • White Papers // Oct 2010

    Critical Success Factors for Information Systems Outsourcing Management: A Software Development Lifecycle View

    Information Systems (ISs) outsourcing is a serious commitment - a formal relationship underpinned by a contractual agreement, with long-term consequences among two or more organizations. Many organizations end up frustrated as they learn that their attempts at IS outsourcing have failed. However, some failures could be avoided with knowledge of...

    Provided By University of South Africa

  • White Papers // Nov 2014

    Identifying User Behavior From Residual Data in Cloud-Based Synchronized Apps

    As the distinction between personal and organizational device usage continues to blur, the combination of applications that interact increases the need to investigate potential security issues. Although security and forensic researchers have been able to recover a variety of artifacts, empirical research has not examined a suite of application artifacts...

    Provided By University of South Africa