Proceedings of 4th International Conference on the Internet, Cyber Security and Information Systems 2019

34 articles392 pagesPublished: October 25, 2019


Pages 1-12
Pages 13-19
Pages 20-31
Pages 32-42
Pages 43-56
Pages 57-71
Pages 72-84
Pages 85-94
Pages 95-104
Pages 105-111
Pages 112-122
Pages 123-131
Pages 132-142
Pages 143-156
Pages 157-168
Pages 169-179
Pages 180-201
Pages 202-212
Pages 213-226
Pages 227-240
Pages 241-249
Pages 250-260
Pages 261-271
Pages 272-280
Pages 281-289
Pages 290-299
Pages 300-309
Pages 310-319
Pages 320-330
Pages 331-341
Pages 342-356
Pages 357-371
Pages 372-381
Pages 382-392


4IR, adaptive learning, Adoption, advocacy, affordance, Africa, Artificial Intelligence2, attitudes, Awareness Behaviour, awareness campaigns, Big Data2, Blockchain, business capabilities, Business Intelligence, Business Strategy, Business Trust, climate change, Cloud based information systems, Cloud Computing4, Cloud Integration, Computer Science Education, concept drift, conceptual model, Connected Enterprise, Contingencies theory, cost analysis2, Cryptocurrency, cultural diversity, Cyber Security, Cyber security awareness2, Cyber Security Culture, Cybersecurity2, cybersecurity awareness, cyberspace, Cynefin Framework, Data Analytics, data integration, data privacy2, Data Quality, Data Warehouse, data-driven decision making, decision making, Decryption, Democratic Republic of Congo, diversity, e-commerce, e-health, e-health literacy, e-HRM, e-learning, eHealth, Electronic Health Records, Encryption, end users, Ensemble, Exam Timetabling, financial services, Forth Industrial Revolution (4IR), Gauteng Province, Genetic Algorithm, global warming, guidelines, Healthcare, higher education, Higher Education Institutions, HR, HRM, ICT, ICT4D, impact, Impact sourcing, Industrial Revolution, Industry 4.0, Information privacy culture, Information Security2, Information Systems, Innovation, institution-based trust, Intelligent Tutoring Systems, Internet of Things (IoT), Investment Industry, learning analytics, learning technologies, literature review, Loyalty, Margin, methodology, microwork, Mobile banking apps, mobile learning, north-south platform work, obese adults, Office 365 SharePoint Online, Ontology, perceived risk, Personal protection of personal information act, POPIA, Prescriptive Model, Privacy, Privacy Awareness, Privacy confidence, Privacy expectations, Public Health Sector, Recycling, research synthesis, Residue Number System, Satisfaction2, Search Algorithms, Security3, Security and Privacy, Security and Privacy., skills and training, small business, Smart Farming, Smart Universities, Smartphone, SMEs, social capital affinity, Social Cognitive Theory (SCT), Social disclosure, social media2, social media platforms, Social Networking Sites, Social Sector, South Africa, South African higher education, South African IT professional, stakeholder theory, Support Vector Machine, Sustainable Manufacturing, sustained monitoring, Technology, Technology-organization-environment Theory, Telemedicine, third-party logistics, Trust2, waste manage-ment, wearable devices2