About
191
Publications
53,986
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,376
Citations
Current institution
Additional affiliations
January 2010 - June 2016
Publications
Publications (191)
Integrating Industry 4.0 technology into IT education is critical for training students to address the challenges of the digital age. This integration has innovative potential, highlighting both the opportunities and challenges of aligning curricula with evolving requirements through technologies such as artificial intelligence (AI), robotics, the...
Background/purpose. The integration of artificial intelligence (AI) in
education has the potential to address inequalities and enhance
teaching and learning outcomes. However, challenges such as AI biases,
limited teacher literacy, and resource constraints hinder equitable
implementation, especially in contexts like South Africa. This study
investi...
Organizations today depend increasingly on the effective adoption of Information and Communication Technology (ICT) to ensure sustainable growth in a competitive global landscape. However, research on the internal factors influencing successful ICT adoption, especially through case studies, remains limited. This study seeks to address this gap by e...
Adverse climate-related vulnerability and impact severity are heightening across the globe but are eviler in developing countries where adaptation and mitigation strategies have the widest climate data-driven technological gap. In SADC, ignoring the primacy of climate data-driven approach contributes to heightened climate change vulnerability and i...
Hackathons in education are increasingly recognized for their immersive learning experiences, emphasizing problem-solving and diverse innovation. Despite their acknowledged role in curricular innovation, there remains a gap in understanding their impact on student learning outcomes. This study employs the PRISMA methodology to evaluate the impact o...
The prevalence of digital technologies in education has fundamentally reshaped the learning landscape. Despite acknowledging their positive impact, limited studies exist in understanding the factors influencing students' engagement and its effect on teaching and learning outcomes. To address this gap, the study evaluates students' willingness to us...
Hackathons have gained popularity recently as a platform for fostering innovation and collaboration, providing hands-on learning experiences for students to design, prototype, and solve real-world problems. While studies have explored hackathon adoption in education, there is a scarcity of chronological reviews on this subject. This article address...
Technology Readiness is the approach for checking people’s responsiveness or attitude towards the use of new technologies, therefore it is imperative to measure people’s readiness towards technology before they can accept or adopt the new technologies and even see their intention to use technology. There have been so many models that are in literat...
This research paper contributes to the existing literature by critically and comprehensively reviewing nine of the most influential and popular theories and models that have been widely applied in foretelling and understanding the behaviour towards adoption of new technology at the personalized or individual level. The idea that the failure or succ...
E-Government has been identified as a tool to allow greater public access to information, and make government more accountable to citizens. E-Government concept has been in existence for some times, and research on the diffusion of e-Government has been limited to the industry but not much in the organs of government in South Africa. This paper end...
Smart city readiness entails the adoption of technological innovation, information and communication technologies by the role players to disseminate information to the citizenry to improve performance, quality of services and welfare maximization. This is why it's important to determine people's readiness for technology before they can accept or ad...
Augmented Reality (AR) and Virtual Reality (VR) have emerged as useful tools to enhance learner and instructor performance in the learning process. E-learning researchers have mentioned that these technologies motivate students and make learning enjoyable. Despite the pronounced benefits of AR and VR in schools, the adoption of these tools in the e...
There is no doubt that innovative technologies have evolved tremendously in the past few decades, notably, in the computing discipline. Organizations adopt technology innovations to create competitive advantage as well as to sustain their competitive position. There is consensus that technology has significant effects on the productivity of organiz...
This study aimed to develop a comprehensive e-learning system success model from a developing country perspective. The integrated lens of DeLone & McLean-Information System Success Model, the Model for Measuring E-learning System Success, and the Social Cognitive Theory was used to develop a research model. Twelve hypotheses were developed and test...
A thorough investigation of social engineering attacks was performed on the lab environment. Numerous users can be easily attacked through the use of illegitimate emails that may come from trusted users. Organizations often try to implement security measures but they remain susceptible to these attacks. The purpose of this study was to show that un...
Education-related hackathons provide a dynamic and participatory method of teaching where students take an active role and become inventors and problem solvers. It encourages teamwork, critical thinking, and the use of technology, preparing students for the demands of the workforce of the twenty-first century. Although it has played a significant r...
The integration of e-learning in teaching and learning has become increasingly prevalent in modern education as technological advancements have revolutionized traditional educational methods and enhanced students' educational experiences. Amidst this advancement, it is important to know how well this e-learning technologies engage learners in teach...
Hackathons are growing more virtual, especially after the COVID-19 epidemic started since they attract many participants at once from different places and time zones. This study intends to identify factors that influence students’ satisfaction with online hackathon for IT projects. The study used quantitative methodology and proposed a model. The m...
The study used two case studies over a period of 12 months to develop and implement a constructivist approach for using lecture podcasts to enhance student learning in a hybrid learning environment. Two groups of undergraduate students enrolled at the Tshwane University of Technology participated in the study. The university’s Learning Management S...
With the increase in the adoption rate of machine learning algorithms in multiple sectors, the need for accurate measurement and assessment is imperative, especially when classifiers are applied to real world applications. Determining which are the most appropriate evaluation metrics to effectively assess and evaluate the performance of a binary, m...
There is a growing rate of online content creation and therefore new and exciting ways to filter data and still deliver relevant information to the user is important for user experience. Intelligent computing systems and dynamic methodologies are required to efficiently access this vast information and knowledge. Merging new and often conflicting i...
Technology Readiness (TR) is a method for checking people’s interest or readiness to use innovative technologies. This is why it’s imperative to determine people’s readiness for technology before they can accept or adopt them and also observe their intention to use them. The study investigated the readiness for asset tracking systems in public scho...
The study investigated the extent to which e-learning quality, self-efficacy and e-learning satisfaction influenced the students’ intention to use/use the e-learning system amid the Covid-19 pandemic and level five locdown restrictions. A total of 857 students took part in the study. A response rate of 63.36% was achieved. A positivist research phi...
Researchers from different fields of study applied numerous theories to study and understand users’ online information privacy concerns, behaviours, attitudes, preferences, as well as the outcomes of their behaviours on the website. Up to date, there are only a few studies that reviewed and integrated theories in the literature to produce an integr...
Hackathons are time-limited events where teams of people come together to create intriguing projects. These experiences have been used in a variety of fields to develop solutions, encourage learning, and address societal problems. However, most academic Hackathon studies either concentrate on the planning of single events or on systematic reviews o...
The telecoms industry has been exposed to increased churn rates compared to other industries. Over the years, there has been a significant drive to construct systems that will identify customers that exhibit the potential to churn. Churn prediction systems utilize various algorithms that are applied to customer datasets to determine customers that...
Hackathons are said to promote a variety of innovative ideas and can be traced back to the idea of problem-solving. There is little research on the use of hackathons in classes to meet course-level learning objectives, despite the emphasis given to its advantages in other human efforts. By conducting a systematic literature review (SLR), this study...
Hackathon as a social event has been identified as a method that assists participants collaborate and solve technical design challenges in a limited time. With the numerous hackathon potentials, its significance in computer and IT programming courses have not been fully explored for teaching and learning. The hackathon concept has been in existence...
The social network and the social context are two vital elements in social recommender systems. Social recommender systems are an important part of everyday life, on social media. New approaches also need to be adopted to be able to deal with the different needs of social media users. A total of twenty papers were reviewed from the years 2015–2021....
Recommender systems are widely used to help in reducing information overload through suggesting relevance items to users proactively or reactively. The usefulness of RS has made them to be used in different sectors such as e-commerce, retail environment and even in education sector. RS is penetrating different sectors with different speed and its a...
In the history of humanity, we have never faced an invisible enemy like the COVID-19 pandemic. The medical field has never been overwhelmed so much. Scientists and engineers are working around the clock to develop a suitable vaccine for COVID-19. In order to fight this pandemic technology will need to be utilized to its full potential. A fourth ind...
Previous studies in online information disclosure and privacy have focused on gender, age and cultural differences, however, a consensus on the role of these three factors in online information disclosure and privacy was not met. Therefore, it is necessary to find out the role of gender, age and cultural differences in online information disclosure...
There are many advantages that Smart home technology can bring to the modernized household nonetheless, smart home technology is yet in early turn of events and has toiled to take up among consumers. The study’s aim is to look into the readiness of IOT Smart Home technology among consumers in Gauteng South Africa. This paper looks at the relationsh...
The use of mobile technology has continued to rise in Zimbabwe, and farmers now can obtain agricultural information through the use of mobile technology. The potential of mobile phones in agriculture gave birth to mAgriculture, which is the use of mobile technology to provide agricultural information and services. Various technological start-up com...
The year 2020 was unprecedented as the whole world went into lockdown due to the pandemic of Covid-19 resulting in loss of education. The main objective of this systematic literature review is to observe the trend within technology acceptance and adoption. Through systematic search by the use of PRISMA, the review has identified 14 relevant studies...
The impacts of information systems (IS) are often indirect and influenced by human, organizational, and environmental factors, therefore measurement of information systems (IS) success is both complex and elusive. Researchers have created models for success emphasizing the need for better and more consistent success metrics. This study endeavoured...
This paper presents a review of e-learning system success models published between 1992 & 2019. Prominent models that focused on e-learning systems success, information systems success, e-learning system quality and user satisfaction from mainly open online journal articles, conferences and book chapters were identified and critiqued. The multidime...
Cloud computing can assist in overcoming the present boundaries in mobile learning (m-learning) with regard to the limited processing and storage capabilities of the mobile devices. This way, learning applications can run on students’ mobile devices while the heaviest computing tasks take place in the cloud. For this to happen leaners have to accep...
The purpose of the study was to determine the selected factors that affect ICT in Gauteng public schools. This study used quantitative approach in which inferential statistical techniques were utilized to answer the research objective. A survey instrument was used to address the research. This study allowed for the determination of associated facto...
Mobile device growth is rapid, and it has a significant impact on our private and professional lives. All mobile users want to be guaranteed that their data is safe, which is why biometrics exists for mobile devices. Countless surveys have been performed on the adoption of biometric verification techniques, however, only a limited number of these s...
Electronic health technology applications are important tools that are utilized to provide health care services. These applications allow healthcare professionals and patients to share, manage and have control over their health information electronically whilst maintaining social distancing. Under hard conditions brought by the coronavirus 2019 dis...
This study aims at building a Support Vector Machine model based on Principal Component Analysis to forecast the direction of economic growth. Evaluation of the generated model is based on multiple economic indicators that have direct influence on economic performance. The performance of the improved SVM is compared with the SVM and regression anal...
Maturity models enable evaluation of the business process management maturity in organizations and assist to benchmark by revealing the opportunities to improve business processes. A very large number of academics have researched the maturity models but there is a need to correlate the challenges and open issues. The maturity models have challenges...
Agile architecture frameworks are flexible, adaptable to change and allows for a faster delivery of projects; these make them very important in delivery of projects. Agile Architecture frameworks are therefore of great advantage when implemented in Information and Communication Technology (ICT) environments as technology is ever changing and evolvi...
The field of view (FOV) and spatial resolution (SR) are the major image quality parameters which are being optimized in neutron radiography (NR) technique. This requires effective components selection during the design of NR detector systems. The selection is a discouraging task owing to often having conflicting experimental requirements and relate...
The development of mobile devices is quick and changes our daily personal and business lives. Every mobile user wants to be sure about individual data security, and for this reason, biometrics come into existence for mobile devices. Many studies were conducted on the acceptance of biometric authentication technology, but only a few of these studies...
Recommendation systems (RS) are software tools and methods designed to give recommendations to support customers in different decisions in terms of what items to buy, music to listen to, news to read, and so forth. Most recommender systems recommend items in terms of individual user likings and group recommender systems recommend items taking into...
E-readiness is considered as one of the critical characteristics for accomplishing successful implementation of e-learning in higher education. Without e-learning readiness, the benefits of e-learning such as time saving, flexible education delivery and training from anywhere at any time will not be reaped. The probability of failure in the adoptio...
There are many benefits that smart home technology can bring to the modern household however, smart home tech-nology is yet in early development and has struggled to adopt among consumers. Some of the challenges that smart home technology faces are privacy & security, trust, reliabil-ity & pricing. However, many literature has dealt with the gap be...
Too many options on internet are the reason for information overload problem to obtain relevant information. Recommender system is a technique that filters information from large sets of data and recommends the most relevant ones based on people’s preference. Collaborative and content-based techniques are the core techniques used to implement recom...
Agile methodology has become the most used software development methodology in different software communities. Besides the extensive benefits that agile methods offer, it also possesses several critical issues. Most studies have reported that when comparing structured methodologies with agile methodologies, agile does improve software quality, othe...
Recommendation systems recommender systems are a subcategory of information filtering that is utilized to determine the preferences of users towards certain items. These systems emerged in the 1990’s and they have since changed the intelligence of both the web and humans. Vast amounts of research papers have been published in various domains. Recom...
Economic growth may be determined based on different economic parameters. The main purpose of this research work is to predict economic growth based on several economic indicators. In this study, an enhanced Multi-layer Perceptron (MLP) model is built and the prediction performances are evaluated and compared with existing models. Using the Princip...
It has been evident that innovative technologies have evolved in the past few decades, notably, in the computing discipline. As a result, technology adoption models and theories are deemed vital to business organizations to assess if end users are ready and accept new technologies. Therefore, requirements to review prevailing technology adoption mo...
Exploit kits are malicious toolkits or platforms that are used to exploit security vulnerabilities in software or systems to perform various malicious actions such as stealing data and spreading malware. Exploit kits contain various payloads or malicious code that are used to detect vulnerabilities, target users and computers. Exploit kits use soci...
Technology adoption has been researched extensively in the literature. New or modified models are emerging with different variables but not much re-search has been done to find out the variable that has been consistent in most model and which ones has been added to modify models. Eighty papers published in seventy-three journals and seven conferenc...
Agriculture is the primary occupation of the majority of Zimbabweans living in rural areas which constitutes of about 70% of Zimbabwe’s population. In the present times of technological development, mobile technology particularly mobile phones have become the most important tools of communication which can be accessed by farmers for agricultural re...
─ In recent times, the rate at which research papers are being processed and shared all over the internet has tremendously increased leading to information overload. Tools such as academic search engines and recommender systems have lately been adopted to help the overwhelmed researchers make right decisions regarding using, downloading and managin...
In this chapter, the authors give an overview of the main data mining techniques that are utilized in the context of research paper recommender systems. These techniques refer to mathematical models and tools that are utilized in discovering patterns in data. Data mining is a term used to describe a collection of techniques that infer recommendatio...
Research-related publications and articles have flooded the internet, and researchers are in the quest of getting better tools and technologies to improve the recommendation of relevant research papers. Ever since the introduction of research paper recommender systems, more than 400 research paper recommendation related articles have been so far pu...