ICICIS 2019: Keyword Index

KeywordPapers
4
4IRWebsite Information Security and Privacy Concerns in 4IR: The Moderating Role of Trust in B2C e-Commerce
a
adaptive learningA Conceptual Model for Institutional Adoption of Learning Technologies in Higher Education
AdoptionModeling the adoption of cloud computing to assess South African SMEs: An integrated perspective
advocacyThe potential use of Social Media for Healthcare Advocacy in the Democratic Republic of Congo
affordanceArtificial Intelligence Affordances for Business Innovation: A Systematic Review of Literature
AfricaAttitudes of Belgian Companies towards Outsourcing Microwork to Africa
Artificial IntelligenceArtificial Intelligence Affordances for Business Innovation: A Systematic Review of Literature
Cost Implications for a Discrete Mathematics Intelligent Tutoring System
attitudesDeterminants of attitudes towards social networking advertising: The role of habit, perceived ease of use and social media capital affinity
Awareness BehaviourThe Awareness Behaviour of Students on Cyber Security Awareness by Using Social Media Platforms: A Case Study at Central University of Technology
awareness campaignsOffice 365 SharePoint Online: Establishing Content Security Awareness with End-Users using Campaigns
b
Big DataCloud Integration for eHealth Data
Big data for small businesses: Abstracting security and decision-making tools
BlockchainBlockchain Technology and Smart Universities
business capabilitiesUnderstanding Business Strategy Factors that Support or Impede Moving Business Capabilities to a Cloud Environment in the Investment Services Industry
Business IntelligenceAdoption of Business Intelligence in the South African public social sector Department
Business StrategyUnderstanding Business Strategy Factors that Support or Impede Moving Business Capabilities to a Cloud Environment in the Investment Services Industry
Business TrustBlockchain Technology and Smart Universities
c
climate changeUnderstanding the role of ICT in South African Sustainable Manufacturing Practice
Cloud based information systemsOffice 365 SharePoint Online: Establishing Content Security Awareness with End-Users using Campaigns
Cloud ComputingModeling the adoption of cloud computing to assess South African SMEs: An integrated perspective
Understanding Business Strategy Factors that Support or Impede Moving Business Capabilities to a Cloud Environment in the Investment Services Industry
Cloud Integration for eHealth Data
Strategic Cloud Computing Framework: South African Context
Cloud IntegrationCloud Integration for eHealth Data
Computer Science EducationCost Implications for a Discrete Mathematics Intelligent Tutoring System
concept driftThe impact of ensemble diversity on learning big data in dynamic environments
conceptual modelModeling the adoption of cloud computing to assess South African SMEs: An integrated perspective
Connected EnterpriseIndustry 4.0 Businesses Environments: Fostering Cyber Security Culture in a Culturally Diverse workplace
Contingencies theoryStrategic Cloud Computing Framework: South African Context
cost analysisCost Implications for an In-House University Timetabling System
Cost Implications for a Discrete Mathematics Intelligent Tutoring System
CryptocurrencyBlockchain Technology and Smart Universities
cultural diversityIndustry 4.0 Businesses Environments: Fostering Cyber Security Culture in a Culturally Diverse workplace
Cyber SecurityChallenges in Information and Cybersecurity program offering at Higher Education Institutions
Cyber security awarenessIndustry 4.0 Businesses Environments: Fostering Cyber Security Culture in a Culturally Diverse workplace
The Awareness Behaviour of Students on Cyber Security Awareness by Using Social Media Platforms: A Case Study at Central University of Technology
Cyber Security CultureIndustry 4.0 Businesses Environments: Fostering Cyber Security Culture in a Culturally Diverse workplace
CybersecurityIoT Security and Privacy: Turning on the Human Firewall in Smart Farming
An Ontology Based Model for Cyber Security Awareness Education
cybersecurity awarenessAn Ontology Based Model for Cyber Security Awareness Education
cyberspaceA Novel Text Encryption and Decryption Scheme using the Genetic Algorithm and Residual Numbers
Cynefin FrameworkA Data-Driven Decision-Making Model for the Third-Party Logistics (3PL) Industry
d
Data AnalyticsA Data-Driven Decision-Making Model for the Third-Party Logistics (3PL) Industry
data integrationCloud Integration for eHealth Data
data privacyPrivacy in wearable health devices: How does POPIA measure up?
Privacy Concerns of Overweight Adults to use Wearable Devices for Sustained Health Monitoring
Data QualityCloud Integration for eHealth Data
Data WarehouseAdoption of Business Intelligence in the South African public social sector Department
data-driven decision makingA Data-Driven Decision-Making Model for the Third-Party Logistics (3PL) Industry
decision makingBig data for small businesses: Abstracting security and decision-making tools
DecryptionA Novel Text Encryption and Decryption Scheme using the Genetic Algorithm and Residual Numbers
Democratic Republic of CongoThe potential use of Social Media for Healthcare Advocacy in the Democratic Republic of Congo
diversityThe impact of ensemble diversity on learning big data in dynamic environments
e
e-commerceWebsite Information Security and Privacy Concerns in 4IR: The Moderating Role of Trust in B2C e-Commerce
e-healthAn Investigation of the Level of E-health Literacy in South Africa
e-health literacyAn Investigation of the Level of E-health Literacy in South Africa
e-HRME-HRM: A Proposed theory based on the Social Cognitive Theory(SCT)
e-learningA Conceptual Model for Institutional Adoption of Learning Technologies in Higher Education
eHealthCloud Integration for eHealth Data
Electronic Health RecordsCloud Integration for eHealth Data
EncryptionA Novel Text Encryption and Decryption Scheme using the Genetic Algorithm and Residual Numbers
end usersOffice 365 SharePoint Online: Establishing Content Security Awareness with End-Users using Campaigns
EnsembleThe impact of ensemble diversity on learning big data in dynamic environments
Exam TimetablingCost Implications for an In-House University Timetabling System
f
financial servicesUnderstanding Business Strategy Factors that Support or Impede Moving Business Capabilities to a Cloud Environment in the Investment Services Industry
Forth Industrial Revolution (4IR)Industry 4.0 Businesses Environments: Fostering Cyber Security Culture in a Culturally Diverse workplace
g
Gauteng ProvinceAn exploratory study on Telemedicine in the South African Public Health Sector: A case of Gauteng Province
Genetic AlgorithmA Novel Text Encryption and Decryption Scheme using the Genetic Algorithm and Residual Numbers
global warmingUnderstanding the role of ICT in South African Sustainable Manufacturing Practice
guidelinesA Synthesis of Literature Review Guidelines from Information Systems Journals
h
HealthcareThe potential use of Social Media for Healthcare Advocacy in the Democratic Republic of Congo
higher educationA Conceptual Model for Institutional Adoption of Learning Technologies in Higher Education
Higher Education InstitutionsChallenges in Information and Cybersecurity program offering at Higher Education Institutions
HRE-HRM: A Proposed theory based on the Social Cognitive Theory(SCT)
HRME-HRM: A Proposed theory based on the Social Cognitive Theory(SCT)
i
ICTUnderstanding the role of ICT in South African Sustainable Manufacturing Practice
ICT4DAttitudes of Belgian Companies towards Outsourcing Microwork to Africa
impactImpacts and Satisfaction of Using Smartphones for Learning in a University Context
Impact sourcingAttitudes of Belgian Companies towards Outsourcing Microwork to Africa
Industrial RevolutionBlockchain Technology and Smart Universities
Industry 4.0Industry 4.0 Businesses Environments: Fostering Cyber Security Culture in a Culturally Diverse workplace
Information privacy cultureA conceptual framework for a student personal information privacy culture at universities in Zimbabwe
Information SecurityChallenges in Information and Cybersecurity program offering at Higher Education Institutions
Office 365 SharePoint Online: Establishing Content Security Awareness with End-Users using Campaigns
Information SystemsA Synthesis of Literature Review Guidelines from Information Systems Journals
InnovationArtificial Intelligence Affordances for Business Innovation: A Systematic Review of Literature
institution-based trustDimensions of perceived risk of mobile banking apps: An empirical investigation of South African retail banking customers.
Intelligent Tutoring SystemsCost Implications for a Discrete Mathematics Intelligent Tutoring System
Internet of Things (IoT)IoT Security and Privacy: Turning on the Human Firewall in Smart Farming
Investment IndustryUnderstanding Business Strategy Factors that Support or Impede Moving Business Capabilities to a Cloud Environment in the Investment Services Industry
l
learning analyticsA Conceptual Model for Institutional Adoption of Learning Technologies in Higher Education
learning technologiesA Conceptual Model for Institutional Adoption of Learning Technologies in Higher Education
literature reviewA Synthesis of Literature Review Guidelines from Information Systems Journals
LoyaltyWebsite Information Security and Privacy Concerns in 4IR: The Moderating Role of Trust in B2C e-Commerce
m
MarginThe impact of ensemble diversity on learning big data in dynamic environments
methodologyA Synthesis of Literature Review Guidelines from Information Systems Journals
microworkAttitudes of Belgian Companies towards Outsourcing Microwork to Africa
Mobile banking appsDimensions of perceived risk of mobile banking apps: An empirical investigation of South African retail banking customers.
mobile learningImpacts and Satisfaction of Using Smartphones for Learning in a University Context
n
north-south platform workAttitudes of Belgian Companies towards Outsourcing Microwork to Africa
o
obese adultsPrivacy Concerns of Overweight Adults to use Wearable Devices for Sustained Health Monitoring
Office 365 SharePoint OnlineOffice 365 SharePoint Online: Establishing Content Security Awareness with End-Users using Campaigns
OntologyAn Ontology Based Model for Cyber Security Awareness Education
p
perceived riskDimensions of perceived risk of mobile banking apps: An empirical investigation of South African retail banking customers.
Personal protection of personal information actPrivacy in wearable health devices: How does POPIA measure up?
POPIAPrivacy in wearable health devices: How does POPIA measure up?
Prescriptive ModelA Data-Driven Decision-Making Model for the Third-Party Logistics (3PL) Industry
PrivacyWebsite Information Security and Privacy Concerns in 4IR: The Moderating Role of Trust in B2C e-Commerce
Privacy AwarenessA conceptual framework for a student personal information privacy culture at universities in Zimbabwe
Privacy confidenceA conceptual framework for a student personal information privacy culture at universities in Zimbabwe
Privacy expectationsA conceptual framework for a student personal information privacy culture at universities in Zimbabwe
Public Health SectorAn exploratory study on Telemedicine in the South African Public Health Sector: A case of Gauteng Province
r
RecyclingUnderstanding the role of ICT in South African Sustainable Manufacturing Practice
research synthesisA Synthesis of Literature Review Guidelines from Information Systems Journals
Residue Number SystemA Novel Text Encryption and Decryption Scheme using the Genetic Algorithm and Residual Numbers
s
SatisfactionWebsite Information Security and Privacy Concerns in 4IR: The Moderating Role of Trust in B2C e-Commerce
Impacts and Satisfaction of Using Smartphones for Learning in a University Context
Search AlgorithmsCost Implications for an In-House University Timetabling System
SecurityA Novel Text Encryption and Decryption Scheme using the Genetic Algorithm and Residual Numbers
Website Information Security and Privacy Concerns in 4IR: The Moderating Role of Trust in B2C e-Commerce
Big data for small businesses: Abstracting security and decision-making tools
Security and PrivacyIndustry 4.0 Businesses Environments: Fostering Cyber Security Culture in a Culturally Diverse workplace
Security and Privacy.IoT Security and Privacy: Turning on the Human Firewall in Smart Farming
skills and trainingChallenges in Information and Cybersecurity program offering at Higher Education Institutions
small businessBig data for small businesses: Abstracting security and decision-making tools
Smart FarmingIoT Security and Privacy: Turning on the Human Firewall in Smart Farming
Smart UniversitiesBlockchain Technology and Smart Universities
SmartphoneImpacts and Satisfaction of Using Smartphones for Learning in a University Context
SMEsModeling the adoption of cloud computing to assess South African SMEs: An integrated perspective
social capital affinityDeterminants of attitudes towards social networking advertising: The role of habit, perceived ease of use and social media capital affinity
Social Cognitive Theory (SCT)E-HRM: A Proposed theory based on the Social Cognitive Theory(SCT)
Social disclosurePrivacy in wearable health devices: How does POPIA measure up?
social mediaThe potential use of Social Media for Healthcare Advocacy in the Democratic Republic of Congo
Determinants of attitudes towards social networking advertising: The role of habit, perceived ease of use and social media capital affinity
social media platformsThe Awareness Behaviour of Students on Cyber Security Awareness by Using Social Media Platforms: A Case Study at Central University of Technology
Social Networking SitesDeterminants of attitudes towards social networking advertising: The role of habit, perceived ease of use and social media capital affinity
Social SectorAdoption of Business Intelligence in the South African public social sector Department
South AfricaAn Investigation of the Level of E-health Literacy in South Africa
South African higher educationImpacts and Satisfaction of Using Smartphones for Learning in a University Context
South African IT professionalStrategic Cloud Computing Framework: South African Context
stakeholder theoryStrategic Cloud Computing Framework: South African Context
Support Vector MachineThe impact of ensemble diversity on learning big data in dynamic environments
Sustainable ManufacturingUnderstanding the role of ICT in South African Sustainable Manufacturing Practice
sustained monitoringPrivacy Concerns of Overweight Adults to use Wearable Devices for Sustained Health Monitoring
t
TechnologyUnderstanding the role of ICT in South African Sustainable Manufacturing Practice
Technology-organization-environment TheoryStrategic Cloud Computing Framework: South African Context
TelemedicineAn exploratory study on Telemedicine in the South African Public Health Sector: A case of Gauteng Province
third-party logisticsA Data-Driven Decision-Making Model for the Third-Party Logistics (3PL) Industry
TrustModeling the adoption of cloud computing to assess South African SMEs: An integrated perspective
Website Information Security and Privacy Concerns in 4IR: The Moderating Role of Trust in B2C e-Commerce
w
waste manage-mentUnderstanding the role of ICT in South African Sustainable Manufacturing Practice
wearable devicesPrivacy in wearable health devices: How does POPIA measure up?
Privacy Concerns of Overweight Adults to use Wearable Devices for Sustained Health Monitoring