Kevin A. Johnston

Learn More
South African Universities are tasked with increasing student throughput by offering additional academic support. A second task is to teach students to challenge and question. One way of attempting to achieve these tasks is by using Information and Communication Technology (ICT). The focus of this paper is to examine the effect of using an ICT tool to both(More)
The main objective of the study was to evaluate the efficacy of personality characteristics as identifiers of potential ICT entrepreneurship. The personality characteristics of the participants were measured on the Keirsey Temperament Sorter, a proven research instrument. Two entrepreneurial tests were used to determine entrepreneurial ability. The(More)
The purpose of this paper is to provide an explanation towards achievement of relevance in the field of Information Systems (IS) by pointing out the critical role of value creation amongst the various stakeholder groups. The research approach was positivistic in its orientation. A survey of IS Lecturers, IS under graduate and postgraduate students and IS(More)
Insider threat is an information security problem. It specifically refers to the users of an information system exploiting their legitimate access rights to that system, in order to perform malicious acts. The purpose of this paper is to describe the body of knowledge of insider threat research through a descriptive literature review. The scope of the(More)
Free and Open Source Software (FOSS) is becoming an increasingly important element in strategies for development and implementation of information and communication technologies (ICT) in low-income countries (LICs). Such initiatives often have strong public sector orientation, as government ICT policies are expected to shape and support further(More)