Cybersecurity through the lens of Digital Identity and Data Protection: Issues and Trends MJ Sule, M Zennaro, G Thomas Technology in Society 67 (101734), 2021 | 38 | 2021 |
Secure mobile device use in healthcare guidance from HIPAA and ISO17799 G Thomas, RA Botha Information Systems Management 24 (4), 333-342, 2007 | 23 | 2007 |
Diabetes Prediction Using Data Mining Techniques DB Bisandu, DD Datiri, E Onokpasa, G Thomas, MM Haruna, A Aliyu, ... International Journal of Research and Innovation in Applied Science -IJRIAS …, 2019 | 15 | 2019 |
Understanding the problem of coordination in a large scale distributed environment from a service lens view—Towards the South African public sector e-Administration criteria … G Thomas, RA Botha, D van Greunen Government Information Quarterly 32 (4), 526-538, 2015 | 10 | 2015 |
A service lens on cybersecurity continuity and management for organizations’ subsistence and growth G Thomas, MJ Sule Organizational Cybersecurity Journal: Practice, Process and People 3 (1), 18-40, 2023 | 7 | 2023 |
Virtual communities as a mechanism for sustainable coordination within the South African public sector G Thomas, RA Botha International Conference on E-Government and E-Services, 62-75, 2010 | 4 | 2010 |
A Prototype of An Automated Farm Monitoring System A Jegede, G Shanding, G Thomas, A Fadele, S Bala, Z Yunusa, ... | 2 | 2021 |
Characterizing an Information Technology centric mechanism to Support coordination in a large scale distributed environment GA Thomas International Journal of Innovative Science, Engineering & Technology, 2018 | 2 | 2018 |
A virtual-community-centric model for coordination in the South African public sector GDA Thomas Nelson Mandela Metropolitan University, 2014 | 2 | 2014 |
A framework for secure mobile computing in healthcare GDA Thomas Nelson Mandela Metropolitan University, 2007 | 2 | 2007 |
Phishing Website Detection using Multilayer Perceptron BO Emedolu, G Thomas, NY Gurumdimma International Journal of Research and Innovation in Applied Science 8 (7 …, 2023 | | 2023 |
Towards an awareness model to caution and mitigate privacy and security invasion on social networking sites D Du Plessis, G Thomas Proceeding of the 2020 international Conference on Information Technology …, 2020 | | 2020 |
A Texture-based Method for Detecting Impostor Attacks using Printed Photographs. AJ Jegede, GIO Aimufua, GA Thomas African Journal of Computing &ICT(Afr. J. Comp. & ICT) 13 (3), 14-41, 2020 | | 2020 |
Towards the Design And Implementation of A Legislature-Electoral Base Information Circulation System. D Sule, G Thomas, J Jegede, A., E Ikoojo, S. Journal of Computer Science 6 (1), 1-15, 2020 | | 2020 |
Development of A Help Desk Support System (A Case Study of the University of Jos) P Binde, G Thomas International Journal of Informatics, Technology & Computers 6 (1), 1-15, 2020 | | 2020 |
A Framework for the Adoption of Knowledge Management System (KMS) in University of Jos, Nigeria DB Bisandu, DD Datiri, E Onokpasa, AT Mammuam, GA Thomas, ... | | 2019 |
Using A Matrix Tutorial Program to Improve Students’ Performance in Elementary Mathematics. H Mangut, M., G Thomas, A Amula International Journal of Biology, Physics & Mathematics 3 (1), 1-6, 2019 | | 2019 |
Implementing A Crossword Puzzle Game in Hausa Language A Apake, G Thomas International Journal of Informatics, Technology & Computers 1 (2), 7-14, 2019 | | 2019 |
A Virtual-Community-Centric Architecture to Support Coordination in a Large Scale Distributed Environment: A Case Study of the South African Public Sector GA Thomas, RA Botha, D Greunen International Journal of Innovative Science, Engineering & Technology, 2018 | | 2018 |
Towards addressing the requirements for coordination in the distributed South African public sector from a virtual community-centric collaboration process lifecycle perspective G Thomas, RA Botha, D Van Greunen 2015 IST-Africa Conference, 1-11, 2015 | | 2015 |