Computer Science
Mobile Application
100%
Intrusion Detection and Prevention
90%
Intrusion Prevention Systems
90%
Intrusion Detection System
90%
Mobile Technology
90%
Human Computer Interaction
90%
Engineering Program
90%
Successful Implementation
90%
Security Systems
83%
Education Institution
75%
Information and Communication Technologies
69%
Mobile Device
60%
Mobile User Experience
45%
Communication Network
45%
Engineering Education
45%
Negative Attitude
45%
Assessment Tool
45%
Wireless Technologies
45%
mobile service
45%
Service Delivery
45%
Government Service
45%
Least Squares Method
45%
Primary Objective
45%
Android
45%
Technology User
45%
Explanatory Power
45%
Learning Management System
45%
Bring Your Own Device
45%
Security Solution
37%
Personal Data
24%
Security Vulnerability
24%
Activity Limitation
22%
Visual Impairment
22%
Cloud Computing
15%
Qualitative Data
15%
Case Study
15%
Identified Risk
15%
Decision Maker
15%
Malware
15%
Network Connection
15%
Cybersecurity Framework
15%
Election Process
11%
Information Technology
11%
Workplace Culture
11%
Malicious Threat
9%
Democratic Election
9%
Mobile Banking
9%
Financial Data
9%
Security Challenge
9%
Keyphrases
Estonia
45%
M-Government
45%
Technology for Development
45%
Information Communication Technology
45%
Engineering Education
45%
ICT4D
45%
ICT Roles
45%
Electronic Voting
45%
Mobile Application
45%
Mobile Phone Voting
45%
Mobile Technology
45%
Human-computer Interaction
45%
Emerging ICT
45%
Cloud Intrusion Detection System
45%
Mobile Communication Network
45%
Mobile Government
45%
M-voting
45%
Visually Impaired Learners
45%
IT Education
45%
Namibia
45%
Mobile User Experience
45%
South Africa
45%
Higher Education Learning
45%
Bring Your Own Device Policy
22%
IT Specialists
22%
Device Implementation
22%
Technology Characteristics
18%
Task Characteristics
18%
Engineering Courses
17%
ICT Acceptance
16%
Voter Education
16%
Extensity
16%
Successful Implementation
15%
IT Course
15%
Higher Education Institutions
11%
Perception of Disability
11%
Participation Restriction
11%
Mobile Voting
11%
Electoral Boundaries
11%
ICT Tools
11%
Free State Province
11%
IT Adoption
10%
Technology Self-efficacy
9%
Utilizing ICT
9%
Voting Process
9%
Malicious Threats
9%
Voting Security
9%
Suricata
9%
Snort
9%
Mobile Penetration
7%