 | 2008 |
6 |  | Felix Ntawanga,
André P. Calitz,
Lynette Barnard:
Maintaining customer profiles in an e-commerce environment.
SAICSIT Conf. 2008: 169-179 |
5 |  | Mathys C. du Plessis,
Lynette Barnard:
Incorporating layout managers into an evolutionary programming algorithm to design graphical user interfaces.
SAICSIT Conf. 2008: 41-47 |
| 2007 |
4 |  | Lynette Barnard,
Reinhardt A. Botha:
Proceedings of the 2007 Annual Conference of the South African Institute of Computer Scientists and Information Technologists on IT Research in Developing Countries, SAICSIT Conf. 2007, Port Elizabeth, South Africa, October 2-3, 2007
ACM 2007 |
| 2005 |
3 |  | Lynette Barnard,
Janet Wesson:
A trust model for E-commerce in South Africa.
South African Computer Journal 35: 10-19 (2005) |
| 2000 |
2 |  | Lynette Barnard,
Rossouw von Solms:
A Formalized Approach to the Effective Selection and Evaluation of Information Security Control.
Computers & Security 19(2): 185-194 (2000) |
| 1998 |
1 |  | Lynette Barnard,
Rossouw von Solms:
The evaluation and certification of information security against BS 7799.
Inf. Manag. Comput. Security 6(2): 72-77 (1998) |