School of Computing

Research areas & supervision

The tables below contains all current research fields offered within the School of Computing (SOC) at Unisa, as well as supervision slots open per supervisor.

Internal SupervisorsEmail areaMaster's supervision slots openPhD supervision slots open
Prof Isaac OsunmakindeosunmioMachine Learning and Computational Intelligence - Robotics and Agent systems, Environmental Safety, Sensor and Telecommunication Networks, Business Intelligence, & Computational Sciences34
Prof Kirstin KrausskrauskeCritical Social Theory, ICTs and Education, ICTs and community engagement, Ethnography, Information Systems Leadership, Information Systems Theory and Theory development, Supervision Practices in Information Systems00
Prof Elmarie KritzingerkritzeInformation Security Education00
Prof Jan H KroezekroezjhAfrican hermeneutics and IS; Digitising African games; How can digital African games be used to improve computer literacy in African communities?; Africanisation of IS; Transformation/Africanisation/Decoloniality and IS; The impact of internet radio on dispersed communities from Africa; Digital inclusion and empowerment for persons with disabilities in Africa; Humanities-enriched Information Systems; Digital humanities/Humanities computing; Hermeneutics in IS; IS research theory and philosophy. Please contact Prof Kroeze if you need more information regarding these topics.00
Prof Ernest MnkandlamnkaneThe world today is overwhelmed with gigabytes of data that are collected and stored in various forms (structured and unstructured). The nature of our real-world problems today is characterised by very complex processes in which mathematical reasoning or traditional modelling are simply inadequate, such complexities are a result of some uncertainties in these processes due to their stochastic nature. Software engineering processes belong to this category of complex processes. In order to improve the quality of software, many software development tasks within software engineering processes can be formulated as learning problems and approaches in terms of machine learning algorithms. This research focuses on the application of machine learning algorithms to model the: 1. Software development projects processes. 2. Software delivery pipeline processes and 3. Big data analytics in a smart cities context. 33
Prof Ian SanderssandeidAlgorithms; Computational Geometry; Image Processing; Computer Science Education23
Prof Judy van BiljonvbiljjaData science empowers citizens, civil servants and entrepreneurs by helping them extract knowledge from data. The focus is on the emerging field of human-centred data science, mainly on data, information and knowledge visualisation, data user-interfaces/ HCI and open data access and use. Example topics: (1) Developing and evaluating open data visualisations to help citizens understand critical governance, (2) Knowledge visualisation in teaching and learning, (3) Visualisation in BI60
Prof Serestina Viririevirirs1Computer Vision, Image Processing, and Pattern Recognition. This research area includes (but not limited to): Image processing related areas such as (Biometrics (biometrics security), Video Processing, Surveillance, Medical Imaging, Nuclear Medicine, etc.). Several Image Segmentation techniques (Graph Cut, Level Set), Feature Extraction algorithms and Classification techniques such as Deep Learning are explored. 55
Prof Felix BankolebankofoExpert Systems, Decision Support Systems, Multi-Criteria Decision Analysis, Database Systems, IT & Productivity, Telecommunication Systems11
Prof Alfred ColemancolemaICT in health (e-health) and Business Informatics & Knowledge Management00
Prof Marianne LoockloockmInformation Security Awareness; Information Security and Business Intelligence; Access Control in a Data Mining environment00
Prof Peter MkhizemkhizplKnowledge management, Strategic Informations System01
Prof Bobby TaittaitblNetwork Security, Voice Recognition, Biometrics, Applied Encryption Technologies; Forensics22
Prof Hossana TwinomurinzitwinohE-government, ICT for development (ICT4D), e-entrepreneurship (ICT in Entrepreneurship), mobile app development (from a sociotechnical dimension)00
Prof Mc Donald van der Merwevdmertme-Learning, m-Learning, Psycho-physiological aspects of Human Computer Interaction, Open Source movement00
Prof Etienne van der PoelevdpoelComputational Creativity, Machine Learning. Artificial Intelligence21
Ms H AbdullahabdulhGovernance, Risk Management, Information Security and Compliance00
Mr Danie BisschoffdbischofDesigning Banking Technology for the Aged and Disabled20
Dr Bester ChimbochimbbChild-Computer Interaction; Designing for children with children and other special user groups; Design of Technology for Education; ICT4D.00
Dr B ChipangurachipabMobile Centric Access to Information; M-Learning; E-Learning; Software usability and user experience (Human Computer Interaction) 01
Dr Adele Da VeigadveigaInformation security culture / cyber security culture / data privacy culture / POPIA culture 00
Mr Ken HallandhallakjApplied Logic and Description Logics30
Dr Vincent HornerhornevzAreas: e-health. epidemiology research. primary health care. public health medicine. quality assurance and clinical practice guidelines. community outreach primary health care. m-health. ICT4Health. Preference: I would like to work with students that are interested in projects that have an indepth engagement with the health system, rather than a superficial one. 00
Dr Grant HowardhowargrIT-related Organisational Change, Organisational Transformation and IS/IT, Green Information Systems (Green IS), Green Information Technology (Green IT), Green Computing, ICT for Sustainability (ICT4S), Information Systems (IS) for community engagement (IS4CE).10
Dr Jan MentzmentzjcEnterprise Architecture, Enterprise Modelling, Enterprise Architecture Frameworks, reference architectures, cloud computing, Enterprise Governance and information systems in business.00
Mr Mathias MujingamujinmInformation Security, Usable Security, Cloud Computing Security00
Mr Elisha OcholaocholeoRouting Protocols in Mobile Wireless Ad Hoc Networks, Ad Hoc Networks Security00
Dr Marthie SchoemanschoemaComputing education, visualization, ODL 00
Dr Shawren Singhsinghsdigital-government 10
Mr Sam SsemugabissemusHuman-Computer Interaction, e-Learning, e-Skills, e-Service quality, Application of mobile technology00
Dr W van StadenvstadwjcInformation Security, Privacy, Anonymity, Digital Forensics00
Dr Cyrille DongmodongmcCombining semi-formal and formal specification techniques - Requirements Engineering - Goal-Oriented Requirements Engineering (GORE) Methods - Formal Software Requirement Specification with Z/Object-Z - User Requirements Notation (URN).31
Mrs Petra le RouxlrouxpODL e-Learning and e-Assessment; Computer Science education : Programming; Psychological Aspects of Computing and Information Systems 10
Mr Lindelani NxumalonxumalsKnowledge Management10
Mr Colin PilkingtonpilkiclComputing education, Virtual learning environments00
Mrs Dorothy Scholtzscholide-Learning, Project Management, Information Systems, ODL00
Ms Anitta ThomasthomaaTrust Negotiation in Information Security00
Mrs Sreedevi VallabhapurapuvallasFabrication of organic computer memory devices00
Mrs Corne Van Stadenvstadcj1User experience, m-learning, e-learning and eModeration00
Mrs Ruthea VorsterrvorsterGreen Computing, Sustainable IT, Green Information Systems10

External SupervisorsResearch areaMaster's supervision slots openPhD supervision slots open
Prof Marlien HerselmanInnovation models in health, education and business information systems, Community informatics, ICT4D, MHealth & eHealth, skills transfer, deploying and integrating technology to improve lives. Email is
Prof Ernest Ketcha NgassamEnterprise Architecture, Enterprise Security Architecture, Information Security, Business Telecommunications, Internet of Things, Internet of Services (Services Engineering & Methodologies), ICT for Development, Big Data and Analytics, Software Construction, Services Oriented Architectures, Algorithmic, Theoretical Computing using Finite Automata (High-Performance Pattern Matching, Computational Biology, Network Intrusion Detection, Genomic, Natural and Computer Virus Scanning, NLP). Email: eketcha@gmail.com33
Prof Mariki EloffComputer and Information Security, Project Management:
Prof Les LabuschagneIT Project, Programme and Portfolio Management:
Prof Hugo LotrietEpistemic issues in IS, Socio-technical systems, ICT4D: South African students who are actively involved in projects that involve the introduction, adoption and use of technology by South African communities, preferably in a developmental context and who wish to conduct some academic research within such a context. The nature of the research projects will have to be qualitative.
Prof Nixon Muganda OcharaE-Government, Open (Data) Innovations, Business Analytics & Data Monetization, Digital Transformation, ICT Governance; Inter-Organizational IS. Contact: nixon.muganda@gmail.com33
Prof Richard NaidooScientific computing, technology enhanced learning and simulations; viz modelling in Communications systems;
Prof Laurette - Natural language processing and computational linguistics; Natural language technology for under-resourced languages; The role of natural language and multilingual natural language processing in ? semantic computing, semantic technologies, including ontology development; ? knowledge extraction from text; ? controlled natural language for domain specific precise machine translation and language generation. : 11
Prof Karen RenaudBehavioural Security; Knowledge Visualisation; Ethnographic studies of security-related behaviours Alternative Authentication; Human Behaviour and Information Security; Privacy of IoT; Adoption of Security Tools Contact email: cyber4humans@gmail.com11
Prof Andre Van der : Formal Specification Techniques, Automated Reasoning, Combining Formal and Semi-formal Specification Techniques, Formal Methods in Business Applications; Formalisms in Cloud Computing (CC); Formalisms in Business Intelligence (BI)33
Prof Zengzhui Artificial Intelligence: Neural network, Particle Swarm Optimization, Ant colony optimization algorithms, Genetic Algorithms, Energy (power system) Optimization, and Evolutionary Multi-Objective Optimization; Intelligent Control: Optimal Control, Fuzzy and/or Neural Network Control, Fault Diagnosis and Fault Tolerant Control; Encryption, Complex networks, etc? 12

Anti-Spam Bots!