| - | 
| - Randomised Detection Algorithm | Memory Requirements for the Detection of Impostor Nodes in Wireless Sensor Networks | 
| - WSN Integrity | Memory Requirements for the Detection of Impostor Nodes in Wireless Sensor Networks | 
| - WSN Safety and Security | Memory Requirements for the Detection of Impostor Nodes in Wireless Sensor Networks | 
| - WSN Trustworthiness | Memory Requirements for the Detection of Impostor Nodes in Wireless Sensor Networks | 
| 3 | 
| 3D Convolutional Neural Networks | Robust Anomaly Detection in CCTV Surveillance | 
| 4 | 
| 4K video post-processing | Low Resource, Post-processed Lecture Recording from 4K Video Streams | 
| a | 
| AI adoption | Understanding the Low Adoption of AI in South African Medium Sized Organisations | 
| anomaly detection | Robust Anomaly Detection in CCTV Surveillance | 
| Artificial Intelligence | Understanding the Low Adoption of AI in South African Medium Sized Organisations | 
| Artificial Intelligence adoption | Towards a socio-specific artificial intelligence adoption framework | 
| Atrous Spatial Pyramid Pooling | Dilated Convolution to Capture Scale Invariant Context in Crowd Density Estimation | 
| Automated Lecture Recording Systems | Low Resource, Post-processed Lecture Recording from 4K Video Streams | 
| b | 
| Barriers | Barriers to dynamic cybersecurity capabilities in healthcare software services | 
| Behaviour Cloning | Combining Evolutionary Search with Behaviour Cloning for Procedurally Generated Content | 
| BERT | Sentiment and intent classification of in-text citations using BERT | 
| Big Data Analytics | Big data analytics capabilities and value creation at the work-practice level: A South African case study | 
| Big Data Analytics Capabilities | Big data analytics capabilities and value creation at the work-practice level: A South African case study | 
| Business Value | Big data analytics capabilities and value creation at the work-practice level: A South African case study | 
| c | 
| case study | Barriers to dynamic cybersecurity capabilities in healthcare software services | 
| citation analysis | Sentiment and intent classification of in-text citations using BERT | 
| Cloud Computing | Barriers to dynamic cybersecurity capabilities in healthcare software services | 
| CNN | Robust Facial Recognition for Occlusions using Facial Landmarks | 
| Convolutional Neural Networks | Dilated Convolution to Capture Scale Invariant Context in Crowd Density Estimation | 
| Crop growth | Analyzing Reinforcement Learning Algorithms for Nitrogen Fertilizer Management in Simulated Crop Growth | 
| crowd density estimation | Dilated Convolution to Capture Scale Invariant Context in Crowd Density Estimation | 
| Cyber Threats | Towards an African cybersecurity community of practice | 
| Cybersecurity | Barriers to dynamic cybersecurity capabilities in healthcare software services | 
| Cybersecurity Challenges | Towards an African cybersecurity community of practice | 
| Cybersecurity Community of Practice | Towards an African cybersecurity community of practice | 
| d | 
| deep learning | Automating Bird Detection Based on Webcam Captured Images using Deep Learning | 
| Design Science Research | Towards a socio-specific artificial intelligence adoption framework | 
| detection accuracy | Memory Requirements for the Detection of Impostor Nodes in Wireless Sensor Networks | 
| dilated convolution | Dilated Convolution to Capture Scale Invariant Context in Crowd Density Estimation | 
| domain search | Do People in Low Resource Environments only Need Search? Exploring Digital Archive Functionalities in South Africa | 
| dynamic capabilities | Barriers to dynamic cybersecurity capabilities in healthcare software services | 
| e | 
| evolutionary search | Combining Evolutionary Search with Behaviour Cloning for Procedurally Generated Content | 
| f | 
| Facial Recognition | Robust Facial Recognition for Occlusions using Facial Landmarks | 
| Faster R-CNN | Automating Bird Detection Based on Webcam Captured Images using Deep Learning | 
| Fertilizer Management | Analyzing Reinforcement Learning Algorithms for Nitrogen Fertilizer Management in Simulated Crop Growth | 
| Framework | Towards a socio-specific artificial intelligence adoption framework | 
| h | 
| Health Social Networks | Influence of Health Social Networks on Healthcare: A Systematic Literature Review | 
| Health social support | Influence of Health Social Networks on Healthcare: A Systematic Literature Review | 
| Healthcare | Barriers to dynamic cybersecurity capabilities in healthcare software services | 
| HSNs and healthcare | Influence of Health Social Networks on Healthcare: A Systematic Literature Review | 
| Human Computer Interaction | Investigating the Usability and Quality of Experience of Mobile Video-Conferencing Apps Among Bandwidth-Constrained Users in South Africa | 
| Human-centered AI | Towards a socio-specific artificial intelligence adoption framework | 
| i | 
| information seeking behaviour | Do People in Low Resource Environments only Need Search? Exploring Digital Archive Functionalities in South Africa | 
| information system | Do People in Low Resource Environments only Need Search? Exploring Digital Archive Functionalities in South Africa | 
| Internet measurement | Investigating the Usability and Quality of Experience of Mobile Video-Conferencing Apps Among Bandwidth-Constrained Users in South Africa | 
| Intrusion Detection | Memory Requirements for the Detection of Impostor Nodes in Wireless Sensor Networks | 
| k | 
| knowledge | The impact of organisational culture on knowledge management: the case of an international multilateral organisation | 
| knowledge creation | The impact of organisational culture on knowledge management: the case of an international multilateral organisation | 
| Knowledge Management | The impact of organisational culture on knowledge management: the case of an international multilateral organisation | 
| m | 
| memory requirements | Memory Requirements for the Detection of Impostor Nodes in Wireless Sensor Networks | 
| multiple instance learning | Robust Anomaly Detection in CCTV Surveillance | 
| n | 
| neural networks | Sentiment and intent classification of in-text citations using BERT | 
| Node Replication Attacks | Memory Requirements for the Detection of Impostor Nodes in Wireless Sensor Networks | 
| o | 
| online health communities | Influence of Health Social Networks on Healthcare: A Systematic Literature Review | 
| online privacy | Online Platform Privacy Policies: South African WhatsApp Users’ Perceptions and Reactions to the January 2021 Changes | 
| optical flow | Robust Anomaly Detection in CCTV Surveillance | 
| organizational culture | The impact of organisational culture on knowledge management: the case of an international multilateral organisation | 
| p | 
| Precision Agriculture | Analyzing Reinforcement Learning Algorithms for Nitrogen Fertilizer Management in Simulated Crop Growth | 
| Presenter Tracking | Low Resource, Post-processed Lecture Recording from 4K Video Streams | 
| probabilistic finite automata | Memory Requirements for the Detection of Impostor Nodes in Wireless Sensor Networks | 
| procedural content generation | Combining Evolutionary Search with Behaviour Cloning for Procedurally Generated Content | 
| q | 
| Quality of Experience | Investigating the Usability and Quality of Experience of Mobile Video-Conferencing Apps Among Bandwidth-Constrained Users in South Africa | 
| r | 
| Reinforcement Learning | Analyzing Reinforcement Learning Algorithms for Nitrogen Fertilizer Management in Simulated Crop Growth | 
| research survey | Do People in Low Resource Environments only Need Search? Exploring Digital Archive Functionalities in South Africa | 
| ResNets | Automating Bird Detection Based on Webcam Captured Images using Deep Learning | 
| s | 
| SECI | The impact of organisational culture on knowledge management: the case of an international multilateral organisation | 
| Siamese Neural Networks | Robust Facial Recognition for Occlusions using Facial Landmarks | 
| Single Shot Detector | Automating Bird Detection Based on Webcam Captured Images using Deep Learning | 
| SMEs | Understanding the Low Adoption of AI in South African Medium Sized Organisations | 
| Social Challenges | Towards a socio-specific artificial intelligence adoption framework | 
| social media | Online Platform Privacy Policies: South African WhatsApp Users’ Perceptions and Reactions to the January 2021 Changes | 
| Social media for health | Influence of Health Social Networks on Healthcare: A Systematic Literature Review | 
| Software as a Service | Barriers to dynamic cybersecurity capabilities in healthcare software services | 
| Systematic Literature Review | Influence of Health Social Networks on Healthcare: A Systematic Literature Review | 
| t | 
| text classification | Sentiment and intent classification of in-text citations using BERT | 
| Transfer Learning | Automating Bird Detection Based on Webcam Captured Images using Deep Learning | 
| u | 
| Usability | Investigating the Usability and Quality of Experience of Mobile Video-Conferencing Apps Among Bandwidth-Constrained Users in South Africa | 
| users’ information needs | Do People in Low Resource Environments only Need Search? Exploring Digital Archive Functionalities in South Africa | 
| v | 
| video segmentation | Low Resource, Post-processed Lecture Recording from 4K Video Streams | 
| Virtual Cameraman | Low Resource, Post-processed Lecture Recording from 4K Video Streams | 
| w | 
| WhatsApp | Online Platform Privacy Policies: South African WhatsApp Users’ Perceptions and Reactions to the January 2021 Changes | 
| Wireless Sensor Networks | Memory Requirements for the Detection of Impostor Nodes in Wireless Sensor Networks | 
| work-practice level | Big data analytics capabilities and value creation at the work-practice level: A South African case study | 
| WSN reliability | Memory Requirements for the Detection of Impostor Nodes in Wireless Sensor Networks |