2015 Annual Global Online Conference on Information and Computer Technology (GOCICT)最新文献

筛选
英文 中文
A Privacy Preserving Context-Aware Insider Threat Prediction and Prevention Model Predicated on the Components of the Fraud Diamond 基于欺诈钻石组件的隐私保护上下文感知内部威胁预测与预防模型
Solomon Mekonnen, Keshnee Padayachee, M. Meshesha
{"title":"A Privacy Preserving Context-Aware Insider Threat Prediction and Prevention Model Predicated on the Components of the Fraud Diamond","authors":"Solomon Mekonnen, Keshnee Padayachee, M. Meshesha","doi":"10.1109/GOCICT.2015.20","DOIUrl":"https://doi.org/10.1109/GOCICT.2015.20","url":null,"abstract":"This paper presents a novel, interdisciplinary insider threat prediction and prevention model which combines several approaches, techniques and tools from computer science, criminology and psychology. It is based on the fraud diamond which comprises four components: pressure (i.e. motive), opportunity, capability and rationalisation. In general, it has been found that a criminal must have the motive and opportunity to commit a crime. However, the criminal must also have the capability to commit crime particularly in the cybercrime domain. Furthermore, criminals tend to rationalise (i.e. excuse) their crimes. The model presented here involves leveraging the fraud diamond to predict and prevent insider threats. Typically insider threat prediction and prevention models tend to overlook the privacy concerns of insiders. Hence the deployment of the model involves gathering information about the insider's possible intent within a privacy-preserving context. This will help to identify high risk insider threats while balancing privacy concerns.","PeriodicalId":221523,"journal":{"name":"2015 Annual Global Online Conference on Information and Computer Technology (GOCICT)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115667871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Three Innovative Software Engineering Methodologies 三种创新的软件工程方法论
E. Foster
{"title":"Three Innovative Software Engineering Methodologies","authors":"E. Foster","doi":"10.1109/GOCICT.2015.25","DOIUrl":"https://doi.org/10.1109/GOCICT.2015.25","url":null,"abstract":"Software engineering has come to the stage where speed of development, level of correctness, interoperability, user friendliness, usefulness, and reusability in different projects are very important factors in determining the success of a software engineering venture. Equally important is the use of methodologies for software design. In just over six decades, we have seen the progress of software design from an amorphous set of informal methodologies to structured techniques, formal methodologies, and object-oriented methodologies. In the area of object-oriented methodologies (OOM), the unified modeling language (UML) has made a significant contribution in defining a set of methodologies that can be applied to any software engineering effort. This paper draws on the UML methodologies and proposes three methodologies that could add richness and additional flexibility to the software engineering experience. They are system topology charts, object/entity specification grid, and the extended operation specification. The system topology charts include an information topology chart (ITC) that presents the object types and/or information entities in the way they will be managed in the software system, and a user interface topology chart (UITC) that presents operations the way they will appear in the system. The object/entity specification grid (O/ESG) adopts the conventions of the UML class diagram, but expands it to include additional critical information that lead to better software construction. The extended operation specification (EOS) embraces the UML guidelines for the activity diagram, but is flexible enough to include other techniques such as pseudo-code, Warnier-Orr diagram, and collaboration diagram. It also allows for the specification of other critical information not covered in these standard techniques.","PeriodicalId":221523,"journal":{"name":"2015 Annual Global Online Conference on Information and Computer Technology (GOCICT)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124903677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Procrustes Classifier for Marine Day Marker 海洋日标的Procrustes分类器
R. Steinhoff, Ben Wongsaroj, C. Cañas, Nicolas Diogo
{"title":"Procrustes Classifier for Marine Day Marker","authors":"R. Steinhoff, Ben Wongsaroj, C. Cañas, Nicolas Diogo","doi":"10.1109/GOCICT.2015.15","DOIUrl":"https://doi.org/10.1109/GOCICT.2015.15","url":null,"abstract":"This conceptual paper examines the computer identification of signs called day markers that commonly appear for navigation purposes in a marine channel waterway. Most people are familiar with these signs when navigating in a boat as they appear either as red triangles, green rectangles or diamonds since they aid navigation through the channel. The paper focuses on a proposed classifier using Procrustes analysis techniques for identification purposes.","PeriodicalId":221523,"journal":{"name":"2015 Annual Global Online Conference on Information and Computer Technology (GOCICT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134211356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Incorporating Mobile Learning in Institutions of Higher Learning in South Africa 将移动学习纳入南非高等教育机构
Mphaphi Molebatsi, Kokisa Phorah
{"title":"Incorporating Mobile Learning in Institutions of Higher Learning in South Africa","authors":"Mphaphi Molebatsi, Kokisa Phorah","doi":"10.1109/GOCICT.2015.13","DOIUrl":"https://doi.org/10.1109/GOCICT.2015.13","url":null,"abstract":"Despite the advancements made towards learning such as technological innovations in the classroom and access to learning in general, there are significant challenges that remain especially the modes of delivery of quality education apart from the traditional classroom teaching and learning. In the endeavour to discover feasible solutions for these challenges, much trust has been put in new data and correspondence advancements such as information communication technologies (ICTs) outside the classroom especially mobile devices. This study reviews several articles and previous studies relating to the use of mobile devices for portable learning instruction or mobile learning (m-learning) education and assess the potential and versatility of m-learning for mobile education experiences in institutions of higher learning in South Africa.","PeriodicalId":221523,"journal":{"name":"2015 Annual Global Online Conference on Information and Computer Technology (GOCICT)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126785686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Increasing Effectiveness of Churn Prediction Software 提高客户流失预测软件的有效性
Joseph Halim, J. Vucetic
{"title":"Increasing Effectiveness of Churn Prediction Software","authors":"Joseph Halim, J. Vucetic","doi":"10.1109/GOCICT.2015.30","DOIUrl":"https://doi.org/10.1109/GOCICT.2015.30","url":null,"abstract":"Despite the development of several churn prediction software that investigate hundreds of factors, there is still much space for improving the accuracy of churn prediction. This explorative case study research investigated the behavioral factors, economic factors, and carrier policies causing churn and revealed a new set of important factors that cause churn that should be incorporated into churn prediction models to enhance the accuracy of churn prediction software.","PeriodicalId":221523,"journal":{"name":"2015 Annual Global Online Conference on Information and Computer Technology (GOCICT)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126930438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Agent Based Simulation Model Applied to Emergency Vehicles in High Traffic Urban Environments 基于智能体的城市高交通环境应急车辆仿真模型
Andreea Ion, Vlad Constantinescu, M. Pătrașcu
{"title":"An Agent Based Simulation Model Applied to Emergency Vehicles in High Traffic Urban Environments","authors":"Andreea Ion, Vlad Constantinescu, M. Pătrașcu","doi":"10.1109/GOCICT.2015.26","DOIUrl":"https://doi.org/10.1109/GOCICT.2015.26","url":null,"abstract":"Advances in information and communication technology offer new tools in managing the ever-growing urban infrastructure. It is non-trivial to design, maintain and expand road networks that insure a safe and fast transport of goods and people while still permitting a quick intervention in emergency situations. The objective of this paper is to present a simulated traffic model application. In this respect, we employ the use of cell agents which are a basic component of CitySCAPE, a Synergic Control Architecture for Protection during Emergencies. The traffic system is modelled and simulated using a multi-agent based solution which will allow emergency responders to go through a group of intersections with minimal waiting time. The purpose of the simulation is to obtain a lower travel time for emergency vehicles than the average value, inside the considered geographical area, taking into account the inherent uncertainties of the drivers' decisions to follow certain urban routes.","PeriodicalId":221523,"journal":{"name":"2015 Annual Global Online Conference on Information and Computer Technology (GOCICT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114270733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Predictive Pointing in Cascading Pull-Down Menus 级联下拉菜单中的预测指向
Igor Crk
{"title":"Predictive Pointing in Cascading Pull-Down Menus","authors":"Igor Crk","doi":"10.1109/GOCICT.2015.17","DOIUrl":"https://doi.org/10.1109/GOCICT.2015.17","url":null,"abstract":"Cascading pull-down menus are common interface elements in many modern graphical interactive applications. Navigation of standard cascading pull-down menus is governed by a combination of Fitts' and Acott-Zhai steering laws, however, recent research has shown that the constraints imposed by the two laws can be overcome by reducing the target distance by either reducing the target distance or increasing the target size. This paper describes the implementation and evaluation of monitoring and prediction mechanisms that can be used to reduce the distance to the user's pointing targets within standard pull-down menus in existing, unmodified applications. Facilitated pointing can be applied to cascading pull-down menus either through pointer jumps or menu reorganization, i.e. placing copies of commonly accessed options at the top of the menus.","PeriodicalId":221523,"journal":{"name":"2015 Annual Global Online Conference on Information and Computer Technology (GOCICT)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129075351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Secure and Efficient Data Transmission for Wireless Mesh Networks 安全高效的无线网状网络数据传输
Luis Cabrera, Tuan T. Tran, Scott Cordle, E. Udoh
{"title":"Secure and Efficient Data Transmission for Wireless Mesh Networks","authors":"Luis Cabrera, Tuan T. Tran, Scott Cordle, E. Udoh","doi":"10.1109/GOCICT.2015.22","DOIUrl":"https://doi.org/10.1109/GOCICT.2015.22","url":null,"abstract":"Wireless data dissemination can be utilized for broadcasting emergency services and military communication. However secure and reliable dissemination of data over a lossy wireless network is challenging due to security attacks and network dynamics. The current proposed schemes require high computational capability of the devices which may not be feasible in most of hand held receivers. Furthermore, in many scenarios, data may need to be relayed via multiple links before reaching to the end users posing potential data breach. Our proposed scheme alleviates computational requirements along with transmission overhead by exploiting the new transmission technique, namely network coding. Our propose scheme utilizes a hierarchical key structure for efficient security key management. In addition, we utilize the null space of network coding to enable secure relay of data via multiple hops. Also, by exploiting network coding, our scheme don' require cooperation among the relay nodes which significantly reduce the communication overhead. Our analysis results show that under some condition, our propose scheme can save up to 50% transmission bandwidth compared with the traditional approach where users share a common group key. We also show that our proposed scheme can achieve high security under relay attacks. The proposed scheme is also efficient with light computation that would be feasible for mobile devices.","PeriodicalId":221523,"journal":{"name":"2015 Annual Global Online Conference on Information and Computer Technology (GOCICT)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134126503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Accessibility, Quality and Performance of Government Portals and Ministry Web Sites: A View Using Diagnostic Tools 政府门户网站和部门网站的可访问性、质量和性能:使用诊断工具的观点
Winfred Yaokumah, Steven Brown, R. Amponsah
{"title":"Accessibility, Quality and Performance of Government Portals and Ministry Web Sites: A View Using Diagnostic Tools","authors":"Winfred Yaokumah, Steven Brown, R. Amponsah","doi":"10.1109/GOCICT.2015.18","DOIUrl":"https://doi.org/10.1109/GOCICT.2015.18","url":null,"abstract":"Accessibility, quality, and performance of government websites and portals are key issues for e-government programmes. Although the number of government sites has increased rapidly in the past few years, their ultimate success will largely depend on their accessibility, quality and performance. This paper reports the results of an evaluative study of 19 e-government websites and portals using a common set of Web diagnostic engines. The findings reveal that none of the sites evaluated meet the recommended Priority AA conformance level. A number of accessibility, quality, and performance weaknesses were identified. Majority of the sites assessed fail to comply with perceivable, operable, understandable, and robust principles of the Web Content Accessibility Guidelines (WCAG). Several non-compliance errors were found on the websites. The page load time for most sites falls far below the acceptable level, spelling errors and bad links were also found. Significant work needs to be done in order to make these websites examples of best practice e-government sites.","PeriodicalId":221523,"journal":{"name":"2015 Annual Global Online Conference on Information and Computer Technology (GOCICT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132539155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Evaluating the Effectiveness of Lego Robots in Engaged Scholarship 评估乐高机器人在从事奖学金中的有效性
Keshnee Padayachee, Patricia Gouws, Marlou Lemmer
{"title":"Evaluating the Effectiveness of Lego Robots in Engaged Scholarship","authors":"Keshnee Padayachee, Patricia Gouws, Marlou Lemmer","doi":"10.1109/GOCICT.2015.12","DOIUrl":"https://doi.org/10.1109/GOCICT.2015.12","url":null,"abstract":"The aim of this paper is to investigate the effect of Lego Robotics Training on learner performance in mathematics. This research was conducted partially to determine the efficacy of a community engagement project that was established to inspire young people's interest in science, technology, engineering and mathematics (STEM) fields. The project uses LEGO League robotics to mentor learners (aged 10 to 16 years) to build and program robots and to do research based on real-world issues. Proficiency in mathematics is a foundation to all STEM related disciplines. Hence, this study aims to determine if using LEGO robotics may be used as a tool to improve proficiency in mathematics or, at least, encourage learners to develop an interest in STEM related disciplines.","PeriodicalId":221523,"journal":{"name":"2015 Annual Global Online Conference on Information and Computer Technology (GOCICT)","volume":"57 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120907694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信