{"title":"A Privacy Preserving Context-Aware Insider Threat Prediction and Prevention Model Predicated on the Components of the Fraud Diamond","authors":"Solomon Mekonnen, Keshnee Padayachee, M. Meshesha","doi":"10.1109/GOCICT.2015.20","DOIUrl":"https://doi.org/10.1109/GOCICT.2015.20","url":null,"abstract":"This paper presents a novel, interdisciplinary insider threat prediction and prevention model which combines several approaches, techniques and tools from computer science, criminology and psychology. It is based on the fraud diamond which comprises four components: pressure (i.e. motive), opportunity, capability and rationalisation. In general, it has been found that a criminal must have the motive and opportunity to commit a crime. However, the criminal must also have the capability to commit crime particularly in the cybercrime domain. Furthermore, criminals tend to rationalise (i.e. excuse) their crimes. The model presented here involves leveraging the fraud diamond to predict and prevent insider threats. Typically insider threat prediction and prevention models tend to overlook the privacy concerns of insiders. Hence the deployment of the model involves gathering information about the insider's possible intent within a privacy-preserving context. This will help to identify high risk insider threats while balancing privacy concerns.","PeriodicalId":221523,"journal":{"name":"2015 Annual Global Online Conference on Information and Computer Technology (GOCICT)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115667871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Three Innovative Software Engineering Methodologies","authors":"E. Foster","doi":"10.1109/GOCICT.2015.25","DOIUrl":"https://doi.org/10.1109/GOCICT.2015.25","url":null,"abstract":"Software engineering has come to the stage where speed of development, level of correctness, interoperability, user friendliness, usefulness, and reusability in different projects are very important factors in determining the success of a software engineering venture. Equally important is the use of methodologies for software design. In just over six decades, we have seen the progress of software design from an amorphous set of informal methodologies to structured techniques, formal methodologies, and object-oriented methodologies. In the area of object-oriented methodologies (OOM), the unified modeling language (UML) has made a significant contribution in defining a set of methodologies that can be applied to any software engineering effort. This paper draws on the UML methodologies and proposes three methodologies that could add richness and additional flexibility to the software engineering experience. They are system topology charts, object/entity specification grid, and the extended operation specification. The system topology charts include an information topology chart (ITC) that presents the object types and/or information entities in the way they will be managed in the software system, and a user interface topology chart (UITC) that presents operations the way they will appear in the system. The object/entity specification grid (O/ESG) adopts the conventions of the UML class diagram, but expands it to include additional critical information that lead to better software construction. The extended operation specification (EOS) embraces the UML guidelines for the activity diagram, but is flexible enough to include other techniques such as pseudo-code, Warnier-Orr diagram, and collaboration diagram. It also allows for the specification of other critical information not covered in these standard techniques.","PeriodicalId":221523,"journal":{"name":"2015 Annual Global Online Conference on Information and Computer Technology (GOCICT)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124903677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Steinhoff, Ben Wongsaroj, C. Cañas, Nicolas Diogo
{"title":"Procrustes Classifier for Marine Day Marker","authors":"R. Steinhoff, Ben Wongsaroj, C. Cañas, Nicolas Diogo","doi":"10.1109/GOCICT.2015.15","DOIUrl":"https://doi.org/10.1109/GOCICT.2015.15","url":null,"abstract":"This conceptual paper examines the computer identification of signs called day markers that commonly appear for navigation purposes in a marine channel waterway. Most people are familiar with these signs when navigating in a boat as they appear either as red triangles, green rectangles or diamonds since they aid navigation through the channel. The paper focuses on a proposed classifier using Procrustes analysis techniques for identification purposes.","PeriodicalId":221523,"journal":{"name":"2015 Annual Global Online Conference on Information and Computer Technology (GOCICT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134211356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Incorporating Mobile Learning in Institutions of Higher Learning in South Africa","authors":"Mphaphi Molebatsi, Kokisa Phorah","doi":"10.1109/GOCICT.2015.13","DOIUrl":"https://doi.org/10.1109/GOCICT.2015.13","url":null,"abstract":"Despite the advancements made towards learning such as technological innovations in the classroom and access to learning in general, there are significant challenges that remain especially the modes of delivery of quality education apart from the traditional classroom teaching and learning. In the endeavour to discover feasible solutions for these challenges, much trust has been put in new data and correspondence advancements such as information communication technologies (ICTs) outside the classroom especially mobile devices. This study reviews several articles and previous studies relating to the use of mobile devices for portable learning instruction or mobile learning (m-learning) education and assess the potential and versatility of m-learning for mobile education experiences in institutions of higher learning in South Africa.","PeriodicalId":221523,"journal":{"name":"2015 Annual Global Online Conference on Information and Computer Technology (GOCICT)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126785686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Increasing Effectiveness of Churn Prediction Software","authors":"Joseph Halim, J. Vucetic","doi":"10.1109/GOCICT.2015.30","DOIUrl":"https://doi.org/10.1109/GOCICT.2015.30","url":null,"abstract":"Despite the development of several churn prediction software that investigate hundreds of factors, there is still much space for improving the accuracy of churn prediction. This explorative case study research investigated the behavioral factors, economic factors, and carrier policies causing churn and revealed a new set of important factors that cause churn that should be incorporated into churn prediction models to enhance the accuracy of churn prediction software.","PeriodicalId":221523,"journal":{"name":"2015 Annual Global Online Conference on Information and Computer Technology (GOCICT)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126930438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Agent Based Simulation Model Applied to Emergency Vehicles in High Traffic Urban Environments","authors":"Andreea Ion, Vlad Constantinescu, M. Pătrașcu","doi":"10.1109/GOCICT.2015.26","DOIUrl":"https://doi.org/10.1109/GOCICT.2015.26","url":null,"abstract":"Advances in information and communication technology offer new tools in managing the ever-growing urban infrastructure. It is non-trivial to design, maintain and expand road networks that insure a safe and fast transport of goods and people while still permitting a quick intervention in emergency situations. The objective of this paper is to present a simulated traffic model application. In this respect, we employ the use of cell agents which are a basic component of CitySCAPE, a Synergic Control Architecture for Protection during Emergencies. The traffic system is modelled and simulated using a multi-agent based solution which will allow emergency responders to go through a group of intersections with minimal waiting time. The purpose of the simulation is to obtain a lower travel time for emergency vehicles than the average value, inside the considered geographical area, taking into account the inherent uncertainties of the drivers' decisions to follow certain urban routes.","PeriodicalId":221523,"journal":{"name":"2015 Annual Global Online Conference on Information and Computer Technology (GOCICT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114270733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Predictive Pointing in Cascading Pull-Down Menus","authors":"Igor Crk","doi":"10.1109/GOCICT.2015.17","DOIUrl":"https://doi.org/10.1109/GOCICT.2015.17","url":null,"abstract":"Cascading pull-down menus are common interface elements in many modern graphical interactive applications. Navigation of standard cascading pull-down menus is governed by a combination of Fitts' and Acott-Zhai steering laws, however, recent research has shown that the constraints imposed by the two laws can be overcome by reducing the target distance by either reducing the target distance or increasing the target size. This paper describes the implementation and evaluation of monitoring and prediction mechanisms that can be used to reduce the distance to the user's pointing targets within standard pull-down menus in existing, unmodified applications. Facilitated pointing can be applied to cascading pull-down menus either through pointer jumps or menu reorganization, i.e. placing copies of commonly accessed options at the top of the menus.","PeriodicalId":221523,"journal":{"name":"2015 Annual Global Online Conference on Information and Computer Technology (GOCICT)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129075351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure and Efficient Data Transmission for Wireless Mesh Networks","authors":"Luis Cabrera, Tuan T. Tran, Scott Cordle, E. Udoh","doi":"10.1109/GOCICT.2015.22","DOIUrl":"https://doi.org/10.1109/GOCICT.2015.22","url":null,"abstract":"Wireless data dissemination can be utilized for broadcasting emergency services and military communication. However secure and reliable dissemination of data over a lossy wireless network is challenging due to security attacks and network dynamics. The current proposed schemes require high computational capability of the devices which may not be feasible in most of hand held receivers. Furthermore, in many scenarios, data may need to be relayed via multiple links before reaching to the end users posing potential data breach. Our proposed scheme alleviates computational requirements along with transmission overhead by exploiting the new transmission technique, namely network coding. Our propose scheme utilizes a hierarchical key structure for efficient security key management. In addition, we utilize the null space of network coding to enable secure relay of data via multiple hops. Also, by exploiting network coding, our scheme don' require cooperation among the relay nodes which significantly reduce the communication overhead. Our analysis results show that under some condition, our propose scheme can save up to 50% transmission bandwidth compared with the traditional approach where users share a common group key. We also show that our proposed scheme can achieve high security under relay attacks. The proposed scheme is also efficient with light computation that would be feasible for mobile devices.","PeriodicalId":221523,"journal":{"name":"2015 Annual Global Online Conference on Information and Computer Technology (GOCICT)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134126503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Accessibility, Quality and Performance of Government Portals and Ministry Web Sites: A View Using Diagnostic Tools","authors":"Winfred Yaokumah, Steven Brown, R. Amponsah","doi":"10.1109/GOCICT.2015.18","DOIUrl":"https://doi.org/10.1109/GOCICT.2015.18","url":null,"abstract":"Accessibility, quality, and performance of government websites and portals are key issues for e-government programmes. Although the number of government sites has increased rapidly in the past few years, their ultimate success will largely depend on their accessibility, quality and performance. This paper reports the results of an evaluative study of 19 e-government websites and portals using a common set of Web diagnostic engines. The findings reveal that none of the sites evaluated meet the recommended Priority AA conformance level. A number of accessibility, quality, and performance weaknesses were identified. Majority of the sites assessed fail to comply with perceivable, operable, understandable, and robust principles of the Web Content Accessibility Guidelines (WCAG). Several non-compliance errors were found on the websites. The page load time for most sites falls far below the acceptable level, spelling errors and bad links were also found. Significant work needs to be done in order to make these websites examples of best practice e-government sites.","PeriodicalId":221523,"journal":{"name":"2015 Annual Global Online Conference on Information and Computer Technology (GOCICT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132539155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluating the Effectiveness of Lego Robots in Engaged Scholarship","authors":"Keshnee Padayachee, Patricia Gouws, Marlou Lemmer","doi":"10.1109/GOCICT.2015.12","DOIUrl":"https://doi.org/10.1109/GOCICT.2015.12","url":null,"abstract":"The aim of this paper is to investigate the effect of Lego Robotics Training on learner performance in mathematics. This research was conducted partially to determine the efficacy of a community engagement project that was established to inspire young people's interest in science, technology, engineering and mathematics (STEM) fields. The project uses LEGO League robotics to mentor learners (aged 10 to 16 years) to build and program robots and to do research based on real-world issues. Proficiency in mathematics is a foundation to all STEM related disciplines. Hence, this study aims to determine if using LEGO robotics may be used as a tool to improve proficiency in mathematics or, at least, encourage learners to develop an interest in STEM related disciplines.","PeriodicalId":221523,"journal":{"name":"2015 Annual Global Online Conference on Information and Computer Technology (GOCICT)","volume":"57 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120907694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}