{"title":"Using a user experience evaluation framework for eModeration","authors":"C. V. Staden, J. V. Biljon, Jan Hendrik Kroeze","doi":"10.1109/ICTAS.2017.7920523","DOIUrl":"https://doi.org/10.1109/ICTAS.2017.7920523","url":null,"abstract":"The use of eModeration (of examination scripts) can improve the efficiency of the examination moderation, while simultaneously lowering the risk of misplacing or delaying the moderation process. Despite the potential benefits of using an eModerate system in terms of optimising examination procedures, the implementation and application of such online moderation systems in the South African context is limited. Various factors could be contributing towards the resistance to the implementation and adoption of eModerate systems in higher education institutions. These factors include human factors as well as technical and organisational resistance to change. This study focuses on the human factors involved in eModeration (user experience) and attempts to answer the following research question: How can the User Experience Evaluation Framework for eModeration be utilised within the context of higher education institutions in South Africa? The research used a Design Science Research methodology, which included the design, development as well as testing of the User Experience Evaluation Framework for eModeration. This paper will report on identified issues pertaining to the User Experience Evaluation Framework for eModeration during the evaluation phase. The research was conducted at Midrand Graduate Institute (MGI), now trading as Pearson Institute of Higher Education, a private higher education institute in South Africa. The data generation methods included interviews with eModerators from different faculties within a private higher education institution. This paper makes a theoretical contribution to this area of study by identifying the problems that users might have with the implementation of the User Experience Evaluation Framework for eModeration as well as providing some insights into the user experience of eModerators.","PeriodicalId":256906,"journal":{"name":"2017 Conference on Information Communication Technology and Society (ICTAS)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116305741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving the information security of personal electronic health records to protect a patient's health information","authors":"Floyd Els, L. Cilliers","doi":"10.1109/ICTAS.2017.7920658","DOIUrl":"https://doi.org/10.1109/ICTAS.2017.7920658","url":null,"abstract":"The electronic collection of patient information is a common practice across healthcare organisations in South Africa. Patients are encouraged to manage and control their own health data and information through the use of personal electronic health records (PEHRs). However, as this is a new type of electronic health record, there are concerns that must be addressed before patients make use of the technology. One of these concerns relate to using mobile devices to manage PEHRs, as patients fear that their health data may be breached due to the mobility and security concerns of these devices. The purpose of this paper is to investigate the information security controls that health care providers must put in place to protect PEHRs accessed from a mobile device. An inductive research approach was used which included an extensive literature review, while a thematic analysis of the data was used in identifying, analysing and reporting patterns within the data. The conceptual m-Health privacy framework was used to identify the 10 privacy principles for the mobile health platform and compared with the three distinct information security threats for the mobile platform. The study found that the data in transit was not as well protected by the framework, while the individual and database of the health care organisation was better regulated. The recommendation of the study is to improve the framework through the inclusion of specific information security controls to protect a patient's privacy whilst in transit when using PEHRs.","PeriodicalId":256906,"journal":{"name":"2017 Conference on Information Communication Technology and Society (ICTAS)","volume":"222 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122766447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Examining the evolution of mobile bully-victims across different schools located in low to high safety risk areas in Cape Town, South Africa","authors":"Kedibone Charlotte Namane, M. Kyobe","doi":"10.1109/ICTAS.2017.7920650","DOIUrl":"https://doi.org/10.1109/ICTAS.2017.7920650","url":null,"abstract":"Mobile bullying and victimization is on the rise. The present study investigates one category of bullies referred to as mobile bully-victims, looking at the evolution of adolescent mobile bully-victims across different ages in different schools which are in different geographical locations around Cape Town. Bully-victim behavior is prevalent during the adolescent stage; this is an era of transitioning and is said to be a stressful period which sees individuals developing impulsive behavior and constant changes in emotions. Structural Equation modelling was used to analyze how the mobile bully-victim pathways are formed. 407 mobile bully-victims, aged 14–18 years were surveyed. 107 of these bully-victims are from schools in low risk safety areas, 114 from moderate and the other 186 from schools in high safety risk areas. The results reveal declining mobile bully-victim behavior across the schools in the different areas, that is, schools in high safety risk zones have a higher rate of mobile bully-victims and those in low risk safety zones have lower rates. The results reveal that in low safety risk schools, previous traditional bullying only influences technology at ages 17 and above, which then leads to bully-victim behavior. In moderate to high safety risk areas, previous traditional bullying experience strongly predicts mobile bully-victim behavior as children grow. These findings are contrary to previous research, which shows that technology advancement in low safety risk areas would encourage more technology use among children thus resulting in irregular usage. The results also reveal that previous traditional bullying experience influences the lack of self-control and the tendency to retaliate which result in mobile bully-victim behavior across all ages in all three of the safety risk zones.","PeriodicalId":256906,"journal":{"name":"2017 Conference on Information Communication Technology and Society (ICTAS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130939277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Acceptance and usage of learning management system amongst academics","authors":"Sizwe Dlalisa","doi":"10.1109/ICTAS.2017.7920525","DOIUrl":"https://doi.org/10.1109/ICTAS.2017.7920525","url":null,"abstract":"The paper evaluates acceptance and usage of an approved Learning Management System (LMS) amongst academics at a leading University of Technology. A total of 111 academics with teaching responsibility participated in the research through an electronic survey (e-survey) followed by semi-structured interviews. The findings reveal a gap between high acceptance and low actual usage, which appears to contradict an important assumption of the Technology Acceptance Model (TAM) framework. The data reveal that academics use the system for course management and communication more often and least for assessment. While collaboration tools like forum discussion, blogs and wikis which can most fruitfully support student-centred learning are not utilized. The paper therefore argues that TAM requires adjustment to successfully account for LMS acceptance at universities and that specific training in the educationally progressive features of LMS appears to be required.","PeriodicalId":256906,"journal":{"name":"2017 Conference on Information Communication Technology and Society (ICTAS)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132864376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploring energy harvesting technology for wireless charging of mobile device batteries","authors":"Neetu Ramsaroop, O. Olugbara, Esther Joubert","doi":"10.1109/ICTAS.2017.7920652","DOIUrl":"https://doi.org/10.1109/ICTAS.2017.7920652","url":null,"abstract":"Mobile devices have become powerful computing tools for everyday tasks. However, their batteries discharge quickly, even if they are not being used mainly because of the heavy computation tasks required by the multimedia applications that run on them. The quick turnover time on the battery life is problematic as frequent charging is required to keep the device operational. This is a major bottleneck because of the current energy optimization crisis, user inconvenience due to constant charging of battery and erratic nature of the electricity supply in some areas. In the current research project, the primary aspiration is to explore the energy harvesting technology innovation of radio frequency to wirelessly recharge the batteries of mobile devices. This implies an alternative way of charging the batteries of mobile devices without the need for a physical charger to connect to an electrical outlet. Energy harvesting, which involves making use of “free energy” from the atmosphere is the most innovative energy-efficient wireless charging technology because mobile devices are constantly transmitting radio signals. At first, radio signals are received from the atmosphere via an antenna. Thereafter, these signals are converted with a rectifier from alternating current into direct current that is then utilized to recharge the battery of a mobile device. The outcome of this phase of the research project is intended to successfully build a radio frequency harvesting circuit that can store a minimum load of 5mV that is required to charge the battery of a mobile device.","PeriodicalId":256906,"journal":{"name":"2017 Conference on Information Communication Technology and Society (ICTAS)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130502913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abiodun Modupe, T. Çelik, Vukosi Marivate, M. Diale
{"title":"Semi-supervised probabilistics approach for normalising informal short text messages","authors":"Abiodun Modupe, T. Çelik, Vukosi Marivate, M. Diale","doi":"10.1109/ICTAS.2017.7920659","DOIUrl":"https://doi.org/10.1109/ICTAS.2017.7920659","url":null,"abstract":"The growing use of informal social text messages on Twitter is one of the known sources of big data. These type of messages are noisy and frequently rife with acronyms, slangs, grammatical errors and non-standard words causing grief for natural language processing (NLP) techniques. In this study, our contribution is to target non-standard words in the short text and propose a method to which the given word is likely to be transformed. Our method uses language model probability to characterise the relationship between formal and Informal-word, then employ the string similarity with a log-linear model to includes features for both word-level transformation and local context similarity. The weights of these features are trained by employing maximum likelihood framework using stochastic gradient descent (SGD) to hypothesise the better clean feature for a given informal short text. Experiments were conducted on a publicly available Enlish-language tweet and the approach is able to normalise inflected words in an online social network.","PeriodicalId":256906,"journal":{"name":"2017 Conference on Information Communication Technology and Society (ICTAS)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116359130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A comparison of two blockchain architectures for inspiring corporate excellence in South Africa","authors":"L. Butgereit, C. Martinus","doi":"10.1109/ICTAS.2017.7920656","DOIUrl":"https://doi.org/10.1109/ICTAS.2017.7920656","url":null,"abstract":"Throughout history, currencies or money have three different uses: means of exchange, unit of accounting, and store of wealth. People have used different types of currencies at different times throughout history. Commodity currencies represented items which are either mined from the Earth or produced by agriculture such as gold or salt. Fiat currencies are created by decree by a sovereign nation or groups of nations. Complementary currencies have been created by much smaller groups of people to solve problems which cannot be solved by commodity currencies or fiat currencies. For example, in times of economic depression when people attempt to hoard money (store wealth) there is often not enough currency to accommodate a means of exchange. With the advent of blockchains and crypto-currencies, it is now possible to easily create complementary currencies to attempt to solve problems which can not be solved using commodity currencies or fiat currencies. This paper discusses and compares two different architectures which are being used in two independent projects in South Africa to create complementary currencies by using the Ethereum blockchain and crypto-currency in order to encourage corporate excellence. It is important to note that this paper is not about the underlying success or failure of the complementary currencies created by the architectures. The paper is about the architectures themselves.","PeriodicalId":256906,"journal":{"name":"2017 Conference on Information Communication Technology and Society (ICTAS)","volume":"167 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121032363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Developing a cyber threat intelligence sharing platform for South African organisations","authors":"Muyowa Mutemwa, J. Mtsweni, Njabulo Mkhonto","doi":"10.1109/ICTAS.2017.7920657","DOIUrl":"https://doi.org/10.1109/ICTAS.2017.7920657","url":null,"abstract":"Cyberattacks are on the increase in severity, complexity and frequency, negatively affecting the citizens, government, and businesses. Adversely, the security and Defence role-players in developing countries, such as South Africa, are short of the required capacity and capability to adequately defend and protect the national cyberspace against these fast moving and persistent threats and attacks. Be that as it may, the South African cyberspace still requires national attention and protection by the mandated role-players, such as the Defence force and its industry partners. Thus, within the cyber domain, the various Defence force role-players can no longer rely on traditional solutions to detect, defend, and respond to the forever changing cyber threats and cyberattacks. In order to reduce cybersecurity risks and strengthen cyber resilience of the nation, strategic cybersecurity information sharing in the Defence environment is becoming a necessity. Thus, the contribution from this paper is a systematic discussion and demonstration of a conceptual cyber threat intelligence sharing model and platform that could stimulate and enable different stakeholders within the Defence environment to seamlessly and collaboratively aggregate, analyse, and timely share contextual and actionable cyber-threat intelligence that could lead to a resilient cybersecurity posture and better protection of the national cyberspace.","PeriodicalId":256906,"journal":{"name":"2017 Conference on Information Communication Technology and Society (ICTAS)","volume":"06 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130504562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Student perception of the contribution of Hackathon and collaborative learning approach on computer programming pass rate","authors":"Mhlongo Donald Sakhumuzi, K. Oyetade","doi":"10.1109/ICTAS.2017.7920524","DOIUrl":"https://doi.org/10.1109/ICTAS.2017.7920524","url":null,"abstract":"According to [8] the student's learning inspiration and adequacy can be influenced by several environmental factors which includes the learning approach and social pressure from class mates. The aim of this study is to investigate students' perceptions about the contribution of collaborative learning and the Hackathon to improve computer programming pass rate. The study included both the under-graduate and post-graduate full-time, Information Technology (IT) students at the Durban University of Technology and a self-administered survey was used. Social cognitive theory and collaborative learning are the core theoretical frameworks that underpins this study. The outcome of students' perception was analyzed using IBM SPSS. It was found that students that collaborated with others on assignments felt that their computer programming marks would improve when participating in Hackathons. The results from this study also revealed that a high number of students are satisfied with their collaborative learning experience.","PeriodicalId":256906,"journal":{"name":"2017 Conference on Information Communication Technology and Society (ICTAS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133999655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A framework for assessing the socio-economic impact of e-governance projects in developing countries","authors":"Sylvester Hatsu, E. Ngassam","doi":"10.1109/ICTAS.2017.7920648","DOIUrl":"https://doi.org/10.1109/ICTAS.2017.7920648","url":null,"abstract":"A study of more than 100 e-Governance projects showed that impact assessment of rolled out e-Governance projects remain insignificant. These findings remain inconclusive notwithstanding the fact that outcomes of public sector based ICT4D initiatives have not been fully established and disseminated. This paper proposes a framework for assessing the socio-economic impact of e-governance projects in developing countries. Socio-economic indicators for e-Governance programmes are identified and grouped into both core and contextual indicators that form the basis for the development of an evaluation model. The proposed assessment framework centered on stakeholders' participation is then subjected to expert evaluation. Outcome of our evaluation revealed wide acceptance and acknowledgement of the relevance and importance of the framework not only by experts, but also through case-study based validation tests.","PeriodicalId":256906,"journal":{"name":"2017 Conference on Information Communication Technology and Society (ICTAS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114927371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}