{"title":"PoPI Compliance through Access Control of Electronic Health Records","authors":"Tamir Tsegaye, Stephen Flowerday","doi":"10.1145/3351108.3351130","DOIUrl":"https://doi.org/10.1145/3351108.3351130","url":null,"abstract":"The electronic health record (EHR) has revolutionised the manner in which healthcare is delivered by providing clinicians with electronic access to patients' complete medical history. Countries such as South Africa aim to take advantage of the EHR by implementing a national EHR system. While this has a number of benefits that are in the best interests of the patient, it also creates security and privacy risks to patients' information. Patient information has been identified as the most sensitive type of personal information. Unlike other types of personal information, it contains confidential information about the patient that cannot be changed such as the patient's medical history. Thus, the EHR needs to be protected from both unauthorised entities and misuse by authorised clinicians. This can be achieved through the regulation of the national EHR system. Although regulations state that personal information must be protected, they do not specify what processes must be followed in order to comply with them. This paper proposes a model to address this problem by indicating the components that are needed in order to assist compliance. The proposed model, which was informed by a scoping review and thematic analysis, is discussed in the context of South Africa's future national EHR system with the focus on the Protection of Personal Information (PoPI) Act.","PeriodicalId":269578,"journal":{"name":"Research Conference of the South African Institute of Computer Scientists and Information Technologists","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116584733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Semantic representations for under-resourced languages","authors":"Jocelyn Mazarura, A. D. Waal, J. D. Villiers","doi":"10.1145/3351108.3351133","DOIUrl":"https://doi.org/10.1145/3351108.3351133","url":null,"abstract":"Distributional semantics studies methods for learning semantic representation of natural text. The semantic similarity between words and documents can be derived from this presentation which leads to other practical NLP applications such as collaborative filtering, aspect-based sentiment analysis, intent classification for chatbots and machine translation. Under-resourced language data is small in size. Small data implies not only small corpora, but also short documents within the corpus. In this paper we investigate the performance of word embedding techniques on two under-resourced languages. We investigate two topic models, LDA and DMM as well as a word embedding word2vec. We find DMM to perform better than LDA as a topic model embedding. DMM and word2vec perform similar in a semantic evaluation task of aligned corpora.","PeriodicalId":269578,"journal":{"name":"Research Conference of the South African Institute of Computer Scientists and Information Technologists","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122940764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ICT technology use within public health clinics: A case study in a Gauteng township","authors":"Irene Ann Abraham, P. Alexander","doi":"10.1145/3351108.3351115","DOIUrl":"https://doi.org/10.1145/3351108.3351115","url":null,"abstract":"This interpretive case study identified factors that affected the effective usage of ICT in three clinics, based in a low income, urban area in Gauteng, South Africa. Semi-structured interviews were used to collect data from healthcare professionals, administrators and IT professionals at the clinics. It was found that appropriate policy and incentives were not in place and there was a lack of staff ICT capabilities. These are public healthcare sector ICT readiness factors and they should be addressed before introducing health information systems and associated technologies. A conceptual framework derived from Technology Organization Environment (TOE) and Human Organization Technology-fit (HOT-fit) was used and this may serve as a guideline to clinics and other organizations to determine the technology-readiness of the organisation. This framework may serve as a guideline to clinics and other organizations to determine the technology-readiness of the organisation and the potential uses of ICT.","PeriodicalId":269578,"journal":{"name":"Research Conference of the South African Institute of Computer Scientists and Information Technologists","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128637020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Guidelines for Data Privacy Compliance: A Focus on Cyber-physical Systems and Internet of Things","authors":"N. Baloyi, P. Kotzé","doi":"10.1145/3351108.3351143","DOIUrl":"https://doi.org/10.1145/3351108.3351143","url":null,"abstract":"Privacy as a human right has been in existence for decades, but its effects are accentuated in the information age. Data privacy compliance in modern information technology applications is important, unavoidable, but complex, even more so for technologies (such as cyber-physical systems (CPSs) and Internet of Things (IoT)) that are enablers of the fourth industrial revolution, because of the covert nature of data collection involved. Organisations are not always equipped to comply with privacy requirements in such environments. This paper proposes a list of privacy compliance guidelines aimed at making it practical for organisations to comply with privacy legislation in these domains. The proposed guidelines can provide direction to organisations when carrying out a data privacy compliance exercise for CPSs and IoT. The guidelines take into account technical, organisational and legal aspects of data privacy compliance. Legal aspects are primarily based on the South African Protection of Personal Information Act 4 of 2013. Design science research, using literature analysis and expert opinion as data collection methods, was used as research approach.","PeriodicalId":269578,"journal":{"name":"Research Conference of the South African Institute of Computer Scientists and Information Technologists","volume":"2016 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127526653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Classification Framework of Mobile Health CrowdSensing Research: A Scoping Review","authors":"T. O. Tokosi, B. Scholtz","doi":"10.1145/3351108.3351113","DOIUrl":"https://doi.org/10.1145/3351108.3351113","url":null,"abstract":"Mobile Health CrowdSensing (MHCS) is the use of sensor-based smart mobile devices to generate, collect, share and analyse real-time patient data from a population for improving health. The purpose of the paper is to report on a scoping review of research conducted on MHCS using a proposed classification framework. The framework has five categories of attributes (purpose; adoption and barriers; system attributes; software; and benefits and outcomes). Repositories searched were Medline/PubMed, Embase/Science Direct, PsycINFO, EBSCOHOST, IEEE, ACM Digital and accessible University library repositories from January 1998 to December 2018. Certain exclusion criteria were applied. 'Mobile crowd sensing' and 'mobile crowdsensing' keywords were separately used as search terms. Thirteen studies met the inclusion criteria. The findings revealed that MHCS applications in healthcare are scant. Most MHCS studies were from conference proceedings rather than traditional journals because of the fast-pace of technology-driven research. Healthcare research is costly and time-consuming thus there is a need to adopt MHCS as it can contribute towards low cost research due to the affordable devices used in generating, collecting and providing access to real-time data.","PeriodicalId":269578,"journal":{"name":"Research Conference of the South African Institute of Computer Scientists and Information Technologists","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129471676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of students with and without disabilities in an e-learning setting","authors":"Motlhabane Jacobus Maboe, M. Eloff, M. Schoeman","doi":"10.1145/3351108.3351138","DOIUrl":"https://doi.org/10.1145/3351108.3351138","url":null,"abstract":"The Internet and ultimately websites should be accessible and usable so that they can provide timely and accurate information in an effective, efficient and satisfactory way. Accessible and usable websites will help with academic activities, such as accessing study material or contacting lecturers and other teaching and learning processes, that are challenging to accomplish at an ODeL (open distance learning) institution. This paper examines and reports on the average time taken by groups of students with and without disabilities to complete certain tasks, using the University of South Africa (Unisa) website and myUnisa, the e-learning website of Unisa. The people for whom a website is intended, in this case, students with disabilities, have to be involved in the development of the websites, that is the e-learning websites. In this qualitative study, quantitative data analysis is used to support qualitative data analysis. The findings of this study show that groups of participants or students with disabilities are having problems working on this e-learning website. The study endorses that well-developed e-learning platforms must be efficiently, effectively and satisfactorily used by all students, including those with disabilities. The study recommends that it is significant for all the applicable stakeholders to be part of the development of websites to guarantee that accessibility and usability are appropriately adhered to. The intention is to reduce marginalisation, as well as digital and social divides of students with disabilities. In order to obtain improved learning accomplishments, technologies such as the Internet should be used.","PeriodicalId":269578,"journal":{"name":"Research Conference of the South African Institute of Computer Scientists and Information Technologists","volume":"329 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115876529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Constructivist Assistive Technology in a Mathematics Classroom for the Deaf: Going Digital at a Rural Namibian Primary School","authors":"Loide K.S. Abiatal, G. Howard","doi":"10.1145/3351108.3351136","DOIUrl":"https://doi.org/10.1145/3351108.3351136","url":null,"abstract":"Within the context of almost nine million children with hearing disabilities in Sub-Saharan Africa, their education is an important topic. The problem was the lack of conclusive research about the effects of digital assistive technologies for educating deaf learners in Sub-Saharan African countries, such as Namibia. The question was could a digital assistive technology improve the mathematics achievement of deaf children? The research objective was to gather scientific evidence by conducting a quantitative experiment with constructivist digital assistive technology and qualitative interviews with the teachers involved. The findings from the experiment suggest that the constructivist digital assistive technology may have had a positive effect on the mathematics achievement of the learners, which was supported by the findings from the interviews. This makes an original contribution to the domain and offers an intervention that was feasible, practical and potentially effective for improving the teaching and learning of mathematics for deaf learners.","PeriodicalId":269578,"journal":{"name":"Research Conference of the South African Institute of Computer Scientists and Information Technologists","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122121715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Grounded Theory Analysis of the Techniques Used by Social Media Influencers and Their potential for Influencing the Public Regarding Environmental Awareness","authors":"Obrukevwe Okuah, B. Scholtz, B. Snow","doi":"10.1145/3351108.3351145","DOIUrl":"https://doi.org/10.1145/3351108.3351145","url":null,"abstract":"There is a need for new inventive strategies to communicate to the public on particular subjects such as climate change, biodiversity loss and sustainability. Social Media Influencers (SMIs) are an emerging type of third-party endorsers who can aim to shape and influence the attitudes and perceptions of people through social media. In the field of marketing, SMIs have had great impact on customer retention and relationships. SMIs could help in engaging with the public to adopt pro-environmental behaviour. However, there is limited research related to SMIs in the field of environmental awareness. This study reports on a grounded theory analysis that explored the literature related to the characteristics of SMIs and the techniques used by SMIs that could be used by researchers for influencing the public regarding environmental awareness and pro-environmental behaviour. This paper fulfils a need for identifying strategies for engaging and influencing the public to gain insights into their pro-environmental behaviour.","PeriodicalId":269578,"journal":{"name":"Research Conference of the South African Institute of Computer Scientists and Information Technologists","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129198641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quantifying the Accuracy of Small Subnet-Equivalent Sampling of IPv4 Internet Background Radiation Datasets","authors":"Stones Dalitso Chindipha, B. Irwin, Alan Herbert","doi":"10.1145/3351108.3351129","DOIUrl":"https://doi.org/10.1145/3351108.3351129","url":null,"abstract":"Network telescopes have been used for over a decade to aid in identifying threats by gathering unsolicited network traffic. This Internet Background Radiation (IBR) data has proved to be a significant source of intelligence in combating emerging threats on the Internet at large. Traditionally, operation has required a significant contiguous block of IP addresses. Continued operation of such sensors by researchers and adoption by organisations as part of its operation intelligence is becoming a challenge due to the global shortage of IPv4 addresses. The pressure is on to use allocated IP addresses for operational purposes. Future use of IBR collection methods is likely to be limited to smaller IP address pools, which may not be contiguous. This paper offers a first step towards evaluating the feasibility of such small sensors. An evaluation is conducted of the random sampling of various subnet sized equivalents. The accuracy of observable data is compared against a traditional 'small' IPv4 network telescope using a /24 net-block. Results show that for much of the IBR data, sensors consisting of smaller, non-contiguous blocks of addresses are able to achieve high accuracy rates vs. the base case. While the results obtained given the current nature of IBR, it proves the viability for organisations to utilise free IP addresses within their networks for IBR collection and ultimately the production of Threat intelligence.","PeriodicalId":269578,"journal":{"name":"Research Conference of the South African Institute of Computer Scientists and Information Technologists","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130044458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Characterization of Digital Native Approaches To Mobile Privacy and Security","authors":"Sarina Till, Melissa Densmore","doi":"10.1145/3351108.3351131","DOIUrl":"https://doi.org/10.1145/3351108.3351131","url":null,"abstract":"Despite their familiarity with the digital, so-called 'digital natives' are not tech-savvy, particularly with respect to privacy and security. In this study we characterize this problem by looking at a cohort of South African students. We employ a web-based survey of 100 students, supplemented by in-depth interviews with 10 additional students. In both cases we inquired about, and observed knowledge of permissions, encryption and application installation practices. Our findings show that most students (80%) do not look for or understand permissions or encryption, and use location-based services unsafely. Based on these results we argue that digital natives lack the technical skills and understanding to properly engage with mobile privacy and security. We further argue that this generation has been so over-exposed to mobile requests that violate their privacy and security that they have become desensitized and their definition of privacy and security has changed. Lastly, we discuss the implications of our findings for higher education institutions, policy, and mobile application design.","PeriodicalId":269578,"journal":{"name":"Research Conference of the South African Institute of Computer Scientists and Information Technologists","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124152755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}