Research Conference of the South African Institute of Computer Scientists and Information Technologists最新文献

筛选
英文 中文
A Framework to Maximise the Communicative Power of Knowledge Visualisations 最大化知识可视化沟通能力的框架
K. Renaud, J. V. Biljon
{"title":"A Framework to Maximise the Communicative Power of Knowledge Visualisations","authors":"K. Renaud, J. V. Biljon","doi":"10.1145/3351108.3351111","DOIUrl":"https://doi.org/10.1145/3351108.3351111","url":null,"abstract":"Knowledge visualisation, in the field of information systems, is both a process and a product, and is informed by the closely aligned fields of information visualisation and knowledge management. Knowledge visualisation has untapped potential within the purview of knowledge communication. Even so, there is little evidence of knowledge visualisations being deployed. This might be due to a lack of evidence-based guidance to inform their creation. To improve this situation, we derived a number of \"lenses\" that can be used to reveal essential perspectives and feed into the visualisation production process.\u0000 We propose a conceptual framework which incorporates these lenses to guide producers of knowledge visualisations. This framework uses the different lenses to reveal critical perspectives that need to be considered during the design process. We conclude by demonstrating how this framework could be used to produce a knowledge visualisation with maximum communicative power.","PeriodicalId":269578,"journal":{"name":"Research Conference of the South African Institute of Computer Scientists and Information Technologists","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131155517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Age and Gender Estimation using Optimised Deep Networks 使用优化的深度网络估计年龄和性别
W.John S. Downton, Hima Vadapalli
{"title":"Age and Gender Estimation using Optimised Deep Networks","authors":"W.John S. Downton, Hima Vadapalli","doi":"10.1145/3351108.3351123","DOIUrl":"https://doi.org/10.1145/3351108.3351123","url":null,"abstract":"Age and gender estimation plays a fundamental role in intelligent applications such as access control, marketing intelligence, human-computer interaction etc. The advent of deep architectures have paved a way to improve the performance of estimation models, however, there is still a lack of optimized architectures. This paper focuses on the use of convolutional neural networks, and parameter modeling and optimization, and their effect on accuracy and loss term convergence. This paper first makes use of a generalized deep architecture based on literature and looks at ways of optimizing and reducing complexity without loss of accuracy. Different activation functions such as rectified linear unit (ReLU), linear function, exponential linear unit (ELU), hyperbolic tangent and Googles' proposed Swish function were tested along with the use of additional convolutional and fully-connected layers. Experiments resulted in a less complex architecture for gender classification and results were in line with that of benchmark accuracies found in literature, however, the same couldn't be achieved for age estimation. The inability to find a simpler architecture for age estimation is attributed to the complex nature of features that are associated with age than that of gender and also the multi-class classification nature of the age estimation problem.","PeriodicalId":269578,"journal":{"name":"Research Conference of the South African Institute of Computer Scientists and Information Technologists","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133364799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Factors that Influence Information Technology Workers' Intention to Telework: A South African Perspective 影响信息技术工作者远程办公意向的因素:一个南非的视角
Joseph Morrison, W. Chigona, D. Malanga
{"title":"Factors that Influence Information Technology Workers' Intention to Telework: A South African Perspective","authors":"Joseph Morrison, W. Chigona, D. Malanga","doi":"10.1145/3351108.3351141","DOIUrl":"https://doi.org/10.1145/3351108.3351141","url":null,"abstract":"This study investigated the factors that influence South African IT workers' intention to telework. Based on the Theory of Planned Behaviour (TPB), an explanatory research approach was followed with the objective of determining the influence of the TPB elements namely attitude, subjective norms and perceived behavioral control on IT workers' intention to adopt telework. The model was tested quantitatively by means of online survey, for which a total of 120 valid responses were received. The results showed that attitude and subjective norms did not significantly influence IT workers' intention to telework. Instead, perceived behavioral control of IT workers was found significant, which was determined by the availability and cost of the technology, the level of support from employers and the self-efficacy of IT workers. The cost of bandwidth was found a major inhibitors of telework amongst local IT workers. Therefore, addressing the technology and support challenges could improve the self-efficacy of workers with regards to working remotely. Employers should provide financial support to subsidize the high cost of bandwidth in South Africa. This study provides new insights regarding the status of IT workers' adoption of telework in South Africa, thereby contributing to policy and research practice.","PeriodicalId":269578,"journal":{"name":"Research Conference of the South African Institute of Computer Scientists and Information Technologists","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133926139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Taking the Subjectivity out of UX Evaluation with Emotiv EPOC+ 用Emotiv EPOC+消解用户体验评价的主观性
Manon Holman, F. Adebesin
{"title":"Taking the Subjectivity out of UX Evaluation with Emotiv EPOC+","authors":"Manon Holman, F. Adebesin","doi":"10.1145/3351108.3351139","DOIUrl":"https://doi.org/10.1145/3351108.3351139","url":null,"abstract":"Changes in the contemporary business environment are shifting the focus of designers and developers of Information Systems (IS) from a narrow focus on system usability to an overall user experience (UX). The subjective nature of UX meant that the majority of UX evaluation methods are subjective. However, advancements in new technologies now make it possible to evaluate UX objectively by collecting physiological data unobtrusively. In this study we explored the use of the Emotiv EPOC+ headset to collect electro-encephalography (EEG) patterns to 'examine' brain activities to determine the presence or absence of the emotion of anger, as well as 'performance metrics' on engagement, excitement, interest, focus, relaxation, and stress, in order to evaluate UX. The results showed that the Emotiv EPOC+ headset provides a low-cost means of evaluating UX objectively.","PeriodicalId":269578,"journal":{"name":"Research Conference of the South African Institute of Computer Scientists and Information Technologists","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116353530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
From Digital Business Strategy to Digital Transformation - How: A Systematic Literature Review 从数字化商业战略到数字化转型——如何:系统的文献综述
Nancy Brown, I. Brown
{"title":"From Digital Business Strategy to Digital Transformation - How: A Systematic Literature Review","authors":"Nancy Brown, I. Brown","doi":"10.1145/3351108.3351122","DOIUrl":"https://doi.org/10.1145/3351108.3351122","url":null,"abstract":"Digital transformation is a top priority in most organizations. It is a complex task that tackles the changes digital technologies can bring about in organisations. As such, it requires clarity of purpose, which can be achieved through having a firm digital business strategy. However, few studies explain how the two processes of digital business strategizing and digital transformation interrelate. The aim of this study is to identify the core concepts that link digital business strategy to digital transformation so as to improve understanding of their dynamic interaction and outcomes. Through a systematic literature review, it was shown that the fundamental concepts in the domain of study are digital technologies, digital business strategy, digital transformation strategy, digital transformation, digital leadership, business models, digital innovation, digital transparency and digital maturity. The key link between digital business strategy and digital transformation is a digital transformation strategy. A model is developed which shows the interrelationship of all these concepts.","PeriodicalId":269578,"journal":{"name":"Research Conference of the South African Institute of Computer Scientists and Information Technologists","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125306682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
An exploratory investigation of online and offline social behaviour among digital natives 数字原生代线上和线下社会行为的探索性调查
Amy Broughton, M. Daly, Nickel-Jon Marx, Michael Nieuwoudt, D. Roux, D. Parry
{"title":"An exploratory investigation of online and offline social behaviour among digital natives","authors":"Amy Broughton, M. Daly, Nickel-Jon Marx, Michael Nieuwoudt, D. Roux, D. Parry","doi":"10.1145/3351108.3351146","DOIUrl":"https://doi.org/10.1145/3351108.3351146","url":null,"abstract":"In response to calls for IS researchers to investigate how digital natives are using information and communication technologies to shape their interpersonal interactions, an exploratory, survey-based study was conducted to investigate patterns of online social behaviour on two popular SNSs (Facebook and Instagram) and, on this basis, compare their online and offline social behaviour. To capture online social behaviour a novel typology involving three high-level interactions --- producing, consuming, and reacting--- was proposed. The investigation found that, among digital natives, Instagram is used more frequently than Facebook, with consumptive behaviour on Instagram occurring most frequently, and productive behaviour on Facebook occurring least frequently. While online social behaviour was found to positively relate to offline socialisation, personality traits were found to account for a larger proportion of the variance in offline social behaviour than online actions. The findings are of particular relevance to those seeking to understand associations between behaviour online and behaviour offline. Moreover, the typology introduced is likely to be useful in a variety of contexts.","PeriodicalId":269578,"journal":{"name":"Research Conference of the South African Institute of Computer Scientists and Information Technologists","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128507396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Investigating the effects various compilers have on the electromagnetic signature of a cryptographic executable 研究各种编译器对加密可执行文件的电磁签名的影响
I. Frieslaar, B. Irwin
{"title":"Investigating the effects various compilers have on the electromagnetic signature of a cryptographic executable","authors":"I. Frieslaar, B. Irwin","doi":"10.1145/3129416.3129436","DOIUrl":"https://doi.org/10.1145/3129416.3129436","url":null,"abstract":"This research investigates changes in the electromagnetic (EM) signatures of a cryptographic binary executable based on compile-time parameters to the GNU and clang compilers. The source code was compiled and executed on a Raspberry Pi 2, which utilizes the ARMv7 CPU. Various optimization flags are enabled at compile-time and the output of the binary executable's EM signatures are captured at run-time. It is demonstrated that GNU and clang compilers produced different EM signature on program execution. The results indicated while utilizing the O3 optimization flag, the EM signature of the program changes. Additionally, the g++ compiler demonstrated fewer instructions were required to run the executable; this related to fewer EM emissions leaked. The EM data from the various compilers under different optimization levels was used as input data for a correlation power analysis attack. The results indicated that partial AES-128 encryption keys was possible. In addition, the fewest subkeys recovered was when the clang compiler was used with level O2 optimization. Finally, the research was able to recover 15 of 16 AES-128 cryptographic algorithm's subkeys, from the the Pi.","PeriodicalId":269578,"journal":{"name":"Research Conference of the South African Institute of Computer Scientists and Information Technologists","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127297513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Organizational interventions to build the ERP business process analyst: the 4I framework perspective 构建ERP业务流程分析师的组织干预:4I框架视角
Elizabeth Wamicha, Lisa F. Seymour
{"title":"Organizational interventions to build the ERP business process analyst: the 4I framework perspective","authors":"Elizabeth Wamicha, Lisa F. Seymour","doi":"10.1145/3129416.3131471","DOIUrl":"https://doi.org/10.1145/3129416.3131471","url":null,"abstract":"Enterprise Resource Planning (ERP) implementations are increasing in most countries in the African continent and in Kenya in particular. Large, medium and small businesses in the country are making significant investments in these enterprise system (ES) implementations. This has given rise to the need for new roles within ES environments, most notably the Business Process Analyst (BPA). The BPA plays a critical role in understanding business processes of the organization. This is a critical requirement for any ES implementation. In this regard, the BPA competence requirements to implement and manage these ES implementations are not clear yet. More so, there is a lack of clarity regarding the interventions and interactions required to build critical competencies in entry level BPAs enabling them to move towards becoming fully fledged and experienced BPAs. To address this gap, this qualitative study focusing on the Kenyan context, utilizes the 4I framework of organizational learning to describe interventions and interactions that organizations use to build the required BPA competencies.","PeriodicalId":269578,"journal":{"name":"Research Conference of the South African Institute of Computer Scientists and Information Technologists","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123297453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Actor-network theory in IS research: critique on application of the principle of generalized symmetry 行动者网络理论在信息系统研究中的应用:对广义对称原理的批判
J. K. Mwenya, I. Brown
{"title":"Actor-network theory in IS research: critique on application of the principle of generalized symmetry","authors":"J. K. Mwenya, I. Brown","doi":"10.1145/3129416.3129448","DOIUrl":"https://doi.org/10.1145/3129416.3129448","url":null,"abstract":"Actor-network theory (ANT) has been gaining popularity as a guiding theoretical apparatus in Information Systems (IS) research, notably research involving IS projects as such projects are seen as assemblages of people, technologies, project documents, methodologies, and other actors. A key tenet of ANT is generalized symmetry, which advocates that human and material actors be viewed on the same analytic plane. A persistent critique of ANT-based IS research is that researchers employing ANT routinely fail to uphold the ideal of generalized symmetry. Critics often point out that many ANT-based IS research accounts (whether consciously or unconsciously) privilege humans as the dominant actors in actor-networks, while paying lip-service to the idea of generalized symmetry for all actors. This paper contributes toward understanding the underlying issues of this critique by assessing the current level of compliance to ANT's principle of generalized symmetry in ANT-based IS research. Using a hermeneutic literature review approach, we investigate how the main constructs, principles, practices and techniques of the full apparatus of ANT have been identified, applied and documented in recent ANT-based IS research studies as reported in the extant literature. This review provides an updated and refreshed understanding of the current level to which ANT's principle of generalized symmetry is upheld in ANT-based IS research.","PeriodicalId":269578,"journal":{"name":"Research Conference of the South African Institute of Computer Scientists and Information Technologists","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122972843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
S-NAR: generating narrations of SQL queries using regular expressions S-NAR:使用正则表达式生成SQL查询的叙述
Abejide Ade-Ibijola, George Obaido
{"title":"S-NAR: generating narrations of SQL queries using regular expressions","authors":"Abejide Ade-Ibijola, George Obaido","doi":"10.1145/3129416.3129454","DOIUrl":"https://doi.org/10.1145/3129416.3129454","url":null,"abstract":"Structured Query Language (SQL) is popular with relational databases. Despite the simple and highly structured nature of SQL, end users often find it difficult to comprehend written queries and/or write new queries. Hence, a number of tools have been proposed to aid the comprehension of SQL queries via visualisation. In this paper, we present a different comprehension aid called narrations. Narrations are non-technical, textual descriptions of SQL queries. Using a representation of regular languages, regular expressions, we have designed a tool, called S-NAR (or Sql-NARrator), that reads queries and generates a narration of these queries using pre-defined templates. S-NAR was tested with 5,000 queries and narrated 96% of the queries. The generated narrations should find applications in aiding comprehension in the teaching of database courses at higher institutions of learning, and assisting the comprehension of legacy queries in data-centered industries.","PeriodicalId":269578,"journal":{"name":"Research Conference of the South African Institute of Computer Scientists and Information Technologists","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117018121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信