Research Conference of the South African Institute of Computer Scientists and Information Technologists最新文献

筛选
英文 中文
Validating Mobile Phone Design Guidelines: Focusing on the Elderly in a Developing Country 验证手机设计指南:关注发展中国家的老年人
J. V. Biljon, K. Renaud
{"title":"Validating Mobile Phone Design Guidelines: Focusing on the Elderly in a Developing Country","authors":"J. V. Biljon, K. Renaud","doi":"10.1145/2987491.2987492","DOIUrl":"https://doi.org/10.1145/2987491.2987492","url":null,"abstract":"Designing a usable mobile phone interface is a non-trivial task, especially when it is intended for use by a special needs group. The group we focus on here is composed of the elderly in developing countries. To inform specialised design, researchers produce and refine sets of tailored guidelines. In this case there is surprisingly little empirical evidence attesting to the value or efficacy of such guidelines. Corroborating evidence, in the form of endorsements of designs that have resulted from their implementation, would constitute such evidence. The aim of this paper is to evaluate existing mobile interface design guidelines for the elderly in developing countries by means of implementation. Guided by the design science research methodology, published guidelines were used to design and implement a mobile phone interface tailored to the needs of elderly South Africans. The resulting prototype was evaluated with two groups of South African elderly mobile phone users. Besides validating and refining the guidelines, the challenges experienced in implementing guidelines were noted together with some conclusions about the viability and usefulness of the specific guidelines, as well as mobile interface design guidelines in general. The unique contribution of this paper lies in the reflection on crossing the research-action divide by also considering the challenges of the developers in implementing the guidelines.","PeriodicalId":269578,"journal":{"name":"Research Conference of the South African Institute of Computer Scientists and Information Technologists","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114215668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
'Real' Police Work?: Norms and Consequences of UK Police Email Use “真正的”警察工作?:英国警察电子邮件使用的规范和后果
E. Coleman
{"title":"'Real' Police Work?: Norms and Consequences of UK Police Email Use","authors":"E. Coleman","doi":"10.1145/2987491.2987526","DOIUrl":"https://doi.org/10.1145/2987491.2987526","url":null,"abstract":"This paper discusses how the interaction between organisational conditions, media capabilities and socially defined norms of email use can lead to negative consequences of use.\u0000 A mixed-methods online questionnaire addressed the perceptions of police officers regarding the influence of email on police work and working relationships. Findings reveal that norms of email use, facilitated by the capabilities of this medium, exacerbate existing issues within the organisation such as conflict between management and operational level officers, and the view that bureaucracy related to increasing levels of accountability leads to feelings of overload and stress, and prevents officers from carrying out 'real police work'.\u0000 The paper reflects on the maintenance of social norms, even in conditions where the behaviour may not be considered appropriate by all members of the group, with implications for further research in this area. The paper argues that norms of email use are perceived as inappropriate by the officers, but that these officers are constrained by and maintain these norms despite this. Results show the importance of considering the interaction between media capabilities, organisational conditions and social norms of use in understanding the consequences of email use within organisational contexts.","PeriodicalId":269578,"journal":{"name":"Research Conference of the South African Institute of Computer Scientists and Information Technologists","volume":"202 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121885264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IT Project Success: A Conceptual Framework for IT Project Auditing Assurance IT项目成功:IT项目审计保证的概念框架
E. Mkoba, C. Marnewick
{"title":"IT Project Success: A Conceptual Framework for IT Project Auditing Assurance","authors":"E. Mkoba, C. Marnewick","doi":"10.1145/2987491.2987495","DOIUrl":"https://doi.org/10.1145/2987491.2987495","url":null,"abstract":"The adoption of project management as a discipline in both public and private sector organisations is still growing. The growth has been evidenced by organisations continually aligning project activities with business strategy to achieve their strategic goals and create value for their organisations. Some of these initiatives are managed as IT projects. In 2016 the global information technology (IT) spend is forecast to total US$3.54 trillion. Despite this growth in IT investment, IT projects still fail at an alarming rate. These failed IT projects have resulted in organisations not achieving their strategic objectives and goals, in addition to costing them huge amounts of money. Many factors contribute to IT projects failing, such as a poorly defined project scope, insufficient human resources, cost overruns, poor communication among project stakeholders, project auditing practices not being followed, inadequate practices in project risk management and lack of correct auditing of processes in IT projects. The majority of project audits are based on ad hoc management requests rather than systematic auditing processes throughout the project life cycle. Project managers are still challenged on managing IT projects to successful delivery. The problem addressed in this article is the lack of IT project auditing processes throughout the project life cycle to ensure IT project success. A conceptual framework is proposed for IT project auditing assurance throughout the project life cycle. The framework introduces high-level and detailed IT project assurance processes in each assurance review gate. These processes can be tailored to ensure the successful delivery of an IT project. The benefits of this article are its contribution to the body of knowledge with regard to project auditing. Secondly, practitioners and project managers can use this framework to audit IT projects to ensure successful completion of IT projects.","PeriodicalId":269578,"journal":{"name":"Research Conference of the South African Institute of Computer Scientists and Information Technologists","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121347291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Persuasive Design for Behaviour Change Apps: Issues for Designers 行为改变应用的说服性设计:设计师的问题
C. Thomson, J. Nash, A. Maeder
{"title":"Persuasive Design for Behaviour Change Apps: Issues for Designers","authors":"C. Thomson, J. Nash, A. Maeder","doi":"10.1145/2987491.2987535","DOIUrl":"https://doi.org/10.1145/2987491.2987535","url":null,"abstract":"The main aim of this position paper is to identify and briefly discuss design-related issues commonly encountered with the implementation of both behaviour change techniques and persuasive design principles in physical activity smartphone applications. These overlapping issues highlight a disconnect in the perspectives held between health scientists' focus on the application of behaviour change theories and components of interventions, and the information systems designers' focus on the application of persuasive design principles as software design features intended to motivate, facilitate and support individuals through the behaviour change process. A review of the current status and some examples of these different perspectives is presented, leading to the identification of the main issues associated with this disconnection. The main behaviour change technique issues identified are concerned with: the fragmented integration of techniques, hindrances in successful use, diversity of user needs and preferences, and the informational flow and presentation. The main persuasive design issues identified are associated with: the fragmented application of persuasive design principles, hindrances in successful usage, diversity of user needs and preferences, informational flow and presentation, the lack of pragmatic guidance for application designers, and the maintenance of immersive user interactions and engagements. Given the common overlap across four of the identified issues, it is concluded that a methodological approach for integrating these two perspectives, and their associated issues, into a consolidated framework is necessary to address the apparent disconnect between these two independently-established, yet complementary fields.","PeriodicalId":269578,"journal":{"name":"Research Conference of the South African Institute of Computer Scientists and Information Technologists","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117225129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Domestication of Free Wi-Fi Amongst People Living in Disadvantaged Communities in the Western Cape Province of South Africa 免费Wi-Fi在南非西开普省贫困社区的普及
W. Chigona, S. Mudavanhu, A. Siebritz, Zaid Amerika
{"title":"Domestication of Free Wi-Fi Amongst People Living in Disadvantaged Communities in the Western Cape Province of South Africa","authors":"W. Chigona, S. Mudavanhu, A. Siebritz, Zaid Amerika","doi":"10.1145/2987491.2987500","DOIUrl":"https://doi.org/10.1145/2987491.2987500","url":null,"abstract":"By the end of 2013, only 10% of households in South Africa had access to the Internet. In that regard, the government introduced different programmes to bridge the digital divide. The City of Cape Town, for example, rolled out the Smart Cape free municipal Wi-Fi programme in some underserved communities. Informed by the domestication theory and using semi-structured interviews, this study endeavoured to understand experiences of people using the free Wi-Fi. Key findings are that most interviewees visited libraries with the Wi-Fi at least once a week and primarily used the service to do research and access social media sites. Teachers interviewed in the study talked about using the free Wi-Fi in their schools every day to search for material to prepare for their classes.","PeriodicalId":269578,"journal":{"name":"Research Conference of the South African Institute of Computer Scientists and Information Technologists","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128334501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Contract-Based Mocking for Services-Oriented Development 面向服务开发的基于契约的模拟
F. Solms, L. Marshall
{"title":"Contract-Based Mocking for Services-Oriented Development","authors":"F. Solms, L. Marshall","doi":"10.1145/2987491.2987534","DOIUrl":"https://doi.org/10.1145/2987491.2987534","url":null,"abstract":"Unit testing of software components requires that a component is tested in isolation. However, many components require the services of other components to provide their functionality. In order to decouple the component being tested from its dependencies, one commonly uses mock objects. Mocking frameworks which are currently used in industry use dynamic mock object generation with the mocking behaviour specified where the mocking is required, e.g. within unit tests. There is no guarantee that the mocking behaviour is consistent with the behaviour required from the component being mocked. Furthermore, these mock objects are not reused across unit tests and other areas where mocking is required.\u0000 We consider an alternative approach to mocking where the mock object is specified against the contract being mocked and reused across unit tests and other code where mocking is required. These mock objects are tested against the component contracts for the components they are mocking. Furthermore, using dependency injection one is able to reuse the functional tests across unit tests (injecting mock objects for the dependencies) and integration tests (injecting actual components for the dependencies). Even though this approach does require more code to be developed for specifying mocking behaviour, this is offset by the mock object being reused across unit tests for components with the same dependency as well as across integration tests.","PeriodicalId":269578,"journal":{"name":"Research Conference of the South African Institute of Computer Scientists and Information Technologists","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116675643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Designing a Process for Identifying and Managing the Benefits of Mobile Enterprise Applications in the Insurance Industry 设计一个流程来识别和管理保险行业中移动企业应用程序的好处
Henri Knoesen, Lisa F. Seymour
{"title":"Designing a Process for Identifying and Managing the Benefits of Mobile Enterprise Applications in the Insurance Industry","authors":"Henri Knoesen, Lisa F. Seymour","doi":"10.1145/2987491.2987520","DOIUrl":"https://doi.org/10.1145/2987491.2987520","url":null,"abstract":"Mobile applications have not only become commonplace for consumers for use in countless daily functions, they are also becoming essential in a business context. The deployment of these mobile enterprise applications in organizations have been shown to provide benefits however, history also shows that benefits from IT innovations are often over-promised and under-delivered. Managing these benefits becomes essential in order to realize the return on the investment required to build and implement mobile applications. This paper uses literature to inform the design of a benefit management process in an insurance company and also to identify the potential benefits and barriers from the use of mobile enterprise applications in a short-term insurance context. This design forms the start of an Action design research study.","PeriodicalId":269578,"journal":{"name":"Research Conference of the South African Institute of Computer Scientists and Information Technologists","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117333468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Factors Influencing ICT Service Efficiency in Curbing Corruption in Africa: A Bootstrap Approach 影响信息通信技术服务在非洲遏制腐败效率的因素:一种引导方法
Lucas Mimbi, Felix Bankole
{"title":"Factors Influencing ICT Service Efficiency in Curbing Corruption in Africa: A Bootstrap Approach","authors":"Lucas Mimbi, Felix Bankole","doi":"10.1145/2987491.2987504","DOIUrl":"https://doi.org/10.1145/2987491.2987504","url":null,"abstract":"Over the years, Africa has been using Information Communication Technology (ICT) in public services as a tool to curb corruption. While ICT has demonstrated a potential of curbing corruption, the factors influencing its efficiency have not been validated empirically. This study investigates the factors influencing ICT efficiency in curbing corruption in 52 African countries over a period from 2005 to 2014. Using Data Envelopment Analysis and Regression Analysis, technical efficiency scores were used as a dependent variable of corruption. Unlike other traditional regressions, the present study adopted a bootstrap method which corrects the inherent dependence among Decision Making Units' efficiency scores. The results indicate that gross domestic product (GDP) per capita and education are significant factors influencing ICT efficiency in curbing corruption while press freedom is not a significant factor. The findings suggest that using ICT to fight corruption in Africa should be implemented parallel with strategies that improve GDP and education if ICT has to successfully reduce corruption.","PeriodicalId":269578,"journal":{"name":"Research Conference of the South African Institute of Computer Scientists and Information Technologists","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126187263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Hand Gesture Recognition of Hand Shapes in Varied Orientations using Deep Learning 基于深度学习的不同方向手部形状识别
Kurt Jacobs, Mehrdad Ghasiazgar, I. Venter, Reg Dodds
{"title":"Hand Gesture Recognition of Hand Shapes in Varied Orientations using Deep Learning","authors":"Kurt Jacobs, Mehrdad Ghasiazgar, I. Venter, Reg Dodds","doi":"10.1145/2987491.2987524","DOIUrl":"https://doi.org/10.1145/2987491.2987524","url":null,"abstract":"A large number of Deaf people are unable to communicate by means of spoken language. Thus, a translation system that converts South African Sign Language to English and vice versa would be invaluable to the Deaf community. In order to recognise sign language gestures, five fundamental gesture parameters, namely, hand shape, hand orientation, hand motion, hand location and facial expressions, need to be recognised separately. The research in this paper aims to utilise deep learning techniques, specifically convolutional neural networks, to recognise a set of hand shapes in various orientations within a live video stream captured on an iPhone mobile device. The research forms part of a larger project that aims to automatically translate South African Sign Language into English and vice versa. The research proposed two approaches for classifying gestures, a two stage approach and single classifier approach. The former approach managed to achieve an average accuracy of 70% and the latter an average accuracy of 67%.","PeriodicalId":269578,"journal":{"name":"Research Conference of the South African Institute of Computer Scientists and Information Technologists","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127613750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Indoor Sign Recognition for the Blind 盲人室内标识识别
Dumisani Kunene, Hima Vadapalli, Jaco Cronje
{"title":"Indoor Sign Recognition for the Blind","authors":"Dumisani Kunene, Hima Vadapalli, Jaco Cronje","doi":"10.1145/2987491.2987530","DOIUrl":"https://doi.org/10.1145/2987491.2987530","url":null,"abstract":"Blind people face difficulties when navigating unfamiliar environments. The information displayed on indoor signs and notice boards is of no use to them. In order to assist them with this challenge, we propose a real time system that can recognise a selection of indoor navigational signs placed over clear backgrounds. The selection of signs will consist of common samples from several different types of indoor signs. Given a captured image, the approach is to use image processing techniques to find the region of interest(ROI) that contains the sign and then extract this region for classification. Using sliding windows for searching the ROI can be time consuming and can lead to many false classifications, hence we used a more explicit approach that is faster and more reliable. We first segment the signs by colour, and then by shape recognition. The sign-type classification is done using a tree search structure that enables the use of iterative contour descriptors like the speeded-up-robust-features(SURF). Once a sign has been detected, this information is communicated to the user via stereo headsets. To evaluate the system's performance, several random pictures with and without signs were used to determine the system's detection rate. The user-feedback performance was evaluated by testing the system's usability score with volunteers.","PeriodicalId":269578,"journal":{"name":"Research Conference of the South African Institute of Computer Scientists and Information Technologists","volume":"37 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132738063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信