{"title":"Evaluating two security systems for mobile voting fortification","authors":"Dina Moloja, Noluntu Mpekoa, Darelle van Greunen","doi":"10.1145/3415088.3415109","DOIUrl":"https://doi.org/10.1145/3415088.3415109","url":null,"abstract":"The developments in Information and Communication Technology transformed almost every aspect of everyday life. Modern societies are now fully dependent on ICT for commercial, labor, and leisure activities, excluding in the voting area. Using ICT for democratic elections is quiet in its early stages. Nevertheless, utilizing ICT, specifically mobile phones, traditional voting processes can be streamlined to except the cost of social assets and time. Other researchers have already developed a mobile voting system, which is the use of a mobile phone to cast a vote. However, using a fast-growing device like mobile phones to vote poses security vulnerabilities. Mobile phones are exposed to security challenges, including malicious threats and intrusions as they are increasingly utilized to store sensitive personal data, such as financial data used for mobile banking. This paper is concerned with the security of the mobile phone as a utensil to vote amid the election. The paper evaluated two security systems to check, among the two-security systems, the one that best guards mobile voting. Simulations were utilized to evaluate the security systems and the findings were that Suricata is more reliable and effective than Snort in protecting XaP mobile application. This paper provides a significant contribution to the literature in mobile voting security as no research has been piloted that evaluates two security systems for mobile voting protection.","PeriodicalId":274948,"journal":{"name":"Proceedings of the 2nd International Conference on Intelligent and Innovative Computing Applications","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125055040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Investigating the usefulness of a micro high performance computing system as an educational tool","authors":"N. M. Mwasaga, M. Joy","doi":"10.1145/3415088.3415105","DOIUrl":"https://doi.org/10.1145/3415088.3415105","url":null,"abstract":"Access to High-Performance Computing (HPC) systems is an increasingly important problem in academia in emerging economies. Computer science curricula often offer courses that require an HPC system as an education supporting tool. This represents a problem in emerging economies due to the extensive financial resources that are required to acquire, host, and maintain it. To tackle this problem we investigate how a micro HPC system can be used in computer science courses to help the students acquire the knowledge and the skills required to utilize a fully-fledged HPC system. In this paper, we use four dimensions of the utilization of a micro HPC system to examine how these are related to one component of the technology acceptance model. In the evaluation of the usefulness of a micro HPC system, we have used design science research as the survey method. Research data were collected to evaluate the hypotheses that the acquisition of HPC skills and knowledge of engineering students in managing, maintaining, programming, and integration relate to the perceived usefulness of a micro HPC system. The results show that a micro HPC system is a useful artifact that can support computer science students in acquiring HPC skills and knowledge. The findings of this study support the usability of a micro HPC system by evaluating the usefulness of the system as an educational tool to support the transfer of HPC skills and knowledge in a resource-constrained environment.","PeriodicalId":274948,"journal":{"name":"Proceedings of the 2nd International Conference on Intelligent and Innovative Computing Applications","volume":"19 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126985089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Titus Haiduwa, V. Hashiyana, James Natangwe Samuel
{"title":"An Android-based application for convenient visitation at windhoek correctional facility","authors":"Titus Haiduwa, V. Hashiyana, James Natangwe Samuel","doi":"10.1145/3415088.3415127","DOIUrl":"https://doi.org/10.1145/3415088.3415127","url":null,"abstract":"A global outbreak of Coronavirus affected countries' economy, people's lives and businesses around the world due to lockdown restrictions imposed on everyday activities. Like elsewhere, logistics and visiting hours to correctional facilities in Namibia is no exception. Namibian correctional facilities are far located in remote areas, hence, visitation to these facilities tends to be cumbersome, time-consuming, costly and at times disappointing due to the lack of accurate and timely information. Also, the rate of imprisonment quadrupled due to unfortunate acts during the lockdown. In response to this challenges, authors of this paper developed an android-based application to support social distancing, help Namibians in locating their relatives and friends in Namibian rehabilitation centers and reduce recidivism while improving the morale and safety of inmates and workers amid the pandemic. This study adopted a mixed research methodology with a case study and an experimental as a research design. An Agile software development model has been used for the development of an application. Primary data were collected through open-ended questionnaires, direct observations in the prison and group interviews. The study has been also chiefly informed by related literature reviews, as secondary data. A simple random sampling technique has been used to select the respondents from a target population of thirty participants. The study concluded that the application developed was intelligent, innovative, helpful, easy and convenient to use. Mobile technology can drastically change how we can communicate. It has been recommended that the Ministry of Home Affairs, Safety and Security consider funding and fully implement this project in all thirteen correctional facilities across the country. As part of future work, a similar version of iOS is to be developed and possibly implement a remote and/or onsite Inmate video visitation.","PeriodicalId":274948,"journal":{"name":"Proceedings of the 2nd International Conference on Intelligent and Innovative Computing Applications","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121492662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DroidSecAware","authors":"Kevin Julius, M. Coetzee","doi":"10.1145/3415088.3415131","DOIUrl":"https://doi.org/10.1145/3415088.3415131","url":null,"abstract":"This paper presents DroidSecAware, a native Android application to assist Android users to be more aware of harmful applications that steal and gather their personal information on their Android devices. The current Android architecture allows users to decide what resource an application may access when the application is installed. If a malicious application is installed, it can gather sensitive information from users without their knowledge. To protect users by providing them with more awareness of the permissions requested by applications, DroidSecAware is proposed. DroidSecAware consists of three components that each target a specific aspect to secure Android devices and make users more aware of their actions. When combined these components provide an environment where users can learn and share knowledge on how to make better choices when installing applications on their Android devices. The results indicate that there is a need for such an application for users as they feel vulnerable when installing applications. DroidSecAware addressed this by providing an environment where Android users are supported by experts to make better permission choices.","PeriodicalId":274948,"journal":{"name":"Proceedings of the 2nd International Conference on Intelligent and Innovative Computing Applications","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131380884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proceedings of the 2nd International Conference on Intelligent and Innovative Computing Applications","authors":"","doi":"10.1145/3415088","DOIUrl":"https://doi.org/10.1145/3415088","url":null,"abstract":"","PeriodicalId":274948,"journal":{"name":"Proceedings of the 2nd International Conference on Intelligent and Innovative Computing Applications","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133323802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}