{"title":"African heritage: A true asset","authors":"A. Ronchi","doi":"10.1109/ISTAFRICA.2016.7530671","DOIUrl":"https://doi.org/10.1109/ISTAFRICA.2016.7530671","url":null,"abstract":"Globalisation is one of the key terms used to describe actual trends as positive, but there are many aspects of this concept that should be carefully considered, such as people's cultural identity. Africa is one of the most diverse and culturally rich continents in the world, something that is not widely known. Heritage is one of the building blocks of cohesion and solidarity of the society and in addition is one of the national resources that can contribute in the gross national income. It is acting as ambassador of the country and at the same time enriching the international community with new instances of culture. The present document describes a proposal in order to establish digital humanities curricula in the African continent and preserve, manage and exploit African Culture. The paper includes the description of the role of communication methodologies and formats enabled and empowered by information.","PeriodicalId":326074,"journal":{"name":"2016 IST-Africa Week Conference","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114710370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Transmitting a biomedical signal in a TV White Spaces Network","authors":"J. Pinifolo, S. Rimer","doi":"10.1109/ISTAFRICA.2016.7530634","DOIUrl":"https://doi.org/10.1109/ISTAFRICA.2016.7530634","url":null,"abstract":"In an effort to examine the heart condition, electrodes of Electrocardiogram (ECG) machine are placed on the skin of the patient thereby detecting depolarization and repolarisation of the myocardium which is the muscular tissue of the heart. The readings are therefore displayed on an electrocardiograph. It is therefore important to note that there is a technical limitation in obtaining readings in the sense that upon movement of the patient, the equipment equally moves hence artefact making interpretation difficult. This paper is therefore trying to eliminate the stated technical problem by designing a low cost solution incorporating an instrumentation amplifier with high common mode rejection ratio (CMRR) and the biomedical signal is transmitted from the patient in a remote hospital to the heart specialist for analysis using TV White Spaces network.","PeriodicalId":326074,"journal":{"name":"2016 IST-Africa Week Conference","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125061022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Classification of cyber attacks in South Africa","authors":"Renier van Heerden, Sune Von Soms, R. Mooi","doi":"10.1109/ISTAFRICA.2016.7530663","DOIUrl":"https://doi.org/10.1109/ISTAFRICA.2016.7530663","url":null,"abstract":"This paper introduces a classification scheme for the visual classification of cyber attacks. Through the use of the scheme, the impact of various cyber attacks throughout the history of South Africa are investigated and classified. The goal of this paper is to introduce a classification scheme that arranges attacks into different classes and sub-classes, which is presented visually. To enhance the visual description, each class has a maximum of three sub-classes, which can overlap. This classification scheme helps to show the diverse impacts of cyber attacks in South Africa. This method of classification can be used for the assessment of any cyber attack and to find similarities between attacks.","PeriodicalId":326074,"journal":{"name":"2016 IST-Africa Week Conference","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127748186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Main trade-offs for energy efficiency in cognitive radio networks","authors":"E. F. Orumwense, T. Afullo, V. Srivastava","doi":"10.1109/ISTAFRICA.2016.7530618","DOIUrl":"https://doi.org/10.1109/ISTAFRICA.2016.7530618","url":null,"abstract":"In this paper, we investigate the major trade-offs that relates to the energy efficiency in cognitive radio networks. We address five main trade-offs (QoS, network architecture, primary user interference, fairness and security) that are vital since they affect all the components of cognitive radio network's operability, design and implementation. The relationship between these trade-offs and how they affect each other is investigated. How to bring about higher energy efficiency while satisfying the different actors and elements in a cognitive radio network is also studied.","PeriodicalId":326074,"journal":{"name":"2016 IST-Africa Week Conference","volume":"73 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121271630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Promoting savings among low income earners in Kenya through mobile money","authors":"P. K. Wamuyu","doi":"10.1109/ISTAFRICA.2016.7530699","DOIUrl":"https://doi.org/10.1109/ISTAFRICA.2016.7530699","url":null,"abstract":"With most households in rural Kenya dependent on meagre wages from manual labor, the task of balancing immediate family needs with long-term financial goals is usually a difficult task, which in most cases leave families with minimal or no savings. This paper articulates a study to investigate the potential of using mobile money accounts as a money management platform that can help promote a savings culture as well as establish and nurture financial discipline among poor households in Kenya. Based on the premises that 41% of Kenyans do not save regularly because they do not have “enough money to live on let alone save for a rainy day”, the study examined innovative ways in which poor households could use mobile money accounts as a tool for financial inclusion, achieving household financial security, and enhancing family role performance. The study took place in Nairobi's Mathare slum. It aimed to understand, in depth, mobile money savings accounts usage among poor households. Key informants were low income traders, who earns a daily income of less than two dollars (about 200 Kenya Shillings). Data was collected using a questionnaire, informal conversations and contextual interviews and supplemented by in-depth interviews with managers from a leading mobile money service provider and the mobile money provider commercial banks. The study results indicates that lack of awareness on the available and affordable mobile money savings products, low interest rates on mobile money fixed deposit savings accounts and high transaction costs when making mobile money payments impacts negatively on mobile money fixed deposit savings accounts usage while availability of microcredit on mobile money savings accounts has a positive effect on the usage. The study provides policy and technology design recommendations that could aid in mobile money lock savings accounts acceptance.","PeriodicalId":326074,"journal":{"name":"2016 IST-Africa Week Conference","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126608439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"E-government websites user experience from public value perspective: Case study of iTax website in Kenya","authors":"G. Kamau, J. Njihia, A. Wausi","doi":"10.1109/ISTAFRICA.2016.7530631","DOIUrl":"https://doi.org/10.1109/ISTAFRICA.2016.7530631","url":null,"abstract":"The need to encourage citizens' adoption of e-government services has led to an increasing interest in the evaluation of e-government websites. The success of e-government websites depends on how well it is perceived by the end-users. User experience of e-government websites is considered one of important factors affecting the success or failure of e-government websites. However, researchers have focused on infrastructure issues not giving user experience of websites attention as one of the factors affect usage of government services. Focusing on the three high levels of UX components namely user internal state, the characteristic of the system and context and using hedonic/pragmatic quality model to measure the user experience. This study evaluated e-government websites UX from public value perspective. iTax website in Kenya was used as a case study. Findings are discussed with reference to previous research and recommendations for practice. Finally, further research works are offered.","PeriodicalId":326074,"journal":{"name":"2016 IST-Africa Week Conference","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122275214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Herselman, A. Botha, Hannes Toivanen, Jouko Myllyoja, Thomas Fogwill, R. Alberts
{"title":"A Digital Health Innovation Ecosystem for South Africa","authors":"M. Herselman, A. Botha, Hannes Toivanen, Jouko Myllyoja, Thomas Fogwill, R. Alberts","doi":"10.1109/ISTAFRICA.2016.7530615","DOIUrl":"https://doi.org/10.1109/ISTAFRICA.2016.7530615","url":null,"abstract":"The purpose of this paper is to provide an overview of how a digital health innovation ecosystem was conceptualised and validated for South Africa. Largely, we focus on defining strategies to build Digital Health Innovation Ecosystems in the context of developing countries, and pay particular attention to the challenges and potentials. Over a period of two years the conceptualisation was done by applying Design research as a methodology and the validation through two cycles of expert review feedback in order to improve the artifact. The conceptual digital health innovation ecosystem for South Africa portrays the inputs from research experts and practitioners in South Africa, Africa and Europe working in the Health domain. Feedback indicated that the conceptual digital health innovation ecosystem for South Africa is a good reflection of the realities of developing contexts where all role players and systems are indicated that affect digital health. This conceptualisation allows for the positioning of sub innovation ecosystems and related new products through applying an open innovation life cycle to improve the quality of life of ordinary citizens.","PeriodicalId":326074,"journal":{"name":"2016 IST-Africa Week Conference","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130552046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Context for the SA NREN Computer Security Incident Response Team","authors":"R. Mooi, R. Botha","doi":"10.1109/ISTAFRICA.2016.7530662","DOIUrl":"https://doi.org/10.1109/ISTAFRICA.2016.7530662","url":null,"abstract":"The South African (SA) National Research and Education Network (NREN) identified the requirement for a Computer Security Incident Response Team (CSIRT). This paper sets the context for the CSIRT by exploring the business requirements and associated decisions in five areas: the environment, constituency, authority, funding and legal considerations. The SA NREN CSIRT was categorised as an academic sector CSIRT serving the research and education community of South Africa with limited authority. The NREN is comprised of two organisations and the corresponding embedded, but distributed, organisational model makes this CSIRT case particularly interesting. Various cost recovery options and relevant South African laws and regulations were also identified. The resulting “strategic” framework sets the scene for the remainder of the establishment process. This paper is useful to anyone desiring to establish a CSIRT, or equivalent capability, who can follow a similar process to discover where to begin.","PeriodicalId":326074,"journal":{"name":"2016 IST-Africa Week Conference","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133964699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Scenario-based IT risk assessment in local government","authors":"U. Mcube, M. Gerber, Rossouw von Solms","doi":"10.1109/ISTAFRICA.2016.7530587","DOIUrl":"https://doi.org/10.1109/ISTAFRICA.2016.7530587","url":null,"abstract":"Information Technology (IT) has become an integral part of conducting business within organizations including local government. Local government depends heavily on the use of IT to achieve its goals and objectives. The use of IT poses a number of risks within local government. Thus it is important for IT to be governed adequately. Core to the governance of IT is the process of risk management. To conduct effective risk management, an adequate risk assessment must be conducted within its given context. The Auditor General identified lack of adequate risk assessments within local government in South Africa. The objective of this paper is to propose an automated scenario-based IT risk assessment process model for local government to improve risk assessment. The research study followed a design-oriented IS research approach to devise and revise the process model.","PeriodicalId":326074,"journal":{"name":"2016 IST-Africa Week Conference","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134073832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
B. Sithole, S. Rimer, K. Ouahada, C. Mikeka, J. Pinifolo
{"title":"Smart water leakage detection and metering device","authors":"B. Sithole, S. Rimer, K. Ouahada, C. Mikeka, J. Pinifolo","doi":"10.1109/ISTAFRICA.2016.7530612","DOIUrl":"https://doi.org/10.1109/ISTAFRICA.2016.7530612","url":null,"abstract":"Water is a scarce and valuable resource hence proper management of this resource is essential for social and economic development of any country because it is an input to almost all production in key sectors like Agriculture, Industry, Energy and Transport. Smart devices have transformed nearly every aspect of our home and this paper is presenting a practical low-cost Smart Water Meter Device which is capable of determining possible leakages in the customer's property and reporting current household water consumption levels in real time. Flow meter sensors have been deployed to measure the quantity of water consumer by a consumer. In turn, the flow rates and the amount of litres consumed will be displayed on the LCD display and they will also be sent through the GSM/GPRS module to the website. The system has been efficiently and carefully designed to minimise commercial losses.","PeriodicalId":326074,"journal":{"name":"2016 IST-Africa Week Conference","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134417289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}