{"title":"Behaviour Prediction in a Learning Management System","authors":"Charles Lwande, Lawrence Muchemi, Robert O. Oboko","doi":"10.23919/ISTAFRICA.2019.8764877","DOIUrl":"https://doi.org/10.23919/ISTAFRICA.2019.8764877","url":null,"abstract":"Learning Management Systems (LMS) lack automated intelligent components that analyse data and classify learners in terms of their respective characteristics. Manual methods involving administering questionnaire related to a specific learning style and cognitive psychometric tests have been used to identify such behaviour. The problem such method is that a leaner can give inaccurate information, time consuming and prone to errors. Although literature reports complex models predicting leaning styles, only a few have used machine learning methods such as k-nearest neighbour (KNN). The primary objective of this study was to design, develop and evaluate a model based on machine learning model for predicting LS from LMS log records. Approximately 200,000 log records of 199 students who had accessed e-Learning course for a 15-week semester were extracted from LMS to create a dataset. Machine learning concepts were identified from the log records. The dataset was split into training and testing set. A model using K-NN algorithm designed and implemented on using r-studio programming language. The model was trained to predict LS and classify each student based on FSLSM. From this, a model predicting learning behaviour based on the theory was developed and evaluated. Preliminary results are promising demonstrating the model after full validation can be relied on to identify the LS.","PeriodicalId":420572,"journal":{"name":"2019 IST-Africa Week Conference (IST-Africa)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129829902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Empirical Assessment of the Effectiveness of Business Intelligence Tools: Case of Free State Government Departments","authors":"T. Moloabi","doi":"10.23919/ISTAFRICA.2019.8764873","DOIUrl":"https://doi.org/10.23919/ISTAFRICA.2019.8764873","url":null,"abstract":"In this paper, we employ a multi-pronged analytical approach (qualitative survey and factor analysis) to empirically analyze the usage and effectiveness of a widely used business intelligence tool, namely the Vulindela System (VS) in prominent service-oriented government departments (Provincial Treasury, Health and CoGTA) in the Free State province in South Africa. Using the novel Task Technology Fit theoretical framework proposed by Goodhue (1995) as an evaluation benchmark, we compute two principal component analysis (PCA) models to identify key latent features of the VS technology. We find evidence for both bi-directional and unidirectional links between the operational capacity, usability and functionality of the VS and executed tasks, productivity and decision-making capability of the main users. The empirical result suggest that the strength of VS lies in its ability to perform unstructured tasks, collate information, improve decision making and productivity but the operational capacity and functionality of the system is constrained due to incompatibility to meet user’s task profile and inflexibility to execute new task demanded. Based on these findings, the reliability and usability of the VS can be improved by testing the system in different network environment and continuous development of new software, upgrade of operating systems.","PeriodicalId":420572,"journal":{"name":"2019 IST-Africa Week Conference (IST-Africa)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121192803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of the Adoption and Use of ICT for e-Government Services: The Case of Mozambique","authors":"Domingos Rhongo, A. D. Almeida, Nunoo David","doi":"10.23919/ISTAFRICA.2019.8764866","DOIUrl":"https://doi.org/10.23919/ISTAFRICA.2019.8764866","url":null,"abstract":"The relevance of e-government for the modernisation of public services motivated this study on the Mozambican citizens’ attitude towards the use and acceptance of ICTs for e-government. This paper analyses the presence of communication infrastructure in Mozambican villages and the adoption and acceptance of electronic services accessible through computer and mobile devices, considering a sample group of e-learning students of the Catholic University of Mozambique. The results were obtained through a questionnaire, which comprehended the levels of technological usage and acceptance of ICTs and e-services. All the participants have used ICT devices and are aware of its importance. This study suggests that facilitating conditions influence the intention of using e-government, as well as the user’s behaviour. The presence of telecommunications network infrastructure in all districts of the country and the device’s price value plays an important role for using the technology. Additionally, the study hints at the relationship between various socio-economic factors in Mozambique and the use and acceptance of these technologies, such as gender and literacy, which are relevant to public policies in this domain.","PeriodicalId":420572,"journal":{"name":"2019 IST-Africa Week Conference (IST-Africa)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124114745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Role of Technology in Monitoring Inter-institutional Lecturers’ Teaching Workload in Kenya","authors":"Evans M. Ombati, Simon M. Karume, M. Thiga","doi":"10.23919/ISTAFRICA.2019.8764885","DOIUrl":"https://doi.org/10.23919/ISTAFRICA.2019.8764885","url":null,"abstract":"The teaching profession has one of the highest numbers of workforce grappling with unmanageable workload. Excessive lecturers’ workload causes adverse effects to both employer and employee. Lecturers are assigned lectures in multiple independent learning institutions and there is no platform to foster interuniversity communication regarding the shared lecturers’ employment state, tenure and lecturing obligations. The Commission for University Education has guidelines set to limit the maximum lecturer workload and yet there is no way to monitor inter institution lecturers’ teaching workload. There’s the need to employ technology to address this problem. Existing models have no capability to monitor cross-campus lecturers’ workload, they rather concentrate on the business aspect of automating scheduling of lectures, tutor recruitment. Triangulation methodology was used to conduct this study while proof of concept methodology was applied to develop the model. Research questions were answered through engaging industry experts in a validation exercise. Feedback received indicated that the model would be an efficient tool in safeguarding lecturers against burnout arising from unmanageable workload. Management, human and technical challenges are anticipated during the adoption phase of the model. Further research should be undertaken to develop models to monitor a lecturer’s inter-institution teaching workload using identified alternative quantifiable attributes.","PeriodicalId":420572,"journal":{"name":"2019 IST-Africa Week Conference (IST-Africa)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116976984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Institutional Pressures and Cloud Computing Adoption: The Moderating Effect of Organizational Mindfulness","authors":"J. Oredo, J. Njihia, X. Iraki","doi":"10.23919/ISTAFRICA.2019.8764832","DOIUrl":"https://doi.org/10.23919/ISTAFRICA.2019.8764832","url":null,"abstract":"The literature on cloud computing adoption has grown substantially. Most of the focus on the antecedents of cloud computing adoption. While some of these studies have investigated the relationship between institutional pressures and cloud computing adoption, there is a dearth of empirical literature on how organizations can moderate the bandwagon effect of institutional pressures. The current study aims at investigating the moderating role of organizational mindfulness on the relationship between institutional pressures and cloud computing adoption. A priori model was developed and tested through SEM. A firm level cross sectional survey was conducted on a sample of 60 financial institutions. The results indicate that organizational mindfulness has a small moderating effect on the relationship between institutional pressures and cloud computing adoption. An implication of this study is that financial institutions, should adopt cloud services that suite their own individual needs discerned through mindfulness rather than following institutional bandwagons.","PeriodicalId":420572,"journal":{"name":"2019 IST-Africa Week Conference (IST-Africa)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114362557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Scenario-Based Digital Forensic Investigation of Compromised MySQL Database","authors":"T. Hungwe, H. Venter, V. Kebande","doi":"10.23919/ISTAFRICA.2019.8764819","DOIUrl":"https://doi.org/10.23919/ISTAFRICA.2019.8764819","url":null,"abstract":"Insider and outsider database threats have more often than not posed a greater challenge as far as integrity and investigation of databases is concerned. Database forensic investigation is a process through which scientifically proven methods can be used to create a hypothesis that can prove or disprove the occurrence of a potential security incident. This paper explores the techniques that can be used to conduct forensic investigations of a compromised MySQL database. The authors have simulated investigative scenarios that have aided to conduct forensic investigative processes and the results are promising.","PeriodicalId":420572,"journal":{"name":"2019 IST-Africa Week Conference (IST-Africa)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114727628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FileLinker: Simple Peer-to-Peer File Sharing Using Wi-Fi Direct and NFC","authors":"Keith Kwan, B. Greaves","doi":"10.23919/ISTAFRICA.2019.8764840","DOIUrl":"https://doi.org/10.23919/ISTAFRICA.2019.8764840","url":null,"abstract":"In Africa there is a lack of wired infrastructure to enable the free sharing of files and information which has led to the uptake of wireless infrastructure and mobile device utilisation. Even with the abundance of wireless technology, there are still very few user-friendly approached to share files and information without incurring service provider costs to the user. This research proposes a peer-to-peer model for sharing files and information between smart devices using Wi-Fi-Direct. FileLinker is a model developed to enable the scheduling of files without the cumbersome interactions required by many other peer-to-peer sharing applications. The contribution of this work is made by making FileLinker able to pre-setup sharing schedules that enable users to collect files when they can be near the sharer. A streamlined setup method is implemented that utilises NFC to reduce user inputs, thus enabling a tap-to-whitelist device approach, built around simplicity and usability. The researchers also document and evaluate the FileLinker prototype.","PeriodicalId":420572,"journal":{"name":"2019 IST-Africa Week Conference (IST-Africa)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123915865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Model for Visual and Intuitive Crime Investigation Based on Associative Rule Mining Technique (VICIBARM): A Case Study of Kenya","authors":"Edigar Adero, G. Okeyo, W. Mwangi","doi":"10.23919/ISTAFRICA.2019.8764876","DOIUrl":"https://doi.org/10.23919/ISTAFRICA.2019.8764876","url":null,"abstract":"Crime has been part of our society ever since the concept of laws was first approved. There is an increased concern at governance level due to escalating levels of crime both internationally as well as locally in Kenya. Large amounts of raw data are recorded in the occurrence books of many police stations. This data can be intelligently analyzed and visualized to assist law enforcement agencies in understanding these crimes and taking steps to ensure they remain ahead of the criminal elements. Data mining and visual analysis can be used for advanced crime analysis. In this article, the researcher suggests the use of Associative Rule Mining to come up with a model suitable for crime analysis and prevention using Apriori algorithm to represent mutual implications among criminal occurrences. This model is aimed at providing better understanding of crime patterns and helping law enforcement plan on preventive future crime policy.","PeriodicalId":420572,"journal":{"name":"2019 IST-Africa Week Conference (IST-Africa)","volume":"31 Suppl 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116626262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Edge Computing for Emerging Markets Addressing African Needs","authors":"Mxolisi Mtshali, S. Dlamini, M. Adigun, P. Mudali","doi":"10.23919/ISTAFRICA.2019.8764842","DOIUrl":"https://doi.org/10.23919/ISTAFRICA.2019.8764842","url":null,"abstract":"With the pacing of the next industrial revolution and adoption of industrial internet of things. It’s difficult for emerging markets to keep-up with the pacing evolution of technology due to economic reasons of course. However, edge computing has emerged as a promising technology that also caters for emerging markets enabling them to pace up with the evolution of technology. Edge computing is defined as distributed computing paradigm in which computation is largely or completely performed on distributed edge device nodes known as edge computing nodes as opposed to primarily taking place in a centralized cloud environment. This computing paradigm has been adopted mostly to reduce the workload from cloud computing or to provide computing closer to the user in order to improve performance. This paper presents a review of three edge deployment architectures focusing on their impact on emerging markets. Furthermore, present discussion of use cases in emerging markets and their business case. We then provide a framework promising to cater for edge challenges and finally provide simulation results performed on iFogSim as a framework proof of concept. The simulation result shows edge perfoms better than cloud interms of resource use. Therefore, the proposed framework is recommended and reliable for emerging markets use cases. This work only modelled a precision farming use case.","PeriodicalId":420572,"journal":{"name":"2019 IST-Africa Week Conference (IST-Africa)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122399212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. Iyawa, Wanano Masikara, J. Osakwe, Collins O Oduor
{"title":"CS Challenger: Gamifying the Learning of Computer Science Concepts through a Mobile Application Platform","authors":"G. Iyawa, Wanano Masikara, J. Osakwe, Collins O Oduor","doi":"10.23919/ISTAFRICA.2019.8764865","DOIUrl":"https://doi.org/10.23919/ISTAFRICA.2019.8764865","url":null,"abstract":"There is a huge dropout rate among Computer Science students at the University of Namibia (UNAM). This can be attributed to the lack of engaging methods for learning both basic and advanced computational concepts. Despite gamification concepts in learning discussed in the literature, no study addresses the modules with very high failure rates among Computer Science students at UNAM using the concept of gamification. The purpose of this paper was to present the design, development, and evaluation of CS Challenger. CS Challenger is a mobile application which was developed to motivate students through interactive gaming techniques to facilitate rewards and rankings. For the first time in the Namibian context, a contextualised mobile app was developed to gamify the concepts of five modules offered to Computer Science students at UNAM. The results from the evaluation suggest that CS Challenger provides a motivating environment in which students can quickly grasp the concept of a subject. The findings of the study are expected to inform managers in education in Namibia on alternative means of providing gamified learning content to students.","PeriodicalId":420572,"journal":{"name":"2019 IST-Africa Week Conference (IST-Africa)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124920500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}