South African Computer Journal最新文献

筛选
英文 中文
Waterfall and Agile information system project success rates – A South African perspective 瀑布和敏捷信息系统项目的成功率——一个南非的视角
South African Computer Journal Pub Date : 2020-07-22 DOI: 10.18489/sacj.v32i1.683
L. Khoza, C. Marnewick
{"title":"Waterfall and Agile information system project success rates – A South African perspective","authors":"L. Khoza, C. Marnewick","doi":"10.18489/sacj.v32i1.683","DOIUrl":"https://doi.org/10.18489/sacj.v32i1.683","url":null,"abstract":"Software projects are still failing at an alarming rate and do not provide value to the organisation at large. This has been the case for the last decade. Software projects use predominantly Waterfall as a methodology. This raises the question whether new ways of working can be introduced to improve the success rate. One such new way is Agile as an approach to developing software. A survey was done to determine whether Agile projects are more successful than Waterfall projects, thus contrasting the old and the new ways of working. Some 617 software projects were evaluated to determine the success rate based on the methodology used. Success was measured on a continuum of five levels and not just the triple constraint. The results imply that Agile projects are more successful than Waterfall projects to some extent, but that there are still concerns that need to be addressed.","PeriodicalId":55859,"journal":{"name":"South African Computer Journal","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48744607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A Survey of Automated Financial Statement Fraud Detection with Relevance to the South African Context 与南非背景相关的财务报表欺诈自动检测调查
South African Computer Journal Pub Date : 2020-07-22 DOI: 10.18489/sacj.v32i1.777
W. Mongwe, K. Malan
{"title":"A Survey of Automated Financial Statement Fraud Detection with Relevance to the South African Context","authors":"W. Mongwe, K. Malan","doi":"10.18489/sacj.v32i1.777","DOIUrl":"https://doi.org/10.18489/sacj.v32i1.777","url":null,"abstract":"Financial statement fraud has been on the increase in the past two decades and includes prominent scandals such as Enron, WorldCom and more recently in South Africa, Steinhoff. These scandals have led to billions of dollars being lost in the form of market capitalisation from different stock exchanges across the world. During this time, there has been an increase in the literature on applying automated methods to detecting financial statement fraud using publicly available data. This paper provides a survey of the literature on automated financial statement fraud detection and identifies current gaps in the literature. The paper highlights a number of important considerations in the implementation of financial statement fraud detection decision support systems, including 1) the definition of fraud, 2) features used for detecting fraud, 3) region of the case study, dataset size and imbalance, 4) algorithms used for detection, 5) approach to feature selection / feature engineering, 6) treatment of missing data, and 7) performance measure used. The current study discusses how these and other implementation factors could be approached within the South African context.","PeriodicalId":55859,"journal":{"name":"South African Computer Journal","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49488146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Perceptions of cyber bullying amongst student teachers in the Eastern Cape Province of South Africa 南非东开普省实习教师对网络欺凌的看法
South African Computer Journal Pub Date : 2020-07-22 DOI: 10.18489/sacj.v32i1.737
L. Cilliers, W. Chinyamurindi
{"title":"Perceptions of cyber bullying amongst student teachers in the Eastern Cape Province of South Africa","authors":"L. Cilliers, W. Chinyamurindi","doi":"10.18489/sacj.v32i1.737","DOIUrl":"https://doi.org/10.18489/sacj.v32i1.737","url":null,"abstract":"Cyber bullying has become a topical issue in South Africa. However, there is very little guidance and training for teachers on how to deal with cyber bullying in the classroom. This study investigated the perceptions of cyber bullying amongst student teachers in the Eastern Cape Province of South Africa. The backdrop of this study is a context where there is a proliferation of technologies in much of South African society. Within this, there are calls to not only investigate the positive side of technology but also aspects where technology may have a “dark” side. The study made use of a quantitative survey approach to collect data from 150 student teachers at a university in the Eastern Cape Province of South Africa. The student teachers were representative of all three the school phases used in South Africa. The results indicated that almost half of the student teachers had been victims of cyber bullying. Overall, cyber bullying was considered a serious issue for the student teachers but awareness of the prevalence of the issue decreased outside the classroom. The topic has not been incorporated into policy or the school curriculum in South Africa. The recommendation of the study is that the Department of Basic Education in South Africa must provide a standardised policy and curriculum that schools can use to implement and enforce cyber safety behaviour in the schools.","PeriodicalId":55859,"journal":{"name":"South African Computer Journal","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44017764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Obituary: KenMcGregor 作者:KenMcGregor
South African Computer Journal Pub Date : 2020-07-22 DOI: 10.18489/sacj.v32i1.863
S. Berman
{"title":"Obituary: KenMcGregor","authors":"S. Berman","doi":"10.18489/sacj.v32i1.863","DOIUrl":"https://doi.org/10.18489/sacj.v32i1.863","url":null,"abstract":"","PeriodicalId":55859,"journal":{"name":"South African Computer Journal","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48675133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Editorial: Coping with Covid 社论:应对新冠肺炎
South African Computer Journal Pub Date : 2020-07-22 DOI: 10.18489/sacj.v32i1.858
P. Machanick
{"title":"Editorial: Coping with Covid","authors":"P. Machanick","doi":"10.18489/sacj.v32i1.858","DOIUrl":"https://doi.org/10.18489/sacj.v32i1.858","url":null,"abstract":"I am pleased to report that SACJ has been able to publish on schedule in July 2020 despite the Covid-19 (SARS-CoV-2) pandemic. South Africa, like many other countries, has been severely impacted by prevention measures. South African academics have had to try to work out how to do remote delivery of courses with inadequate resources. At my own university, there has been a major upsurge in students supported by the National Student Financial Aid Scheme (NSFAS). These students are from poor families, many with no prior exposure to higher education, and from all over the country as well as further afield. As one of the country’s smallest universities, we have also become one of the most diverse. I hope we do not lose significant numbers of students to the additional academic stresses. In this editorial I look at how academia can respond to a crisis like this. I also outline an upcoming special issue and some transitions including a sad event arising from the pandemic, a warning to all of us.","PeriodicalId":55859,"journal":{"name":"South African Computer Journal","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42662113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An OpenCL-based parallel acceleration of aSobel edge detection algorithm Using IntelFPGA technology 基于OpenCL的基于IntelFPGA技术的Sobel边缘检测并行加速算法
South African Computer Journal Pub Date : 2020-07-22 DOI: 10.18489/sacj.v32i1.749
Abedalmuhdi Almomany, A. Al-Omari, Amin Jarrah, M. Tawalbeh, A. Alqudah
{"title":"An OpenCL-based parallel acceleration of aSobel edge detection algorithm Using IntelFPGA technology","authors":"Abedalmuhdi Almomany, A. Al-Omari, Amin Jarrah, M. Tawalbeh, A. Alqudah","doi":"10.18489/sacj.v32i1.749","DOIUrl":"https://doi.org/10.18489/sacj.v32i1.749","url":null,"abstract":"This paper examines the feasibility of using commercial out-of-the-box reconfigurable field programmable gate array (FPGA) technology and the open computing language (OpenCL) framework to create an efficient Sobel edge-detection implementation, which is considered a fundamental aspect of image and video processing. This implementation enhances speedup and energy consumption attributes when compared to general single-core processors. We created the proposed approach at a high level of abstraction and executed it on a high commodity Intel FPGA platform (an Intel De5-net device was used). This approach was designed in a manner that allows the high-level compiler/synthesis tool to manipulate a task-parallelism model. The most promising FPGA and conventional implementations were compared to their single-core CPU software equivalents. For these comparisons, local-memory, pipelining, loop unrolling, vectorization, internal channel mechanisms, and memory coalescing were manipulated to provide a much more effective hardware design. The run-time and power consumption attributes were estimated for each implementation, resulting in up to 37-fold improvement of the execution/transfer time and up to a 53-fold improvement in energy consumption when compared to a specific single-core CPU-based implementation.","PeriodicalId":55859,"journal":{"name":"South African Computer Journal","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48173454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Protection of personal information: An experiment involving data value chains and the use of personal information for marketing purposes in South Africa 保护个人信息:在南非进行的一项涉及数据价值链和将个人信息用于营销目的的实验
South African Computer Journal Pub Date : 2020-03-31 DOI: 10.18489/sacj.v32i1.712
Benson Zenda, R. Vorster, Adéle da Veiga
{"title":"Protection of personal information: An experiment involving data value chains and the use of personal information for marketing purposes in South Africa","authors":"Benson Zenda, R. Vorster, Adéle da Veiga","doi":"10.18489/sacj.v32i1.712","DOIUrl":"https://doi.org/10.18489/sacj.v32i1.712","url":null,"abstract":"South Africa enacted the Protection of Personal Information Act 4 of 2013 (POPI) in an effort to curb the misuse of customers’ personal information by organisations. The aim of this research was to establish whether the South African insurance industry is adhering to certain prescripts of POPI, focusing on direct marketing requirements. An experiment was utilised to monitor the flow of personal information submitted to 20 insurance companies requesting short-term insurance quotations, using new e-mail addresses and phone numbers. The results of the experiment indicate that 92% of the marketing communication received did not have prior consent from the researcher. Contact was made by companies outside the sample, indicating third-party sharing. 86% of the unsolicited short message service (SMS) communication received required customers to pay for unsubscribing from SMSs, which is not in line with regulatory requirements. The non-compliance evident in this experiment acts as an early warning to the insurance industry and South Africa, prompting a more concerted effort towards preparation of compliance with POPI. A personal information processing management framework is proposed to aid the insurance industry in understanding how personal information can be processed in line with the requirements of the Act.","PeriodicalId":55859,"journal":{"name":"South African Computer Journal","volume":"32 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41644241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Editorial: ICT in Education 社论:教育中的信息通信技术
South African Computer Journal Pub Date : 2017-10-13 DOI: 10.18489/sacj.v29i2.547
R. Dlamini, E. Coleman
{"title":"Editorial: ICT in Education","authors":"R. Dlamini, E. Coleman","doi":"10.18489/sacj.v29i2.547","DOIUrl":"https://doi.org/10.18489/sacj.v29i2.547","url":null,"abstract":"","PeriodicalId":55859,"journal":{"name":"South African Computer Journal","volume":"39 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67990699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Upper bounds on the performance of discretisation in reinforcement learning : research article 强化学习中离散化性能的上界:研究文章
South African Computer Journal Pub Date : 2015-12-10 DOI: 10.18489/SACJ.V0I57.284
Michael Mitchley
{"title":"Upper bounds on the performance of discretisation in reinforcement learning : research article","authors":"Michael Mitchley","doi":"10.18489/SACJ.V0I57.284","DOIUrl":"https://doi.org/10.18489/SACJ.V0I57.284","url":null,"abstract":"Reinforcement learning is a machine learning framework whereby an agent learns to perform a task by maximising its total reward received for selecting actions in each state. The policy mapping states to actions that the agent learns is either represented explicitly, or implicitly through a value function. It is common in reinforcement learning to discretise a continuous state space using tile coding or binary features. We prove an upper bound on the performance of discretisation for direct policy representation or value function approximation.","PeriodicalId":55859,"journal":{"name":"South African Computer Journal","volume":"57 1","pages":"24-31"},"PeriodicalIF":0.0,"publicationDate":"2015-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67990307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Virtual Learning System Usage in Higher Education – A Study at Two South African Institutions 虚拟学习系统在高等教育中的应用——两所南非机构的研究
South African Computer Journal Pub Date : 2015-12-10 DOI: 10.18489/SACJ.V0I57.324
I. Padayachee, A. V. D. Merwe, P. Kotzé
{"title":"Virtual Learning System Usage in Higher Education – A Study at Two South African Institutions","authors":"I. Padayachee, A. V. D. Merwe, P. Kotzé","doi":"10.18489/SACJ.V0I57.324","DOIUrl":"https://doi.org/10.18489/SACJ.V0I57.324","url":null,"abstract":"In higher education institutions various VLSs have been formally adopted to support online teaching and learning. However, there has been little research on patterns of VLS use among educators. The purpose of the research was to provide a descriptive analysis of VLS feature usage, and associated challenges at two South African higher education institutions. A case study research strategy was adopted, combining qualitative and quantitative approaches to data collection and analysis. Survey findings revealed four clusters of VLS feature usage, namely, communication, management, content and pedagogic. Analysis showed that the ‘content cluster’ was used more than the other clusters. The average usage of the ‘pedagogic cluster’ for Durban University of Technology (DUT) was significantly greater than that of University of KwaZulu-Natal (UKZN), which tentatively indicates that staff development seems to be an important aspect of VLS usage. There was no significant difference in the usage of the ‘communication’ and ‘management’ clusters between the two institutions, DUT and UKZN. The study contributes to the body of system utilisation research by confirming an uneven pattern of VLS feature usage among educators, whilst providing fresh insights into the challenges associated with the usage of two different VLSs in two different universities.","PeriodicalId":55859,"journal":{"name":"South African Computer Journal","volume":"44 1","pages":"32-57"},"PeriodicalIF":0.0,"publicationDate":"2015-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67990762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信