首页 > 最新文献

2022 1st Zimbabwe Conference of Information and Communication Technologies (ZCICT)最新文献

英文 中文
Shrinking the digital divide in online learning beyond the COVID-19 pandemic: A Systematic Literature Review 在COVID-19大流行之后缩小在线学习中的数字鸿沟:系统文献综述
Pub Date : 2022-11-09 DOI: 10.1109/ZCICT55726.2022.10046024
Kudakwashe Maguraushe, Fine Masimba, Meshack Muderedzwa
The emergence of the COVID-19 pandemic disrupted many businesses, including the education sector. As the World Health organization (WHO) urged numerous countries worldwide to implement lockdowns and social distancing laws to curb the spread of the pandemic, higher education institutions responded by embarking on online learning. This article aims to use the systematic literature review to review articles on reducing the digital divide in online learning during the COVID-19 pandemic. Using the technology-organisationenvironment (TOE) model, the benefits and challenges profiled will aid in proffering a way forward in handling and managing the digital divide beyond the COVID-19 pandemic in online learning. Using the keywords: digital divide, COVID-19 and online learning to search from online databases, the inclusion criteria resulted in 10 articles being reviewed. The articles revealed that: students faced many technological challenges in connecting to online learning during the COVID-19 epidemic, students need to be properly trained to be able to use online learning systems and they need to subside data packages for many students to afford the data. The study concludes and recommends that the TOE model can be used to elucidate the effects of the digital divide in online learning. The technological, organisational and environmental factors can help proffer a sustainable online learning model for the future, beyond COVID-19 pandemic.
COVID-19大流行的出现扰乱了包括教育部门在内的许多企业。随着世界卫生组织(世卫组织)敦促世界各国实施封锁和社会距离法,以遏制疫情的蔓延,高等教育机构开始了在线学习。本文旨在采用系统文献综述的方法,对新冠肺炎大流行期间在线学习中缩小数字鸿沟的相关文章进行综述。使用技术-组织-环境(TOE)模型,所描述的好处和挑战将有助于为处理和管理在线学习中的COVID-19大流行之外的数字鸿沟提供前进的道路。通过“数字鸿沟”、“COVID-19”和“在线学习”等关键词在在线数据库中进行搜索,最终纳入了10篇文章。文章显示:在2019冠状病毒病疫情期间,学生在连接在线学习方面面临许多技术挑战,学生需要接受适当的培训,以便能够使用在线学习系统,他们需要为许多学生提供数据包,以负担得起数据。该研究的结论和建议,TOE模型可以用来阐明数字鸿沟对在线学习的影响。技术、组织和环境因素有助于在COVID-19大流行之后为未来提供可持续的在线学习模式。
{"title":"Shrinking the digital divide in online learning beyond the COVID-19 pandemic: A Systematic Literature Review","authors":"Kudakwashe Maguraushe, Fine Masimba, Meshack Muderedzwa","doi":"10.1109/ZCICT55726.2022.10046024","DOIUrl":"https://doi.org/10.1109/ZCICT55726.2022.10046024","url":null,"abstract":"The emergence of the COVID-19 pandemic disrupted many businesses, including the education sector. As the World Health organization (WHO) urged numerous countries worldwide to implement lockdowns and social distancing laws to curb the spread of the pandemic, higher education institutions responded by embarking on online learning. This article aims to use the systematic literature review to review articles on reducing the digital divide in online learning during the COVID-19 pandemic. Using the technology-organisationenvironment (TOE) model, the benefits and challenges profiled will aid in proffering a way forward in handling and managing the digital divide beyond the COVID-19 pandemic in online learning. Using the keywords: digital divide, COVID-19 and online learning to search from online databases, the inclusion criteria resulted in 10 articles being reviewed. The articles revealed that: students faced many technological challenges in connecting to online learning during the COVID-19 epidemic, students need to be properly trained to be able to use online learning systems and they need to subside data packages for many students to afford the data. The study concludes and recommends that the TOE model can be used to elucidate the effects of the digital divide in online learning. The technological, organisational and environmental factors can help proffer a sustainable online learning model for the future, beyond COVID-19 pandemic.","PeriodicalId":125540,"journal":{"name":"2022 1st Zimbabwe Conference of Information and Communication Technologies (ZCICT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115076025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Precision Fish Farming Systems: A Mapping Study 精准养鱼系统:地图研究
Pub Date : 2022-11-09 DOI: 10.1109/ZCICT55726.2022.10045996
Siqabukile Ndlovu, Sibonile Moyo, S. Nleya, S. Dube
Smart agriculture is one of the recognized practices to food security. Also known as precision agriculture, smart agriculture is largely deployed over the Internet through the use of connected sensors and intelligent devices. Smart agriculture has been implemented in a number of forms to include smart crop farming, smart animal farming in general and recently has been adopted in smart fish farming. Fish farming is a complex process as several variables have to be controlled to ensure optimum conditions for healthy fish production. Ensuring an optimum water environment requires skilled labour and resources which may not always be available. To solve this problem, researchers have turned to precision fish farming as a means of ensuring maximum fish production. This paper reviews existing literature to identify primary studies discussing IoT web-based fish farming systems, with the aim of creating a systematic map of the studies. Peer reviewed studies published through conferences and journals were identified through database search and snowballing. Analysis of the identified papers shows that researchers in these environments have used various techniques and technologies to implement IoT based smart fish farming systems. The most popular approach being the use of sensors to monitor the pH, temperature, dissolved oxygen content and turbidity of the water. Majority of the studies reviewed report effectiveness of their methods in improving fish quality, and lowering of production costs. This systematic map would be useful to fish farmers as it shows successful IoT based implementations, hence serving as a guide to existing and new farmers. It would also be useful to IoT technology designers as it shows gaps and shortcomings in these technologies probing for more research in the area.
智慧农业是公认的粮食安全实践之一。智能农业也被称为精准农业,主要通过使用连接的传感器和智能设备在互联网上进行部署。智能农业已经以多种形式实施,包括智能作物种植、智能动物养殖,最近还被应用于智能养鱼。养鱼是一个复杂的过程,因为必须控制几个变量,以确保健康鱼类生产的最佳条件。确保最佳的水环境需要熟练的劳动力和资源,而这些并不总是可用的。为了解决这个问题,研究人员转向了精确的养鱼,作为确保鱼类产量最大化的一种手段。本文回顾了现有文献,以确定讨论基于物联网的鱼类养殖系统的主要研究,目的是创建系统的研究地图。通过会议和期刊发表的同行评议研究是通过数据库搜索和滚雪球的方式确定的。对这些论文的分析表明,这些环境中的研究人员已经使用了各种技术和技术来实现基于物联网的智能养鱼系统。最流行的方法是使用传感器来监测pH值、温度、溶解氧含量和水的浊度。所审查的大多数研究报告了其方法在提高鱼类质量和降低生产成本方面的有效性。这个系统的地图对养鱼户很有用,因为它显示了基于物联网的成功实施,因此可以作为现有和新养殖户的指南。它对物联网技术设计师也很有用,因为它显示了这些技术在探索该领域更多研究方面的差距和缺点。
{"title":"Precision Fish Farming Systems: A Mapping Study","authors":"Siqabukile Ndlovu, Sibonile Moyo, S. Nleya, S. Dube","doi":"10.1109/ZCICT55726.2022.10045996","DOIUrl":"https://doi.org/10.1109/ZCICT55726.2022.10045996","url":null,"abstract":"Smart agriculture is one of the recognized practices to food security. Also known as precision agriculture, smart agriculture is largely deployed over the Internet through the use of connected sensors and intelligent devices. Smart agriculture has been implemented in a number of forms to include smart crop farming, smart animal farming in general and recently has been adopted in smart fish farming. Fish farming is a complex process as several variables have to be controlled to ensure optimum conditions for healthy fish production. Ensuring an optimum water environment requires skilled labour and resources which may not always be available. To solve this problem, researchers have turned to precision fish farming as a means of ensuring maximum fish production. This paper reviews existing literature to identify primary studies discussing IoT web-based fish farming systems, with the aim of creating a systematic map of the studies. Peer reviewed studies published through conferences and journals were identified through database search and snowballing. Analysis of the identified papers shows that researchers in these environments have used various techniques and technologies to implement IoT based smart fish farming systems. The most popular approach being the use of sensors to monitor the pH, temperature, dissolved oxygen content and turbidity of the water. Majority of the studies reviewed report effectiveness of their methods in improving fish quality, and lowering of production costs. This systematic map would be useful to fish farmers as it shows successful IoT based implementations, hence serving as a guide to existing and new farmers. It would also be useful to IoT technology designers as it shows gaps and shortcomings in these technologies probing for more research in the area.","PeriodicalId":125540,"journal":{"name":"2022 1st Zimbabwe Conference of Information and Communication Technologies (ZCICT)","volume":"298 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122739247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Insurance Fraud Detection using Machine Learning 利用机器学习进行保险欺诈检测
Pub Date : 2022-11-09 DOI: 10.1109/ZCICT55726.2022.10046034
Machinya Tongesai, Godfrey Mbizo, Kudakwashe Zvarevashe
Many insurance companies today deal with the issue of fraudulent insurance claims, which results in significant yearly financial loss. Since the losses are covered by raising policyholders’ premium costs, these frauds have a negative impact on society. The traditional claim investigation procedure has also been blamed for producing unreliable conclusions because it is time-consuming and laborious. Therefore, using machine learning and the XGBoost method, we construct an automated fraud detection application framework in this study. Accurately identifying fraud claims in a shorter amount of time is the goal. Data analysis is utilized throughout the process to validate, sanitize, and extract the pertinent data. As a result, the insurance firm can retain its reputation outside by employing this structure and has a reliable relationship with clients that they can share.
今天,许多保险公司处理欺诈性保险索赔问题,这导致每年重大的经济损失。由于这些损失是通过提高投保人的保费来弥补的,这些欺诈行为对社会产生了负面影响。传统的索赔调查程序也被指责得出不可靠的结论,因为它耗时费力。因此,在本研究中,我们使用机器学习和XGBoost方法构建了一个自动欺诈检测应用框架。目标是在更短的时间内准确识别欺诈索赔。在整个过程中使用数据分析来验证、清理和提取相关数据。因此,保险公司可以通过采用这种结构来保持其外部声誉,并与他们可以共享的客户建立可靠的关系。
{"title":"Insurance Fraud Detection using Machine Learning","authors":"Machinya Tongesai, Godfrey Mbizo, Kudakwashe Zvarevashe","doi":"10.1109/ZCICT55726.2022.10046034","DOIUrl":"https://doi.org/10.1109/ZCICT55726.2022.10046034","url":null,"abstract":"Many insurance companies today deal with the issue of fraudulent insurance claims, which results in significant yearly financial loss. Since the losses are covered by raising policyholders’ premium costs, these frauds have a negative impact on society. The traditional claim investigation procedure has also been blamed for producing unreliable conclusions because it is time-consuming and laborious. Therefore, using machine learning and the XGBoost method, we construct an automated fraud detection application framework in this study. Accurately identifying fraud claims in a shorter amount of time is the goal. Data analysis is utilized throughout the process to validate, sanitize, and extract the pertinent data. As a result, the insurance firm can retain its reputation outside by employing this structure and has a reliable relationship with clients that they can share.","PeriodicalId":125540,"journal":{"name":"2022 1st Zimbabwe Conference of Information and Communication Technologies (ZCICT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117124694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Modelling Lanchester Style DDOS Attack and Defense Lanchester式DDOS攻击与防御建模
Pub Date : 2022-11-09 DOI: 10.1109/ZCICT55726.2022.10045998
S. Nleya, M. Velempini, T. T. Gotora
This paper aims to analyze the DDOS problem and describe it using differential equations. Using two armies engaged in conflict according to Lanchester’s Square Law. The other army protects itself when one army attacks it. Applying the generalized Lanchester Square Law to the DDOS problem. Our present 5G Software Defined Network security network technologies act as the army that must defend itself against hackers employing a Bot network. According to numerical simulation, the defense mechanism also grows as the attack strength does.
本文旨在分析DDOS问题,并用微分方程对其进行描述。根据兰彻斯特平方定律,两军交战。当一方军队攻击另一方军队时,另一方军队保护自己。广义Lanchester平方律在DDOS问题中的应用。我们目前的5G软件定义网络安全网络技术就像军队一样,必须保护自己免受黑客利用Bot网络的攻击。数值模拟表明,防御机制也随着攻击强度的增加而增长。
{"title":"Modelling Lanchester Style DDOS Attack and Defense","authors":"S. Nleya, M. Velempini, T. T. Gotora","doi":"10.1109/ZCICT55726.2022.10045998","DOIUrl":"https://doi.org/10.1109/ZCICT55726.2022.10045998","url":null,"abstract":"This paper aims to analyze the DDOS problem and describe it using differential equations. Using two armies engaged in conflict according to Lanchester’s Square Law. The other army protects itself when one army attacks it. Applying the generalized Lanchester Square Law to the DDOS problem. Our present 5G Software Defined Network security network technologies act as the army that must defend itself against hackers employing a Bot network. According to numerical simulation, the defense mechanism also grows as the attack strength does.","PeriodicalId":125540,"journal":{"name":"2022 1st Zimbabwe Conference of Information and Communication Technologies (ZCICT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125620919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Classification of Rice varieties using DMLP-PCA inspired features with MVE Classifier 基于MVE分类器的DMLP-PCA特征的水稻品种分类
Pub Date : 2022-11-09 DOI: 10.1109/ZCICT55726.2022.10046040
Jerita Chibhabha, Kudakwashe Zvarevashe, Leslie Kudzai Nyandoro, T. Matekenya, B. Mapako
The classification of varieties of rice from images is one of the most difficult tasks in computer vision. This complex process is normally applied in automating packaging systems used in production companies. Most companies opt for this option because the alternative way of doing it manually is time consuming, monotonous and prone to expensive errors. To refine the process, there is need to interrogate the features because a classification algorithm is as good as the features used. Therefore, this paper presents Deep Multi-Layer Perceptron generated features. In addition, the paper also introduces the Majority Voting Ensemble (MVE) classifier. The technique was evaluated against CNN (Convolution Neural Network) generated features as well as other traditional classifiers. The proposed solution performed better than the other methods including end-to-end deep learning models.
从图像中分类水稻品种是计算机视觉中最困难的任务之一。这个复杂的过程通常应用于生产公司使用的自动化包装系统。大多数公司都选择这个选项,因为手动操作的替代方法既耗时又单调,而且容易出现代价高昂的错误。为了改进这个过程,需要询问特征,因为分类算法和使用的特征一样好。因此,本文提出了Deep Multi-Layer Perceptron生成的特征。此外,本文还介绍了多数投票集成(MVE)分类器。该技术与CNN(卷积神经网络)生成的特征以及其他传统分类器进行了评估。该解决方案的性能优于其他方法,包括端到端深度学习模型。
{"title":"Classification of Rice varieties using DMLP-PCA inspired features with MVE Classifier","authors":"Jerita Chibhabha, Kudakwashe Zvarevashe, Leslie Kudzai Nyandoro, T. Matekenya, B. Mapako","doi":"10.1109/ZCICT55726.2022.10046040","DOIUrl":"https://doi.org/10.1109/ZCICT55726.2022.10046040","url":null,"abstract":"The classification of varieties of rice from images is one of the most difficult tasks in computer vision. This complex process is normally applied in automating packaging systems used in production companies. Most companies opt for this option because the alternative way of doing it manually is time consuming, monotonous and prone to expensive errors. To refine the process, there is need to interrogate the features because a classification algorithm is as good as the features used. Therefore, this paper presents Deep Multi-Layer Perceptron generated features. In addition, the paper also introduces the Majority Voting Ensemble (MVE) classifier. The technique was evaluated against CNN (Convolution Neural Network) generated features as well as other traditional classifiers. The proposed solution performed better than the other methods including end-to-end deep learning models.","PeriodicalId":125540,"journal":{"name":"2022 1st Zimbabwe Conference of Information and Communication Technologies (ZCICT)","volume":"250 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122518881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Challenges in the Adoption of Artificial Intelligence and Machine Learning in Zimbabwe’s Insurance industry 津巴布韦保险业采用人工智能和机器学习的挑战
Pub Date : 2022-11-09 DOI: 10.1109/ZCICT55726.2022.10045910
Judith Moyo, Noreen Watyoka, F. Chari
This study sought to investigate the challenges in the adoption of AI and ML in the Zimbabwean insurance industry. The TechnologyOrganisation-Environment (TOE) model was selected as the base theory underpinning the study. The study adopted a pragmatic research philosophy and a census was carried out on twenty insurance companies. Questionnaires were administered on operations managers representing their insurance companies. Interviews were used to collect data from 12 operation managers. NVivo version 16 was used to analyse the data thematically. The study results show that adoption of AI by the insurance sector in Zimbabwe is hindered by shortage of resources, lack of expertise and high cost of AI compliant products. These researchers recommend resource allocation, training of employees, culture change, and updated technological environment to ensure effective adoption of AI. This study will contribute to the body of knowledge, be significant to insurance practitioners and policy makers whilst giving direction for future studies.
本研究旨在调查在津巴布韦保险行业采用人工智能和机器学习的挑战。本文选择技术-组织-环境(TOE)模型作为本研究的基础理论。本研究采用务实的研究理念,对20家保险公司进行了调查。对代表其保险公司的业务经理进行了问卷调查。通过访谈收集了12位运营经理的数据。使用NVivo version 16对数据进行主题分析。研究结果表明,津巴布韦保险部门采用人工智能受到资源短缺、缺乏专业知识和人工智能合规产品成本高的阻碍。这些研究人员建议资源分配、员工培训、文化变革和更新技术环境,以确保人工智能的有效采用。本研究将有助于知识体系,对保险从业人员和政策制定者具有重要意义,同时为未来的研究提供方向。
{"title":"Challenges in the Adoption of Artificial Intelligence and Machine Learning in Zimbabwe’s Insurance industry","authors":"Judith Moyo, Noreen Watyoka, F. Chari","doi":"10.1109/ZCICT55726.2022.10045910","DOIUrl":"https://doi.org/10.1109/ZCICT55726.2022.10045910","url":null,"abstract":"This study sought to investigate the challenges in the adoption of AI and ML in the Zimbabwean insurance industry. The TechnologyOrganisation-Environment (TOE) model was selected as the base theory underpinning the study. The study adopted a pragmatic research philosophy and a census was carried out on twenty insurance companies. Questionnaires were administered on operations managers representing their insurance companies. Interviews were used to collect data from 12 operation managers. NVivo version 16 was used to analyse the data thematically. The study results show that adoption of AI by the insurance sector in Zimbabwe is hindered by shortage of resources, lack of expertise and high cost of AI compliant products. These researchers recommend resource allocation, training of employees, culture change, and updated technological environment to ensure effective adoption of AI. This study will contribute to the body of knowledge, be significant to insurance practitioners and policy makers whilst giving direction for future studies.","PeriodicalId":125540,"journal":{"name":"2022 1st Zimbabwe Conference of Information and Communication Technologies (ZCICT)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127597948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assessment of BYOD security awareness among mobile device users within Namibian enterprises 纳米比亚企业移动设备用户BYOD安全意识评估
Pub Date : 2022-11-09 DOI: 10.1109/ZCICT55726.2022.10046002
Ester Shihepo, Fungai Bhunu Shava, Mercy Chitauro
The Bring Your Own Device (BYOD) concept refers to employers allowing their employees to bring their personal digital devices to workplaces and use them for work related purposes. Enterprises are enjoying the benefits of BYOD, which allow them to cut operational costs as they do not need to purchase computers for their employees. Employees are enjoying the comfort and convenience offered by BYOD; however, this can also expose organisations to security breaches as BYOD implementation can present positive opportunities as well as security challenges. The main objective of this paper is to present an assessment of BYOD security awareness within Namibian enterprises. A case study was carried out at one Namibian enterprise as it was considered by the researcher as a suitable site in meeting the research objectives. Data was collected through interviews and questionnaires. Based on the findings, it was observed that the use of personal mobile devices is prevalent within the enterprise. It was further observed that the enterprise suffers from access control challenges and the BYOD concept is not formally implemented with the enterprise because there are no policies in place among other issues. The findings confirmed that if appropriate security measures/controls are implemented, increase in BYOD security awareness among the mobile device users can be anticipated.
自带设备(Bring Your Own Device, BYOD)的概念是指雇主允许员工将自己的个人数字设备带到工作场所,并将其用于与工作相关的目的。企业正在享受BYOD的好处,因为他们不需要为员工购买电脑,这可以降低运营成本。员工享受BYOD带来的舒适和便利;然而,这也可能使组织暴露于安全漏洞,因为BYOD的实施既可以带来积极的机会,也可以带来安全挑战。本文的主要目的是提出纳米比亚企业内部BYOD安全意识的评估。在一家纳米比亚企业进行了个案研究,因为研究人员认为它是实现研究目标的合适地点。通过访谈和问卷调查收集数据。根据调查结果,人们观察到个人移动设备的使用在企业内很普遍。进一步观察到,企业面临访问控制方面的挑战,BYOD概念没有在企业中正式实施,因为除其他问题外,没有适当的政策。调查结果证实,如果实施了适当的安全措施/控制措施,可以预期移动设备用户的BYOD安全意识会有所提高。
{"title":"Assessment of BYOD security awareness among mobile device users within Namibian enterprises","authors":"Ester Shihepo, Fungai Bhunu Shava, Mercy Chitauro","doi":"10.1109/ZCICT55726.2022.10046002","DOIUrl":"https://doi.org/10.1109/ZCICT55726.2022.10046002","url":null,"abstract":"The Bring Your Own Device (BYOD) concept refers to employers allowing their employees to bring their personal digital devices to workplaces and use them for work related purposes. Enterprises are enjoying the benefits of BYOD, which allow them to cut operational costs as they do not need to purchase computers for their employees. Employees are enjoying the comfort and convenience offered by BYOD; however, this can also expose organisations to security breaches as BYOD implementation can present positive opportunities as well as security challenges. The main objective of this paper is to present an assessment of BYOD security awareness within Namibian enterprises. A case study was carried out at one Namibian enterprise as it was considered by the researcher as a suitable site in meeting the research objectives. Data was collected through interviews and questionnaires. Based on the findings, it was observed that the use of personal mobile devices is prevalent within the enterprise. It was further observed that the enterprise suffers from access control challenges and the BYOD concept is not formally implemented with the enterprise because there are no policies in place among other issues. The findings confirmed that if appropriate security measures/controls are implemented, increase in BYOD security awareness among the mobile device users can be anticipated.","PeriodicalId":125540,"journal":{"name":"2022 1st Zimbabwe Conference of Information and Communication Technologies (ZCICT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116575725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Inadvertent Use of ICTs in the South African Higher Education Sector During the Pandemic: Benefits and Challenges 大流行期间南非高等教育部门无意中使用信息通信技术:利益与挑战
Pub Date : 2022-11-09 DOI: 10.1109/ZCICT55726.2022.10045876
D. T. Risinamhodzi, G. P. Dzvapatsva, Courage Matobobo
Globally, higher education (HE) is under pressure to include more diverse groups of students and produce the skills needed to adapt to a rapidly changing world. One of the key catalysts which has been touted to drive the changes is information communication and technologies (ICTs) but the uptake has not been to the optimum levels especially in developing countries. However, after the COVID-19 pandemic, HE sectors, in South Africa particularly, have experienced an increase in ICT uptake for the purpose of responding to educational needs. This paper examines how harnessing the positives of ICT’s could benefit the higher education sector in the post-COVID-19 era. In particular, the paper explores the benefits and challenges of ICTs in catering for educational needs within higher education during the COVID-19 pandemic. We used information systems (IS) continuation theory to move from academic theorising about inadvertent use of ICT tools toward harnessing their continued successful implementation. Documents were analysed using thematic analysis. The results showed several positive potentials from ICT uptake such as self-regulated learning and the saving of the academic calendar as well as student lives in the face of any future pandemics. This paper suggests a continued maintenance of the infrastructure growth model necessitated by the pandemic. Furthermore, we propose that the Department of Higher Education and Training must regulate establishment of ICT infrastructure funding in institutions of higher education.
在全球范围内,高等教育(HE)面临着包括更多不同学生群体和培养适应快速变化的世界所需技能的压力。一直被吹捧为推动变革的关键催化剂之一是信息通信和技术(ict),但吸收尚未达到最佳水平,特别是在发展中国家。然而,在2019冠状病毒病大流行之后,为满足教育需求,特别是在南非,高等教育部门对信息通信技术的采用有所增加。本文探讨了如何利用信息通信技术的积极因素在后covid -19时代使高等教育部门受益。本文特别探讨了2019冠状病毒病大流行期间信息通信技术在满足高等教育需求方面的益处和挑战。我们使用信息系统(IS)延续理论,从无意中使用ICT工具的学术理论转向利用其持续成功的实施。采用专题分析对文件进行分析。结果显示,采用信息和通信技术具有若干积极潜力,如自我调节学习、在面对未来任何大流行病时节省学历和学生的生活。本文建议继续维持大流行所必需的基础设施增长模式。此外,我们建议高等教育和培训部必须规范在高等教育机构中建立ICT基础设施的资金。
{"title":"Inadvertent Use of ICTs in the South African Higher Education Sector During the Pandemic: Benefits and Challenges","authors":"D. T. Risinamhodzi, G. P. Dzvapatsva, Courage Matobobo","doi":"10.1109/ZCICT55726.2022.10045876","DOIUrl":"https://doi.org/10.1109/ZCICT55726.2022.10045876","url":null,"abstract":"Globally, higher education (HE) is under pressure to include more diverse groups of students and produce the skills needed to adapt to a rapidly changing world. One of the key catalysts which has been touted to drive the changes is information communication and technologies (ICTs) but the uptake has not been to the optimum levels especially in developing countries. However, after the COVID-19 pandemic, HE sectors, in South Africa particularly, have experienced an increase in ICT uptake for the purpose of responding to educational needs. This paper examines how harnessing the positives of ICT’s could benefit the higher education sector in the post-COVID-19 era. In particular, the paper explores the benefits and challenges of ICTs in catering for educational needs within higher education during the COVID-19 pandemic. We used information systems (IS) continuation theory to move from academic theorising about inadvertent use of ICT tools toward harnessing their continued successful implementation. Documents were analysed using thematic analysis. The results showed several positive potentials from ICT uptake such as self-regulated learning and the saving of the academic calendar as well as student lives in the face of any future pandemics. This paper suggests a continued maintenance of the infrastructure growth model necessitated by the pandemic. Furthermore, we propose that the Department of Higher Education and Training must regulate establishment of ICT infrastructure funding in institutions of higher education.","PeriodicalId":125540,"journal":{"name":"2022 1st Zimbabwe Conference of Information and Communication Technologies (ZCICT)","volume":"68 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134190253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using design thinking for social innovation: Undergraduate students’ experiences when developing mobile application prototypes 运用设计思维进行社会创新:大学生开发移动应用原型的经验
Pub Date : 2022-11-09 DOI: 10.1109/ZCICT55726.2022.10045961
Fazlyn Petersen, Monique Philander
Information and communication technology can be used in social innovation to solve societal challenges, such as access to quality education. Despite the increasing number of South Africans with mobile phones, there are still barriers to online learning for students. The barriers include the lack of technological skills, lack of digital access and inequitable learning environments. This exploratory case study examined 26 third-year university students’ experiences when using design thinking to design mobile application prototypes to support education. Sustainable Development Goal (SDG) 4 was used as a scenario as it focuses on providing quality education for all. An online survey was used to collect qualitative and quantitative data. Qualitative data were analysed using content analysis. Quantitative data were analysed using descriptive statistics. The results demonstrate that students had a positive experience when using design thinking. Each of the five stages in design thinking received positive feedback. Improvements can be made to provide more training to use the tool, Justinmind, to develop mobile application prototypes.
信息和通信技术可用于社会创新,以解决诸如获得优质教育等社会挑战。尽管拥有手机的南非人越来越多,但学生在线学习仍然存在障碍。这些障碍包括缺乏技术技能、缺乏数字访问和不公平的学习环境。本探索性案例研究考察了26名大学三年级学生使用设计思维设计移动应用原型以支持教育的经验。可持续发展目标(SDG) 4被用作情景,因为它侧重于为所有人提供优质教育。通过在线调查收集定性和定量数据。定性资料采用内容分析法进行分析。定量资料采用描述性统计进行分析。结果表明,学生在运用设计思维时获得了积极的体验。设计思维的五个阶段都得到了积极的反馈。可以进行改进,提供更多使用Justinmind工具开发移动应用程序原型的培训。
{"title":"Using design thinking for social innovation: Undergraduate students’ experiences when developing mobile application prototypes","authors":"Fazlyn Petersen, Monique Philander","doi":"10.1109/ZCICT55726.2022.10045961","DOIUrl":"https://doi.org/10.1109/ZCICT55726.2022.10045961","url":null,"abstract":"Information and communication technology can be used in social innovation to solve societal challenges, such as access to quality education. Despite the increasing number of South Africans with mobile phones, there are still barriers to online learning for students. The barriers include the lack of technological skills, lack of digital access and inequitable learning environments. This exploratory case study examined 26 third-year university students’ experiences when using design thinking to design mobile application prototypes to support education. Sustainable Development Goal (SDG) 4 was used as a scenario as it focuses on providing quality education for all. An online survey was used to collect qualitative and quantitative data. Qualitative data were analysed using content analysis. Quantitative data were analysed using descriptive statistics. The results demonstrate that students had a positive experience when using design thinking. Each of the five stages in design thinking received positive feedback. Improvements can be made to provide more training to use the tool, Justinmind, to develop mobile application prototypes.","PeriodicalId":125540,"journal":{"name":"2022 1st Zimbabwe Conference of Information and Communication Technologies (ZCICT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128773064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Seeking ABET Accreditation for Computing Programmes in Africa: A Case Study of UNAM’s BSc in Computer Science 寻求非洲计算机课程的ABET认证:以墨西哥国立自治大学计算机科学学士学位为例
Pub Date : 2022-11-09 DOI: 10.1109/ZCICT55726.2022.10046007
R. Greenlaw, Tulimevava K. Mufeti
ABET is the worldwide leader in accrediting pro-grams in computing, engineering, applied and natural sciences, and engineering technology. Only four of 54 countries in Africa have programmes which achieved ABET accreditation. During COVID-19 and in times of intense competition, it has become especially important for institutions to distinguish their programs as having high quality. Using the University of Namibia’s Bachelor of Science in Computer Science as a case study, we use a systematic methodology to evaluate and analyse the programme in a detailed, step-by-step, easy-to-understand manner. We evaluate this program with respect to ABET’s General Criteria and then examine how well it does against ABET’s Program Criteria in computer science. Our aim is to pinpoint shortcomings and solutions. The results for the selected program, despite ticking positives for a number of criterion, show the need for considerable work to meet ABET accreditation. Our research stands to inspire university programs in Africa to strive for ABET accreditation as a way of distinguishing themselves.
ABET是计算机、工程、应用科学和自然科学以及工程技术领域认证项目的全球领导者。非洲54个国家中只有4个国家的课程获得了ABET认证。在2019冠状病毒病期间和竞争激烈时期,各院校将其课程区分为高质量变得尤为重要。我们以纳米比亚大学(University of Namibia)的计算机科学学士学位课程为例,采用系统的方法,以详细、循序渐进、易于理解的方式评估和分析该课程。我们根据ABET的一般标准评估这个程序,然后检查它在计算机科学方面与ABET的程序标准相比有多好。我们的目标是找出缺点和解决办法。所选项目的结果,尽管在许多标准上都是积极的,但表明需要做大量的工作来满足ABET的认证。我们的研究将激励非洲的大学项目努力获得ABET认证,以此作为一种与众不同的方式。
{"title":"Seeking ABET Accreditation for Computing Programmes in Africa: A Case Study of UNAM’s BSc in Computer Science","authors":"R. Greenlaw, Tulimevava K. Mufeti","doi":"10.1109/ZCICT55726.2022.10046007","DOIUrl":"https://doi.org/10.1109/ZCICT55726.2022.10046007","url":null,"abstract":"ABET is the worldwide leader in accrediting pro-grams in computing, engineering, applied and natural sciences, and engineering technology. Only four of 54 countries in Africa have programmes which achieved ABET accreditation. During COVID-19 and in times of intense competition, it has become especially important for institutions to distinguish their programs as having high quality. Using the University of Namibia’s Bachelor of Science in Computer Science as a case study, we use a systematic methodology to evaluate and analyse the programme in a detailed, step-by-step, easy-to-understand manner. We evaluate this program with respect to ABET’s General Criteria and then examine how well it does against ABET’s Program Criteria in computer science. Our aim is to pinpoint shortcomings and solutions. The results for the selected program, despite ticking positives for a number of criterion, show the need for considerable work to meet ABET accreditation. Our research stands to inspire university programs in Africa to strive for ABET accreditation as a way of distinguishing themselves.","PeriodicalId":125540,"journal":{"name":"2022 1st Zimbabwe Conference of Information and Communication Technologies (ZCICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131250860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 1st Zimbabwe Conference of Information and Communication Technologies (ZCICT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1