Pub Date : 2022-11-09DOI: 10.1109/ZCICT55726.2022.10046024
Kudakwashe Maguraushe, Fine Masimba, Meshack Muderedzwa
The emergence of the COVID-19 pandemic disrupted many businesses, including the education sector. As the World Health organization (WHO) urged numerous countries worldwide to implement lockdowns and social distancing laws to curb the spread of the pandemic, higher education institutions responded by embarking on online learning. This article aims to use the systematic literature review to review articles on reducing the digital divide in online learning during the COVID-19 pandemic. Using the technology-organisationenvironment (TOE) model, the benefits and challenges profiled will aid in proffering a way forward in handling and managing the digital divide beyond the COVID-19 pandemic in online learning. Using the keywords: digital divide, COVID-19 and online learning to search from online databases, the inclusion criteria resulted in 10 articles being reviewed. The articles revealed that: students faced many technological challenges in connecting to online learning during the COVID-19 epidemic, students need to be properly trained to be able to use online learning systems and they need to subside data packages for many students to afford the data. The study concludes and recommends that the TOE model can be used to elucidate the effects of the digital divide in online learning. The technological, organisational and environmental factors can help proffer a sustainable online learning model for the future, beyond COVID-19 pandemic.
{"title":"Shrinking the digital divide in online learning beyond the COVID-19 pandemic: A Systematic Literature Review","authors":"Kudakwashe Maguraushe, Fine Masimba, Meshack Muderedzwa","doi":"10.1109/ZCICT55726.2022.10046024","DOIUrl":"https://doi.org/10.1109/ZCICT55726.2022.10046024","url":null,"abstract":"The emergence of the COVID-19 pandemic disrupted many businesses, including the education sector. As the World Health organization (WHO) urged numerous countries worldwide to implement lockdowns and social distancing laws to curb the spread of the pandemic, higher education institutions responded by embarking on online learning. This article aims to use the systematic literature review to review articles on reducing the digital divide in online learning during the COVID-19 pandemic. Using the technology-organisationenvironment (TOE) model, the benefits and challenges profiled will aid in proffering a way forward in handling and managing the digital divide beyond the COVID-19 pandemic in online learning. Using the keywords: digital divide, COVID-19 and online learning to search from online databases, the inclusion criteria resulted in 10 articles being reviewed. The articles revealed that: students faced many technological challenges in connecting to online learning during the COVID-19 epidemic, students need to be properly trained to be able to use online learning systems and they need to subside data packages for many students to afford the data. The study concludes and recommends that the TOE model can be used to elucidate the effects of the digital divide in online learning. The technological, organisational and environmental factors can help proffer a sustainable online learning model for the future, beyond COVID-19 pandemic.","PeriodicalId":125540,"journal":{"name":"2022 1st Zimbabwe Conference of Information and Communication Technologies (ZCICT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115076025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-09DOI: 10.1109/ZCICT55726.2022.10045996
Siqabukile Ndlovu, Sibonile Moyo, S. Nleya, S. Dube
Smart agriculture is one of the recognized practices to food security. Also known as precision agriculture, smart agriculture is largely deployed over the Internet through the use of connected sensors and intelligent devices. Smart agriculture has been implemented in a number of forms to include smart crop farming, smart animal farming in general and recently has been adopted in smart fish farming. Fish farming is a complex process as several variables have to be controlled to ensure optimum conditions for healthy fish production. Ensuring an optimum water environment requires skilled labour and resources which may not always be available. To solve this problem, researchers have turned to precision fish farming as a means of ensuring maximum fish production. This paper reviews existing literature to identify primary studies discussing IoT web-based fish farming systems, with the aim of creating a systematic map of the studies. Peer reviewed studies published through conferences and journals were identified through database search and snowballing. Analysis of the identified papers shows that researchers in these environments have used various techniques and technologies to implement IoT based smart fish farming systems. The most popular approach being the use of sensors to monitor the pH, temperature, dissolved oxygen content and turbidity of the water. Majority of the studies reviewed report effectiveness of their methods in improving fish quality, and lowering of production costs. This systematic map would be useful to fish farmers as it shows successful IoT based implementations, hence serving as a guide to existing and new farmers. It would also be useful to IoT technology designers as it shows gaps and shortcomings in these technologies probing for more research in the area.
{"title":"Precision Fish Farming Systems: A Mapping Study","authors":"Siqabukile Ndlovu, Sibonile Moyo, S. Nleya, S. Dube","doi":"10.1109/ZCICT55726.2022.10045996","DOIUrl":"https://doi.org/10.1109/ZCICT55726.2022.10045996","url":null,"abstract":"Smart agriculture is one of the recognized practices to food security. Also known as precision agriculture, smart agriculture is largely deployed over the Internet through the use of connected sensors and intelligent devices. Smart agriculture has been implemented in a number of forms to include smart crop farming, smart animal farming in general and recently has been adopted in smart fish farming. Fish farming is a complex process as several variables have to be controlled to ensure optimum conditions for healthy fish production. Ensuring an optimum water environment requires skilled labour and resources which may not always be available. To solve this problem, researchers have turned to precision fish farming as a means of ensuring maximum fish production. This paper reviews existing literature to identify primary studies discussing IoT web-based fish farming systems, with the aim of creating a systematic map of the studies. Peer reviewed studies published through conferences and journals were identified through database search and snowballing. Analysis of the identified papers shows that researchers in these environments have used various techniques and technologies to implement IoT based smart fish farming systems. The most popular approach being the use of sensors to monitor the pH, temperature, dissolved oxygen content and turbidity of the water. Majority of the studies reviewed report effectiveness of their methods in improving fish quality, and lowering of production costs. This systematic map would be useful to fish farmers as it shows successful IoT based implementations, hence serving as a guide to existing and new farmers. It would also be useful to IoT technology designers as it shows gaps and shortcomings in these technologies probing for more research in the area.","PeriodicalId":125540,"journal":{"name":"2022 1st Zimbabwe Conference of Information and Communication Technologies (ZCICT)","volume":"298 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122739247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Many insurance companies today deal with the issue of fraudulent insurance claims, which results in significant yearly financial loss. Since the losses are covered by raising policyholders’ premium costs, these frauds have a negative impact on society. The traditional claim investigation procedure has also been blamed for producing unreliable conclusions because it is time-consuming and laborious. Therefore, using machine learning and the XGBoost method, we construct an automated fraud detection application framework in this study. Accurately identifying fraud claims in a shorter amount of time is the goal. Data analysis is utilized throughout the process to validate, sanitize, and extract the pertinent data. As a result, the insurance firm can retain its reputation outside by employing this structure and has a reliable relationship with clients that they can share.
{"title":"Insurance Fraud Detection using Machine Learning","authors":"Machinya Tongesai, Godfrey Mbizo, Kudakwashe Zvarevashe","doi":"10.1109/ZCICT55726.2022.10046034","DOIUrl":"https://doi.org/10.1109/ZCICT55726.2022.10046034","url":null,"abstract":"Many insurance companies today deal with the issue of fraudulent insurance claims, which results in significant yearly financial loss. Since the losses are covered by raising policyholders’ premium costs, these frauds have a negative impact on society. The traditional claim investigation procedure has also been blamed for producing unreliable conclusions because it is time-consuming and laborious. Therefore, using machine learning and the XGBoost method, we construct an automated fraud detection application framework in this study. Accurately identifying fraud claims in a shorter amount of time is the goal. Data analysis is utilized throughout the process to validate, sanitize, and extract the pertinent data. As a result, the insurance firm can retain its reputation outside by employing this structure and has a reliable relationship with clients that they can share.","PeriodicalId":125540,"journal":{"name":"2022 1st Zimbabwe Conference of Information and Communication Technologies (ZCICT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117124694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-09DOI: 10.1109/ZCICT55726.2022.10045998
S. Nleya, M. Velempini, T. T. Gotora
This paper aims to analyze the DDOS problem and describe it using differential equations. Using two armies engaged in conflict according to Lanchester’s Square Law. The other army protects itself when one army attacks it. Applying the generalized Lanchester Square Law to the DDOS problem. Our present 5G Software Defined Network security network technologies act as the army that must defend itself against hackers employing a Bot network. According to numerical simulation, the defense mechanism also grows as the attack strength does.
{"title":"Modelling Lanchester Style DDOS Attack and Defense","authors":"S. Nleya, M. Velempini, T. T. Gotora","doi":"10.1109/ZCICT55726.2022.10045998","DOIUrl":"https://doi.org/10.1109/ZCICT55726.2022.10045998","url":null,"abstract":"This paper aims to analyze the DDOS problem and describe it using differential equations. Using two armies engaged in conflict according to Lanchester’s Square Law. The other army protects itself when one army attacks it. Applying the generalized Lanchester Square Law to the DDOS problem. Our present 5G Software Defined Network security network technologies act as the army that must defend itself against hackers employing a Bot network. According to numerical simulation, the defense mechanism also grows as the attack strength does.","PeriodicalId":125540,"journal":{"name":"2022 1st Zimbabwe Conference of Information and Communication Technologies (ZCICT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125620919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-09DOI: 10.1109/ZCICT55726.2022.10046040
Jerita Chibhabha, Kudakwashe Zvarevashe, Leslie Kudzai Nyandoro, T. Matekenya, B. Mapako
The classification of varieties of rice from images is one of the most difficult tasks in computer vision. This complex process is normally applied in automating packaging systems used in production companies. Most companies opt for this option because the alternative way of doing it manually is time consuming, monotonous and prone to expensive errors. To refine the process, there is need to interrogate the features because a classification algorithm is as good as the features used. Therefore, this paper presents Deep Multi-Layer Perceptron generated features. In addition, the paper also introduces the Majority Voting Ensemble (MVE) classifier. The technique was evaluated against CNN (Convolution Neural Network) generated features as well as other traditional classifiers. The proposed solution performed better than the other methods including end-to-end deep learning models.
{"title":"Classification of Rice varieties using DMLP-PCA inspired features with MVE Classifier","authors":"Jerita Chibhabha, Kudakwashe Zvarevashe, Leslie Kudzai Nyandoro, T. Matekenya, B. Mapako","doi":"10.1109/ZCICT55726.2022.10046040","DOIUrl":"https://doi.org/10.1109/ZCICT55726.2022.10046040","url":null,"abstract":"The classification of varieties of rice from images is one of the most difficult tasks in computer vision. This complex process is normally applied in automating packaging systems used in production companies. Most companies opt for this option because the alternative way of doing it manually is time consuming, monotonous and prone to expensive errors. To refine the process, there is need to interrogate the features because a classification algorithm is as good as the features used. Therefore, this paper presents Deep Multi-Layer Perceptron generated features. In addition, the paper also introduces the Majority Voting Ensemble (MVE) classifier. The technique was evaluated against CNN (Convolution Neural Network) generated features as well as other traditional classifiers. The proposed solution performed better than the other methods including end-to-end deep learning models.","PeriodicalId":125540,"journal":{"name":"2022 1st Zimbabwe Conference of Information and Communication Technologies (ZCICT)","volume":"250 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122518881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-09DOI: 10.1109/ZCICT55726.2022.10045910
Judith Moyo, Noreen Watyoka, F. Chari
This study sought to investigate the challenges in the adoption of AI and ML in the Zimbabwean insurance industry. The TechnologyOrganisation-Environment (TOE) model was selected as the base theory underpinning the study. The study adopted a pragmatic research philosophy and a census was carried out on twenty insurance companies. Questionnaires were administered on operations managers representing their insurance companies. Interviews were used to collect data from 12 operation managers. NVivo version 16 was used to analyse the data thematically. The study results show that adoption of AI by the insurance sector in Zimbabwe is hindered by shortage of resources, lack of expertise and high cost of AI compliant products. These researchers recommend resource allocation, training of employees, culture change, and updated technological environment to ensure effective adoption of AI. This study will contribute to the body of knowledge, be significant to insurance practitioners and policy makers whilst giving direction for future studies.
本研究旨在调查在津巴布韦保险行业采用人工智能和机器学习的挑战。本文选择技术-组织-环境(TOE)模型作为本研究的基础理论。本研究采用务实的研究理念,对20家保险公司进行了调查。对代表其保险公司的业务经理进行了问卷调查。通过访谈收集了12位运营经理的数据。使用NVivo version 16对数据进行主题分析。研究结果表明,津巴布韦保险部门采用人工智能受到资源短缺、缺乏专业知识和人工智能合规产品成本高的阻碍。这些研究人员建议资源分配、员工培训、文化变革和更新技术环境,以确保人工智能的有效采用。本研究将有助于知识体系,对保险从业人员和政策制定者具有重要意义,同时为未来的研究提供方向。
{"title":"Challenges in the Adoption of Artificial Intelligence and Machine Learning in Zimbabwe’s Insurance industry","authors":"Judith Moyo, Noreen Watyoka, F. Chari","doi":"10.1109/ZCICT55726.2022.10045910","DOIUrl":"https://doi.org/10.1109/ZCICT55726.2022.10045910","url":null,"abstract":"This study sought to investigate the challenges in the adoption of AI and ML in the Zimbabwean insurance industry. The TechnologyOrganisation-Environment (TOE) model was selected as the base theory underpinning the study. The study adopted a pragmatic research philosophy and a census was carried out on twenty insurance companies. Questionnaires were administered on operations managers representing their insurance companies. Interviews were used to collect data from 12 operation managers. NVivo version 16 was used to analyse the data thematically. The study results show that adoption of AI by the insurance sector in Zimbabwe is hindered by shortage of resources, lack of expertise and high cost of AI compliant products. These researchers recommend resource allocation, training of employees, culture change, and updated technological environment to ensure effective adoption of AI. This study will contribute to the body of knowledge, be significant to insurance practitioners and policy makers whilst giving direction for future studies.","PeriodicalId":125540,"journal":{"name":"2022 1st Zimbabwe Conference of Information and Communication Technologies (ZCICT)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127597948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-09DOI: 10.1109/ZCICT55726.2022.10046002
Ester Shihepo, Fungai Bhunu Shava, Mercy Chitauro
The Bring Your Own Device (BYOD) concept refers to employers allowing their employees to bring their personal digital devices to workplaces and use them for work related purposes. Enterprises are enjoying the benefits of BYOD, which allow them to cut operational costs as they do not need to purchase computers for their employees. Employees are enjoying the comfort and convenience offered by BYOD; however, this can also expose organisations to security breaches as BYOD implementation can present positive opportunities as well as security challenges. The main objective of this paper is to present an assessment of BYOD security awareness within Namibian enterprises. A case study was carried out at one Namibian enterprise as it was considered by the researcher as a suitable site in meeting the research objectives. Data was collected through interviews and questionnaires. Based on the findings, it was observed that the use of personal mobile devices is prevalent within the enterprise. It was further observed that the enterprise suffers from access control challenges and the BYOD concept is not formally implemented with the enterprise because there are no policies in place among other issues. The findings confirmed that if appropriate security measures/controls are implemented, increase in BYOD security awareness among the mobile device users can be anticipated.
自带设备(Bring Your Own Device, BYOD)的概念是指雇主允许员工将自己的个人数字设备带到工作场所,并将其用于与工作相关的目的。企业正在享受BYOD的好处,因为他们不需要为员工购买电脑,这可以降低运营成本。员工享受BYOD带来的舒适和便利;然而,这也可能使组织暴露于安全漏洞,因为BYOD的实施既可以带来积极的机会,也可以带来安全挑战。本文的主要目的是提出纳米比亚企业内部BYOD安全意识的评估。在一家纳米比亚企业进行了个案研究,因为研究人员认为它是实现研究目标的合适地点。通过访谈和问卷调查收集数据。根据调查结果,人们观察到个人移动设备的使用在企业内很普遍。进一步观察到,企业面临访问控制方面的挑战,BYOD概念没有在企业中正式实施,因为除其他问题外,没有适当的政策。调查结果证实,如果实施了适当的安全措施/控制措施,可以预期移动设备用户的BYOD安全意识会有所提高。
{"title":"Assessment of BYOD security awareness among mobile device users within Namibian enterprises","authors":"Ester Shihepo, Fungai Bhunu Shava, Mercy Chitauro","doi":"10.1109/ZCICT55726.2022.10046002","DOIUrl":"https://doi.org/10.1109/ZCICT55726.2022.10046002","url":null,"abstract":"The Bring Your Own Device (BYOD) concept refers to employers allowing their employees to bring their personal digital devices to workplaces and use them for work related purposes. Enterprises are enjoying the benefits of BYOD, which allow them to cut operational costs as they do not need to purchase computers for their employees. Employees are enjoying the comfort and convenience offered by BYOD; however, this can also expose organisations to security breaches as BYOD implementation can present positive opportunities as well as security challenges. The main objective of this paper is to present an assessment of BYOD security awareness within Namibian enterprises. A case study was carried out at one Namibian enterprise as it was considered by the researcher as a suitable site in meeting the research objectives. Data was collected through interviews and questionnaires. Based on the findings, it was observed that the use of personal mobile devices is prevalent within the enterprise. It was further observed that the enterprise suffers from access control challenges and the BYOD concept is not formally implemented with the enterprise because there are no policies in place among other issues. The findings confirmed that if appropriate security measures/controls are implemented, increase in BYOD security awareness among the mobile device users can be anticipated.","PeriodicalId":125540,"journal":{"name":"2022 1st Zimbabwe Conference of Information and Communication Technologies (ZCICT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116575725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-09DOI: 10.1109/ZCICT55726.2022.10045876
D. T. Risinamhodzi, G. P. Dzvapatsva, Courage Matobobo
Globally, higher education (HE) is under pressure to include more diverse groups of students and produce the skills needed to adapt to a rapidly changing world. One of the key catalysts which has been touted to drive the changes is information communication and technologies (ICTs) but the uptake has not been to the optimum levels especially in developing countries. However, after the COVID-19 pandemic, HE sectors, in South Africa particularly, have experienced an increase in ICT uptake for the purpose of responding to educational needs. This paper examines how harnessing the positives of ICT’s could benefit the higher education sector in the post-COVID-19 era. In particular, the paper explores the benefits and challenges of ICTs in catering for educational needs within higher education during the COVID-19 pandemic. We used information systems (IS) continuation theory to move from academic theorising about inadvertent use of ICT tools toward harnessing their continued successful implementation. Documents were analysed using thematic analysis. The results showed several positive potentials from ICT uptake such as self-regulated learning and the saving of the academic calendar as well as student lives in the face of any future pandemics. This paper suggests a continued maintenance of the infrastructure growth model necessitated by the pandemic. Furthermore, we propose that the Department of Higher Education and Training must regulate establishment of ICT infrastructure funding in institutions of higher education.
{"title":"Inadvertent Use of ICTs in the South African Higher Education Sector During the Pandemic: Benefits and Challenges","authors":"D. T. Risinamhodzi, G. P. Dzvapatsva, Courage Matobobo","doi":"10.1109/ZCICT55726.2022.10045876","DOIUrl":"https://doi.org/10.1109/ZCICT55726.2022.10045876","url":null,"abstract":"Globally, higher education (HE) is under pressure to include more diverse groups of students and produce the skills needed to adapt to a rapidly changing world. One of the key catalysts which has been touted to drive the changes is information communication and technologies (ICTs) but the uptake has not been to the optimum levels especially in developing countries. However, after the COVID-19 pandemic, HE sectors, in South Africa particularly, have experienced an increase in ICT uptake for the purpose of responding to educational needs. This paper examines how harnessing the positives of ICT’s could benefit the higher education sector in the post-COVID-19 era. In particular, the paper explores the benefits and challenges of ICTs in catering for educational needs within higher education during the COVID-19 pandemic. We used information systems (IS) continuation theory to move from academic theorising about inadvertent use of ICT tools toward harnessing their continued successful implementation. Documents were analysed using thematic analysis. The results showed several positive potentials from ICT uptake such as self-regulated learning and the saving of the academic calendar as well as student lives in the face of any future pandemics. This paper suggests a continued maintenance of the infrastructure growth model necessitated by the pandemic. Furthermore, we propose that the Department of Higher Education and Training must regulate establishment of ICT infrastructure funding in institutions of higher education.","PeriodicalId":125540,"journal":{"name":"2022 1st Zimbabwe Conference of Information and Communication Technologies (ZCICT)","volume":"68 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134190253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-09DOI: 10.1109/ZCICT55726.2022.10045961
Fazlyn Petersen, Monique Philander
Information and communication technology can be used in social innovation to solve societal challenges, such as access to quality education. Despite the increasing number of South Africans with mobile phones, there are still barriers to online learning for students. The barriers include the lack of technological skills, lack of digital access and inequitable learning environments. This exploratory case study examined 26 third-year university students’ experiences when using design thinking to design mobile application prototypes to support education. Sustainable Development Goal (SDG) 4 was used as a scenario as it focuses on providing quality education for all. An online survey was used to collect qualitative and quantitative data. Qualitative data were analysed using content analysis. Quantitative data were analysed using descriptive statistics. The results demonstrate that students had a positive experience when using design thinking. Each of the five stages in design thinking received positive feedback. Improvements can be made to provide more training to use the tool, Justinmind, to develop mobile application prototypes.
{"title":"Using design thinking for social innovation: Undergraduate students’ experiences when developing mobile application prototypes","authors":"Fazlyn Petersen, Monique Philander","doi":"10.1109/ZCICT55726.2022.10045961","DOIUrl":"https://doi.org/10.1109/ZCICT55726.2022.10045961","url":null,"abstract":"Information and communication technology can be used in social innovation to solve societal challenges, such as access to quality education. Despite the increasing number of South Africans with mobile phones, there are still barriers to online learning for students. The barriers include the lack of technological skills, lack of digital access and inequitable learning environments. This exploratory case study examined 26 third-year university students’ experiences when using design thinking to design mobile application prototypes to support education. Sustainable Development Goal (SDG) 4 was used as a scenario as it focuses on providing quality education for all. An online survey was used to collect qualitative and quantitative data. Qualitative data were analysed using content analysis. Quantitative data were analysed using descriptive statistics. The results demonstrate that students had a positive experience when using design thinking. Each of the five stages in design thinking received positive feedback. Improvements can be made to provide more training to use the tool, Justinmind, to develop mobile application prototypes.","PeriodicalId":125540,"journal":{"name":"2022 1st Zimbabwe Conference of Information and Communication Technologies (ZCICT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128773064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-09DOI: 10.1109/ZCICT55726.2022.10046007
R. Greenlaw, Tulimevava K. Mufeti
ABET is the worldwide leader in accrediting pro-grams in computing, engineering, applied and natural sciences, and engineering technology. Only four of 54 countries in Africa have programmes which achieved ABET accreditation. During COVID-19 and in times of intense competition, it has become especially important for institutions to distinguish their programs as having high quality. Using the University of Namibia’s Bachelor of Science in Computer Science as a case study, we use a systematic methodology to evaluate and analyse the programme in a detailed, step-by-step, easy-to-understand manner. We evaluate this program with respect to ABET’s General Criteria and then examine how well it does against ABET’s Program Criteria in computer science. Our aim is to pinpoint shortcomings and solutions. The results for the selected program, despite ticking positives for a number of criterion, show the need for considerable work to meet ABET accreditation. Our research stands to inspire university programs in Africa to strive for ABET accreditation as a way of distinguishing themselves.
ABET是计算机、工程、应用科学和自然科学以及工程技术领域认证项目的全球领导者。非洲54个国家中只有4个国家的课程获得了ABET认证。在2019冠状病毒病期间和竞争激烈时期,各院校将其课程区分为高质量变得尤为重要。我们以纳米比亚大学(University of Namibia)的计算机科学学士学位课程为例,采用系统的方法,以详细、循序渐进、易于理解的方式评估和分析该课程。我们根据ABET的一般标准评估这个程序,然后检查它在计算机科学方面与ABET的程序标准相比有多好。我们的目标是找出缺点和解决办法。所选项目的结果,尽管在许多标准上都是积极的,但表明需要做大量的工作来满足ABET的认证。我们的研究将激励非洲的大学项目努力获得ABET认证,以此作为一种与众不同的方式。
{"title":"Seeking ABET Accreditation for Computing Programmes in Africa: A Case Study of UNAM’s BSc in Computer Science","authors":"R. Greenlaw, Tulimevava K. Mufeti","doi":"10.1109/ZCICT55726.2022.10046007","DOIUrl":"https://doi.org/10.1109/ZCICT55726.2022.10046007","url":null,"abstract":"ABET is the worldwide leader in accrediting pro-grams in computing, engineering, applied and natural sciences, and engineering technology. Only four of 54 countries in Africa have programmes which achieved ABET accreditation. During COVID-19 and in times of intense competition, it has become especially important for institutions to distinguish their programs as having high quality. Using the University of Namibia’s Bachelor of Science in Computer Science as a case study, we use a systematic methodology to evaluate and analyse the programme in a detailed, step-by-step, easy-to-understand manner. We evaluate this program with respect to ABET’s General Criteria and then examine how well it does against ABET’s Program Criteria in computer science. Our aim is to pinpoint shortcomings and solutions. The results for the selected program, despite ticking positives for a number of criterion, show the need for considerable work to meet ABET accreditation. Our research stands to inspire university programs in Africa to strive for ABET accreditation as a way of distinguishing themselves.","PeriodicalId":125540,"journal":{"name":"2022 1st Zimbabwe Conference of Information and Communication Technologies (ZCICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131250860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}