首页 > 最新文献

2016 IST-Africa Week Conference最新文献

英文 中文
Survey of Media Access Control address spoofing attacks detection and prevention techniques in wireless networks 无线网络中媒体访问控制地址欺骗攻击检测与预防技术综述
Pub Date : 2016-05-11 DOI: 10.1109/ISTAFRICA.2016.7530589
E. Letsoalo, S. Ojo
Wireless networks are used to access many services such as Internet banking, e-commerce, eHealth, and from many more systems that relay sensitive information. To connect to a wireless network a user needs to be authenticated by and be associated with an access point. Management frames and control frames are used for authentication, association and giving a user access to the wireless network. Management frames and control frames are sent in clear text and can expose the wireless network to security attacks such as media access control spoofing and session hijacking attacks. An attacker with the packet sniffer software can intercept packets and extract Media Access Control addresses of the access point or other users. MAC address is used to associate a client with the access point in wireless networks. An attacker can use a spoofed Media Access Control address of the real access point to disconnect the legitimate users from the network and takeover any existing TCP session that has already been established. Since the legitimate user is already authenticated in the network, an attacker with the spoofed MAC address will not require authentication. Such an exploitation of a valid computer session to gain unauthorized access to information or services through a network is referred to as session hijacking attack. There are proposed methods for dealing with MAC address spoofing. Some methods produce lots of false positives and false negatives while others require a lot of infrastructural overhead as well as computational overhead. In this study some of the existing MAC addresses spoofing detection and prevention methods are reviewed, with strengths and weaknesses analysed. Factors considered in the analysis include reliability and robustness of the methods, and performance in terms of computational overhead and efficiency.
无线网络被用来访问许多服务,如互联网银行、电子商务、电子健康,以及从更多传递敏感信息的系统访问。要连接到无线网络,用户需要通过接入点进行身份验证并与接入点相关联。管理帧和控制帧用于身份验证、关联和授予用户对无线网络的访问权限。管理帧和控制帧以明文形式发送,会使无线网络暴露在媒体访问控制欺骗和会话劫持攻击等安全攻击之下。利用数据包嗅探软件,攻击者可以拦截数据包并提取接入点或其他用户的媒体访问控制地址。MAC地址用于无线网络中客户端与接入点之间的关联。攻击者可以使用欺骗的真实接入点的媒体访问控制地址来断开合法用户与网络的连接,并接管已经建立的任何现有TCP会话。由于合法用户已经在网络中进行了身份验证,因此使用欺骗MAC地址的攻击者不需要身份验证。这种利用有效的计算机会话通过网络获得对信息或服务的未经授权的访问被称为会话劫持攻击。提出了处理MAC地址欺骗的方法。有些方法会产生大量的假阳性和假阴性,而另一些方法则需要大量的基础设施开销和计算开销。本文对现有的MAC地址欺骗检测和预防方法进行了综述,并分析了其优缺点。分析中考虑的因素包括方法的可靠性和鲁棒性,以及计算开销和效率方面的性能。
{"title":"Survey of Media Access Control address spoofing attacks detection and prevention techniques in wireless networks","authors":"E. Letsoalo, S. Ojo","doi":"10.1109/ISTAFRICA.2016.7530589","DOIUrl":"https://doi.org/10.1109/ISTAFRICA.2016.7530589","url":null,"abstract":"Wireless networks are used to access many services such as Internet banking, e-commerce, eHealth, and from many more systems that relay sensitive information. To connect to a wireless network a user needs to be authenticated by and be associated with an access point. Management frames and control frames are used for authentication, association and giving a user access to the wireless network. Management frames and control frames are sent in clear text and can expose the wireless network to security attacks such as media access control spoofing and session hijacking attacks. An attacker with the packet sniffer software can intercept packets and extract Media Access Control addresses of the access point or other users. MAC address is used to associate a client with the access point in wireless networks. An attacker can use a spoofed Media Access Control address of the real access point to disconnect the legitimate users from the network and takeover any existing TCP session that has already been established. Since the legitimate user is already authenticated in the network, an attacker with the spoofed MAC address will not require authentication. Such an exploitation of a valid computer session to gain unauthorized access to information or services through a network is referred to as session hijacking attack. There are proposed methods for dealing with MAC address spoofing. Some methods produce lots of false positives and false negatives while others require a lot of infrastructural overhead as well as computational overhead. In this study some of the existing MAC addresses spoofing detection and prevention methods are reviewed, with strengths and weaknesses analysed. Factors considered in the analysis include reliability and robustness of the methods, and performance in terms of computational overhead and efficiency.","PeriodicalId":326074,"journal":{"name":"2016 IST-Africa Week Conference","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123518835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A profile-aware microtasking approach for improving task assignment in crowdsourcing services 改进众包服务中任务分配的配置文件感知微任务方法
Pub Date : 2016-05-11 DOI: 10.1109/ISTAFRICA.2016.7530702
J. Mtsweni, E. Ngassam, L. Burge
Microtasking as one of the crowdsourcing models has found penetration mostly in developed nations and is slowly making inroads in developing nations. It has been used for quickly solving a myriad of social and business challenges by tapping into the diversity of the unknown crowd. Nevertheless, there are still a number of research challenges that are found in various microtasking initiatives, such as lack of user profiling, quality of task submissions, poor task design and assignment, ambiguous task assessments, and lack of diverse platforms to cater for the needs of differently skilled crowds. Most prominent microtasking platforms do not consider or even exploit the profile of the crowd in improving task design, assignment, and eventually quality of completed microtasks. In this paper, the objective was to explore the design and evaluation of a conceptual approach that could be implemented in microtasking environments for purposes of improving task assignments and eventually quality. A design science research methodology was adopted to build the proposed artefact, which was evaluated for relevance using comparative analysis and crowdsourcing metrics. The results suggest that exploiting micro workers' profiles could improve task design, assignment, assessment, and ultimately quality. However, stakeholders' awareness of effective microtasking approaches still requires research attention.
微任务作为众包模式之一,主要在发达国家普及,在发展中国家也在慢慢普及。通过挖掘未知人群的多样性,它已经被用于快速解决无数的社会和商业挑战。然而,在各种微任务计划中仍然存在许多研究挑战,例如缺乏用户分析,任务提交质量,任务设计和分配不良,任务评估模糊,以及缺乏满足不同技能人群需求的多样化平台。大多数突出的微任务平台在改进任务设计、分配和最终完成的微任务质量时,都没有考虑甚至利用人群的特征。在本文中,我们的目标是探索一种概念方法的设计和评估,这种方法可以在微任务环境中实现,以改善任务分配和最终质量。采用设计科学研究方法来构建提议的人工制品,并使用比较分析和众包度量来评估其相关性。研究结果表明,利用微员工的个人资料可以改善任务设计、分配、评估,并最终提高工作质量。然而,利益相关者对有效的微任务方法的认识仍然需要研究的关注。
{"title":"A profile-aware microtasking approach for improving task assignment in crowdsourcing services","authors":"J. Mtsweni, E. Ngassam, L. Burge","doi":"10.1109/ISTAFRICA.2016.7530702","DOIUrl":"https://doi.org/10.1109/ISTAFRICA.2016.7530702","url":null,"abstract":"Microtasking as one of the crowdsourcing models has found penetration mostly in developed nations and is slowly making inroads in developing nations. It has been used for quickly solving a myriad of social and business challenges by tapping into the diversity of the unknown crowd. Nevertheless, there are still a number of research challenges that are found in various microtasking initiatives, such as lack of user profiling, quality of task submissions, poor task design and assignment, ambiguous task assessments, and lack of diverse platforms to cater for the needs of differently skilled crowds. Most prominent microtasking platforms do not consider or even exploit the profile of the crowd in improving task design, assignment, and eventually quality of completed microtasks. In this paper, the objective was to explore the design and evaluation of a conceptual approach that could be implemented in microtasking environments for purposes of improving task assignments and eventually quality. A design science research methodology was adopted to build the proposed artefact, which was evaluated for relevance using comparative analysis and crowdsourcing metrics. The results suggest that exploiting micro workers' profiles could improve task design, assignment, assessment, and ultimately quality. However, stakeholders' awareness of effective microtasking approaches still requires research attention.","PeriodicalId":326074,"journal":{"name":"2016 IST-Africa Week Conference","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121951671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
The network society: A model for computing infrastructure in South African schools 网络社会:南非学校计算基础设施的模型
Pub Date : 2016-05-11 DOI: 10.1109/ISTAFRICA.2016.7530673
I. Sieborger, A. Terzoli
Worldwide computers are being used in schools for, amongst other things, developing the knowledge and skills required for citizens to be able to operate within the 21st Century Information Age. Realising the potential of technology in uplifting the lives of its citizens the South African government has proposed the National Broadband Plan (SA Connect). However, unfortunately this plan only addresses the networking aspect of Information Communication Technologies (ICTs). In this paper we investigate appropriate Information Technologies for schools in the light of SA Connect, and propose a model for the computing infrastructure required in South African schools in order to support access to and adoption of technology and networks. This model is based on our multi-year experimentation in the Siyakhula Living Lab.
世界各地的学校都在使用计算机,除其他用途外,还用于培养公民在21世纪信息时代操作所需的知识和技能。南非政府意识到技术在提升其公民生活方面的潜力,提出了国家宽带计划(SA Connect)。然而,不幸的是,这个计划只针对信息通信技术(ict)的网络方面。在本文中,我们根据SA Connect研究了适合学校的信息技术,并提出了南非学校所需的计算基础设施模型,以支持技术和网络的获取和采用。这个模型是基于我们在Siyakhula生活实验室多年的实验。
{"title":"The network society: A model for computing infrastructure in South African schools","authors":"I. Sieborger, A. Terzoli","doi":"10.1109/ISTAFRICA.2016.7530673","DOIUrl":"https://doi.org/10.1109/ISTAFRICA.2016.7530673","url":null,"abstract":"Worldwide computers are being used in schools for, amongst other things, developing the knowledge and skills required for citizens to be able to operate within the 21st Century Information Age. Realising the potential of technology in uplifting the lives of its citizens the South African government has proposed the National Broadband Plan (SA Connect). However, unfortunately this plan only addresses the networking aspect of Information Communication Technologies (ICTs). In this paper we investigate appropriate Information Technologies for schools in the light of SA Connect, and propose a model for the computing infrastructure required in South African schools in order to support access to and adoption of technology and networks. This model is based on our multi-year experimentation in the Siyakhula Living Lab.","PeriodicalId":326074,"journal":{"name":"2016 IST-Africa Week Conference","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124066845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A topology visualisation tool for National Research and Education Networks in Africa 非洲国家研究和教育网络的拓扑可视化工具
Pub Date : 2016-05-11 DOI: 10.1109/ISTAFRICA.2016.7530605
Chantal Yang, H. Suleman, Josiah Chavula
Previous research on National Research and Education Networks (NRENs) in Africa has shown high latency in traffic exchanged between networks, with 75% of this traffic taking circuitous routes through Europe. This paper presents a user-centered creation of a geospatial visualisation tool that can be used to show the network structure of African NRENs, using Traceroute as a method for network topology discovery. The visualisation tool allows multiple Traceroutes for a single IP address to be viewed on a map from various vantage points. The tool's effectiveness and accuracy at communicating the logical network topology of African NRENs and routes of traffic traversal was assessed. Results from usability tests showed that the tool was able to effectively and accurately communicate the logical topology on a country and continental level with over 68% of visual queries having been answered successfully.
先前对非洲国家研究和教育网络(NRENs)的研究表明,网络之间交换的流量具有很高的延迟,其中75%的流量通过欧洲的迂回路线。本文介绍了一个以用户为中心的地理空间可视化工具的创建,该工具可用于显示非洲nren的网络结构,使用Traceroute作为网络拓扑发现的方法。可视化工具允许从不同的有利位置在地图上查看单个IP地址的多个traceroute。评估了该工具在传达非洲nren的逻辑网络拓扑和交通穿越路线方面的有效性和准确性。可用性测试的结果表明,该工具能够在国家和大陆层面上有效、准确地传达逻辑拓扑,超过68%的视觉查询得到了成功回答。
{"title":"A topology visualisation tool for National Research and Education Networks in Africa","authors":"Chantal Yang, H. Suleman, Josiah Chavula","doi":"10.1109/ISTAFRICA.2016.7530605","DOIUrl":"https://doi.org/10.1109/ISTAFRICA.2016.7530605","url":null,"abstract":"Previous research on National Research and Education Networks (NRENs) in Africa has shown high latency in traffic exchanged between networks, with 75% of this traffic taking circuitous routes through Europe. This paper presents a user-centered creation of a geospatial visualisation tool that can be used to show the network structure of African NRENs, using Traceroute as a method for network topology discovery. The visualisation tool allows multiple Traceroutes for a single IP address to be viewed on a map from various vantage points. The tool's effectiveness and accuracy at communicating the logical network topology of African NRENs and routes of traffic traversal was assessed. Results from usability tests showed that the tool was able to effectively and accurately communicate the logical topology on a country and continental level with over 68% of visual queries having been answered successfully.","PeriodicalId":326074,"journal":{"name":"2016 IST-Africa Week Conference","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127639636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Open transport map — Routable OpenStreetMap 开放交通地图-可路由的OpenStreetMap
Pub Date : 2016-05-11 DOI: 10.1109/ISTAFRICA.2016.7530657
K. Jedlička, P. Hájek, V. Cada, J. Martolos, J. Stastny, Daniel Beran, Frantisek Kolovský, D. Kozhukh
This paper introduces Open Transport Map (OTM). The OTM is a web based map, depicting the road network of the Europe. The road network is derived from open source OpenStreetMap (OSM) but the data is stored in the Infrastructure for Spatial Information in the European Community (INSPIRE) Transport Network compatible data scheme. OTM is (contrariwise the OSM) topologically clean and routable data source, suitable for network analyses. A calculation of time and place related traffic volumes is one of analysis possible to perform on the base of such a data. The calculation of traffic volumes combines demographic data about the population and a road network vector data to create an enriched traffic model. This model can simulate traffic volume changes in the network through the time. The OTM is developed within the European projects OpenTransportNet, SDI4Apps and Foodie and it is freely available (under the ODbL license) for user's further use.
本文介绍了开放式交通地图(OTM)。OTM是一个基于网络的地图,描绘了欧洲的道路网络。道路网络来源于开源的OpenStreetMap (OSM),但数据存储在欧洲共同体(INSPIRE)交通网络兼容数据方案的空间信息基础设施中。OTM(与OSM相反)是拓扑干净且可路由的数据源,适合于网络分析。计算与时间和地点有关的交通量是在这种数据的基础上可能进行的分析之一。交通量的计算结合了人口统计数据和道路网络矢量数据,创建了一个丰富的交通模型。该模型可以模拟网络中流量随时间的变化。OTM是由欧洲项目OpenTransportNet、SDI4Apps和Foodie开发的,它是免费的(在ODbL许可下),供用户进一步使用。
{"title":"Open transport map — Routable OpenStreetMap","authors":"K. Jedlička, P. Hájek, V. Cada, J. Martolos, J. Stastny, Daniel Beran, Frantisek Kolovský, D. Kozhukh","doi":"10.1109/ISTAFRICA.2016.7530657","DOIUrl":"https://doi.org/10.1109/ISTAFRICA.2016.7530657","url":null,"abstract":"This paper introduces Open Transport Map (OTM). The OTM is a web based map, depicting the road network of the Europe. The road network is derived from open source OpenStreetMap (OSM) but the data is stored in the Infrastructure for Spatial Information in the European Community (INSPIRE) Transport Network compatible data scheme. OTM is (contrariwise the OSM) topologically clean and routable data source, suitable for network analyses. A calculation of time and place related traffic volumes is one of analysis possible to perform on the base of such a data. The calculation of traffic volumes combines demographic data about the population and a road network vector data to create an enriched traffic model. This model can simulate traffic volume changes in the network through the time. The OTM is developed within the European projects OpenTransportNet, SDI4Apps and Foodie and it is freely available (under the ODbL license) for user's further use.","PeriodicalId":326074,"journal":{"name":"2016 IST-Africa Week Conference","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129485367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The internet of things for South African tourism 南非旅游业的物联网
Pub Date : 2016-05-11 DOI: 10.1109/ISTAFRICA.2016.7530573
O. Gcaba, N. Dlodlo
This paper presents examples of internet of things (IoT) applications that could enhance the management of tourism activities in South Africa. Although information and communication technologies (ICT) have been adopted in some aspects of the tourism industry, there is further room to enhance this functionality through the adoption of IoT technologies. The IoT technologies in this research have been categorised under wildlife monitoring and tracking, monitoring seas and waters, monitoring birds, plant species monitoring, tourist information services, hospitality services, tourism marketing and mountaineering and weather monitoring as identified from the South African Department of Tourism website. A literature review was conducted to identify IoT applications in tourism in the international arena that would apply in the South African environment. An architecture of a wildfire detection and alert system using IoT is given as an example. The question that this research answers therefore is, “What IoT technologies can be adopted to impact on South Africa's tourism industry”.
本文介绍了可以加强南非旅游活动管理的物联网(IoT)应用实例。尽管信息和通信技术(ICT)已被应用于旅游业的某些方面,但通过采用物联网技术,这一功能还有进一步增强的空间。本研究中的物联网技术分为野生动物监测和跟踪、海洋和水域监测、鸟类监测、植物物种监测、旅游信息服务、酒店服务、旅游营销、登山和天气监测,这些都是南非旅游部网站上确定的。进行了一项文献综述,以确定物联网在国际舞台上的旅游业应用,适用于南非环境。以一种基于物联网的野火探测预警系统架构为例。因此,本研究要回答的问题是,“可以采用哪些物联网技术来影响南非的旅游业”。
{"title":"The internet of things for South African tourism","authors":"O. Gcaba, N. Dlodlo","doi":"10.1109/ISTAFRICA.2016.7530573","DOIUrl":"https://doi.org/10.1109/ISTAFRICA.2016.7530573","url":null,"abstract":"This paper presents examples of internet of things (IoT) applications that could enhance the management of tourism activities in South Africa. Although information and communication technologies (ICT) have been adopted in some aspects of the tourism industry, there is further room to enhance this functionality through the adoption of IoT technologies. The IoT technologies in this research have been categorised under wildlife monitoring and tracking, monitoring seas and waters, monitoring birds, plant species monitoring, tourist information services, hospitality services, tourism marketing and mountaineering and weather monitoring as identified from the South African Department of Tourism website. A literature review was conducted to identify IoT applications in tourism in the international arena that would apply in the South African environment. An architecture of a wildfire detection and alert system using IoT is given as an example. The question that this research answers therefore is, “What IoT technologies can be adopted to impact on South Africa's tourism industry”.","PeriodicalId":326074,"journal":{"name":"2016 IST-Africa Week Conference","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130965913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Towards an adaptive ontology based model for interoperability in internet of things (IoT) 基于自适应本体的物联网互操作性模型研究
Pub Date : 2016-05-11 DOI: 10.1109/ISTAFRICA.2016.7530599
E. Chindenga, Caroline Gurajena, M. Thinyane
Interoperability is key in any networked system. In the IoT environments, the need is further amplified by the presence of numerous heterogeneous devices. To address device and service disparity, the things will need proper addressing, registration and de-registration. This can be implemented through abstraction technologies and models such as ontologies for semantic expressiveness. The aim of this paper is to investigate some of the requirements for semantic interoperability and expose some of the current challenges in device and service discovery. We also explore current models for resource discovery highlighting their strengths and weaknesses and how they can contribute to an ontology based IoT device and service discovery model. Furthermore, the paper concludes by proposing a model for device and service discovery.
互操作性是任何网络系统的关键。在物联网环境中,大量异构设备的存在进一步扩大了需求。为了解决设备和服务的差异,这些东西需要适当的寻址、注册和注销。这可以通过抽象技术和模型来实现,比如用于语义表达的本体。本文的目的是研究语义互操作性的一些需求,并揭示设备和服务发现中当前面临的一些挑战。我们还探讨了当前的资源发现模型,突出了它们的优点和缺点,以及它们如何有助于基于本体的物联网设备和服务发现模型。最后,提出了一个设备和服务发现模型。
{"title":"Towards an adaptive ontology based model for interoperability in internet of things (IoT)","authors":"E. Chindenga, Caroline Gurajena, M. Thinyane","doi":"10.1109/ISTAFRICA.2016.7530599","DOIUrl":"https://doi.org/10.1109/ISTAFRICA.2016.7530599","url":null,"abstract":"Interoperability is key in any networked system. In the IoT environments, the need is further amplified by the presence of numerous heterogeneous devices. To address device and service disparity, the things will need proper addressing, registration and de-registration. This can be implemented through abstraction technologies and models such as ontologies for semantic expressiveness. The aim of this paper is to investigate some of the requirements for semantic interoperability and expose some of the current challenges in device and service discovery. We also explore current models for resource discovery highlighting their strengths and weaknesses and how they can contribute to an ontology based IoT device and service discovery model. Furthermore, the paper concludes by proposing a model for device and service discovery.","PeriodicalId":326074,"journal":{"name":"2016 IST-Africa Week Conference","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131620442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
e-Government development in Sub-Saharan Africa (SSA): Relationship with macro level indices and possible implications 撒哈拉以南非洲的电子政务发展:与宏观指标的关系及其可能的影响
Pub Date : 2016-05-11 DOI: 10.1109/ISTAFRICA.2016.7530580
S. Verkijika, L. de Wet
The remarkable benefits of e-government has enthused many governments around the globe to focus on the development of e-government competencies as a central part of their strategies. However, there are still great disparities in the level of e-government development between the developed and developing worlds, with Sub-Saharan Africa (SSA) lagging behind all other regions. The reason for these disparities has so far been attributed to differences in national income; nonetheless, some resource-poor countries have succeeded to make great strides in e-government development. As such, there has been a call to examine other indicators of e-government development, since national income alone does not paint a detailed picture. In this light, this study examined a total of six indicators (corruption, gender equality, population age, national income, cybersecurity, and innovation) that are believed to influence e-government development using SSA as the case study. Macro-level indices were used to capture country level data from 49 SSA countries. The findings indicated that all the factors significantly influenced e-government development in SSA. The paper culminates with a discussion of the possible implications of the findings.
电子政务的显著优势促使全球许多政府将电子政务能力的发展作为其战略的核心部分。然而,发达国家和发展中国家的电子政务发展水平仍然存在很大差距,撒哈拉以南非洲地区的电子政务发展水平落后于其他地区。迄今为止,造成这些差异的原因被归因于国民收入的差异;然而,一些资源贫乏的国家已经成功地在电子政务发展方面取得了长足的进步。因此,有人呼吁检查电子政务发展的其他指标,因为仅靠国民收入并不能描绘出详细的图景。有鉴于此,本研究以SSA为个案,考察了被认为影响电子政务发展的六个指标(腐败、性别平等、人口年龄、国民收入、网络安全和创新)。宏观指数用于获取49个SSA国家的国家级数据。研究结果表明,各因素对电子政务发展均有显著影响。论文最后讨论了这些发现可能产生的影响。
{"title":"e-Government development in Sub-Saharan Africa (SSA): Relationship with macro level indices and possible implications","authors":"S. Verkijika, L. de Wet","doi":"10.1109/ISTAFRICA.2016.7530580","DOIUrl":"https://doi.org/10.1109/ISTAFRICA.2016.7530580","url":null,"abstract":"The remarkable benefits of e-government has enthused many governments around the globe to focus on the development of e-government competencies as a central part of their strategies. However, there are still great disparities in the level of e-government development between the developed and developing worlds, with Sub-Saharan Africa (SSA) lagging behind all other regions. The reason for these disparities has so far been attributed to differences in national income; nonetheless, some resource-poor countries have succeeded to make great strides in e-government development. As such, there has been a call to examine other indicators of e-government development, since national income alone does not paint a detailed picture. In this light, this study examined a total of six indicators (corruption, gender equality, population age, national income, cybersecurity, and innovation) that are believed to influence e-government development using SSA as the case study. Macro-level indices were used to capture country level data from 49 SSA countries. The findings indicated that all the factors significantly influenced e-government development in SSA. The paper culminates with a discussion of the possible implications of the findings.","PeriodicalId":326074,"journal":{"name":"2016 IST-Africa Week Conference","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121668413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A mobile based technology platform for citizen engagement in Malawi 马拉维公民参与的移动技术平台
Pub Date : 2016-05-11 DOI: 10.1109/ISTAFRICA.2016.7530683
Rachel Sibande, H. Thinyane
The proliferation of mobile phones and the internet has presented opportunities to enhance communication between citizens, elected leaders, service providers and local government. This paper examines the status of citizen participation in Malawi and the gaps that exist. We leverage the exponential and continued growth of mobile phones; to develop a mobile responsive web based citizen engagement platform to address the deficiencies that exist in citizen engagement beyond elections as observed by scholars and practitioners. The paper presents work in progress on the development and deployment of this citizen engagement platform in Malawi. The prototype caters for data collection streams through SMS, web forms and social media. It also integrates multimedia files such as images, videos and audio for evidence based reporting. Beyond deployment of the platform, research will be conducted to unearth factors that influence or constrain citizens from adopting technology as a tool for engagement. Results of this study are expected to contribute to the discourse on use of ICTs as a tool for citizen engagement to inform subsequent deployments.
手机和互联网的普及为加强公民、民选领导人、服务提供商和地方政府之间的沟通提供了机会。本文考察了马拉维公民参与的现状和存在的差距。我们利用了手机的指数级和持续增长;开发一个基于移动响应网络的公民参与平台,以解决学者和实践者所观察到的公民参与在选举之外存在的缺陷。该文件介绍了在马拉维开发和部署这一公民参与平台的进展情况。原型机通过短信、网页表单和社交媒体来收集数据流。它还集成了多媒体文件,如图像、视频和音频,用于基于证据的报告。除了部署平台之外,还将进行研究,以发掘影响或限制公民采用技术作为参与工具的因素。预计这项研究的结果将有助于讨论如何将ict作为公民参与的工具,为后续部署提供信息。
{"title":"A mobile based technology platform for citizen engagement in Malawi","authors":"Rachel Sibande, H. Thinyane","doi":"10.1109/ISTAFRICA.2016.7530683","DOIUrl":"https://doi.org/10.1109/ISTAFRICA.2016.7530683","url":null,"abstract":"The proliferation of mobile phones and the internet has presented opportunities to enhance communication between citizens, elected leaders, service providers and local government. This paper examines the status of citizen participation in Malawi and the gaps that exist. We leverage the exponential and continued growth of mobile phones; to develop a mobile responsive web based citizen engagement platform to address the deficiencies that exist in citizen engagement beyond elections as observed by scholars and practitioners. The paper presents work in progress on the development and deployment of this citizen engagement platform in Malawi. The prototype caters for data collection streams through SMS, web forms and social media. It also integrates multimedia files such as images, videos and audio for evidence based reporting. Beyond deployment of the platform, research will be conducted to unearth factors that influence or constrain citizens from adopting technology as a tool for engagement. Results of this study are expected to contribute to the discourse on use of ICTs as a tool for citizen engagement to inform subsequent deployments.","PeriodicalId":326074,"journal":{"name":"2016 IST-Africa Week Conference","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114569506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A model for the delivery of SMS and USSD location-based mobile advertising using network-based positioning 基于网络定位的SMS和USSD位置移动广告投放模式
Pub Date : 2016-05-11 DOI: 10.1109/ISTAFRICA.2016.7530613
M. Thiga
This paper examines the use of Network-based location determination as an alternative to symbolic locations in the provision of location-based mobile advertising services using SMS and USSD. Two alternatives are explored; the use of reverse geo-coding and the use of coordinates to identify the locations of both users and providers. Both approaches are found to be feasible. However, the lack of a detailed geo-code database for use in reverse geo-coding as well as the lack of mobile network cooperation in the provision of user coordinates emerge as the main challenges to implementing the proposed model.
本文探讨了在使用SMS和USSD提供基于位置的移动广告服务时,使用基于网络的位置确定作为替代符号位置的方法。探讨了两种替代方案;使用反向地理编码和使用坐标来识别用户和提供者的位置。两种方法都是可行的。然而,缺乏用于反向地理编码的详细地理代码数据库,以及在提供用户坐标方面缺乏移动网络合作,成为实施拟议模型的主要挑战。
{"title":"A model for the delivery of SMS and USSD location-based mobile advertising using network-based positioning","authors":"M. Thiga","doi":"10.1109/ISTAFRICA.2016.7530613","DOIUrl":"https://doi.org/10.1109/ISTAFRICA.2016.7530613","url":null,"abstract":"This paper examines the use of Network-based location determination as an alternative to symbolic locations in the provision of location-based mobile advertising services using SMS and USSD. Two alternatives are explored; the use of reverse geo-coding and the use of coordinates to identify the locations of both users and providers. Both approaches are found to be feasible. However, the lack of a detailed geo-code database for use in reverse geo-coding as well as the lack of mobile network cooperation in the provision of user coordinates emerge as the main challenges to implementing the proposed model.","PeriodicalId":326074,"journal":{"name":"2016 IST-Africa Week Conference","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116077372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2016 IST-Africa Week Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1