Pub Date : 2016-05-11DOI: 10.1109/ISTAFRICA.2016.7530589
E. Letsoalo, S. Ojo
Wireless networks are used to access many services such as Internet banking, e-commerce, eHealth, and from many more systems that relay sensitive information. To connect to a wireless network a user needs to be authenticated by and be associated with an access point. Management frames and control frames are used for authentication, association and giving a user access to the wireless network. Management frames and control frames are sent in clear text and can expose the wireless network to security attacks such as media access control spoofing and session hijacking attacks. An attacker with the packet sniffer software can intercept packets and extract Media Access Control addresses of the access point or other users. MAC address is used to associate a client with the access point in wireless networks. An attacker can use a spoofed Media Access Control address of the real access point to disconnect the legitimate users from the network and takeover any existing TCP session that has already been established. Since the legitimate user is already authenticated in the network, an attacker with the spoofed MAC address will not require authentication. Such an exploitation of a valid computer session to gain unauthorized access to information or services through a network is referred to as session hijacking attack. There are proposed methods for dealing with MAC address spoofing. Some methods produce lots of false positives and false negatives while others require a lot of infrastructural overhead as well as computational overhead. In this study some of the existing MAC addresses spoofing detection and prevention methods are reviewed, with strengths and weaknesses analysed. Factors considered in the analysis include reliability and robustness of the methods, and performance in terms of computational overhead and efficiency.
{"title":"Survey of Media Access Control address spoofing attacks detection and prevention techniques in wireless networks","authors":"E. Letsoalo, S. Ojo","doi":"10.1109/ISTAFRICA.2016.7530589","DOIUrl":"https://doi.org/10.1109/ISTAFRICA.2016.7530589","url":null,"abstract":"Wireless networks are used to access many services such as Internet banking, e-commerce, eHealth, and from many more systems that relay sensitive information. To connect to a wireless network a user needs to be authenticated by and be associated with an access point. Management frames and control frames are used for authentication, association and giving a user access to the wireless network. Management frames and control frames are sent in clear text and can expose the wireless network to security attacks such as media access control spoofing and session hijacking attacks. An attacker with the packet sniffer software can intercept packets and extract Media Access Control addresses of the access point or other users. MAC address is used to associate a client with the access point in wireless networks. An attacker can use a spoofed Media Access Control address of the real access point to disconnect the legitimate users from the network and takeover any existing TCP session that has already been established. Since the legitimate user is already authenticated in the network, an attacker with the spoofed MAC address will not require authentication. Such an exploitation of a valid computer session to gain unauthorized access to information or services through a network is referred to as session hijacking attack. There are proposed methods for dealing with MAC address spoofing. Some methods produce lots of false positives and false negatives while others require a lot of infrastructural overhead as well as computational overhead. In this study some of the existing MAC addresses spoofing detection and prevention methods are reviewed, with strengths and weaknesses analysed. Factors considered in the analysis include reliability and robustness of the methods, and performance in terms of computational overhead and efficiency.","PeriodicalId":326074,"journal":{"name":"2016 IST-Africa Week Conference","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123518835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-11DOI: 10.1109/ISTAFRICA.2016.7530702
J. Mtsweni, E. Ngassam, L. Burge
Microtasking as one of the crowdsourcing models has found penetration mostly in developed nations and is slowly making inroads in developing nations. It has been used for quickly solving a myriad of social and business challenges by tapping into the diversity of the unknown crowd. Nevertheless, there are still a number of research challenges that are found in various microtasking initiatives, such as lack of user profiling, quality of task submissions, poor task design and assignment, ambiguous task assessments, and lack of diverse platforms to cater for the needs of differently skilled crowds. Most prominent microtasking platforms do not consider or even exploit the profile of the crowd in improving task design, assignment, and eventually quality of completed microtasks. In this paper, the objective was to explore the design and evaluation of a conceptual approach that could be implemented in microtasking environments for purposes of improving task assignments and eventually quality. A design science research methodology was adopted to build the proposed artefact, which was evaluated for relevance using comparative analysis and crowdsourcing metrics. The results suggest that exploiting micro workers' profiles could improve task design, assignment, assessment, and ultimately quality. However, stakeholders' awareness of effective microtasking approaches still requires research attention.
{"title":"A profile-aware microtasking approach for improving task assignment in crowdsourcing services","authors":"J. Mtsweni, E. Ngassam, L. Burge","doi":"10.1109/ISTAFRICA.2016.7530702","DOIUrl":"https://doi.org/10.1109/ISTAFRICA.2016.7530702","url":null,"abstract":"Microtasking as one of the crowdsourcing models has found penetration mostly in developed nations and is slowly making inroads in developing nations. It has been used for quickly solving a myriad of social and business challenges by tapping into the diversity of the unknown crowd. Nevertheless, there are still a number of research challenges that are found in various microtasking initiatives, such as lack of user profiling, quality of task submissions, poor task design and assignment, ambiguous task assessments, and lack of diverse platforms to cater for the needs of differently skilled crowds. Most prominent microtasking platforms do not consider or even exploit the profile of the crowd in improving task design, assignment, and eventually quality of completed microtasks. In this paper, the objective was to explore the design and evaluation of a conceptual approach that could be implemented in microtasking environments for purposes of improving task assignments and eventually quality. A design science research methodology was adopted to build the proposed artefact, which was evaluated for relevance using comparative analysis and crowdsourcing metrics. The results suggest that exploiting micro workers' profiles could improve task design, assignment, assessment, and ultimately quality. However, stakeholders' awareness of effective microtasking approaches still requires research attention.","PeriodicalId":326074,"journal":{"name":"2016 IST-Africa Week Conference","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121951671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-11DOI: 10.1109/ISTAFRICA.2016.7530673
I. Sieborger, A. Terzoli
Worldwide computers are being used in schools for, amongst other things, developing the knowledge and skills required for citizens to be able to operate within the 21st Century Information Age. Realising the potential of technology in uplifting the lives of its citizens the South African government has proposed the National Broadband Plan (SA Connect). However, unfortunately this plan only addresses the networking aspect of Information Communication Technologies (ICTs). In this paper we investigate appropriate Information Technologies for schools in the light of SA Connect, and propose a model for the computing infrastructure required in South African schools in order to support access to and adoption of technology and networks. This model is based on our multi-year experimentation in the Siyakhula Living Lab.
{"title":"The network society: A model for computing infrastructure in South African schools","authors":"I. Sieborger, A. Terzoli","doi":"10.1109/ISTAFRICA.2016.7530673","DOIUrl":"https://doi.org/10.1109/ISTAFRICA.2016.7530673","url":null,"abstract":"Worldwide computers are being used in schools for, amongst other things, developing the knowledge and skills required for citizens to be able to operate within the 21st Century Information Age. Realising the potential of technology in uplifting the lives of its citizens the South African government has proposed the National Broadband Plan (SA Connect). However, unfortunately this plan only addresses the networking aspect of Information Communication Technologies (ICTs). In this paper we investigate appropriate Information Technologies for schools in the light of SA Connect, and propose a model for the computing infrastructure required in South African schools in order to support access to and adoption of technology and networks. This model is based on our multi-year experimentation in the Siyakhula Living Lab.","PeriodicalId":326074,"journal":{"name":"2016 IST-Africa Week Conference","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124066845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-11DOI: 10.1109/ISTAFRICA.2016.7530605
Chantal Yang, H. Suleman, Josiah Chavula
Previous research on National Research and Education Networks (NRENs) in Africa has shown high latency in traffic exchanged between networks, with 75% of this traffic taking circuitous routes through Europe. This paper presents a user-centered creation of a geospatial visualisation tool that can be used to show the network structure of African NRENs, using Traceroute as a method for network topology discovery. The visualisation tool allows multiple Traceroutes for a single IP address to be viewed on a map from various vantage points. The tool's effectiveness and accuracy at communicating the logical network topology of African NRENs and routes of traffic traversal was assessed. Results from usability tests showed that the tool was able to effectively and accurately communicate the logical topology on a country and continental level with over 68% of visual queries having been answered successfully.
{"title":"A topology visualisation tool for National Research and Education Networks in Africa","authors":"Chantal Yang, H. Suleman, Josiah Chavula","doi":"10.1109/ISTAFRICA.2016.7530605","DOIUrl":"https://doi.org/10.1109/ISTAFRICA.2016.7530605","url":null,"abstract":"Previous research on National Research and Education Networks (NRENs) in Africa has shown high latency in traffic exchanged between networks, with 75% of this traffic taking circuitous routes through Europe. This paper presents a user-centered creation of a geospatial visualisation tool that can be used to show the network structure of African NRENs, using Traceroute as a method for network topology discovery. The visualisation tool allows multiple Traceroutes for a single IP address to be viewed on a map from various vantage points. The tool's effectiveness and accuracy at communicating the logical network topology of African NRENs and routes of traffic traversal was assessed. Results from usability tests showed that the tool was able to effectively and accurately communicate the logical topology on a country and continental level with over 68% of visual queries having been answered successfully.","PeriodicalId":326074,"journal":{"name":"2016 IST-Africa Week Conference","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127639636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-11DOI: 10.1109/ISTAFRICA.2016.7530657
K. Jedlička, P. Hájek, V. Cada, J. Martolos, J. Stastny, Daniel Beran, Frantisek Kolovský, D. Kozhukh
This paper introduces Open Transport Map (OTM). The OTM is a web based map, depicting the road network of the Europe. The road network is derived from open source OpenStreetMap (OSM) but the data is stored in the Infrastructure for Spatial Information in the European Community (INSPIRE) Transport Network compatible data scheme. OTM is (contrariwise the OSM) topologically clean and routable data source, suitable for network analyses. A calculation of time and place related traffic volumes is one of analysis possible to perform on the base of such a data. The calculation of traffic volumes combines demographic data about the population and a road network vector data to create an enriched traffic model. This model can simulate traffic volume changes in the network through the time. The OTM is developed within the European projects OpenTransportNet, SDI4Apps and Foodie and it is freely available (under the ODbL license) for user's further use.
{"title":"Open transport map — Routable OpenStreetMap","authors":"K. Jedlička, P. Hájek, V. Cada, J. Martolos, J. Stastny, Daniel Beran, Frantisek Kolovský, D. Kozhukh","doi":"10.1109/ISTAFRICA.2016.7530657","DOIUrl":"https://doi.org/10.1109/ISTAFRICA.2016.7530657","url":null,"abstract":"This paper introduces Open Transport Map (OTM). The OTM is a web based map, depicting the road network of the Europe. The road network is derived from open source OpenStreetMap (OSM) but the data is stored in the Infrastructure for Spatial Information in the European Community (INSPIRE) Transport Network compatible data scheme. OTM is (contrariwise the OSM) topologically clean and routable data source, suitable for network analyses. A calculation of time and place related traffic volumes is one of analysis possible to perform on the base of such a data. The calculation of traffic volumes combines demographic data about the population and a road network vector data to create an enriched traffic model. This model can simulate traffic volume changes in the network through the time. The OTM is developed within the European projects OpenTransportNet, SDI4Apps and Foodie and it is freely available (under the ODbL license) for user's further use.","PeriodicalId":326074,"journal":{"name":"2016 IST-Africa Week Conference","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129485367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-11DOI: 10.1109/ISTAFRICA.2016.7530573
O. Gcaba, N. Dlodlo
This paper presents examples of internet of things (IoT) applications that could enhance the management of tourism activities in South Africa. Although information and communication technologies (ICT) have been adopted in some aspects of the tourism industry, there is further room to enhance this functionality through the adoption of IoT technologies. The IoT technologies in this research have been categorised under wildlife monitoring and tracking, monitoring seas and waters, monitoring birds, plant species monitoring, tourist information services, hospitality services, tourism marketing and mountaineering and weather monitoring as identified from the South African Department of Tourism website. A literature review was conducted to identify IoT applications in tourism in the international arena that would apply in the South African environment. An architecture of a wildfire detection and alert system using IoT is given as an example. The question that this research answers therefore is, “What IoT technologies can be adopted to impact on South Africa's tourism industry”.
{"title":"The internet of things for South African tourism","authors":"O. Gcaba, N. Dlodlo","doi":"10.1109/ISTAFRICA.2016.7530573","DOIUrl":"https://doi.org/10.1109/ISTAFRICA.2016.7530573","url":null,"abstract":"This paper presents examples of internet of things (IoT) applications that could enhance the management of tourism activities in South Africa. Although information and communication technologies (ICT) have been adopted in some aspects of the tourism industry, there is further room to enhance this functionality through the adoption of IoT technologies. The IoT technologies in this research have been categorised under wildlife monitoring and tracking, monitoring seas and waters, monitoring birds, plant species monitoring, tourist information services, hospitality services, tourism marketing and mountaineering and weather monitoring as identified from the South African Department of Tourism website. A literature review was conducted to identify IoT applications in tourism in the international arena that would apply in the South African environment. An architecture of a wildfire detection and alert system using IoT is given as an example. The question that this research answers therefore is, “What IoT technologies can be adopted to impact on South Africa's tourism industry”.","PeriodicalId":326074,"journal":{"name":"2016 IST-Africa Week Conference","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130965913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-11DOI: 10.1109/ISTAFRICA.2016.7530599
E. Chindenga, Caroline Gurajena, M. Thinyane
Interoperability is key in any networked system. In the IoT environments, the need is further amplified by the presence of numerous heterogeneous devices. To address device and service disparity, the things will need proper addressing, registration and de-registration. This can be implemented through abstraction technologies and models such as ontologies for semantic expressiveness. The aim of this paper is to investigate some of the requirements for semantic interoperability and expose some of the current challenges in device and service discovery. We also explore current models for resource discovery highlighting their strengths and weaknesses and how they can contribute to an ontology based IoT device and service discovery model. Furthermore, the paper concludes by proposing a model for device and service discovery.
{"title":"Towards an adaptive ontology based model for interoperability in internet of things (IoT)","authors":"E. Chindenga, Caroline Gurajena, M. Thinyane","doi":"10.1109/ISTAFRICA.2016.7530599","DOIUrl":"https://doi.org/10.1109/ISTAFRICA.2016.7530599","url":null,"abstract":"Interoperability is key in any networked system. In the IoT environments, the need is further amplified by the presence of numerous heterogeneous devices. To address device and service disparity, the things will need proper addressing, registration and de-registration. This can be implemented through abstraction technologies and models such as ontologies for semantic expressiveness. The aim of this paper is to investigate some of the requirements for semantic interoperability and expose some of the current challenges in device and service discovery. We also explore current models for resource discovery highlighting their strengths and weaknesses and how they can contribute to an ontology based IoT device and service discovery model. Furthermore, the paper concludes by proposing a model for device and service discovery.","PeriodicalId":326074,"journal":{"name":"2016 IST-Africa Week Conference","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131620442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-11DOI: 10.1109/ISTAFRICA.2016.7530580
S. Verkijika, L. de Wet
The remarkable benefits of e-government has enthused many governments around the globe to focus on the development of e-government competencies as a central part of their strategies. However, there are still great disparities in the level of e-government development between the developed and developing worlds, with Sub-Saharan Africa (SSA) lagging behind all other regions. The reason for these disparities has so far been attributed to differences in national income; nonetheless, some resource-poor countries have succeeded to make great strides in e-government development. As such, there has been a call to examine other indicators of e-government development, since national income alone does not paint a detailed picture. In this light, this study examined a total of six indicators (corruption, gender equality, population age, national income, cybersecurity, and innovation) that are believed to influence e-government development using SSA as the case study. Macro-level indices were used to capture country level data from 49 SSA countries. The findings indicated that all the factors significantly influenced e-government development in SSA. The paper culminates with a discussion of the possible implications of the findings.
{"title":"e-Government development in Sub-Saharan Africa (SSA): Relationship with macro level indices and possible implications","authors":"S. Verkijika, L. de Wet","doi":"10.1109/ISTAFRICA.2016.7530580","DOIUrl":"https://doi.org/10.1109/ISTAFRICA.2016.7530580","url":null,"abstract":"The remarkable benefits of e-government has enthused many governments around the globe to focus on the development of e-government competencies as a central part of their strategies. However, there are still great disparities in the level of e-government development between the developed and developing worlds, with Sub-Saharan Africa (SSA) lagging behind all other regions. The reason for these disparities has so far been attributed to differences in national income; nonetheless, some resource-poor countries have succeeded to make great strides in e-government development. As such, there has been a call to examine other indicators of e-government development, since national income alone does not paint a detailed picture. In this light, this study examined a total of six indicators (corruption, gender equality, population age, national income, cybersecurity, and innovation) that are believed to influence e-government development using SSA as the case study. Macro-level indices were used to capture country level data from 49 SSA countries. The findings indicated that all the factors significantly influenced e-government development in SSA. The paper culminates with a discussion of the possible implications of the findings.","PeriodicalId":326074,"journal":{"name":"2016 IST-Africa Week Conference","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121668413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-11DOI: 10.1109/ISTAFRICA.2016.7530683
Rachel Sibande, H. Thinyane
The proliferation of mobile phones and the internet has presented opportunities to enhance communication between citizens, elected leaders, service providers and local government. This paper examines the status of citizen participation in Malawi and the gaps that exist. We leverage the exponential and continued growth of mobile phones; to develop a mobile responsive web based citizen engagement platform to address the deficiencies that exist in citizen engagement beyond elections as observed by scholars and practitioners. The paper presents work in progress on the development and deployment of this citizen engagement platform in Malawi. The prototype caters for data collection streams through SMS, web forms and social media. It also integrates multimedia files such as images, videos and audio for evidence based reporting. Beyond deployment of the platform, research will be conducted to unearth factors that influence or constrain citizens from adopting technology as a tool for engagement. Results of this study are expected to contribute to the discourse on use of ICTs as a tool for citizen engagement to inform subsequent deployments.
{"title":"A mobile based technology platform for citizen engagement in Malawi","authors":"Rachel Sibande, H. Thinyane","doi":"10.1109/ISTAFRICA.2016.7530683","DOIUrl":"https://doi.org/10.1109/ISTAFRICA.2016.7530683","url":null,"abstract":"The proliferation of mobile phones and the internet has presented opportunities to enhance communication between citizens, elected leaders, service providers and local government. This paper examines the status of citizen participation in Malawi and the gaps that exist. We leverage the exponential and continued growth of mobile phones; to develop a mobile responsive web based citizen engagement platform to address the deficiencies that exist in citizen engagement beyond elections as observed by scholars and practitioners. The paper presents work in progress on the development and deployment of this citizen engagement platform in Malawi. The prototype caters for data collection streams through SMS, web forms and social media. It also integrates multimedia files such as images, videos and audio for evidence based reporting. Beyond deployment of the platform, research will be conducted to unearth factors that influence or constrain citizens from adopting technology as a tool for engagement. Results of this study are expected to contribute to the discourse on use of ICTs as a tool for citizen engagement to inform subsequent deployments.","PeriodicalId":326074,"journal":{"name":"2016 IST-Africa Week Conference","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114569506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-11DOI: 10.1109/ISTAFRICA.2016.7530613
M. Thiga
This paper examines the use of Network-based location determination as an alternative to symbolic locations in the provision of location-based mobile advertising services using SMS and USSD. Two alternatives are explored; the use of reverse geo-coding and the use of coordinates to identify the locations of both users and providers. Both approaches are found to be feasible. However, the lack of a detailed geo-code database for use in reverse geo-coding as well as the lack of mobile network cooperation in the provision of user coordinates emerge as the main challenges to implementing the proposed model.
{"title":"A model for the delivery of SMS and USSD location-based mobile advertising using network-based positioning","authors":"M. Thiga","doi":"10.1109/ISTAFRICA.2016.7530613","DOIUrl":"https://doi.org/10.1109/ISTAFRICA.2016.7530613","url":null,"abstract":"This paper examines the use of Network-based location determination as an alternative to symbolic locations in the provision of location-based mobile advertising services using SMS and USSD. Two alternatives are explored; the use of reverse geo-coding and the use of coordinates to identify the locations of both users and providers. Both approaches are found to be feasible. However, the lack of a detailed geo-code database for use in reverse geo-coding as well as the lack of mobile network cooperation in the provision of user coordinates emerge as the main challenges to implementing the proposed model.","PeriodicalId":326074,"journal":{"name":"2016 IST-Africa Week Conference","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116077372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}