Pub Date : 2019-03-06DOI: 10.1109/ICTAS.2019.8703617
Quintus van Wyk, J. V. Biljon, M. Schoeman
Incident Management Systems (IMS) assist in managing resources in order to minimize fatalities and damage. Visual artifacts in an IMS can facilitate knowledge transfer between responders to an incident, however, evidence-based guidance on the design of these visualizations are lacking. The aim of this study is to propose evidence-based knowledge visualization criteria (KVC). Design Science Research (DSR) was the guiding methodology. We abstracted a set of KVC from the academic literature, and then applied said criteria to evaluate a cloud-based prototype IMS. The evaluation included interviews with content experts from the South African Fire Service to establish the relevance of the KVC. The KVC were also used in a heuristic evaluation of the IMS by usability experts. The theoretical contribution of the study is the validated set of KVC based on the triangulation of the findings from the content experts and the usability experts. The study also makes a practical contribution by demonstrating the use of evidence-based visualization criteria in IMS.
{"title":"Visualization Criteria: supporting knowledge transfer in Incident Management Systems","authors":"Quintus van Wyk, J. V. Biljon, M. Schoeman","doi":"10.1109/ICTAS.2019.8703617","DOIUrl":"https://doi.org/10.1109/ICTAS.2019.8703617","url":null,"abstract":"Incident Management Systems (IMS) assist in managing resources in order to minimize fatalities and damage. Visual artifacts in an IMS can facilitate knowledge transfer between responders to an incident, however, evidence-based guidance on the design of these visualizations are lacking. The aim of this study is to propose evidence-based knowledge visualization criteria (KVC). Design Science Research (DSR) was the guiding methodology. We abstracted a set of KVC from the academic literature, and then applied said criteria to evaluate a cloud-based prototype IMS. The evaluation included interviews with content experts from the South African Fire Service to establish the relevance of the KVC. The KVC were also used in a heuristic evaluation of the IMS by usability experts. The theoretical contribution of the study is the validated set of KVC based on the triangulation of the findings from the content experts and the usability experts. The study also makes a practical contribution by demonstrating the use of evidence-based visualization criteria in IMS.","PeriodicalId":386209,"journal":{"name":"2019 Conference on Information Communications Technology and Society (ICTAS)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132495532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-06DOI: 10.1109/ICTAS.2019.8703629
Yotamu Gangire, A. D. Veiga, M. Herselman
The increase in threats to information systems resources in organisations has been attributed to the failure by employees to adhere to information security policies. Research into the information security behaviour of employees is still predominantly based on the extrinsic model, while the intrinsic model has not received as much attention. Therefore, this paper aims to contribute to the understanding of the intrinsic motivations that lead to information security compliant behaviour. To this end, a review of literature on this topic was conducted to understand what other researchers have found in this area. The results show that intrinsic motivational factors could provide alternative explanations for information security compliant behaviour. This paper proposes a conceptual framework for compliant behaviour based on the self-determination theory.
{"title":"A conceptual model of information security compliant behaviour based on the self-determination theory","authors":"Yotamu Gangire, A. D. Veiga, M. Herselman","doi":"10.1109/ICTAS.2019.8703629","DOIUrl":"https://doi.org/10.1109/ICTAS.2019.8703629","url":null,"abstract":"The increase in threats to information systems resources in organisations has been attributed to the failure by employees to adhere to information security policies. Research into the information security behaviour of employees is still predominantly based on the extrinsic model, while the intrinsic model has not received as much attention. Therefore, this paper aims to contribute to the understanding of the intrinsic motivations that lead to information security compliant behaviour. To this end, a review of literature on this topic was conducted to understand what other researchers have found in this area. The results show that intrinsic motivational factors could provide alternative explanations for information security compliant behaviour. This paper proposes a conceptual framework for compliant behaviour based on the self-determination theory.","PeriodicalId":386209,"journal":{"name":"2019 Conference on Information Communications Technology and Society (ICTAS)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131314981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-06DOI: 10.1109/ICTAS.2019.8703630
K. Nair, A. Abu-Mahfouz, S. Lefophane
Internet of Things (IoT) has the potential to enable the interconnection of small foot-print devices, which can offer valuable information for various critical use cases. It is expected to enable interconnections of participating IoT entities by combining a plethora of technologies and communication networks. Low Power Wide Area Network (LPWAN) IoT connectivity has been evolved to address the massive scale of IoT deployments and other critical requirements in terms of low power, low cost, deep coverage in hard-to-reach areas, and long battery life. Among the various wireless LPWAN technologies, the Narrow Band IoT (NB-IoT) using the existing cellular Long Term Evolution (LTE) network is the front runner. It is getting very popular and starting to be deployed on an exponential scale. As the current IoT market trend leverages on the usage of this evolving technology, it is highly important to critically evaluate, analyse, and assess the NB-IoT technology. It is believed that the work presented in this paper would be an eye-opener that will benefit the researchers who are working in the NB-IoT and IoT technology space.
{"title":"Analysis of the Narrow Band Internet of Things (NB-IoT) Technology","authors":"K. Nair, A. Abu-Mahfouz, S. Lefophane","doi":"10.1109/ICTAS.2019.8703630","DOIUrl":"https://doi.org/10.1109/ICTAS.2019.8703630","url":null,"abstract":"Internet of Things (IoT) has the potential to enable the interconnection of small foot-print devices, which can offer valuable information for various critical use cases. It is expected to enable interconnections of participating IoT entities by combining a plethora of technologies and communication networks. Low Power Wide Area Network (LPWAN) IoT connectivity has been evolved to address the massive scale of IoT deployments and other critical requirements in terms of low power, low cost, deep coverage in hard-to-reach areas, and long battery life. Among the various wireless LPWAN technologies, the Narrow Band IoT (NB-IoT) using the existing cellular Long Term Evolution (LTE) network is the front runner. It is getting very popular and starting to be deployed on an exponential scale. As the current IoT market trend leverages on the usage of this evolving technology, it is highly important to critically evaluate, analyse, and assess the NB-IoT technology. It is believed that the work presented in this paper would be an eye-opener that will benefit the researchers who are working in the NB-IoT and IoT technology space.","PeriodicalId":386209,"journal":{"name":"2019 Conference on Information Communications Technology and Society (ICTAS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114994797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-06DOI: 10.1109/ICTAS.2019.8703624
Wiaan Heyns, S. Buckley
In this paper, the researcher set out to show how Twitter could be used as knowledge sharing platform in small South African businesses in the Western Cape. The purpose of the study was to implement a Twitter knowledge sharing platform in three small businesses in the Western Cape so as to measure the potential of the platform as knowledge sharing medium. The researcher gathered data through semi-structured interviews. This paper aimed to shed more light on two aspects identified in the literature as a gap in the knowledge on using social networking services as a knowledge sharing platform. Firstly the focus was placed on incorporating Twitter throughout a business as a whole. Secondly, the platform is no longer considered novel, and as such it was revisited at this time. The sample comprised of 15 semi-structured interview participants across three small businesses. Although it became apparent that small businesses are not willing to use Twitter exclusively as knowledge sharing tool, foregoing traditional platforms, the researcher proposed a use case of Twitter, which he believes takes the greatest advantage of the functions Twitter affords.
{"title":"A Twitter knowledge sharing model based on small businesses in the Western Cape","authors":"Wiaan Heyns, S. Buckley","doi":"10.1109/ICTAS.2019.8703624","DOIUrl":"https://doi.org/10.1109/ICTAS.2019.8703624","url":null,"abstract":"In this paper, the researcher set out to show how Twitter could be used as knowledge sharing platform in small South African businesses in the Western Cape. The purpose of the study was to implement a Twitter knowledge sharing platform in three small businesses in the Western Cape so as to measure the potential of the platform as knowledge sharing medium. The researcher gathered data through semi-structured interviews. This paper aimed to shed more light on two aspects identified in the literature as a gap in the knowledge on using social networking services as a knowledge sharing platform. Firstly the focus was placed on incorporating Twitter throughout a business as a whole. Secondly, the platform is no longer considered novel, and as such it was revisited at this time. The sample comprised of 15 semi-structured interview participants across three small businesses. Although it became apparent that small businesses are not willing to use Twitter exclusively as knowledge sharing tool, foregoing traditional platforms, the researcher proposed a use case of Twitter, which he believes takes the greatest advantage of the functions Twitter affords.","PeriodicalId":386209,"journal":{"name":"2019 Conference on Information Communications Technology and Society (ICTAS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115107886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-06DOI: 10.1109/ICTAS.2019.8703609
Tebogo Kesetse Lejaka, A. D. Veiga, Marianne Loock
SMMEs are increasingly depending on IT to manage their business operations effectively. In South Africa, there is an increase of cyberattacks on organisations regardless of size and industry, although SMMEs are most impacted. Yet, SMMEs do not always pay attention to cyber security issues. The primary objective of this paper is to review, discover and update researchers about prior cyber security awareness (CSA) studies conducted in the context of South African SMMEs, which warrant future work. A second objective is to discover and analyse frameworks to identify building blocks for a CSA framework. Therefore, in order to respond to research questions, the literature was reviewed systematically. The evaluation shows the absence of previous studies on the topic. However, it was concluded that none of the identified frameworks can be utilised in an SMME context. In addition, ten common components of CSA were identified, that can be considered in future research.
{"title":"Cyber security awareness for small, medium and micro enterprises (SMMEs) in South Africa","authors":"Tebogo Kesetse Lejaka, A. D. Veiga, Marianne Loock","doi":"10.1109/ICTAS.2019.8703609","DOIUrl":"https://doi.org/10.1109/ICTAS.2019.8703609","url":null,"abstract":"SMMEs are increasingly depending on IT to manage their business operations effectively. In South Africa, there is an increase of cyberattacks on organisations regardless of size and industry, although SMMEs are most impacted. Yet, SMMEs do not always pay attention to cyber security issues. The primary objective of this paper is to review, discover and update researchers about prior cyber security awareness (CSA) studies conducted in the context of South African SMMEs, which warrant future work. A second objective is to discover and analyse frameworks to identify building blocks for a CSA framework. Therefore, in order to respond to research questions, the literature was reviewed systematically. The evaluation shows the absence of previous studies on the topic. However, it was concluded that none of the identified frameworks can be utilised in an SMME context. In addition, ten common components of CSA were identified, that can be considered in future research.","PeriodicalId":386209,"journal":{"name":"2019 Conference on Information Communications Technology and Society (ICTAS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130873017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-06DOI: 10.1109/ICTAS.2019.8703520
Norman Nelufule, A. Kock, G. Mabuza-Hocquet, Y. Moolla
Image quality assessment plays an important role in enhancing the performance of pattern recognition systems, including biometric systems. Although, quality assessment methods have been utilized for iris recognition on adults they have not been investigated on iris recognition for children. Iris recognition on children is difficult because of their uncooperative nature and may result in lower quality iris samples. In this study, we applied four existing quality assessment methods, light variation, pupil dilation, off-angle, and pixel count to data we collected from children and the CASIA database with iris images from adults. The results indicate that once the image without any visible iris area are removed, using an automated process, then the remaining images for children produces similar quality assessment distributions as those of iris images from adults. This study is the first step in creating an iris recognition system for children.
{"title":"Image Quality Assessment for Iris Biometrics for Minors","authors":"Norman Nelufule, A. Kock, G. Mabuza-Hocquet, Y. Moolla","doi":"10.1109/ICTAS.2019.8703520","DOIUrl":"https://doi.org/10.1109/ICTAS.2019.8703520","url":null,"abstract":"Image quality assessment plays an important role in enhancing the performance of pattern recognition systems, including biometric systems. Although, quality assessment methods have been utilized for iris recognition on adults they have not been investigated on iris recognition for children. Iris recognition on children is difficult because of their uncooperative nature and may result in lower quality iris samples. In this study, we applied four existing quality assessment methods, light variation, pupil dilation, off-angle, and pixel count to data we collected from children and the CASIA database with iris images from adults. The results indicate that once the image without any visible iris area are removed, using an automated process, then the remaining images for children produces similar quality assessment distributions as those of iris images from adults. This study is the first step in creating an iris recognition system for children.","PeriodicalId":386209,"journal":{"name":"2019 Conference on Information Communications Technology and Society (ICTAS)","volume":"57 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132969071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-06DOI: 10.1109/ICTAS.2019.8703613
Themba Shozi, S. Dlamini, P. Mudali, M. Adigun
Technology has shaped numerous artefacts to get rid of manual, routine and laborious tasks. However, for this to transpire it is requirement for the next-generation networks to be fast, scalable, reliable and cost effective. Fascinatingly, Software defined networking (SDN) helps in distributing network capacity more effectively, dynamically adjusting to changeable demands, and managing failure more rapidly. We propose an SDN-based overlay solution for the existing traditional Wide Area Networks (WAN) environment, targeting provisioning flexibility and control in case of network failures, through a distributed SDN network overlay and edge SDN devices. The goal was to facilitate transition to SDN in developing economies through adoption of SDN while retaining legacy infrastructure. We present an SDN overlay on top of the existing WAN using the South African National Research Network (SANReN) network as a use case. We conducted an evaluation to ascertain which controller is suitable for the proposed WAN network overlay by examining the controller's highest throughput and lowest latency in relation to WAN as our use case. ONOS outshined the other three controller (Ryu, Floodlight and OpenDayLight) and was suitable for the implementation of proposed network solution. We implemented the proposed SDN-overlay on the WAN setup using SANReN topology to test the performance. The results showed improvements in the network performance when distributed control and edge nodes placement were implemented.
{"title":"An SDN Solution for Performance Improvement in Dedicated Wide-Area Networks","authors":"Themba Shozi, S. Dlamini, P. Mudali, M. Adigun","doi":"10.1109/ICTAS.2019.8703613","DOIUrl":"https://doi.org/10.1109/ICTAS.2019.8703613","url":null,"abstract":"Technology has shaped numerous artefacts to get rid of manual, routine and laborious tasks. However, for this to transpire it is requirement for the next-generation networks to be fast, scalable, reliable and cost effective. Fascinatingly, Software defined networking (SDN) helps in distributing network capacity more effectively, dynamically adjusting to changeable demands, and managing failure more rapidly. We propose an SDN-based overlay solution for the existing traditional Wide Area Networks (WAN) environment, targeting provisioning flexibility and control in case of network failures, through a distributed SDN network overlay and edge SDN devices. The goal was to facilitate transition to SDN in developing economies through adoption of SDN while retaining legacy infrastructure. We present an SDN overlay on top of the existing WAN using the South African National Research Network (SANReN) network as a use case. We conducted an evaluation to ascertain which controller is suitable for the proposed WAN network overlay by examining the controller's highest throughput and lowest latency in relation to WAN as our use case. ONOS outshined the other three controller (Ryu, Floodlight and OpenDayLight) and was suitable for the implementation of proposed network solution. We implemented the proposed SDN-overlay on the WAN setup using SANReN topology to test the performance. The results showed improvements in the network performance when distributed control and edge nodes placement were implemented.","PeriodicalId":386209,"journal":{"name":"2019 Conference on Information Communications Technology and Society (ICTAS)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116675956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-06DOI: 10.1109/ICTAS.2019.8703523
Tapiwa Gundu, Stephen Flowerday, K. Renaud
Organisational information security policy contents are disseminated by awareness and training drives. Its success is usually judged based on immediate post-training self-reports which are usually subject to social desirability bias. Such self-reports are generally positive, but they cannot act as a proxy for actual subsequent behaviours. This study aims to formulate and test a more comprehensive way of measuring the efficacy of these awareness and training drives, called ASTUTE. We commenced by delivering security training. We then assessed security awareness (post-training), and followed up by measuring actual behaviours. When we measured actual behaviours after a single delivery of security awareness training, the conversion from intention to behaviour was half of the desired 100%. We then proceeded to deliver the training again, another two times. The repeated training significantly reduced the gap between self-reported intention and actual secure behaviours.
{"title":"Deliver Security Awareness Training, then Repeat: {Deliver; Measure Efficacy}","authors":"Tapiwa Gundu, Stephen Flowerday, K. Renaud","doi":"10.1109/ICTAS.2019.8703523","DOIUrl":"https://doi.org/10.1109/ICTAS.2019.8703523","url":null,"abstract":"Organisational information security policy contents are disseminated by awareness and training drives. Its success is usually judged based on immediate post-training self-reports which are usually subject to social desirability bias. Such self-reports are generally positive, but they cannot act as a proxy for actual subsequent behaviours. This study aims to formulate and test a more comprehensive way of measuring the efficacy of these awareness and training drives, called ASTUTE. We commenced by delivering security training. We then assessed security awareness (post-training), and followed up by measuring actual behaviours. When we measured actual behaviours after a single delivery of security awareness training, the conversion from intention to behaviour was half of the desired 100%. We then proceeded to deliver the training again, another two times. The repeated training significantly reduced the gap between self-reported intention and actual secure behaviours.","PeriodicalId":386209,"journal":{"name":"2019 Conference on Information Communications Technology and Society (ICTAS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126769843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-06DOI: 10.1109/ICTAS.2019.8703633
A. Hoogen, B. Scholtz, A. Calitz
Cities globally are facing an increasing forecasted citizen growth for the next decade. It has therefore become a necessity for cities to address their initiatives in smarter ways to overcome the challenges of possible extinction of resources. Cities in South Africa are trying to involve stakeholders to help address these challenges. Stakeholders are an important component in any smart city initiatives. The purpose of this paper is to report on a review of existing literature related to smart cities, and to propose a Smart City Stakeholder Classification Model. The common dimensions of smart cities are identified and the roles of the various stakeholders are classified according to these dimensions in the model. Nine common dimensions and related factors were identified through an analysis of existing frameworks for smart cities. The model was then used to identify and classify the stakeholders participating in two smart city projects in the Eastern Cape province of South Africa.
{"title":"A Smart City Stakeholder Classification Model","authors":"A. Hoogen, B. Scholtz, A. Calitz","doi":"10.1109/ICTAS.2019.8703633","DOIUrl":"https://doi.org/10.1109/ICTAS.2019.8703633","url":null,"abstract":"Cities globally are facing an increasing forecasted citizen growth for the next decade. It has therefore become a necessity for cities to address their initiatives in smarter ways to overcome the challenges of possible extinction of resources. Cities in South Africa are trying to involve stakeholders to help address these challenges. Stakeholders are an important component in any smart city initiatives. The purpose of this paper is to report on a review of existing literature related to smart cities, and to propose a Smart City Stakeholder Classification Model. The common dimensions of smart cities are identified and the roles of the various stakeholders are classified according to these dimensions in the model. Nine common dimensions and related factors were identified through an analysis of existing frameworks for smart cities. The model was then used to identify and classify the stakeholders participating in two smart city projects in the Eastern Cape province of South Africa.","PeriodicalId":386209,"journal":{"name":"2019 Conference on Information Communications Technology and Society (ICTAS)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128116342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/ICTAS.2019.8703621
Max Mitchell, Ingrid Siebörger
The purpose of the South African broadband policy, SA Connect, is to provide a long-term approach that will begin to develop broadband access in SA with immediate effect. The policy aims to achieve this by implementing a broadband model that incorporates private and public sectors, increasing monetary investments towards ICT, reducing the number of impediments in the broadband policy, removing bottlenecks that inhibit broadband expansion and identifying successful methods and applications that will enhance broadband access. The current approach has been through a centralized deployment and ownership approach, which is largely delayed. In this paper we propose an alternative, decentralized approach to deployment and ownership, in order to incrementally and in parallel build a national telecommunications network through the interconnection of community area networks.
{"title":"Building a National Network through peered community area networks: realising ICTs within developing countries","authors":"Max Mitchell, Ingrid Siebörger","doi":"10.1109/ICTAS.2019.8703621","DOIUrl":"https://doi.org/10.1109/ICTAS.2019.8703621","url":null,"abstract":"The purpose of the South African broadband policy, SA Connect, is to provide a long-term approach that will begin to develop broadband access in SA with immediate effect. The policy aims to achieve this by implementing a broadband model that incorporates private and public sectors, increasing monetary investments towards ICT, reducing the number of impediments in the broadband policy, removing bottlenecks that inhibit broadband expansion and identifying successful methods and applications that will enhance broadband access. The current approach has been through a centralized deployment and ownership approach, which is largely delayed. In this paper we propose an alternative, decentralized approach to deployment and ownership, in order to incrementally and in parallel build a national telecommunications network through the interconnection of community area networks.","PeriodicalId":386209,"journal":{"name":"2019 Conference on Information Communications Technology and Society (ICTAS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125100450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}