首页 > 最新文献

2019 Conference on Information Communications Technology and Society (ICTAS)最新文献

英文 中文
Visualization Criteria: supporting knowledge transfer in Incident Management Systems 可视化标准:支持事件管理系统中的知识转移
Pub Date : 2019-03-06 DOI: 10.1109/ICTAS.2019.8703617
Quintus van Wyk, J. V. Biljon, M. Schoeman
Incident Management Systems (IMS) assist in managing resources in order to minimize fatalities and damage. Visual artifacts in an IMS can facilitate knowledge transfer between responders to an incident, however, evidence-based guidance on the design of these visualizations are lacking. The aim of this study is to propose evidence-based knowledge visualization criteria (KVC). Design Science Research (DSR) was the guiding methodology. We abstracted a set of KVC from the academic literature, and then applied said criteria to evaluate a cloud-based prototype IMS. The evaluation included interviews with content experts from the South African Fire Service to establish the relevance of the KVC. The KVC were also used in a heuristic evaluation of the IMS by usability experts. The theoretical contribution of the study is the validated set of KVC based on the triangulation of the findings from the content experts and the usability experts. The study also makes a practical contribution by demonstrating the use of evidence-based visualization criteria in IMS.
事件管理系统(IMS)协助管理资源,以尽量减少死亡和损害。IMS中的可视化工件可以促进事件响应者之间的知识转移,然而,缺乏关于这些可视化设计的基于证据的指导。本研究旨在提出基于证据的知识可视化标准(KVC)。设计科学研究(DSR)是指导方法。我们从学术文献中提取了一组KVC,然后应用这些标准来评估基于云的原型IMS。评估包括与南非消防局的内容专家的访谈,以确定KVC的相关性。可用性专家还将KVC用于IMS的启发式评估。该研究的理论贡献是基于对内容专家和可用性专家的发现进行三角剖分的验证集KVC。该研究还通过展示在IMS中使用基于证据的可视化标准做出了实际贡献。
{"title":"Visualization Criteria: supporting knowledge transfer in Incident Management Systems","authors":"Quintus van Wyk, J. V. Biljon, M. Schoeman","doi":"10.1109/ICTAS.2019.8703617","DOIUrl":"https://doi.org/10.1109/ICTAS.2019.8703617","url":null,"abstract":"Incident Management Systems (IMS) assist in managing resources in order to minimize fatalities and damage. Visual artifacts in an IMS can facilitate knowledge transfer between responders to an incident, however, evidence-based guidance on the design of these visualizations are lacking. The aim of this study is to propose evidence-based knowledge visualization criteria (KVC). Design Science Research (DSR) was the guiding methodology. We abstracted a set of KVC from the academic literature, and then applied said criteria to evaluate a cloud-based prototype IMS. The evaluation included interviews with content experts from the South African Fire Service to establish the relevance of the KVC. The KVC were also used in a heuristic evaluation of the IMS by usability experts. The theoretical contribution of the study is the validated set of KVC based on the triangulation of the findings from the content experts and the usability experts. The study also makes a practical contribution by demonstrating the use of evidence-based visualization criteria in IMS.","PeriodicalId":386209,"journal":{"name":"2019 Conference on Information Communications Technology and Society (ICTAS)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132495532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A conceptual model of information security compliant behaviour based on the self-determination theory 基于自我决定理论的信息安全合规行为概念模型
Pub Date : 2019-03-06 DOI: 10.1109/ICTAS.2019.8703629
Yotamu Gangire, A. D. Veiga, M. Herselman
The increase in threats to information systems resources in organisations has been attributed to the failure by employees to adhere to information security policies. Research into the information security behaviour of employees is still predominantly based on the extrinsic model, while the intrinsic model has not received as much attention. Therefore, this paper aims to contribute to the understanding of the intrinsic motivations that lead to information security compliant behaviour. To this end, a review of literature on this topic was conducted to understand what other researchers have found in this area. The results show that intrinsic motivational factors could provide alternative explanations for information security compliant behaviour. This paper proposes a conceptual framework for compliant behaviour based on the self-determination theory.
组织中信息系统资源威胁的增加归因于员工未能遵守信息安全政策。对员工信息安全行为的研究仍然主要基于外在模型,而内在模型并没有受到足够的重视。因此,本文旨在有助于理解导致信息安全合规行为的内在动机。为此,对这一主题的文献进行了回顾,以了解其他研究人员在这一领域的发现。结果表明,内在动机因素可以为信息安全合规行为提供不同的解释。本文提出了一个基于自我决定理论的顺从行为概念框架。
{"title":"A conceptual model of information security compliant behaviour based on the self-determination theory","authors":"Yotamu Gangire, A. D. Veiga, M. Herselman","doi":"10.1109/ICTAS.2019.8703629","DOIUrl":"https://doi.org/10.1109/ICTAS.2019.8703629","url":null,"abstract":"The increase in threats to information systems resources in organisations has been attributed to the failure by employees to adhere to information security policies. Research into the information security behaviour of employees is still predominantly based on the extrinsic model, while the intrinsic model has not received as much attention. Therefore, this paper aims to contribute to the understanding of the intrinsic motivations that lead to information security compliant behaviour. To this end, a review of literature on this topic was conducted to understand what other researchers have found in this area. The results show that intrinsic motivational factors could provide alternative explanations for information security compliant behaviour. This paper proposes a conceptual framework for compliant behaviour based on the self-determination theory.","PeriodicalId":386209,"journal":{"name":"2019 Conference on Information Communications Technology and Society (ICTAS)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131314981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Analysis of the Narrow Band Internet of Things (NB-IoT) Technology 窄带物联网(NB-IoT)技术分析
Pub Date : 2019-03-06 DOI: 10.1109/ICTAS.2019.8703630
K. Nair, A. Abu-Mahfouz, S. Lefophane
Internet of Things (IoT) has the potential to enable the interconnection of small foot-print devices, which can offer valuable information for various critical use cases. It is expected to enable interconnections of participating IoT entities by combining a plethora of technologies and communication networks. Low Power Wide Area Network (LPWAN) IoT connectivity has been evolved to address the massive scale of IoT deployments and other critical requirements in terms of low power, low cost, deep coverage in hard-to-reach areas, and long battery life. Among the various wireless LPWAN technologies, the Narrow Band IoT (NB-IoT) using the existing cellular Long Term Evolution (LTE) network is the front runner. It is getting very popular and starting to be deployed on an exponential scale. As the current IoT market trend leverages on the usage of this evolving technology, it is highly important to critically evaluate, analyse, and assess the NB-IoT technology. It is believed that the work presented in this paper would be an eye-opener that will benefit the researchers who are working in the NB-IoT and IoT technology space.
物联网(IoT)有可能实现小型设备的互连,这可以为各种关键用例提供有价值的信息。预计它将通过结合大量技术和通信网络,实现参与物联网实体的互联。低功耗广域网(LPWAN)物联网连接已经发展到解决大规模物联网部署和其他低功耗、低成本、难以到达区域的深度覆盖和长电池寿命方面的关键要求。在各种无线LPWAN技术中,使用现有蜂窝长期演进(LTE)网络的窄带物联网(NB-IoT)是领跑者。它正变得非常流行,并开始以指数级的规模部署。由于当前的物联网市场趋势依赖于这种不断发展的技术的使用,因此批判性地评估、分析和评估NB-IoT技术非常重要。相信本文所介绍的工作将使在NB-IoT和IoT技术领域工作的研究人员大开眼界。
{"title":"Analysis of the Narrow Band Internet of Things (NB-IoT) Technology","authors":"K. Nair, A. Abu-Mahfouz, S. Lefophane","doi":"10.1109/ICTAS.2019.8703630","DOIUrl":"https://doi.org/10.1109/ICTAS.2019.8703630","url":null,"abstract":"Internet of Things (IoT) has the potential to enable the interconnection of small foot-print devices, which can offer valuable information for various critical use cases. It is expected to enable interconnections of participating IoT entities by combining a plethora of technologies and communication networks. Low Power Wide Area Network (LPWAN) IoT connectivity has been evolved to address the massive scale of IoT deployments and other critical requirements in terms of low power, low cost, deep coverage in hard-to-reach areas, and long battery life. Among the various wireless LPWAN technologies, the Narrow Band IoT (NB-IoT) using the existing cellular Long Term Evolution (LTE) network is the front runner. It is getting very popular and starting to be deployed on an exponential scale. As the current IoT market trend leverages on the usage of this evolving technology, it is highly important to critically evaluate, analyse, and assess the NB-IoT technology. It is believed that the work presented in this paper would be an eye-opener that will benefit the researchers who are working in the NB-IoT and IoT technology space.","PeriodicalId":386209,"journal":{"name":"2019 Conference on Information Communications Technology and Society (ICTAS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114994797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
A Twitter knowledge sharing model based on small businesses in the Western Cape 基于西开普省小企业的Twitter知识共享模式
Pub Date : 2019-03-06 DOI: 10.1109/ICTAS.2019.8703624
Wiaan Heyns, S. Buckley
In this paper, the researcher set out to show how Twitter could be used as knowledge sharing platform in small South African businesses in the Western Cape. The purpose of the study was to implement a Twitter knowledge sharing platform in three small businesses in the Western Cape so as to measure the potential of the platform as knowledge sharing medium. The researcher gathered data through semi-structured interviews. This paper aimed to shed more light on two aspects identified in the literature as a gap in the knowledge on using social networking services as a knowledge sharing platform. Firstly the focus was placed on incorporating Twitter throughout a business as a whole. Secondly, the platform is no longer considered novel, and as such it was revisited at this time. The sample comprised of 15 semi-structured interview participants across three small businesses. Although it became apparent that small businesses are not willing to use Twitter exclusively as knowledge sharing tool, foregoing traditional platforms, the researcher proposed a use case of Twitter, which he believes takes the greatest advantage of the functions Twitter affords.
在这篇论文中,研究人员着手展示如何将Twitter用作西开普省小型南非企业的知识共享平台。本研究的目的是在西开普省的三家小企业中实施Twitter知识共享平台,以衡量该平台作为知识共享媒介的潜力。研究人员通过半结构化访谈收集数据。本文旨在更多地阐明文献中确定的两个方面,即使用社交网络服务作为知识共享平台的知识差距。首先,重点放在将Twitter整合到整个企业中。其次,这个平台不再被认为是新颖的,因此在这个时候它被重新审视了。样本包括来自三家小型企业的15名半结构化访谈参与者。虽然很明显,小企业不愿意将Twitter作为知识共享工具,而放弃传统平台,但研究人员提出了Twitter的一个用例,他认为这可以最大限度地利用Twitter提供的功能。
{"title":"A Twitter knowledge sharing model based on small businesses in the Western Cape","authors":"Wiaan Heyns, S. Buckley","doi":"10.1109/ICTAS.2019.8703624","DOIUrl":"https://doi.org/10.1109/ICTAS.2019.8703624","url":null,"abstract":"In this paper, the researcher set out to show how Twitter could be used as knowledge sharing platform in small South African businesses in the Western Cape. The purpose of the study was to implement a Twitter knowledge sharing platform in three small businesses in the Western Cape so as to measure the potential of the platform as knowledge sharing medium. The researcher gathered data through semi-structured interviews. This paper aimed to shed more light on two aspects identified in the literature as a gap in the knowledge on using social networking services as a knowledge sharing platform. Firstly the focus was placed on incorporating Twitter throughout a business as a whole. Secondly, the platform is no longer considered novel, and as such it was revisited at this time. The sample comprised of 15 semi-structured interview participants across three small businesses. Although it became apparent that small businesses are not willing to use Twitter exclusively as knowledge sharing tool, foregoing traditional platforms, the researcher proposed a use case of Twitter, which he believes takes the greatest advantage of the functions Twitter affords.","PeriodicalId":386209,"journal":{"name":"2019 Conference on Information Communications Technology and Society (ICTAS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115107886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber security awareness for small, medium and micro enterprises (SMMEs) in South Africa 南非中小微企业(SMMEs)的网络安全意识
Pub Date : 2019-03-06 DOI: 10.1109/ICTAS.2019.8703609
Tebogo Kesetse Lejaka, A. D. Veiga, Marianne Loock
SMMEs are increasingly depending on IT to manage their business operations effectively. In South Africa, there is an increase of cyberattacks on organisations regardless of size and industry, although SMMEs are most impacted. Yet, SMMEs do not always pay attention to cyber security issues. The primary objective of this paper is to review, discover and update researchers about prior cyber security awareness (CSA) studies conducted in the context of South African SMMEs, which warrant future work. A second objective is to discover and analyse frameworks to identify building blocks for a CSA framework. Therefore, in order to respond to research questions, the literature was reviewed systematically. The evaluation shows the absence of previous studies on the topic. However, it was concluded that none of the identified frameworks can be utilised in an SMME context. In addition, ten common components of CSA were identified, that can be considered in future research.
中小型企业越来越依赖资讯科技来有效地管理其业务运作。在南非,无论规模大小和行业,针对组织的网络攻击都在增加,尽管中小企业受到的影响最大。然而,中小企业并不总是关注网络安全问题。本文的主要目的是回顾、发现和更新研究人员在南非中小企业背景下进行的先前网络安全意识(CSA)研究,这保证了未来的工作。第二个目标是发现和分析框架,以确定CSA框架的构建块。因此,为了回答研究问题,我们对文献进行了系统的回顾。该评价表明,缺乏对该主题的先前研究。然而,得出的结论是,所确定的框架中没有一个可以在中小微企业环境中使用。此外,还确定了CSA的十个常见成分,可以在未来的研究中考虑。
{"title":"Cyber security awareness for small, medium and micro enterprises (SMMEs) in South Africa","authors":"Tebogo Kesetse Lejaka, A. D. Veiga, Marianne Loock","doi":"10.1109/ICTAS.2019.8703609","DOIUrl":"https://doi.org/10.1109/ICTAS.2019.8703609","url":null,"abstract":"SMMEs are increasingly depending on IT to manage their business operations effectively. In South Africa, there is an increase of cyberattacks on organisations regardless of size and industry, although SMMEs are most impacted. Yet, SMMEs do not always pay attention to cyber security issues. The primary objective of this paper is to review, discover and update researchers about prior cyber security awareness (CSA) studies conducted in the context of South African SMMEs, which warrant future work. A second objective is to discover and analyse frameworks to identify building blocks for a CSA framework. Therefore, in order to respond to research questions, the literature was reviewed systematically. The evaluation shows the absence of previous studies on the topic. However, it was concluded that none of the identified frameworks can be utilised in an SMME context. In addition, ten common components of CSA were identified, that can be considered in future research.","PeriodicalId":386209,"journal":{"name":"2019 Conference on Information Communications Technology and Society (ICTAS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130873017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Image Quality Assessment for Iris Biometrics for Minors 未成年人虹膜生物识别图像质量评估
Pub Date : 2019-03-06 DOI: 10.1109/ICTAS.2019.8703520
Norman Nelufule, A. Kock, G. Mabuza-Hocquet, Y. Moolla
Image quality assessment plays an important role in enhancing the performance of pattern recognition systems, including biometric systems. Although, quality assessment methods have been utilized for iris recognition on adults they have not been investigated on iris recognition for children. Iris recognition on children is difficult because of their uncooperative nature and may result in lower quality iris samples. In this study, we applied four existing quality assessment methods, light variation, pupil dilation, off-angle, and pixel count to data we collected from children and the CASIA database with iris images from adults. The results indicate that once the image without any visible iris area are removed, using an automated process, then the remaining images for children produces similar quality assessment distributions as those of iris images from adults. This study is the first step in creating an iris recognition system for children.
图像质量评估在提高模式识别系统(包括生物识别系统)的性能方面起着重要作用。虽然质量评估方法已被用于成人虹膜识别,但尚未对儿童虹膜识别进行研究。由于儿童的不合作性质,虹膜识别很困难,可能导致虹膜样本质量较低。在这项研究中,我们采用了四种现有的质量评估方法,光线变化、瞳孔扩张、偏离角度和像素计数,对我们从儿童和CASIA数据库收集的成人虹膜图像进行了分析。结果表明,一旦使用自动化过程去除没有任何可见虹膜区域的图像,则剩余的儿童图像产生与成人虹膜图像相似的质量评估分布。这项研究是为儿童创建虹膜识别系统的第一步。
{"title":"Image Quality Assessment for Iris Biometrics for Minors","authors":"Norman Nelufule, A. Kock, G. Mabuza-Hocquet, Y. Moolla","doi":"10.1109/ICTAS.2019.8703520","DOIUrl":"https://doi.org/10.1109/ICTAS.2019.8703520","url":null,"abstract":"Image quality assessment plays an important role in enhancing the performance of pattern recognition systems, including biometric systems. Although, quality assessment methods have been utilized for iris recognition on adults they have not been investigated on iris recognition for children. Iris recognition on children is difficult because of their uncooperative nature and may result in lower quality iris samples. In this study, we applied four existing quality assessment methods, light variation, pupil dilation, off-angle, and pixel count to data we collected from children and the CASIA database with iris images from adults. The results indicate that once the image without any visible iris area are removed, using an automated process, then the remaining images for children produces similar quality assessment distributions as those of iris images from adults. This study is the first step in creating an iris recognition system for children.","PeriodicalId":386209,"journal":{"name":"2019 Conference on Information Communications Technology and Society (ICTAS)","volume":"57 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132969071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An SDN Solution for Performance Improvement in Dedicated Wide-Area Networks 用于专用广域网性能改进的SDN解决方案
Pub Date : 2019-03-06 DOI: 10.1109/ICTAS.2019.8703613
Themba Shozi, S. Dlamini, P. Mudali, M. Adigun
Technology has shaped numerous artefacts to get rid of manual, routine and laborious tasks. However, for this to transpire it is requirement for the next-generation networks to be fast, scalable, reliable and cost effective. Fascinatingly, Software defined networking (SDN) helps in distributing network capacity more effectively, dynamically adjusting to changeable demands, and managing failure more rapidly. We propose an SDN-based overlay solution for the existing traditional Wide Area Networks (WAN) environment, targeting provisioning flexibility and control in case of network failures, through a distributed SDN network overlay and edge SDN devices. The goal was to facilitate transition to SDN in developing economies through adoption of SDN while retaining legacy infrastructure. We present an SDN overlay on top of the existing WAN using the South African National Research Network (SANReN) network as a use case. We conducted an evaluation to ascertain which controller is suitable for the proposed WAN network overlay by examining the controller's highest throughput and lowest latency in relation to WAN as our use case. ONOS outshined the other three controller (Ryu, Floodlight and OpenDayLight) and was suitable for the implementation of proposed network solution. We implemented the proposed SDN-overlay on the WAN setup using SANReN topology to test the performance. The results showed improvements in the network performance when distributed control and edge nodes placement were implemented.
技术已经塑造了许多人工制品,以摆脱手工、常规和费力的任务。然而,为了实现这一目标,下一代网络需要快速、可扩展、可靠和具有成本效益。令人着迷的是,软件定义网络(SDN)有助于更有效地分配网络容量,动态调整以适应不断变化的需求,并更快地管理故障。我们提出了一种基于SDN的覆盖解决方案,针对现有的传统广域网(WAN)环境,通过分布式SDN网络覆盖和边缘SDN设备,针对网络故障情况下的供应灵活性和控制。其目标是在保留遗留基础设施的同时,通过采用SDN,促进发展中经济体向SDN的过渡。我们使用南非国家研究网络(SANReN)网络作为用例,在现有广域网之上提出一个SDN覆盖。我们进行了评估,以确定哪个控制器适合提议的广域网覆盖,通过检查控制器与广域网相关的最高吞吐量和最低延迟作为我们的用例。ONOS优于其他三种控制器(Ryu, Floodlight和OpenDayLight),适合实施拟议的网络解决方案。我们使用SANReN拓扑在WAN设置上实现了所提出的sdn覆盖以测试性能。结果表明,当实现分布式控制和边缘节点放置时,网络性能有所改善。
{"title":"An SDN Solution for Performance Improvement in Dedicated Wide-Area Networks","authors":"Themba Shozi, S. Dlamini, P. Mudali, M. Adigun","doi":"10.1109/ICTAS.2019.8703613","DOIUrl":"https://doi.org/10.1109/ICTAS.2019.8703613","url":null,"abstract":"Technology has shaped numerous artefacts to get rid of manual, routine and laborious tasks. However, for this to transpire it is requirement for the next-generation networks to be fast, scalable, reliable and cost effective. Fascinatingly, Software defined networking (SDN) helps in distributing network capacity more effectively, dynamically adjusting to changeable demands, and managing failure more rapidly. We propose an SDN-based overlay solution for the existing traditional Wide Area Networks (WAN) environment, targeting provisioning flexibility and control in case of network failures, through a distributed SDN network overlay and edge SDN devices. The goal was to facilitate transition to SDN in developing economies through adoption of SDN while retaining legacy infrastructure. We present an SDN overlay on top of the existing WAN using the South African National Research Network (SANReN) network as a use case. We conducted an evaluation to ascertain which controller is suitable for the proposed WAN network overlay by examining the controller's highest throughput and lowest latency in relation to WAN as our use case. ONOS outshined the other three controller (Ryu, Floodlight and OpenDayLight) and was suitable for the implementation of proposed network solution. We implemented the proposed SDN-overlay on the WAN setup using SANReN topology to test the performance. The results showed improvements in the network performance when distributed control and edge nodes placement were implemented.","PeriodicalId":386209,"journal":{"name":"2019 Conference on Information Communications Technology and Society (ICTAS)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116675956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Deliver Security Awareness Training, then Repeat: {Deliver; Measure Efficacy} 提供安全意识培训,然后重复:{提供;衡量有效性}
Pub Date : 2019-03-06 DOI: 10.1109/ICTAS.2019.8703523
Tapiwa Gundu, Stephen Flowerday, K. Renaud
Organisational information security policy contents are disseminated by awareness and training drives. Its success is usually judged based on immediate post-training self-reports which are usually subject to social desirability bias. Such self-reports are generally positive, but they cannot act as a proxy for actual subsequent behaviours. This study aims to formulate and test a more comprehensive way of measuring the efficacy of these awareness and training drives, called ASTUTE. We commenced by delivering security training. We then assessed security awareness (post-training), and followed up by measuring actual behaviours. When we measured actual behaviours after a single delivery of security awareness training, the conversion from intention to behaviour was half of the desired 100%. We then proceeded to deliver the training again, another two times. The repeated training significantly reduced the gap between self-reported intention and actual secure behaviours.
机构资讯保安政策内容透过宣传及培训活动传播。它的成功与否通常是根据训练后的即时自我报告来判断的,而这些报告通常受到社会期望偏见的影响。这样的自我报告通常是积极的,但它们不能作为实际后续行为的代表。这项研究旨在制定和测试一种更全面的方法来衡量这些意识和训练驱动的有效性,称为ASTUTE。我们开始提供保安培训。然后我们评估了安全意识(培训后),并通过测量实际行为进行跟踪。当我们在一次安全意识培训后测量实际行为时,从意图到行为的转换是预期100%的一半。然后我们又进行了两次培训。重复训练显著减少了自我报告的意图和实际安全行为之间的差距。
{"title":"Deliver Security Awareness Training, then Repeat: {Deliver; Measure Efficacy}","authors":"Tapiwa Gundu, Stephen Flowerday, K. Renaud","doi":"10.1109/ICTAS.2019.8703523","DOIUrl":"https://doi.org/10.1109/ICTAS.2019.8703523","url":null,"abstract":"Organisational information security policy contents are disseminated by awareness and training drives. Its success is usually judged based on immediate post-training self-reports which are usually subject to social desirability bias. Such self-reports are generally positive, but they cannot act as a proxy for actual subsequent behaviours. This study aims to formulate and test a more comprehensive way of measuring the efficacy of these awareness and training drives, called ASTUTE. We commenced by delivering security training. We then assessed security awareness (post-training), and followed up by measuring actual behaviours. When we measured actual behaviours after a single delivery of security awareness training, the conversion from intention to behaviour was half of the desired 100%. We then proceeded to deliver the training again, another two times. The repeated training significantly reduced the gap between self-reported intention and actual secure behaviours.","PeriodicalId":386209,"journal":{"name":"2019 Conference on Information Communications Technology and Society (ICTAS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126769843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A Smart City Stakeholder Classification Model 智慧城市利益相关者分类模型
Pub Date : 2019-03-06 DOI: 10.1109/ICTAS.2019.8703633
A. Hoogen, B. Scholtz, A. Calitz
Cities globally are facing an increasing forecasted citizen growth for the next decade. It has therefore become a necessity for cities to address their initiatives in smarter ways to overcome the challenges of possible extinction of resources. Cities in South Africa are trying to involve stakeholders to help address these challenges. Stakeholders are an important component in any smart city initiatives. The purpose of this paper is to report on a review of existing literature related to smart cities, and to propose a Smart City Stakeholder Classification Model. The common dimensions of smart cities are identified and the roles of the various stakeholders are classified according to these dimensions in the model. Nine common dimensions and related factors were identified through an analysis of existing frameworks for smart cities. The model was then used to identify and classify the stakeholders participating in two smart city projects in the Eastern Cape province of South Africa.
未来十年,全球城市都将面临日益增长的人口增长。因此,城市必须以更明智的方式解决其倡议,以克服资源可能灭绝的挑战。南非的城市正试图让利益相关者参与进来,帮助应对这些挑战。利益相关者是任何智慧城市计划的重要组成部分。本文的目的是对现有的智慧城市相关文献进行综述,并提出一个智慧城市利益相关者分类模型。确定了智慧城市的共同维度,并根据模型中的这些维度对各种利益相关者的角色进行了分类。通过对现有智慧城市框架的分析,确定了九个共同维度和相关因素。然后,该模型被用于识别和分类参与南非东开普省两个智慧城市项目的利益相关者。
{"title":"A Smart City Stakeholder Classification Model","authors":"A. Hoogen, B. Scholtz, A. Calitz","doi":"10.1109/ICTAS.2019.8703633","DOIUrl":"https://doi.org/10.1109/ICTAS.2019.8703633","url":null,"abstract":"Cities globally are facing an increasing forecasted citizen growth for the next decade. It has therefore become a necessity for cities to address their initiatives in smarter ways to overcome the challenges of possible extinction of resources. Cities in South Africa are trying to involve stakeholders to help address these challenges. Stakeholders are an important component in any smart city initiatives. The purpose of this paper is to report on a review of existing literature related to smart cities, and to propose a Smart City Stakeholder Classification Model. The common dimensions of smart cities are identified and the roles of the various stakeholders are classified according to these dimensions in the model. Nine common dimensions and related factors were identified through an analysis of existing frameworks for smart cities. The model was then used to identify and classify the stakeholders participating in two smart city projects in the Eastern Cape province of South Africa.","PeriodicalId":386209,"journal":{"name":"2019 Conference on Information Communications Technology and Society (ICTAS)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128116342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Building a National Network through peered community area networks: realising ICTs within developing countries 通过对等社区区域网络建立国家网络:在发展中国家实现信通技术
Pub Date : 2019-03-01 DOI: 10.1109/ICTAS.2019.8703621
Max Mitchell, Ingrid Siebörger
The purpose of the South African broadband policy, SA Connect, is to provide a long-term approach that will begin to develop broadband access in SA with immediate effect. The policy aims to achieve this by implementing a broadband model that incorporates private and public sectors, increasing monetary investments towards ICT, reducing the number of impediments in the broadband policy, removing bottlenecks that inhibit broadband expansion and identifying successful methods and applications that will enhance broadband access. The current approach has been through a centralized deployment and ownership approach, which is largely delayed. In this paper we propose an alternative, decentralized approach to deployment and ownership, in order to incrementally and in parallel build a national telecommunications network through the interconnection of community area networks.
南非宽带政策“南非连接”的目的是提供一个长期的方法,将开始在南非发展宽带接入,并立即生效。该政策旨在通过实施一种结合私营和公共部门的宽带模式、增加对信息通信技术的货币投资、减少宽带政策中的障碍、消除阻碍宽带扩展的瓶颈以及确定将增强宽带接入的成功方法和应用来实现这一目标。目前的方法是通过集中部署和所有权方法,这在很大程度上是延迟的。在本文中,我们提出了另一种分散的部署和所有权方法,以便通过社区区域网络的互连逐步并行地建立一个国家电信网络。
{"title":"Building a National Network through peered community area networks: realising ICTs within developing countries","authors":"Max Mitchell, Ingrid Siebörger","doi":"10.1109/ICTAS.2019.8703621","DOIUrl":"https://doi.org/10.1109/ICTAS.2019.8703621","url":null,"abstract":"The purpose of the South African broadband policy, SA Connect, is to provide a long-term approach that will begin to develop broadband access in SA with immediate effect. The policy aims to achieve this by implementing a broadband model that incorporates private and public sectors, increasing monetary investments towards ICT, reducing the number of impediments in the broadband policy, removing bottlenecks that inhibit broadband expansion and identifying successful methods and applications that will enhance broadband access. The current approach has been through a centralized deployment and ownership approach, which is largely delayed. In this paper we propose an alternative, decentralized approach to deployment and ownership, in order to incrementally and in parallel build a national telecommunications network through the interconnection of community area networks.","PeriodicalId":386209,"journal":{"name":"2019 Conference on Information Communications Technology and Society (ICTAS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125100450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2019 Conference on Information Communications Technology and Society (ICTAS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1