首页 > 最新文献

2020 Conference on Information Communications Technology and Society (ICTAS)最新文献

英文 中文
Challenges faced by employers when using social media for recruitment and selection purposes 雇主在使用社交媒体进行招聘和选拔时所面临的挑战
Pub Date : 2020-03-01 DOI: 10.1109/ICTAS47918.2020.233997
Obrain Murire, W. Chinyamurindi, L. Cilliers
Employers use social media to search for and connect with prospective employees. However, they face some challenges when they use social media for recruitment purposes. To enable employers to overcome these challenges, a systematic review was adopted to identify barriers for the use of social media by recruiters. Sixteen articles were included in the study. The study proposed five main critical success factors to overcome the challenges employers face when using social media for employment purposes: developing a human resource social media policy for recruiting applicants; compliance with existing laws; training the human resources personnel on how to use social media for recruitment purposes; identifying a social media champion in the organisation; and developing and implementing policies for social media recruitment in the organisation. There is a need for continued support from management to ensure that the Human Resource Department uses social media correctly to identify and recruit graduates for vacancies in the organisation.
雇主使用社交媒体来搜索和联系未来的员工。然而,当他们使用社交媒体进行招聘时,他们面临着一些挑战。为了使雇主能够克服这些挑战,我们采用了一种系统的评估方法来确定招聘人员使用社交媒体的障碍。该研究纳入了16篇文章。该研究提出了五个主要的关键成功因素,以克服雇主在使用社交媒体实现就业目的时面临的挑战:为招聘申请人制定人力资源社交媒体政策;遵守现行法律;培训人力资源人员如何使用社交媒体进行招聘;确定组织内的社交媒体拥护者;制定和实施组织内的社交媒体招聘政策。管理层需要持续的支持,以确保人力资源部门正确使用社交媒体来识别和招聘毕业生填补组织的空缺。
{"title":"Challenges faced by employers when using social media for recruitment and selection purposes","authors":"Obrain Murire, W. Chinyamurindi, L. Cilliers","doi":"10.1109/ICTAS47918.2020.233997","DOIUrl":"https://doi.org/10.1109/ICTAS47918.2020.233997","url":null,"abstract":"Employers use social media to search for and connect with prospective employees. However, they face some challenges when they use social media for recruitment purposes. To enable employers to overcome these challenges, a systematic review was adopted to identify barriers for the use of social media by recruiters. Sixteen articles were included in the study. The study proposed five main critical success factors to overcome the challenges employers face when using social media for employment purposes: developing a human resource social media policy for recruiting applicants; compliance with existing laws; training the human resources personnel on how to use social media for recruitment purposes; identifying a social media champion in the organisation; and developing and implementing policies for social media recruitment in the organisation. There is a need for continued support from management to ensure that the Human Resource Department uses social media correctly to identify and recruit graduates for vacancies in the organisation.","PeriodicalId":431012,"journal":{"name":"2020 Conference on Information Communications Technology and Society (ICTAS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127770152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of Limit States and Tolerance Field of Polarization Multiplexing 偏振复用极限状态及容差场分析
Pub Date : 2020-03-01 DOI: 10.1109/ICTAS47918.2020.234003
M. Kyselak, C. Vlcek
Global communication is inevitably accompanied by increasing the capacity of optical routes, which is one of the main goals of modern data network designers. Particular emphasis is placed on increasing the capacities while using the existing builtin optical infrastructures. Recently, the attention of network engineers has been focused on the polarization division multiplexing (PDM) technology that uses at least two independent data channels on a single wavelength with orthogonal polarization states. PDM is becoming the standard in most state-of-the-art telecommunications systems. Thus, existing technologies allow multiple polarization states to be used. However, the latest research points to the emergence of new advanced PDM techniques using dozens of polarization states. The paper deals with the analysis of the tolerance field of general polarization division multiplexing. It brings new results that can yield new methods that will open up new possibilities for exploiting the polarization properties of light in telecommunications.
全球通信不可避免地伴随着光路由容量的增加,这是现代数据网络设计者的主要目标之一。特别强调的是在使用现有的内置光学基础设施的同时增加容量。近年来,偏振分复用(PDM)技术已成为网络工程师关注的焦点,该技术在具有正交偏振态的单个波长上使用至少两个独立的数据通道。PDM正在成为大多数最先进的电信系统的标准。因此,现有技术允许使用多种极化状态。然而,最新的研究指出,新的先进PDM技术的出现,使用几十个极化态。本文对一般极化分复用的容差场进行了分析。它带来了新的结果,可以产生新的方法,为在电信中利用光的偏振特性开辟新的可能性。
{"title":"Analysis of Limit States and Tolerance Field of Polarization Multiplexing","authors":"M. Kyselak, C. Vlcek","doi":"10.1109/ICTAS47918.2020.234003","DOIUrl":"https://doi.org/10.1109/ICTAS47918.2020.234003","url":null,"abstract":"Global communication is inevitably accompanied by increasing the capacity of optical routes, which is one of the main goals of modern data network designers. Particular emphasis is placed on increasing the capacities while using the existing builtin optical infrastructures. Recently, the attention of network engineers has been focused on the polarization division multiplexing (PDM) technology that uses at least two independent data channels on a single wavelength with orthogonal polarization states. PDM is becoming the standard in most state-of-the-art telecommunications systems. Thus, existing technologies allow multiple polarization states to be used. However, the latest research points to the emergence of new advanced PDM techniques using dozens of polarization states. The paper deals with the analysis of the tolerance field of general polarization division multiplexing. It brings new results that can yield new methods that will open up new possibilities for exploiting the polarization properties of light in telecommunications.","PeriodicalId":431012,"journal":{"name":"2020 Conference on Information Communications Technology and Society (ICTAS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132661178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Criticism of the role of trust in e-government services 对信任在电子政务服务中的作用的批评
Pub Date : 2020-03-01 DOI: 10.1109/ICTAS47918.2020.233973
A. Bayaga, M. Kyobe, Jacques Ophoff
Following the growing interest in the topic of e-government services’ adoption, which is believed to be obstructed by the multifaceted nature of lacking trust, the objective of the current research was to examine the adoption and role of trust in e-government services. The current research took the approach of a systematic review of previous work, which was positioned upon researching trust as an influencer of e-government services’ adoption. Guided by the theoretical framework, and based on the researched and reviewed findings, the conclusion reached as a potential for increasing trust in e-government services was first, to consider the various types of trust and their dimensions/requirements. The second recommendation was to test how these requirements influence e-government services such as e-voting (e-election), e-tax [e-filing], e-health (m-health), e-banking, e-commerce, and e-learning (m-learning). Another crucial attribute to be considered is (1) the best predictor(s) for these requirements, and (2) how the variation of continued use of e-government services could be explained by the types of trust and their dimensions.
随着人们对电子政务服务采用这一主题的兴趣日益浓厚,人们认为缺乏信任的多方面性质阻碍了电子政务服务的采用,本研究的目的是研究信任在电子政务服务中的采用和作用。目前的研究采用了对以往工作进行系统回顾的方法,其定位是研究信任是电子政务服务采用的影响因素。在理论框架的指导下,基于研究和回顾的结果,得出的结论是,首先要考虑各种类型的信任及其维度/要求,以提高电子政务服务的信任。第二项建议是测试这些要求如何影响电子政务服务,如电子投票(电子选举)、电子税收(电子申报)、电子保健(移动保健)、电子银行、电子商务和电子学习(移动学习)。需要考虑的另一个关键属性是(1)这些需求的最佳预测器,以及(2)如何通过信任类型及其维度来解释电子政务服务持续使用的变化。
{"title":"Criticism of the role of trust in e-government services","authors":"A. Bayaga, M. Kyobe, Jacques Ophoff","doi":"10.1109/ICTAS47918.2020.233973","DOIUrl":"https://doi.org/10.1109/ICTAS47918.2020.233973","url":null,"abstract":"Following the growing interest in the topic of e-government services’ adoption, which is believed to be obstructed by the multifaceted nature of lacking trust, the objective of the current research was to examine the adoption and role of trust in e-government services. The current research took the approach of a systematic review of previous work, which was positioned upon researching trust as an influencer of e-government services’ adoption. Guided by the theoretical framework, and based on the researched and reviewed findings, the conclusion reached as a potential for increasing trust in e-government services was first, to consider the various types of trust and their dimensions/requirements. The second recommendation was to test how these requirements influence e-government services such as e-voting (e-election), e-tax [e-filing], e-health (m-health), e-banking, e-commerce, and e-learning (m-learning). Another crucial attribute to be considered is (1) the best predictor(s) for these requirements, and (2) how the variation of continued use of e-government services could be explained by the types of trust and their dimensions.","PeriodicalId":431012,"journal":{"name":"2020 Conference on Information Communications Technology and Society (ICTAS)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121722027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Hybrid Symbiotic Organism Search algorithms for Automatic Data Clustering 自动数据聚类的混合共生生物搜索算法
Pub Date : 2020-03-01 DOI: 10.1109/ICTAS47918.2020.234001
V. Rajah, Ezugwu E. Absalom
Cluster analysis is an essential tool in data mining. Several clustering algorithms have been proposed and implemented for which most are able to find the good quality or optimal clustering solutions. However, most of these algorithms still depend on the number of a cluster being provided a priori. In dealing with real-life problems, the number of clusters is unknown and determining the optimal number of clusters for a large density and high dimensionality dataset is quite a difficult task to handle. This paper, therefore, proposes five new hybrid symbiotic organism search algorithms to automatically partition datasets without any prior information regarding the number of clusters. Furthermore, the hybrid algorithms will be evaluated in terms of solution quality using the Davies–Bouldin clustering validity index. The simulation results show that the performance of the hybrid symbiotic organisms search particle swarm optimization algorithm is superior to the other proposed hybrid algorithms.
聚类分析是数据挖掘中的重要工具。人们提出并实现了几种聚类算法,其中大多数算法都能找到质量好的或最优的聚类解。然而,这些算法中的大多数仍然依赖于先验提供的集群数量。在处理现实问题时,聚类的数量是未知的,对于大密度、高维的数据集,确定最优的聚类数量是一项相当困难的任务。因此,本文提出了五种新的混合共生生物搜索算法来自动划分数据集,而不需要任何关于聚类数量的先验信息。此外,将使用Davies-Bouldin聚类有效性指数来评估混合算法的解质量。仿真结果表明,混合共生生物搜索粒子群优化算法的性能优于其他混合算法。
{"title":"Hybrid Symbiotic Organism Search algorithms for Automatic Data Clustering","authors":"V. Rajah, Ezugwu E. Absalom","doi":"10.1109/ICTAS47918.2020.234001","DOIUrl":"https://doi.org/10.1109/ICTAS47918.2020.234001","url":null,"abstract":"Cluster analysis is an essential tool in data mining. Several clustering algorithms have been proposed and implemented for which most are able to find the good quality or optimal clustering solutions. However, most of these algorithms still depend on the number of a cluster being provided a priori. In dealing with real-life problems, the number of clusters is unknown and determining the optimal number of clusters for a large density and high dimensionality dataset is quite a difficult task to handle. This paper, therefore, proposes five new hybrid symbiotic organism search algorithms to automatically partition datasets without any prior information regarding the number of clusters. Furthermore, the hybrid algorithms will be evaluated in terms of solution quality using the Davies–Bouldin clustering validity index. The simulation results show that the performance of the hybrid symbiotic organisms search particle swarm optimization algorithm is superior to the other proposed hybrid algorithms.","PeriodicalId":431012,"journal":{"name":"2020 Conference on Information Communications Technology and Society (ICTAS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126121492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Deep Learning Model for Forecasting Institutional Building Energy Consumption 机构建筑能耗预测的深度学习模型
Pub Date : 2020-03-01 DOI: 10.1109/ICTAS47918.2020.234004
Simangaliso Mlangeni, Ezugwu E. Absalom, H. Chiroma
South Africa is currently facing an on-going energy crisis that seems to persist every year. Load shedding has become one of the country’s biggest challenge. This is because of energy consumption being at an all-time high and inconsistent in terms of supply. In this paper, we propose a deep learning framework (called Dense Neural Network) for the prediction of energy consumption for University buildings. The deep learning model is evaluated on an energy dataset (collected from the University of KwaZulu-Natal), to forecast the energy consumption of the buildings in the University of KwaZulu-Natal. Furthermore, we compared the performance of the proposed model with two classical algorithms (Support Vector Machine and Multiple Regression), and the deep learning model outperformed the classical algorithms. The forecasted energy consumption can be used by various University managements to assess where most of the energy is being consumed. It can provide an opportunity to devise strategies for optimal utilization of energy in Universities.
南非目前正面临一场持续不断的能源危机,似乎每年都在持续。减电已成为该国面临的最大挑战之一。这是因为能源消耗处于历史最高水平,而且供应不稳定。在本文中,我们提出了一个深度学习框架(称为密集神经网络)来预测大学建筑的能源消耗。深度学习模型在能源数据集(从夸祖鲁-纳塔尔大学收集)上进行评估,以预测夸祖鲁-纳塔尔大学建筑物的能源消耗。此外,我们将所提出的模型与两种经典算法(支持向量机和多元回归)的性能进行了比较,结果表明深度学习模型优于经典算法。预测的能源消耗可以被不同的大学管理部门用来评估哪里消耗了大部分的能源。它可以提供一个机会,制定战略,在大学能源的最佳利用。
{"title":"Deep Learning Model for Forecasting Institutional Building Energy Consumption","authors":"Simangaliso Mlangeni, Ezugwu E. Absalom, H. Chiroma","doi":"10.1109/ICTAS47918.2020.234004","DOIUrl":"https://doi.org/10.1109/ICTAS47918.2020.234004","url":null,"abstract":"South Africa is currently facing an on-going energy crisis that seems to persist every year. Load shedding has become one of the country’s biggest challenge. This is because of energy consumption being at an all-time high and inconsistent in terms of supply. In this paper, we propose a deep learning framework (called Dense Neural Network) for the prediction of energy consumption for University buildings. The deep learning model is evaluated on an energy dataset (collected from the University of KwaZulu-Natal), to forecast the energy consumption of the buildings in the University of KwaZulu-Natal. Furthermore, we compared the performance of the proposed model with two classical algorithms (Support Vector Machine and Multiple Regression), and the deep learning model outperformed the classical algorithms. The forecasted energy consumption can be used by various University managements to assess where most of the energy is being consumed. It can provide an opportunity to devise strategies for optimal utilization of energy in Universities.","PeriodicalId":431012,"journal":{"name":"2020 Conference on Information Communications Technology and Society (ICTAS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125203131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
eModeration adoption requirements for secondary school education: a critical literature review 中学教育适度采用要求:批判性文献综述
Pub Date : 2020-03-01 DOI: 10.1109/ICTAS47918.2020.233979
Vanitha Rajamany, J. V. Biljon, C. V. Staden
eModeration is an essential aspect of quality assurance in electronic learning, but eModeration systems are not a regular feature of assessment in educational institutions. One reason could be the lack of evidence-based requirements to guide the implementation and evaluation of eModeration systems. To ensure adoption, it is important that eModeration system requirements comply with technology acceptance requirements. The purpose of this paper is to determine the adoption requirements for the development of an eModeration system. We employ a critical literature review as methodology to extract an initial set of eModeration requirements from the literature. The initial set of eModeration requirements are then used as a basis for eliciting requirements from technology acceptance models. The lack of eModeration systems especially in the secondary school environment necessitated a focus on pre- adoption requirements, which was a challenge since most technology acceptance models assume the use of a system. The Human, Organisation and Technology model is useful in supporting pre-adoption requirements and was thus selected as the basis for synthesising the refined set of requirements. The contribution is a set of requirements that should be useful in the design and evaluation of eModeration systems towards ensuring adoption and use.
调节是电子学习质量保证的一个重要方面,但调节系统并不是教育机构评估的常规特征。一个原因可能是缺乏以证据为基础的要求来指导调节系统的实施和评估。为了确保采用,重要的是调节系统需求要符合技术接受需求。本文的目的是确定开发一个管理系统的采用要求。我们采用批判性文献综述作为方法,从文献中提取一组初始的调节要求。然后,eModeration需求的初始集被用作从技术接受模型中引出需求的基础。特别是在中学环境中缺乏审核系统,因此必须关注采用前的要求,这是一个挑战,因为大多数技术接受模型都假定使用一个系统。人、组织和技术模型在支持采用前需求方面很有用,因此被选为综合精细化需求集的基础。贡献是一套要求,在设计和评价调节系统以确保采用和使用方面应该是有用的。
{"title":"eModeration adoption requirements for secondary school education: a critical literature review","authors":"Vanitha Rajamany, J. V. Biljon, C. V. Staden","doi":"10.1109/ICTAS47918.2020.233979","DOIUrl":"https://doi.org/10.1109/ICTAS47918.2020.233979","url":null,"abstract":"eModeration is an essential aspect of quality assurance in electronic learning, but eModeration systems are not a regular feature of assessment in educational institutions. One reason could be the lack of evidence-based requirements to guide the implementation and evaluation of eModeration systems. To ensure adoption, it is important that eModeration system requirements comply with technology acceptance requirements. The purpose of this paper is to determine the adoption requirements for the development of an eModeration system. We employ a critical literature review as methodology to extract an initial set of eModeration requirements from the literature. The initial set of eModeration requirements are then used as a basis for eliciting requirements from technology acceptance models. The lack of eModeration systems especially in the secondary school environment necessitated a focus on pre- adoption requirements, which was a challenge since most technology acceptance models assume the use of a system. The Human, Organisation and Technology model is useful in supporting pre-adoption requirements and was thus selected as the basis for synthesising the refined set of requirements. The contribution is a set of requirements that should be useful in the design and evaluation of eModeration systems towards ensuring adoption and use.","PeriodicalId":431012,"journal":{"name":"2020 Conference on Information Communications Technology and Society (ICTAS)","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131607726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Irenbus: A Real-Time Public Transport Management System 实时公共交通管理系统
Pub Date : 2020-03-01 DOI: 10.1109/ICTAS47918.2020.234000
Menzi Skhosana, Ezugwu E. Absalom
As commuters want to be informed about the current status of public transport vehicles, availability of real time information to commuters will make public transport more trustworthy and reliable. Having more people use public transport has good implications - not only will it result to less traffic congestion, but a greener environment too. In this paper we present Irenbus, a novel dynamic real-time information system that keeps commuters informed about buses currently in transit and other relevant information such as vehicle arrival time. The system is composed of three subsystems that cater for commuters, bus drivers and bus managers respectively. These are all developed using the Firebase Backend-as-a-Service (BaaS) platform. Several sophisticated automated tests on the mobile application component of the system were carried out to evaluate its device resource consumption. The results of the tests show that the proposed system is very efficient and suitable for use on low end devices.
由于通勤者希望了解公共交通车辆的现状,向通勤者提供实时信息将使公共交通更加值得信赖和可靠。让更多的人使用公共交通有很好的影响——它不仅会减少交通拥堵,还会带来更环保的环境。在本文中,我们介绍了一种新颖的动态实时信息系统Irenbus,它可以让通勤者了解当前正在运输的公交车和其他相关信息,如车辆到达时间。该系统由三个子系统组成,分别满足通勤者、公交车司机和公交车管理人员的需求。这些都是使用Firebase后端即服务(BaaS)平台开发的。对系统的移动应用组件进行了几个复杂的自动化测试,以评估其设备资源消耗。测试结果表明,该系统非常高效,适用于低端设备。
{"title":"Irenbus: A Real-Time Public Transport Management System","authors":"Menzi Skhosana, Ezugwu E. Absalom","doi":"10.1109/ICTAS47918.2020.234000","DOIUrl":"https://doi.org/10.1109/ICTAS47918.2020.234000","url":null,"abstract":"As commuters want to be informed about the current status of public transport vehicles, availability of real time information to commuters will make public transport more trustworthy and reliable. Having more people use public transport has good implications - not only will it result to less traffic congestion, but a greener environment too. In this paper we present Irenbus, a novel dynamic real-time information system that keeps commuters informed about buses currently in transit and other relevant information such as vehicle arrival time. The system is composed of three subsystems that cater for commuters, bus drivers and bus managers respectively. These are all developed using the Firebase Backend-as-a-Service (BaaS) platform. Several sophisticated automated tests on the mobile application component of the system were carried out to evaluate its device resource consumption. The results of the tests show that the proposed system is very efficient and suitable for use on low end devices.","PeriodicalId":431012,"journal":{"name":"2020 Conference on Information Communications Technology and Society (ICTAS)","volume":"359 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115898604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Mobile Information Security Awareness Among Students in Higher Education : An Exploratory Study 高校学生移动信息安全意识的探索性研究
Pub Date : 2020-03-01 DOI: 10.1109/ICTAS47918.2020.233978
Tankiso Moletsane, P. Tsibolane
Higher education students live their lives through their mobile technology devices. The availability of broadband networks and the associated connectivity capabilities of modern mobile devices as well as the numerous mobile apps on offer enable students to be constantly connected. Consequently, large amounts of sensitive information is being stored and processed through a variety of mobile devices, making the individual students and their higher education institutions easy targets for cyberattacks. This study assesses factors that impact mobile security awareness of students (N=397) at a higher education institution in South Africa. It proposes a conceptual model of mobile information security awareness, which draws upon a combination of constructs from the Knowledge-Attitude-Behavior (KAB) model and the Theory of Planned Behavior (TPB) to measure mobile information security awareness. The results show a significant relationship between students’ knowledge and behavioral intentions about information security threats and their levels of security awareness. The study also shows the existence of the gap between knowing about security and the lack of concomitant safety behaviors. The study concludes with a discussion of the practical implications of the research outcomes.
高等教育学生通过他们的移动技术设备生活。宽带网络的可用性和现代移动设备的相关连接功能以及提供的众多移动应用程序使学生能够随时保持联系。因此,大量的敏感信息通过各种移动设备被存储和处理,使学生个人和他们的高等教育机构容易成为网络攻击的目标。本研究评估了影响南非一所高等教育机构学生(N=397)移动安全意识的因素。提出了一个移动信息安全意识的概念模型,该模型结合了知识-态度-行为(Knowledge-Attitude-Behavior, KAB)模型和计划行为理论(Theory of Planned Behavior, TPB)的结构来测量移动信息安全意识。结果表明,学生对信息安全威胁的认知、行为意愿与安全意识水平之间存在显著的相关关系。该研究还表明,了解安全与缺乏相应的安全行为之间存在差距。本研究最后讨论了研究结果的实际意义。
{"title":"Mobile Information Security Awareness Among Students in Higher Education : An Exploratory Study","authors":"Tankiso Moletsane, P. Tsibolane","doi":"10.1109/ICTAS47918.2020.233978","DOIUrl":"https://doi.org/10.1109/ICTAS47918.2020.233978","url":null,"abstract":"Higher education students live their lives through their mobile technology devices. The availability of broadband networks and the associated connectivity capabilities of modern mobile devices as well as the numerous mobile apps on offer enable students to be constantly connected. Consequently, large amounts of sensitive information is being stored and processed through a variety of mobile devices, making the individual students and their higher education institutions easy targets for cyberattacks. This study assesses factors that impact mobile security awareness of students (N=397) at a higher education institution in South Africa. It proposes a conceptual model of mobile information security awareness, which draws upon a combination of constructs from the Knowledge-Attitude-Behavior (KAB) model and the Theory of Planned Behavior (TPB) to measure mobile information security awareness. The results show a significant relationship between students’ knowledge and behavioral intentions about information security threats and their levels of security awareness. The study also shows the existence of the gap between knowing about security and the lack of concomitant safety behaviors. The study concludes with a discussion of the practical implications of the research outcomes.","PeriodicalId":431012,"journal":{"name":"2020 Conference on Information Communications Technology and Society (ICTAS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122632590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
ICTAS 2020 Committees
Pub Date : 2020-03-01 DOI: 10.1109/ictas47918.2020.9082477
{"title":"ICTAS 2020 Committees","authors":"","doi":"10.1109/ictas47918.2020.9082477","DOIUrl":"https://doi.org/10.1109/ictas47918.2020.9082477","url":null,"abstract":"","PeriodicalId":431012,"journal":{"name":"2020 Conference on Information Communications Technology and Society (ICTAS)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124913591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modelling and analysis of interference diffusion in the internet of things: an epidemic model 物联网中干扰扩散的建模与分析:流行病模型
Pub Date : 2020-03-01 DOI: 10.1109/ICTAS47918.2020.233984
Emmanuel Tuyishimire, A. Bagula
For the last decades, Internet of Things (IoT) applications have been in high demand with the objective of creating smart environments that could impact positively many aspects of our daily lives. The IoT uses smart objects which are embedded into the environment and interact by transmitting several messages which interference with other messages on receiving nodes. This can lead to inevitable sensors’ (nodes’) deterioration after transmitting a considerable number of messages. Interference mitigation In a complex network such as the IoT is still a subject of active research which could benefit many real-world applications. Collection trees algorithms and protocols can be used adopted to reduce the interference on the nodes/paths of an IoT network but but can not fully stop or avoid interference across an IoT network. Building upon a mapping between path interference on devices (nodes) and real life contamination of a disease that can move an individual from a susceptible (S) to infected (I) and replaced (R) statuses, this paper revisits the collection tree algorithms with the objective of studying the dynamics of the interference in IoT networks. In this study, the IoT network’s nodes are partitioned into mutually exclusive groups based on possible epidemic spread. For each group, an SIR model is proposed in a form of a system of difference equations. The model is analysed by studying the system stability and simulations are used to study the real time status of the interference across the network.
在过去的几十年里,物联网(IoT)应用的需求一直很高,其目标是创建智能环境,从而对我们日常生活的许多方面产生积极影响。物联网使用嵌入环境中的智能对象,并通过传输与接收节点上的其他消息干扰的多条消息进行交互。这可能导致传感器(节点)在传输相当数量的信息后不可避免地恶化。在物联网等复杂网络中,干扰缓解仍然是一个积极研究的主题,可以使许多实际应用受益。集合树算法和协议可以用来减少物联网网络节点/路径上的干扰,但不能完全阻止或避免物联网网络之间的干扰。基于设备(节点)上的路径干扰和疾病的现实生活污染之间的映射,可以将个体从易感(S)移动到感染(I)和替换(R)状态,本文重新审视了收集树算法,目的是研究物联网网络中干扰的动态。在本研究中,物联网网络的节点根据可能的疫情传播被划分为互斥的组。对于每一组,SIR模型以差分方程系统的形式提出。通过对系统稳定性的研究对该模型进行了分析,并通过仿真研究了网络中干扰的实时状态。
{"title":"Modelling and analysis of interference diffusion in the internet of things: an epidemic model","authors":"Emmanuel Tuyishimire, A. Bagula","doi":"10.1109/ICTAS47918.2020.233984","DOIUrl":"https://doi.org/10.1109/ICTAS47918.2020.233984","url":null,"abstract":"For the last decades, Internet of Things (IoT) applications have been in high demand with the objective of creating smart environments that could impact positively many aspects of our daily lives. The IoT uses smart objects which are embedded into the environment and interact by transmitting several messages which interference with other messages on receiving nodes. This can lead to inevitable sensors’ (nodes’) deterioration after transmitting a considerable number of messages. Interference mitigation In a complex network such as the IoT is still a subject of active research which could benefit many real-world applications. Collection trees algorithms and protocols can be used adopted to reduce the interference on the nodes/paths of an IoT network but but can not fully stop or avoid interference across an IoT network. Building upon a mapping between path interference on devices (nodes) and real life contamination of a disease that can move an individual from a susceptible (S) to infected (I) and replaced (R) statuses, this paper revisits the collection tree algorithms with the objective of studying the dynamics of the interference in IoT networks. In this study, the IoT network’s nodes are partitioned into mutually exclusive groups based on possible epidemic spread. For each group, an SIR model is proposed in a form of a system of difference equations. The model is analysed by studying the system stability and simulations are used to study the real time status of the interference across the network.","PeriodicalId":431012,"journal":{"name":"2020 Conference on Information Communications Technology and Society (ICTAS)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121789410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
2020 Conference on Information Communications Technology and Society (ICTAS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1