Software projects are still failing at an alarming rate and do not provide value to the organisation at large. This has been the case for the last decade. Software projects use predominantly Waterfall as a methodology. This raises the question whether new ways of working can be introduced to improve the success rate. One such new way is Agile as an approach to developing software. A survey was done to determine whether Agile projects are more successful than Waterfall projects, thus contrasting the old and the new ways of working. Some 617 software projects were evaluated to determine the success rate based on the methodology used. Success was measured on a continuum of five levels and not just the triple constraint. The results imply that Agile projects are more successful than Waterfall projects to some extent, but that there are still concerns that need to be addressed.
{"title":"Waterfall and Agile information system project success rates – A South African perspective","authors":"L. Khoza, C. Marnewick","doi":"10.18489/sacj.v32i1.683","DOIUrl":"https://doi.org/10.18489/sacj.v32i1.683","url":null,"abstract":"Software projects are still failing at an alarming rate and do not provide value to the organisation at large. This has been the case for the last decade. Software projects use predominantly Waterfall as a methodology. This raises the question whether new ways of working can be introduced to improve the success rate. One such new way is Agile as an approach to developing software. A survey was done to determine whether Agile projects are more successful than Waterfall projects, thus contrasting the old and the new ways of working. Some 617 software projects were evaluated to determine the success rate based on the methodology used. Success was measured on a continuum of five levels and not just the triple constraint. The results imply that Agile projects are more successful than Waterfall projects to some extent, but that there are still concerns that need to be addressed.","PeriodicalId":55859,"journal":{"name":"South African Computer Journal","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48744607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Financial statement fraud has been on the increase in the past two decades and includes prominent scandals such as Enron, WorldCom and more recently in South Africa, Steinhoff. These scandals have led to billions of dollars being lost in the form of market capitalisation from different stock exchanges across the world. During this time, there has been an increase in the literature on applying automated methods to detecting financial statement fraud using publicly available data. This paper provides a survey of the literature on automated financial statement fraud detection and identifies current gaps in the literature. The paper highlights a number of important considerations in the implementation of financial statement fraud detection decision support systems, including 1) the definition of fraud, 2) features used for detecting fraud, 3) region of the case study, dataset size and imbalance, 4) algorithms used for detection, 5) approach to feature selection / feature engineering, 6) treatment of missing data, and 7) performance measure used. The current study discusses how these and other implementation factors could be approached within the South African context.
{"title":"A Survey of Automated Financial Statement Fraud Detection with Relevance to the South African Context","authors":"W. Mongwe, K. Malan","doi":"10.18489/sacj.v32i1.777","DOIUrl":"https://doi.org/10.18489/sacj.v32i1.777","url":null,"abstract":"Financial statement fraud has been on the increase in the past two decades and includes prominent scandals such as Enron, WorldCom and more recently in South Africa, Steinhoff. These scandals have led to billions of dollars being lost in the form of market capitalisation from different stock exchanges across the world. During this time, there has been an increase in the literature on applying automated methods to detecting financial statement fraud using publicly available data. This paper provides a survey of the literature on automated financial statement fraud detection and identifies current gaps in the literature. The paper highlights a number of important considerations in the implementation of financial statement fraud detection decision support systems, including 1) the definition of fraud, 2) features used for detecting fraud, 3) region of the case study, dataset size and imbalance, 4) algorithms used for detection, 5) approach to feature selection / feature engineering, 6) treatment of missing data, and 7) performance measure used. The current study discusses how these and other implementation factors could be approached within the South African context.","PeriodicalId":55859,"journal":{"name":"South African Computer Journal","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49488146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cyber bullying has become a topical issue in South Africa. However, there is very little guidance and training for teachers on how to deal with cyber bullying in the classroom. This study investigated the perceptions of cyber bullying amongst student teachers in the Eastern Cape Province of South Africa. The backdrop of this study is a context where there is a proliferation of technologies in much of South African society. Within this, there are calls to not only investigate the positive side of technology but also aspects where technology may have a “dark” side. The study made use of a quantitative survey approach to collect data from 150 student teachers at a university in the Eastern Cape Province of South Africa. The student teachers were representative of all three the school phases used in South Africa. The results indicated that almost half of the student teachers had been victims of cyber bullying. Overall, cyber bullying was considered a serious issue for the student teachers but awareness of the prevalence of the issue decreased outside the classroom. The topic has not been incorporated into policy or the school curriculum in South Africa. The recommendation of the study is that the Department of Basic Education in South Africa must provide a standardised policy and curriculum that schools can use to implement and enforce cyber safety behaviour in the schools.
网络欺凌已经成为南非的一个热门话题。然而,在如何处理课堂上的网络欺凌方面,对教师的指导和培训很少。本研究调查了南非东开普省实习教师对网络欺凌的看法。这项研究的背景是在南非社会的许多地方都有技术扩散的背景。在这种情况下,有人呼吁不仅要调查技术的积极方面,还要调查技术可能有“黑暗”一面的方面。这项研究采用了定量调查的方法,从南非东开普省一所大学的150名实习教师那里收集数据。这些实习教师代表了南非所有三个阶段的学校。调查结果显示,近一半的实习教师曾是网络欺凌的受害者。总体而言,学生教师认为网络欺凌是一个严重的问题,但在课堂外,对这一问题的普遍认识却有所下降。在南非,这一主题尚未纳入政策或学校课程。这项研究的建议是,南非基础教育部(Department of Basic Education)必须提供一套标准化的政策和课程,学校可以用它来实施和加强学校的网络安全行为。
{"title":"Perceptions of cyber bullying amongst student teachers in the Eastern Cape Province of South Africa","authors":"L. Cilliers, W. Chinyamurindi","doi":"10.18489/sacj.v32i1.737","DOIUrl":"https://doi.org/10.18489/sacj.v32i1.737","url":null,"abstract":"Cyber bullying has become a topical issue in South Africa. However, there is very little guidance and training for teachers on how to deal with cyber bullying in the classroom. This study investigated the perceptions of cyber bullying amongst student teachers in the Eastern Cape Province of South Africa. The backdrop of this study is a context where there is a proliferation of technologies in much of South African society. Within this, there are calls to not only investigate the positive side of technology but also aspects where technology may have a “dark” side. The study made use of a quantitative survey approach to collect data from 150 student teachers at a university in the Eastern Cape Province of South Africa. The student teachers were representative of all three the school phases used in South Africa. The results indicated that almost half of the student teachers had been victims of cyber bullying. Overall, cyber bullying was considered a serious issue for the student teachers but awareness of the prevalence of the issue decreased outside the classroom. The topic has not been incorporated into policy or the school curriculum in South Africa. The recommendation of the study is that the Department of Basic Education in South Africa must provide a standardised policy and curriculum that schools can use to implement and enforce cyber safety behaviour in the schools.","PeriodicalId":55859,"journal":{"name":"South African Computer Journal","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44017764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
I am pleased to report that SACJ has been able to publish on schedule in July 2020 despite the Covid-19 (SARS-CoV-2) pandemic. South Africa, like many other countries, has been severely impacted by prevention measures. South African academics have had to try to work out how to do remote delivery of courses with inadequate resources. At my own university, there has been a major upsurge in students supported by the National Student Financial Aid Scheme (NSFAS). These students are from poor families, many with no prior exposure to higher education, and from all over the country as well as further afield. As one of the country’s smallest universities, we have also become one of the most diverse. I hope we do not lose significant numbers of students to the additional academic stresses. In this editorial I look at how academia can respond to a crisis like this. I also outline an upcoming special issue and some transitions including a sad event arising from the pandemic, a warning to all of us.
{"title":"Editorial: Coping with Covid","authors":"P. Machanick","doi":"10.18489/sacj.v32i1.858","DOIUrl":"https://doi.org/10.18489/sacj.v32i1.858","url":null,"abstract":"I am pleased to report that SACJ has been able to publish on schedule in July 2020 despite the Covid-19 (SARS-CoV-2) pandemic. South Africa, like many other countries, has been severely impacted by prevention measures. South African academics have had to try to work out how to do remote delivery of courses with inadequate resources. At my own university, there has been a major upsurge in students supported by the National Student Financial Aid Scheme (NSFAS). These students are from poor families, many with no prior exposure to higher education, and from all over the country as well as further afield. As one of the country’s smallest universities, we have also become one of the most diverse. I hope we do not lose significant numbers of students to the additional academic stresses. In this editorial I look at how academia can respond to a crisis like this. I also outline an upcoming special issue and some transitions including a sad event arising from the pandemic, a warning to all of us.","PeriodicalId":55859,"journal":{"name":"South African Computer Journal","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42662113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abedalmuhdi Almomany, A. Al-Omari, Amin Jarrah, M. Tawalbeh, A. Alqudah
This paper examines the feasibility of using commercial out-of-the-box reconfigurable field programmable gate array (FPGA) technology and the open computing language (OpenCL) framework to create an efficient Sobel edge-detection implementation, which is considered a fundamental aspect of image and video processing. This implementation enhances speedup and energy consumption attributes when compared to general single-core processors. We created the proposed approach at a high level of abstraction and executed it on a high commodity Intel FPGA platform (an Intel De5-net device was used). This approach was designed in a manner that allows the high-level compiler/synthesis tool to manipulate a task-parallelism model. The most promising FPGA and conventional implementations were compared to their single-core CPU software equivalents. For these comparisons, local-memory, pipelining, loop unrolling, vectorization, internal channel mechanisms, and memory coalescing were manipulated to provide a much more effective hardware design. The run-time and power consumption attributes were estimated for each implementation, resulting in up to 37-fold improvement of the execution/transfer time and up to a 53-fold improvement in energy consumption when compared to a specific single-core CPU-based implementation.
{"title":"An OpenCL-based parallel acceleration of aSobel edge detection algorithm Using IntelFPGA technology","authors":"Abedalmuhdi Almomany, A. Al-Omari, Amin Jarrah, M. Tawalbeh, A. Alqudah","doi":"10.18489/sacj.v32i1.749","DOIUrl":"https://doi.org/10.18489/sacj.v32i1.749","url":null,"abstract":"This paper examines the feasibility of using commercial out-of-the-box reconfigurable field programmable gate array (FPGA) technology and the open computing language (OpenCL) framework to create an efficient Sobel edge-detection implementation, which is considered a fundamental aspect of image and video processing. This implementation enhances speedup and energy consumption attributes when compared to general single-core processors. We created the proposed approach at a high level of abstraction and executed it on a high commodity Intel FPGA platform (an Intel De5-net device was used). This approach was designed in a manner that allows the high-level compiler/synthesis tool to manipulate a task-parallelism model. The most promising FPGA and conventional implementations were compared to their single-core CPU software equivalents. For these comparisons, local-memory, pipelining, loop unrolling, vectorization, internal channel mechanisms, and memory coalescing were manipulated to provide a much more effective hardware design. The run-time and power consumption attributes were estimated for each implementation, resulting in up to 37-fold improvement of the execution/transfer time and up to a 53-fold improvement in energy consumption when compared to a specific single-core CPU-based implementation.","PeriodicalId":55859,"journal":{"name":"South African Computer Journal","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48173454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
South Africa enacted the Protection of Personal Information Act 4 of 2013 (POPI) in an effort to curb the misuse of customers’ personal information by organisations. The aim of this research was to establish whether the South African insurance industry is adhering to certain prescripts of POPI, focusing on direct marketing requirements. An experiment was utilised to monitor the flow of personal information submitted to 20 insurance companies requesting short-term insurance quotations, using new e-mail addresses and phone numbers. The results of the experiment indicate that 92% of the marketing communication received did not have prior consent from the researcher. Contact was made by companies outside the sample, indicating third-party sharing. 86% of the unsolicited short message service (SMS) communication received required customers to pay for unsubscribing from SMSs, which is not in line with regulatory requirements. The non-compliance evident in this experiment acts as an early warning to the insurance industry and South Africa, prompting a more concerted effort towards preparation of compliance with POPI. A personal information processing management framework is proposed to aid the insurance industry in understanding how personal information can be processed in line with the requirements of the Act.
{"title":"Protection of personal information: An experiment involving data value chains and the use of personal information for marketing purposes in South Africa","authors":"Benson Zenda, R. Vorster, Adéle da Veiga","doi":"10.18489/sacj.v32i1.712","DOIUrl":"https://doi.org/10.18489/sacj.v32i1.712","url":null,"abstract":"South Africa enacted the Protection of Personal Information Act 4 of 2013 (POPI) in an effort to curb the misuse of customers’ personal information by organisations. The aim of this research was to establish whether the South African insurance industry is adhering to certain prescripts of POPI, focusing on direct marketing requirements. An experiment was utilised to monitor the flow of personal information submitted to 20 insurance companies requesting short-term insurance quotations, using new e-mail addresses and phone numbers. The results of the experiment indicate that 92% of the marketing communication received did not have prior consent from the researcher. Contact was made by companies outside the sample, indicating third-party sharing. 86% of the unsolicited short message service (SMS) communication received required customers to pay for unsubscribing from SMSs, which is not in line with regulatory requirements. The non-compliance evident in this experiment acts as an early warning to the insurance industry and South Africa, prompting a more concerted effort towards preparation of compliance with POPI. A personal information processing management framework is proposed to aid the insurance industry in understanding how personal information can be processed in line with the requirements of the Act.","PeriodicalId":55859,"journal":{"name":"South African Computer Journal","volume":"32 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41644241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Reinforcement learning is a machine learning framework whereby an agent learns to perform a task by maximising its total reward received for selecting actions in each state. The policy mapping states to actions that the agent learns is either represented explicitly, or implicitly through a value function. It is common in reinforcement learning to discretise a continuous state space using tile coding or binary features. We prove an upper bound on the performance of discretisation for direct policy representation or value function approximation.
{"title":"Upper bounds on the performance of discretisation in reinforcement learning : research article","authors":"Michael Mitchley","doi":"10.18489/SACJ.V0I57.284","DOIUrl":"https://doi.org/10.18489/SACJ.V0I57.284","url":null,"abstract":"Reinforcement learning is a machine learning framework whereby an agent learns to perform a task by maximising its total reward received for selecting actions in each state. The policy mapping states to actions that the agent learns is either represented explicitly, or implicitly through a value function. It is common in reinforcement learning to discretise a continuous state space using tile coding or binary features. We prove an upper bound on the performance of discretisation for direct policy representation or value function approximation.","PeriodicalId":55859,"journal":{"name":"South African Computer Journal","volume":"57 1","pages":"24-31"},"PeriodicalIF":0.0,"publicationDate":"2015-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67990307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In higher education institutions various VLSs have been formally adopted to support online teaching and learning. However, there has been little research on patterns of VLS use among educators. The purpose of the research was to provide a descriptive analysis of VLS feature usage, and associated challenges at two South African higher education institutions. A case study research strategy was adopted, combining qualitative and quantitative approaches to data collection and analysis. Survey findings revealed four clusters of VLS feature usage, namely, communication, management, content and pedagogic. Analysis showed that the ‘content cluster’ was used more than the other clusters. The average usage of the ‘pedagogic cluster’ for Durban University of Technology (DUT) was significantly greater than that of University of KwaZulu-Natal (UKZN), which tentatively indicates that staff development seems to be an important aspect of VLS usage. There was no significant difference in the usage of the ‘communication’ and ‘management’ clusters between the two institutions, DUT and UKZN. The study contributes to the body of system utilisation research by confirming an uneven pattern of VLS feature usage among educators, whilst providing fresh insights into the challenges associated with the usage of two different VLSs in two different universities.
{"title":"Virtual Learning System Usage in Higher Education – A Study at Two South African Institutions","authors":"I. Padayachee, A. V. D. Merwe, P. Kotzé","doi":"10.18489/SACJ.V0I57.324","DOIUrl":"https://doi.org/10.18489/SACJ.V0I57.324","url":null,"abstract":"In higher education institutions various VLSs have been formally adopted to support online teaching and learning. However, there has been little research on patterns of VLS use among educators. The purpose of the research was to provide a descriptive analysis of VLS feature usage, and associated challenges at two South African higher education institutions. A case study research strategy was adopted, combining qualitative and quantitative approaches to data collection and analysis. Survey findings revealed four clusters of VLS feature usage, namely, communication, management, content and pedagogic. Analysis showed that the ‘content cluster’ was used more than the other clusters. The average usage of the ‘pedagogic cluster’ for Durban University of Technology (DUT) was significantly greater than that of University of KwaZulu-Natal (UKZN), which tentatively indicates that staff development seems to be an important aspect of VLS usage. There was no significant difference in the usage of the ‘communication’ and ‘management’ clusters between the two institutions, DUT and UKZN. The study contributes to the body of system utilisation research by confirming an uneven pattern of VLS feature usage among educators, whilst providing fresh insights into the challenges associated with the usage of two different VLSs in two different universities.","PeriodicalId":55859,"journal":{"name":"South African Computer Journal","volume":"44 1","pages":"32-57"},"PeriodicalIF":0.0,"publicationDate":"2015-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67990762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}