- Sponsor:
- sigweb
The South African Institute of Computer Scientists and Information technologists (SAICSIT) has, over a number of years, developed into a highly acclaimed and respected forum for exchanging and sharing knowledge. The annual SAICSIT conference has steadily gained recognition not only in South Africa, but also internationally. Significantly more international researchers are submitting contributions to the conference and a substantial proportion of the programme committee is from the international research community.
At this year's conference, much like previous years, we have strived to provide an opportunity for academics in Computer Science, Information Systems and Information Technology to review, present and discuss research in their respective fields. We have also maintained the international participation in the conference, specifically as far as the programme committee is concerned. Out of a total of 69 reviewers, 45% of them were from the international research community. We would like to thank our international reviewers for their much valued contribution. We trust that the Programme Committee will remain involved in the conference and will advertise the work and opportunities provided by the SAICSIT conference in their fields of influence.
This year's conference once again comprises of two sections: a main conference of which this is the proceedings, as well as a post-graduate Research Symposium aimed at supporting and developing young researchers from a capacity building perspective. A total of 22 submissions of work-in-progress or proposal reports was accepted for presentation at the Research Symposium.
The main conference received 80 submissions of which 33 were accepted for presentation at the conference, resulting in a 41% acceptance rate. All papers were subjected to a single blind peer-review process (identities of reviewers were not revealed to the submitting authors) with each paper receiving a minimum of three reviews from the international programme committee. We have no doubt that the process yielded papers of high quality and would like to thank the reviewers for their efforts in this regards.
Proceeding Downloads
Towards a taxonomy of network scanning techniques
Network scanning is a common reconnaissance activity in network intrusion. Despite this, it's classification remains vague and detection systems in current Network Intrusion Detection Systems are incapable of detecting many forms of scanning traffic.
...
Investigating the impact of the external environment on strategic information systems planning: a qualitative inquiry
Strategic information systems planning (SISP) is a key issue to IS managers. The SISP approach employed by organizations is very much dependent on the internal and external environment. Recent research points to a gap between the manner in which IS ...
Contemplating systematic software reuse in a project-centric company
Systematic software reuse is still the most promising strategy for increasing productivity and improving quality in the software industry. Although it is simple in concept, successful software reuse implementation is difficult in practice. A reason put ...
The relationship between emergence of the shortest path and information value using ant-like agents
Ant-like agents forage between two points. These agents' probabilistic movements are based on the use of two pheromones; one marking trails towards the goal and another marking trails back to the starting point. Path selection decisions are influenced ...
Utilising the living labs approach in the design of a digital platform for SINGA
Vulnerable children in Africa fail to access basic social services and people they need to advance in life because they are not empowered enough to do so and have little information to their benefit. This paper describes the development of SINGA which ...
Incorporating layout managers into an evolutionary programming algorithm to design graphical user interfaces
Designing graphical user interfaces (GUIs) is an arduous task that requires both functional and aesthetic considerations, often relying on documented style guides and design principles. Style guides and principles are mostly prescriptive in terms of ...
Agile systems development and stakeholder satisfaction: a South African empirical study
The high rate of systems development (SD) failure is often attributed to the complexity of traditional SD methodologies (e.g. Waterfall) and their inability to cope with changes brought about by today's dynamic and evolving business environment. Agile ...
Guidelines for secure software development
It is within highly integrated technology environments that information security is becoming a focal point for designing, developing and deploying software applications. Ensuring a high level of trust in the security and quality of these applications is ...
Designing technology for young children: what we can learn from theories of cognitive development
The majority of guidelines and principles for design of technology are aimed at products for adults. The limited guidelines available for design of young children's technology do not focus sufficiently on age-related requirements or they offer high-...
Usability evaluation of the South African National Accessibility Portal interactive voice response system
One of the most prominent problems that persons with disabilities face in South Africa, is access to relevant disability related information. To address this need the South African National Accessibility Portal (NAP Portal) was developed, that enable ...
Do online buying behaviour and attitudes to web personalization vary by age group?
A study of 821 South African Internet users was undertaken to assess attitudes towards the personalization of online content, concerns about privacy, and willingness to provide explicit personal information and to allow implicit gathering of web usage ...
Scientific computing using virtual high-performance computing: a case study using the Amazon elastic computing cloud
High-performance computing systems are important in scientific computing. Clusters of computer systems --- which range greatly in size --- are a common architecture for high-performance computing. Small, dedicated clusters are affordable and cost-...
Using mobile preference-based searching to improve tourism decision support
Powerful mobile computing devices such as smartphones and PDAs are becoming more numerous and affordable. These mobile devices are ideal for tourists needing to search for suitable points-of-interest (POIs) such as restaurants or accommodation. This ...
Planning as model checking: the performance of ProB vs NuSMV
In this paper we investigate the feasibility of using two different model-checking techniques for solving a number of classical AI planning problems. The ProB model checker, based on mathematical set theory and first-order logic, is specifically ...
A model for eliciting user requirements specific to South African rural areas
Dwesa is a rural town situated in South Africa's Eastern Cape Province. Its residents are plagued with the challenges of poverty, poor access to public services, unemployment and low levels of literacy. A project is currently underway in Dwesa to ...
Java Micro Edition and Adobe Flash Lite for arcade-style mobile phone game development: a comparative study
The pervasiveness of mobile devices has created a substantial market for mobile applications and games that continues to grow extremely rapidly. Consequently, the mobile game industry has firmly asserted itself as a significant industry with major ...
Investigating the use of "Grounded Theory" in information systems research
"Grounded Theory" has been employed quite widely in studies of information systems (IS) phenomena. A survey of IS literature reveals conflict in the understanding and use of "grounded theory". The term "grounded theory" is often used as a catch phrase ...
An investigation into the implementation of open source software within the SA government: an emerging expansion model
Open source software (OSS) is increasingly becoming an alternative for proprietary software (PS), particularly in the government sector globally. The adoption and implementation of OSS by the government sector is cited as one of the enablers for the ...
A model of an intelligent video-based security surveillance system for general indoor/outdoor environments
Over a decade ago, simply recording a few minutes of CCTV footage required special hardware. Today, with the emergence of new sensors and improved processing hardware, a relatively inexpensive personal computer can process and store video in real-time, ...
Maintaining customer profiles in an e-commerce environment
Recent studies have indicated an increase in customer profiling techniques used by e-commerce businesses. E-commerce businesses are creating, maintaining and utilising customer profiles to assist in personalisation. Personalisation can help improve ...
A lightweight web interface to grid scheduling systems
Grid computing is often out of reach for the very scientists who need these resources because of the complexity of popular middleware suites. Some effort has gone into abstracting away these complexities using graphical user interfaces, some of which ...
An analysis of representations for hyper-heuristics for the uncapacitated examination timetabling problem in a genetic programming system
Earlier research into the examination timetabling problem focused on applying different methodologies to generate solutions to the problem. More recently research has been directed at developing hyper-heuristic systems for timetable construction. Hyper-...
An application of genetic algorithms to the school timetabling problem
There has been a large amount of research into the automatic generation of school timetables. Methodologies such as constraint programming, simulated annealing, Tabu search and genetic algorithms have been applied to the school timetabling problem. ...
Models towards a hybrid conversational agent for contact centres
The usability of touch-tone Interactive Voice Response (IVR) systems is dismal. Clients would rather speak to a contact centre agent than navigate through the menu structure found in these systems. Contact centres, due to a variety of reasons, most ...
Predicting technology acceptance and adoption by the elderly: a qualitative study
Technology adoption has been studied from a variety of perspectives. Information systems, Sociology and Human-Computer Interaction researchers have come up with various models incorporating factors and phases to predict adoption that, in turn, will lead ...
Investigating the viability of scroll-wheel interfaced mobile phones for text entry
Increasingly mobile device applications are requiring users to perform text-intensive tasks, such as text messaging, thus creating a demand for more efficient and easier text entry methods. The current diversity of mobile phones come with an equally ...
Automatic marking with Sakai
Large student numbers often drive teaching staff to consider greater degrees of automation of assessment activities. In introductory Computer Science classes - where submitted programs need to repeatedly be compiled, executed and tested -automation is ...
Development and implementation of an institutional repository within a science, engineering and technology (SET) environment
Parallel to the Open Source Software movement, there is an increased demand and need for free, open access to information resources. The Open Access initiative is characterized by two strategies: namely the promotion of self-archiving or, alternatively, ...
e-Government: living up to the challenge of culture context
e-Government is a global technology transfer taking designs from one context into a different context. This paper finds that the context of design inscribed into e-Government systems in both explicit and implicit ways can produce a mismatch with the ...
Using adaptive interfaces to improve mobile map-based visualisation
Visualising map-based data on mobile devices presents many challenges. Small displays, comparatively slow hardware and awkward interaction techniques all combine to make mobile map-based visualisations difficult to design and often frustrating to use. ...
Cited By
-
Ezziane Z Information Technology Literacy: Learning and Teaching, SSRN Electronic Journal, 10.2139/ssrn.893541
-
Tran K and Nguyen T (2021). Preliminary Research on the Social Attitudes toward AI’s Involvement in Christian Education in Vietnam: Promoting AI Technology for Religious Education, Religions, 10.3390/rel12030208, 12:3, (208)
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
SAICSIT '17 | 108 | 39 | 36% |
SAICSIT '15 | 119 | 43 | 36% |
SAICSIT '13 | 89 | 48 | 54% |
SAICSIT '06 | 61 | 29 | 48% |
SAICSIT '05 | 62 | 28 | 45% |
Overall | 439 | 187 | 43% |