skip to main content
10.1145/1456659acmotherconferencesBook PagePublication PageshtConference Proceedingsconference-collections
SAICSIT '08: Proceedings of the 2008 annual research conference of the South African Institute of Computer Scientists and Information Technologists on IT research in developing countries: riding the wave of technology
ACM2008 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
SAICSIT '08: 2008 Annual Conference of the South African Institute of Computer Scientists and Information Technologists Wilderness South Africa October 6 - 8, 2008
ISBN:
978-1-60558-286-3
Published:
06 October 2008
Sponsors:
Microsoft
Next Conference
September 10 - 13, 2024
Poznan , Poland
Bibliometrics
Skip Abstract Section
Abstract

The South African Institute of Computer Scientists and Information technologists (SAICSIT) has, over a number of years, developed into a highly acclaimed and respected forum for exchanging and sharing knowledge. The annual SAICSIT conference has steadily gained recognition not only in South Africa, but also internationally. Significantly more international researchers are submitting contributions to the conference and a substantial proportion of the programme committee is from the international research community.

At this year's conference, much like previous years, we have strived to provide an opportunity for academics in Computer Science, Information Systems and Information Technology to review, present and discuss research in their respective fields. We have also maintained the international participation in the conference, specifically as far as the programme committee is concerned. Out of a total of 69 reviewers, 45% of them were from the international research community. We would like to thank our international reviewers for their much valued contribution. We trust that the Programme Committee will remain involved in the conference and will advertise the work and opportunities provided by the SAICSIT conference in their fields of influence.

This year's conference once again comprises of two sections: a main conference of which this is the proceedings, as well as a post-graduate Research Symposium aimed at supporting and developing young researchers from a capacity building perspective. A total of 22 submissions of work-in-progress or proposal reports was accepted for presentation at the Research Symposium.

The main conference received 80 submissions of which 33 were accepted for presentation at the conference, resulting in a 41% acceptance rate. All papers were subjected to a single blind peer-review process (identities of reviewers were not revealed to the submitting authors) with each paper receiving a minimum of three reviews from the international programme committee. We have no doubt that the process yielded papers of high quality and would like to thank the reviewers for their efforts in this regards.

research-article
Towards a taxonomy of network scanning techniques

Network scanning is a common reconnaissance activity in network intrusion. Despite this, it's classification remains vague and detection systems in current Network Intrusion Detection Systems are incapable of detecting many forms of scanning traffic.

...

research-article
Investigating the impact of the external environment on strategic information systems planning: a qualitative inquiry

Strategic information systems planning (SISP) is a key issue to IS managers. The SISP approach employed by organizations is very much dependent on the internal and external environment. Recent research points to a gap between the manner in which IS ...

research-article
Contemplating systematic software reuse in a project-centric company

Systematic software reuse is still the most promising strategy for increasing productivity and improving quality in the software industry. Although it is simple in concept, successful software reuse implementation is difficult in practice. A reason put ...

research-article
The relationship between emergence of the shortest path and information value using ant-like agents

Ant-like agents forage between two points. These agents' probabilistic movements are based on the use of two pheromones; one marking trails towards the goal and another marking trails back to the starting point. Path selection decisions are influenced ...

research-article
Utilising the living labs approach in the design of a digital platform for SINGA

Vulnerable children in Africa fail to access basic social services and people they need to advance in life because they are not empowered enough to do so and have little information to their benefit. This paper describes the development of SINGA which ...

research-article
Incorporating layout managers into an evolutionary programming algorithm to design graphical user interfaces

Designing graphical user interfaces (GUIs) is an arduous task that requires both functional and aesthetic considerations, often relying on documented style guides and design principles. Style guides and principles are mostly prescriptive in terms of ...

research-article
Agile systems development and stakeholder satisfaction: a South African empirical study

The high rate of systems development (SD) failure is often attributed to the complexity of traditional SD methodologies (e.g. Waterfall) and their inability to cope with changes brought about by today's dynamic and evolving business environment. Agile ...

research-article
Guidelines for secure software development

It is within highly integrated technology environments that information security is becoming a focal point for designing, developing and deploying software applications. Ensuring a high level of trust in the security and quality of these applications is ...

research-article
Designing technology for young children: what we can learn from theories of cognitive development

The majority of guidelines and principles for design of technology are aimed at products for adults. The limited guidelines available for design of young children's technology do not focus sufficiently on age-related requirements or they offer high-...

research-article
Usability evaluation of the South African National Accessibility Portal interactive voice response system

One of the most prominent problems that persons with disabilities face in South Africa, is access to relevant disability related information. To address this need the South African National Accessibility Portal (NAP Portal) was developed, that enable ...

research-article
Do online buying behaviour and attitudes to web personalization vary by age group?

A study of 821 South African Internet users was undertaken to assess attitudes towards the personalization of online content, concerns about privacy, and willingness to provide explicit personal information and to allow implicit gathering of web usage ...

research-article
Scientific computing using virtual high-performance computing: a case study using the Amazon elastic computing cloud

High-performance computing systems are important in scientific computing. Clusters of computer systems --- which range greatly in size --- are a common architecture for high-performance computing. Small, dedicated clusters are affordable and cost-...

research-article
Using mobile preference-based searching to improve tourism decision support

Powerful mobile computing devices such as smartphones and PDAs are becoming more numerous and affordable. These mobile devices are ideal for tourists needing to search for suitable points-of-interest (POIs) such as restaurants or accommodation. This ...

research-article
Planning as model checking: the performance of ProB vs NuSMV

In this paper we investigate the feasibility of using two different model-checking techniques for solving a number of classical AI planning problems. The ProB model checker, based on mathematical set theory and first-order logic, is specifically ...

research-article
A model for eliciting user requirements specific to South African rural areas

Dwesa is a rural town situated in South Africa's Eastern Cape Province. Its residents are plagued with the challenges of poverty, poor access to public services, unemployment and low levels of literacy. A project is currently underway in Dwesa to ...

research-article
Java Micro Edition and Adobe Flash Lite for arcade-style mobile phone game development: a comparative study

The pervasiveness of mobile devices has created a substantial market for mobile applications and games that continues to grow extremely rapidly. Consequently, the mobile game industry has firmly asserted itself as a significant industry with major ...

research-article
Investigating the use of "Grounded Theory" in information systems research

"Grounded Theory" has been employed quite widely in studies of information systems (IS) phenomena. A survey of IS literature reveals conflict in the understanding and use of "grounded theory". The term "grounded theory" is often used as a catch phrase ...

research-article
An investigation into the implementation of open source software within the SA government: an emerging expansion model

Open source software (OSS) is increasingly becoming an alternative for proprietary software (PS), particularly in the government sector globally. The adoption and implementation of OSS by the government sector is cited as one of the enablers for the ...

research-article
A model of an intelligent video-based security surveillance system for general indoor/outdoor environments

Over a decade ago, simply recording a few minutes of CCTV footage required special hardware. Today, with the emergence of new sensors and improved processing hardware, a relatively inexpensive personal computer can process and store video in real-time, ...

research-article
Maintaining customer profiles in an e-commerce environment

Recent studies have indicated an increase in customer profiling techniques used by e-commerce businesses. E-commerce businesses are creating, maintaining and utilising customer profiles to assist in personalisation. Personalisation can help improve ...

research-article
A lightweight web interface to grid scheduling systems

Grid computing is often out of reach for the very scientists who need these resources because of the complexity of popular middleware suites. Some effort has gone into abstracting away these complexities using graphical user interfaces, some of which ...

research-article
An analysis of representations for hyper-heuristics for the uncapacitated examination timetabling problem in a genetic programming system

Earlier research into the examination timetabling problem focused on applying different methodologies to generate solutions to the problem. More recently research has been directed at developing hyper-heuristic systems for timetable construction. Hyper-...

research-article
An application of genetic algorithms to the school timetabling problem

There has been a large amount of research into the automatic generation of school timetables. Methodologies such as constraint programming, simulated annealing, Tabu search and genetic algorithms have been applied to the school timetabling problem. ...

research-article
Models towards a hybrid conversational agent for contact centres

The usability of touch-tone Interactive Voice Response (IVR) systems is dismal. Clients would rather speak to a contact centre agent than navigate through the menu structure found in these systems. Contact centres, due to a variety of reasons, most ...

research-article
Predicting technology acceptance and adoption by the elderly: a qualitative study

Technology adoption has been studied from a variety of perspectives. Information systems, Sociology and Human-Computer Interaction researchers have come up with various models incorporating factors and phases to predict adoption that, in turn, will lead ...

research-article
Investigating the viability of scroll-wheel interfaced mobile phones for text entry

Increasingly mobile device applications are requiring users to perform text-intensive tasks, such as text messaging, thus creating a demand for more efficient and easier text entry methods. The current diversity of mobile phones come with an equally ...

research-article
Automatic marking with Sakai

Large student numbers often drive teaching staff to consider greater degrees of automation of assessment activities. In introductory Computer Science classes - where submitted programs need to repeatedly be compiled, executed and tested -automation is ...

research-article
Development and implementation of an institutional repository within a science, engineering and technology (SET) environment

Parallel to the Open Source Software movement, there is an increased demand and need for free, open access to information resources. The Open Access initiative is characterized by two strategies: namely the promotion of self-archiving or, alternatively, ...

research-article
e-Government: living up to the challenge of culture context

e-Government is a global technology transfer taking designs from one context into a different context. This paper finds that the context of design inscribed into e-Government systems in both explicit and implicit ways can produce a mismatch with the ...

research-article
Using adaptive interfaces to improve mobile map-based visualisation

Visualising map-based data on mobile devices presents many challenges. Small displays, comparatively slow hardware and awkward interaction techniques all combine to make mobile map-based visualisations difficult to design and often frustrating to use. ...

Contributors
  • Nelson Mandela University
  • Nelson Mandela University

Recommendations

Acceptance Rates

Overall Acceptance Rate187of439submissions,43%
YearSubmittedAcceptedRate
SAICSIT '171083936%
SAICSIT '151194336%
SAICSIT '13894854%
SAICSIT '06612948%
SAICSIT '05622845%
Overall43918743%