AJIC Issue 24, 2019

Permanent URI for this collection


Recent Submissions

Now showing 1 - 5 of 5
  • Item
    Assessing the Social Media Maturity of a Community Radio Station: The Case of Rhodes Music Radio in South Africa
    (LINK Centre, University of the Witwatersrand (Wits), Johannesburg, 2019-12-06) Gavaza, Mudiwa A.; Pearse, Noel J.
    Social media has become a major factor within the operations and functions of radio stations. This study used a social media maturity model (SMMM), developed from available literature, to assess the social media maturity of a South Africa community radio station, Rhodes Music Radio (RMR). The study found that RMR had a level 3 rating on a 5-level maturity scale, indicating that it was quite, but not yet fully, mature in its social media use. In addition to outlining the research and its findings, this article makes recommendations for how the station could increase the maturity of its social media use.
  • Item
    Intelligent Malware Detection Using a Neural Network Ensemble Based on a Hybrid Search Mechanism
    (LINK Centre, University of the Witwatersrand (Wits), Johannesburg, 2019-12-06) Akandwanaho, Stephen M.; Kooblal, Muni
    Malware threats have become increasingly dynamic and complex, and, accordingly, artificial intelligence techniques have become the focal point for cybersecurity, as they are viewed as being more suited to tackling modern malware incidents. Specifically, neural networks, with their strong generalisation performance capability, are able to address a wide range of cyber threats. This article outlines the development and testing of a neural network ensemble approach to malware detection, based on a hybrid search mechanism. In this mechanism, the optimising of individual networks is done by an adaptive memetic algorithm with tabu search, which is also used to improve hidden neurons and weights of neural networks. The adaptive memetic algorithm combines global and local search optimisation techniques in order to overcome premature convergence and obtain an optimal search outcome. The results from the testing prove that the proposed method is strongly adaptive and efficient in its detection of a range of malware threats, and that it generates better results than other existing methods.
  • Item
    Realities of Microenterprises’ ICT Use for Business Activities and for Acquiring Online Government Support: A Study in Western Cape Province, South Africa
    (2019-12-06) Osman, Muhammad Ameer; Malanga, Donald Flywell; Chigona, Wallace
    This article provides findings from a study, in South Africa’s Western Cape Province, of microenterprises’ experiences and perceptions of use of information and communication technologies (ICTs) for general business activities and for acquiring online government business support information. Using the capability approach (CA) theoretical framework, the study analysed data from interviews with microenterprise owners and digital government experts. The study found that the microenterprises were adept in their use of ICTs in their businesses, but that they encountered problems in using online government business support information services. These problems were found to be the result of deficiencies in the online services’ content, structure, design, navigation, mobile-friendliness, language usage and bureaucratic requirements.
  • Item
    Digital Transformation in South Africa’s Short-Term Insurance Sector: Traditional Insurers’ Responses to the Internet of Things (IoT) and Insurtech
    (2019-12-06) Moodley, Andrew
    This article explores the impact of the internet of things (IoT) and insurtech on South Africa’s short-term insurance industry. The research found, based on interviews with high-level players in or connected to the South African industry, that while IoT and insurtech are significant potential drivers, the country’s incumbent insurers have to date been slow to adopt these digital transformation elements in their business models. This article outlines the drivers of IoT and insurtech, the factors influencing the slow adoption of these elements by traditional South African insurers, and recommendations for the adoption of these elements by South African insurers.
  • Item
    Best Practices for Establishment of a National Information Security Incident Management Capability (ISIMC)
    (2019-12-06) Pretorius, Morné; Ngejane, Hombakazi
    The South African Government’s National Cybersecurity Policy Framework (NCPF) of 2012 provides for the establishment of a national computer security incident response team (CSIRT) in the form of the National Cybersecurity Hub—more correctly referred to as an information security incident management capability (ISIMC). Among other things, the National Cybersecurity Hub is mandated to serve as a high-level national ISIMC that works in collaboration with sector ISIMCs to improve South Africa’s critical infrastructure security. In this article, we identify standards, policies, procedures and best practices regarding the establishment of ISIMCs, and we provide recommendations for South Africa’s deployment of an ISIMC collaboration network.
All articles are licensed under a Creative Commons Attribution 4.0 International (CC BY 4.0) licence: https://creativecommons.org/licenses/by/4.0.