South African Computer Journal - latest Issue
Volumes & issues
Volume 28, Issue 2, 2016
Author Philip MachanickSource: South African Computer Journal 28, pp vii –viii (2016) http://dx.doi.org/https://doi.org/10.18489/sacj.v28i2.441More Less
Source: South African Computer Journal 28, pp 1 –24 (2016) http://dx.doi.org/https://doi.org/10.18489/sacj.v28i2.374More Less
Mobile devices such as smartphones have until now been protected by traditional authentication methods, including passwords or pattern locks. These authentication mechanisms are difficult to remember and are often disabled, leaving the device vulnerable if stolen. This paper investigates the possibility of unobtrusive, continuous authentication for smartphones based on biometric data collected using a touchscreen. The possibility of authenticating users on a smartphone was evaluated by conducting an experiment simulating real-world touch interaction. Touch data was collected from 30 participants during normal phone use. The touch features were analysed in terms of the information provided for authentication. It was found that features such as finger pressure, location of touch interaction and shape of the finger were important discriminators for authentication. The touch data was also analysed using two classification algorithms to measure the authentication accuracy. The results show that touch data is sufficiently distinct between users to be used in authentication without disrupting normal touch interaction. It is also shown that the raw touch data was more effective in authentication than the aggregated gesture data.
Author Keshnee PadayacheeSource: South African Computer Journal 28, pp 25 –45 (2016) http://dx.doi.org/https://doi.org/10.18489/sacj.v28i2.376More Less
This article reviews the challenges of, and issues associated with conducting internet-mediated research. The article explores the use of online platforms and in particular social media platforms for research purposes. Additionally the methodological considerations are demonstrated with examples from the author's praxis. The review involves examining two case studies based on the design science methodology and on the Delphi technique. This paper reports on the performance of these methods under the internet-mediated research paradigm and specifically considers the challenge of low response rates. Consequently the primary aim is of this article is to report the demographics determinants of experts who participate in internet-mediated studies to identify possible links to response rates and attrition rates. Exploring the relationship between response rates and the demographical data of experts is consequential as this may impact the validity of internet-mediated research.
Author Martin OlivierSource: South African Computer Journal 28, pp 46 –49 (2016) http://dx.doi.org/https://doi.org/10.18489/sacj.v28i2.442More Less
Most members of the public probably had a rather vague notion of forensic science until various TV shows - starting with CSI - carried an image of a forensic utopia into our living rooms on a weekly basis. In general we were impressed - to the extent that jurisdictions where juries are used had to deal with the so-called new CSI-effect: Juries wanted the detailed and authoritative evidence they got used to in their favourite shows in order to make what should have been simple decisions during their deliberations. Unfortunately, the reality did not match these expectations. While many reports suggested that much of the forensic science on these shows was in principle realistic (apart from the speed at which test results became available) the computer scientists (and some technically inclined computer users) amongst us were usually not impressed when digital evidence needed to be recovered. The ability to type a command or two to trace the exact physical location from which some message was received was often beyond what we could accept as sciencefiction.
Author Stefan GrunerSource: South African Computer Journal 28, pp 60 –62 (2016) http://dx.doi.org/https://doi.org/10.18489/sacj.v28i2.424More Less
Dear editor of SACJ, dear academic colleagues!
Over forty-five years, Southern African computing lecturers have been holding annual meetings to discuss matters and issues in the context of lecturing computing (computer science, informatics, information technology) in tertiary education. The SACLA series has thus one of the most longstanding conferencing traditions in our discipline worldwide, though the series was internationally not widely known in its earlier years. During the course of its history the SACLA series evolved from initially very informal gatherings to increasingly formalised and peer-reviewed conferences, though still with a rather regional Southern African character until today.