Software Development
Permanent URI for this collection
Browse
Browsing Software Development by Title
Now showing 1 - 13 of 13
Results Per Page
Sort Options
Item Are the financial transactions conducted inside virtual environments truly anonymous? An experimental research from an Australian perspective.(Emerald, 2012) Irwin, Angela S. M.; Slay, Jill; Choo, Raymond K.-K.; Liu, LinThis paper examines the identity and payment method verification procedures implemented by a number of popular massively multiplayer online games (MMOGs) and online financial service providers (OFSPs) to determine if the systems they currently have in place are sufficient to uncover the identities of those who may wish to use such environments to conduct money laundering or terrorism financing activity. The paper also investigates whether the payment instruments or methods used by account holders to place funds into their account(s) hinder or assist investigators to expose the real-world identity of the account holder. The paper then discusses whether it is feasible and/or desirable to introduce know your customer (KYC) and customer due diligence (CDD) legislation into virtual environments and illustrates an effective KYC approach which may assist MMOGs and OFSPs to correctly identify their account holders, should legislation be put in place.Item An attempt to merge local and technological paradigms in the digital representation of indigenous knowledge.(IKTC, 2011) Kapuire, Gereon Koch; Blake, EdwinCurrent technology trends and developments have hardly been informed by African indigenous and rural knowledge systems. Thus either substantial modifications are necessary in adapting technology to the requirements of indigenous knowledge systems or those systems are inadequately represented through technologies. This paper explores different options of organising video recorded indigenous knowledge in the pursuit of maintaining local communication patterns and practices. The evolutionary design of our indigenous knowledge management system is informed by a series of interactions and prototype evaluations with a pilot community in Eastern Namibia.Item Designing multimodal biometrics framework for the Namibian government.(Namibia University of Science and Technology, 2015-12) Erastus, Licky RichardAs technology evolves, the once reliable traditional authentication and verification systems are now open to a number of security threats, some of which may not be combated by these old or traditional security measures. For instance, Personal Identification (PIN) Numbers and passwords that are normally used to authenticate system users are vulnerable to shoulder surfing and systematic trial-and-error attacks. Cases have since been reported in Namibia in which people have lost personal belongings worth thousands of dollars as a result of information security breaches. In response to these security breaches, different technologies have been proposed with the aim to authenticate users, verify and or detect any possible fraud activities. Among these are firewalls, encryption and biometrics. Biometrics offer reliable identification mechanisms compared to other technologies due to their uniqueness and difficulty to be emulated. Regardless of the tremendous advances in biometric technology, the recognition systems based on the measurement of single modality (mono-modal) cannot guarantee 100% accuracy. Accordingly, multimodal systems based on multiple uncorrelated biometric signatures or traits offer more robustness in terms of recognition accuracy and handling of poor quality biometric samples. The research used a qualitative research approach. For data collection, questionnaires, interviews, observations and document analysis were employed. A multiple case study strategy was used for data collection to ensure validity through data triangulation. Three Namibia ministries were selected as case sites as they are among the security critical sectors of the nation where the use of biometrics is imperative. Results have shown that a number of biometrics is used in government departments in Namibia. However, the usage is still a bit low and a lot is required for citizens to trust and use biometrics. The major challenges in biometrics usage have been identified as a lack of technical skills, a lack of appropriate budget, too dynamic, social challenges and a lack of supporting policies. This study argues that even if these challenges are addressed, one biometric may not be reliable and very secure. The purpose of this research is to share possible biometrics that can be combined and used concurrently to address the identified security challenges. This saw the designing of a multimodal biometrics framework for the Namibian government.Item Development of InfoVis software for digital forensics.(IEEE, 2012) Osborne, Grant; Turnbull, Benjamin; Slay, JillInformation Visualisation techniques are one method that may be used to combat the growing complexity and data sizes associated with digital forensic investigations. This work outlines the processes, challenges, trials and tribulations of developing proof-of-concept forensic software designed to create interactive Information Visualisations from digital evidence sources.Item Digital forensics in the Cloud: Research perspectives. Paper presented at the ISC Secure Johannesburg Conference, November 15, 2012.(2012) Slay, JillI am a researcher in forensic computing carrying out research aimed to develop a sound theoretical and scientific foundation for the discipline, based on principles broadly gained from software engineering.Item Digital Forensics Institute in Malaysia: The way forward(Pario Communications Limited, 2012) Arrifin, A.; Jazri, H.; Slay, Jill; Lee, I.This paper analyzes cybercrimes, cyber related crimes and problems encountered in Malaysia. Mitigation efforts are discussed such as digital forensics research and procedures including progress. Comparison is made with Japan and to move forward, a Digital Forensics Institute in Malaysia (DFIM) is proposed.Item An integrated tool-support for small team meetings in organisations.(IJCA, 2012) Dhenesh, Virallikattur S.; Sitnikova, Elena; Slay, JillTeams collaborate in different contexts within organisations to share information with its members in achieving their targets. Collaborations with face-to-face meetings are prevalent despite the emergence of numerous tools to support distributed team collaborations. However, the nature of tool-support for team collaborations in the last decade was focused on supporting distributed and web-mediated meetings. Furthermore the tools were either not designed to support all the processes within team collaboration or not readily adopted by users. Literature on developing an integrated tool-support that includes all the potential processes within a meeting, and learning lessons whilst designing tools to improve the state of their adoption is largely unexplored. This paper reports on a qualitative study that observed twenty team meetings from five organisations in South Australia and analysed the data using a grounded theory approach to generate stories on team activities. The stories were used to develop a tool-kit framework and lessons on providing a tool support for team meetings. The proposed framework consists of a list of potential hardware and software tools that could be introduced within a team meeting to support the team activities.Lessons were learned on the potential processes that would require tool support, participants’ requirements and how technology could be introduced to provide assistance in team meetings.The results from the study in comparisons with an earlier study on simulated meetings identified that it is possible to provide an integrated tool-support for team meetings whilst the framework is grounded on the activities within them. Given, the results were based only on passive observations of team meetings, the framework and lessons will be used as a foundationfor a follow-up study in generating conceptsto initiate focus group discussions with team members. Thus, the framework and the lessons be refined and are aimed to provide more insights for system designers in developing an integrated tool-support for team meetings.Item Lessons towards developing an integrated tool-support for small team meetings.(MECS Publisher, 2012) Dhenesh, Virallikattur S.; Sitnikova, Elena; Slay, JillTeams within organisations meet regularly to review their progress and engage in collaborative activities within a team setting. However, the uptake of tools to support their activities within team meetings is limited. Research efforts on understanding the reasons for low rates of tool adoption and learning lessons in developing tools that could be readily adopted by team members within team meetings are largely unexplored. This qualitative study focuses on learning lessons towards developing an integrated tool-support for small team meetings within organisations using focus groups. Discussions were based on a tool-kit framework generated by observing their team meetings in an earlier study. The discussions were recorded and the transcripts were analysed using grounded theory approach to generate stories on team processes and potential tools that could assist team members during each process. The lessons derived from the study were based on three aspects of tool-support namely the potential users of the proposed tool-kit, processes within the team meetings that would be influenced by the introduction of the tool-kit and the technological aspects of the tool-kit.Item A markup language for narrative knowledge annotation, mining and management.(IKTC, 2011) Fendler, JensNarrative knowledge as the name implies, is not naturally bound to any media other than speech. In order to preserve such knowledge and to make it accessible through computer systems: a formal and standardized basis needs to be identified, and to be integrated with other informal sources.Item Towards appropriate user interface design preserving rural African communication practices.(IKTC, 2011) Chivuno-Kuria, ShilumbePoster presentation: The aim of this research project is to determine current communication structures and discourse practices of listeners in a selected rural community.Item A User Awareness Model for averting Computer Threats(2014) Shava, Fungai Bhunu; Gamundani, Attlee M.One of the major reasons why systems are susceptible to threats in many ways or the other is the lack of the know-how and a follow up system for the education rendered to users, who in most cases are the weakest point for any perpetrated system attacks. Security awareness should be viewed as a gyratory exercise, as the attackers of systems never cease to explore on better and easier ways to penetrate organisational systems. This paper presents a user awareness model based on a case study done in one of the corporate environments in Namibia. The proposed model is a product of the different key facets that are perceived to be detrimental to system security in any average organisational setup. One of the major contributions of the User Awareness Model (UAM) is a systematic and procedural assessment tool of the user practice towards computer systems security, which can be applied to any organisational environment with the flexible option to vary the combination of security needs variables.Item Voice Over IP and forensics: A review of recent Australian work. Paper presented at the 1st International Conference on Digital Forensics and Investigation (ICDFI), September 21-23, 2012, Beijing, China.(2012) Slay, Jill; Simon, Matthew; Irwin, DavidThe popularity of Voice over the Internet Protocol (VoIP) for providing voice communication over IP networks such as the Internet has resulted in VoIP becoming a global telephony service. VoIP applications convert analogue voice signals into a digital format, which is then encapsulated into IP packets for transmission over the Internet. Our research has examined both the security and privacy implications of widespread adoption of VoIP for personal and business telecommunications and also the use of VoIP calls by criminals, as many implementations of VoIP may also use strong encryption to secure both the voice payload as well as to control messages. We have also considered the implication of recovering electronic evidence and information from VoIP since conventional methods of eavesdropping and wire-tapping do not apply to VoIP calls. This paper provides an overview of the development of investigative processes and forensic tools to enable law enforcement to engage the digital forensic process in a VoIP environmentItem VoIP system using open source software component in tertiary institutions: The case of the University of Namibia.(NUST of Namibia, Department of Communication., 2007) Mwansa, GardnerGovernments and their agencies are often challenged by high cost and flexible telephonic, Web based data services. Emerging technologies, such as those of Voice over Internet Protocol (VoIP) that allow convergent systems where voice and Web technologies can utilise the same network to provide both services, can be used to improve such services. The contribution of this paper is the outcome of a study from examining how, Asterisk, an open source VoIP software can be deployed to serve the needs of an educational institution. The educational institution in this case is the University of Namibia which is currently using a conventional PABX system for voice and fax communication services, as well as the local area network connected to Internet for Web and data services. Interesting findings include that the University of Namibia has a potential to implement the project. Since the software recommended for installation is open source, the project could be used as a source of valuable information by students who specialize in real-time multi-media systems in Southern African tertiary institutions at large.