Scielo RSS <![CDATA[The African Journal of Information and Communication]]> vol. 24 num. lang. en <![CDATA[SciELO Logo]]> <![CDATA[<b>Assessing the Social Media Maturity of a Community Radio Station: The Case of Rhodes Music Radio in South Africa</b>]]> Social media has become a major factor within the operations and functions of radio stations. This study used a social media maturity model (SMMM), developed from available literature, to assess the social media maturity of a South Africa community radio station, Rhodes Music Radio (RMR). The study found that RMR had a level 3 rating on a 5-level maturity scale, indicating that it was quite, but not yet fully, mature in its social media use. In addition to outlining the research and its findings, this article makes recommendations for how the station could increase the maturity of its social media use. <![CDATA[<b>Teachers' ICT Adoption in South African Rural Schools: A Study of Technology Readiness and Implications for the South Africa Connect Broadband Policy</b>]]> The South Africa Connect national broadband policy of 2013 aims to ensure that the country achieves universal internet access by 2030, thereby fostering digital skills development. This study investigates one dimension of the South Africa Connect policy objectives, by considering rural teachers' adoption of information and communication technologies (ICTs) for teaching and learning at 24 schools. This research used baseline data from the Information and Communication Technology for Education (ICT4E) project undertaken in rural schools in seven South African provinces. The technology readiness index (TRI) was used as the theoretical lens. We found that the vast majority of the teachers surveyed were optimistic about the use of ICTs for teaching and learning, which suggests teachers' readiness to use ICTs despite the existing financial, technical and digital skills challenges at their schools. We also found that the majority of the schools had policies prohibiting student use of personal digital devices, apart from calculators, on school premises. In our analysis, these policies potentially conflict with the objectives of South Africa Connect. This study contributes to theory and practice by offering empirical evidence of the usefulness of the TRI for presenting teachers' readiness to adopt ICTs in situations of conflicting forces. The study also has the potential to contribute to policy deliberations by highlighting the possible disconnect between the schools' bans on student personal digital devices and the objectives and targets set by the South Africa Connect policy. <![CDATA[<b>Realities of Microenterprises' ICT Use for Business Activities and for Acquiring Online Government Support: A Study in Western Cape Province, South Africa</b>]]> This article provides findings from a study, in South Africa's Western Cape Province, of microenterprises' experiences and perceptions of use of information and communication technologies (ICTs) for general business activities and for acquiring online government business support information. Using the capability approach (CA) theoretical framework, the study analysed data from interviews with microenterprise owners and digital government experts. The study found that the microenterprises were adept in their use of ICTs in their businesses, but that they encountered problems in using online government business support information services. These problems were found to be the result of deficiencies in the online services' content, structure, design, navigation, mobile-friendliness, language usage and bureaucratic requirements. <![CDATA[<b>Digital Transformation in South Africa's Short-Term Insurance Sector: Traditional Insurers' Responses to the Internet of Things (IoT) and Insurtech</b>]]> This article explores the impact of the internet of things (IoT) and insurtech on South Africa's short-term insurance industry. The research found, based on interviews with high-level players in or connected to the South African industry, that while IoT and insurtech are significant potential drivers, the country's incumbent insurers have to date been slow to adopt these digital transformation elements in their business models. This article outlines the drivers of IoT and insurtech, the factors influencing the slow adoption of these elements by traditional South African insurers, and recommendations for the adoption of these elements by South African insurers. <![CDATA[<b>Intelligent Malware Detection Using a Neural Network Ensemble Based on a Hybrid Search Mechanism</b>]]> Malware threats have become increasingly dynamic and complex, and, accordingly, artificial intelligence techniques have become the focal point for cybersecurity, as they are viewed as being more suited to tackling modern malware incidents. Specifically, neural networks, with their strong generalisation performance capability, are able to address a wide range of cyber threats. This article outlines the development and testing of a neural network ensemble approach to malware detection, based on a hybrid search mechanism. In this mechanism, the optimising of individual networks is done by an adaptive memetic algorithm with tabu search, which is also used to improve hidden neurons and weights of neural networks. The adaptive memetic algorithm combines global and local search optimisation techniques in order to overcome premature convergence and obtain an optimal search outcome. The results from the testing prove that the proposed method is strongly adaptive and efficient in its detection of a range of malware threats, and that it generates better results than other existing methods. <![CDATA[<b>Best Practices for Establishment of a National Information Security Incident Management Capability (ISIMC)</b>]]> The South African Government's National Cybersecurity Policy Framework (NCPF) of 2012 provides for the establishment of a national computer security incident response team (CSIRT) in the form of the National Cybersecurity Hub- more correctly referred to as an information security incident management capability (ISIMC). Among other things, the National Cybersecurity Hub is mandated to serve as a high-level national ISIMC that works in collaboration with sector ISIMCs to improve South Africa's critical infrastructure security. In this article, we identify standards, policies, procedures and best practices regarding the establishment of ISIMCs, and we provide recommendations for South Africa's deployment of an ISIMC collaboration network.