Scielo RSS <![CDATA[South African Computer Journal]]> vol. 32 num. 1 lang. es <![CDATA[SciELO Logo]]> <![CDATA[<b>An OpenCL-based parallel acceleration of a Sobel edge detection algorithm Using Intel FPGA technology</b>]]> This paper examines the feasibility of using commercial out-of-the-box reconfigurable field programmable gate array (FPGA) technology and the open computing language (OpenCL) framework to create an efficient Sobel edge-detection implementation, which is considered a fundamental aspect of image and video processing. This implementation enhances speedup and energy consumption attributes when compared to general single-core processors. We created the proposed approach at a high level of abstraction and executed it on a high commodity Intel FPGA platform (an Intel De5-net device was used). This approach was designed in a manner that allows the high-level compiler/synthesis tool to manipulate a task-parallelism model. The most promising FPGA and conventional implementations were compared to their single-core CPU software equivalents. For these comparisons, local-memory, pipelining, loop unrolling, vectorization, internal channel mechanisms, and memory coalescing were manipulated to provide a much more effective hardware design. The run-time and power consumption attributes were estimated for each implementation, resulting in up to 37-fold improvement of the execution/transfer time and up to a 53-fold improvement in energy consumption when compared to a specific single-core CPU-based implementation.CATEGORIES: • Hardware ~ Reconfigurable logic applications <![CDATA[<b>Perceptions of cyber bullying at primary and secondary school level amongst student teachers in the Eastern Cape province of South Africa</b>]]> Cyber bullying has become a topical issue in South Africa. However, there is very little guidance or training for teachers on how to deal with cyber bullying in the classroom. This study investigated the perceptions of cyber bullying amongst student teachers in the Eastern Cape. The study made use of a quantitative survey approach to collect data from 150 student teachers at a university in the Eastern Cape. The student teachers were representative of all three school phases. The results indicated that almost half of the student teachers had been victims of cyber bullying. Overall, cyber bullying was considered a serious issue for the student teachers but awareness of the prevalence of the issue decreased outside the classroom. The topic has not been incorporated into policy or the school curriculum in South Africa. The study recommends that the Department of Basic Education must provide a standardised policy and curriculum that schools can use to implement and enforce cyber safety behaviour in the schools.CATEGORIES: • Social and professional topics ~ Human and societal aspects of security and privacy • Social and professional topics ~ Informal education • Social and professional topics ~ Computing literacy <![CDATA[<b>Waterfall and Agile information system project success rates-A South African perspective</b>]]> Even though software projects do add value to the organisation, studies reveal that some software projects are still failing at an alarming rate and do not always provide the anticipated value to the organisation. This has been the case for the last couple of decades. Software projects use predominantly Waterfall as a methodology. This raises the question whether new ways of working can be introduced to improve the success rate. One such new way is Agile as an approach to developing software. A survey was done to determine whether Agile projects are more successful than Waterfall projects, thus contrasting the old and the new ways of working. Some 617 software projects were evaluated to determine the success rate based on the methodology used. Success was measured on a continuum of five levels and not just the triple constraint. The results imply that Agile projects are more successful than Waterfall projects to some extent, but that there are still concerns that need to be addressed.CATEGORIES: • Software and its engineering ~ Agile software development <![CDATA[<b>A survey of automated financial statement fraud detection with relevance to the South African context</b>]]> Financial statement fraud has been on the increase in the past two decades and includes prominent scandals such as Enron, WorldCom and more recently in South Africa, Steinhoff. These scandals have led to billions of dollars being lost in the form of market capitalisation from different stock exchanges across the world. During this time, there has been an increase in the literature on applying automated methods to detecting financial statement fraud using publicly available data. This paper provides a survey of the literature on automated financial statement fraud detection and identifies current gaps in the literature. The paper highlights a number of important considerations in the implementation of financial statement fraud detection decision support systems, including 1) the definition of fraud, 2) features used for detecting fraud, 3) region of the case study, dataset size and imbalance, 4) algorithms used for detection, 5) approach to feature selection / feature engineering, 6) treatment of missing data, and 7) performance measure used. The current study discusses how these and other implementation factors could be approached within the South African context.CATEGORIES: • Computing methodologies ~ Machine learning • Applied computing ~ Economics <![CDATA[<b>Protection of personal information: An experiment involving data value chains and the use of personal information for marketing purposes in South Africa</b>]]> South Africa enacted the Protection of Personal Information Act 4 of 2013 (POPI) in an effort to curb the misuse of customers' personal information by organisations. The aim of this research was to establish whether the South African insurance industry is adhering to certain prescripts of POPI, focusing on direct marketing requirements. An experiment was utilised to monitor the flow of personal information submitted to 20 insurance companies requesting short-term insurance quotations, using new e-mail addresses and phone numbers. The results of the experiment indicate that 92% of the marketing communication received did not have prior consent from the researcher. Contact was made by companies outside the sample, indicating third-party sharing. 86% of the unsolicited short message service (SMS) communication received required customers to pay for unsubscribing from SMSs, which is not in line with regulatory requirements. The non-compliance evident in this experiment acts as an early warning to the insurance industry and South Africa, prompting a more concerted effort towards preparation of compliance with POPI. A personal information processing management framework is proposed to aid the insurance industry in understanding how personal information can be processed in line with the requirements of the Act.CATEGORIES: • Security and privacy ~ Privacy protections