School of Computing and Informatics Technology (CIT) Collectionhttp://hdl.handle.net/10570/882024-03-29T00:32:26Z2024-03-29T00:32:26ZAddressing the challenges of the information and knowledge societies : the case for optimum curriculum in the SCECSAL RegionKigongo-Bukenya, I. M. N.http://hdl.handle.net/10570/7252021-11-26T06:59:28Z2004-01-01T00:00:00ZAddressing the challenges of the information and knowledge societies : the case for optimum curriculum in the SCECSAL Region
Kigongo-Bukenya, I. M. N.
The paper rotates on the question whether Information Management (IM) curriculum is equally appropriate for Knowledge Management (KM). Using the Conceptual Framework of Knowledge Management Processes (CFKMP), the concepts "Information Management" and "Knowledge Management" are explained and related in the context of optimum curriculum. The processes/activities of information management and knowledge management are examined to identify similarities or differences and to establish the base of knowledge and competencies/skills required. Based on Coral (2005) and comparative analysis of other literature, it is estimated that both IM and KM professionals require similar knowledge and skills competencies. It is deduced therefore that the same curricula would be appropriate for both. The paper further suggests that two strategies could be adapted in teaching of such curricula. The first would be the core-elective approach, whereby IM and KM are taught as electives along the core required by the information profession. The second would be the specialization strategy approach by which IM and KM are taught as different programmes.
Standing Conference of Eastern, Central and Southern Africa Library and Information Associations (SCECSAL XVII)
2004-01-01T00:00:00ZAn adherence monitoring system in antiretroviral therapyOtine, Charles Danielhttp://hdl.handle.net/10570/3722021-11-26T07:04:08Z2007-05-01T00:00:00ZAn adherence monitoring system in antiretroviral therapy
Otine, Charles Daniel
This study investigated the use of a Multi-dimensional system to improve adherence monitoring in antiretroviral therapy (ART). The high adherence levels required during patient therapy and the consequences of adherence failures (virus mutation to drug resistant strains, treatment failure, fatality) necessitated this study, with the hope that the development of a system would provide a basis for deployment of similar systems in other ART providing centers. An ART providing health centre (Mbuya reach out) was selected as a case study, with data collected from the centre used as a basis for the system design, development, testing and validation. Data was gathered through interviews, content analysis and direct observation; the rational unified process (RUP) of system development was then used to develop the system. Unified modeling Language (UML) was used to document the system development process, producing artifacts such as use case models, domain models, collaboration diagrams and System sequence diagrams. The final system was entirely implemented in open source (MySQL and PHP) and hosted to an online web server with the findings revealing that adherence monitoring can indeed be improved by using the system, but there is still need for further research in protecting the data and the tweaking of the system to enable monitoring not only for adults but for children as well. It is recommended that leading ART providing centers in conjunction with Ministry of health champion the use of the system by training users to exploit the functionality of the system, and encourage use of the system with a goal of developing a comprehensive information base for future studies on adherence.
A thesis submitted in partial fulfillment of the requirements for the award of the Masters of Science Degree in Computer Science of Makerere University.
2007-05-01T00:00:00ZAn adjustable usable security approach for a continuous user authentication schemeKaburu, Dennishttp://hdl.handle.net/10570/79862020-01-20T12:01:52Z2019-11-01T00:00:00ZAn adjustable usable security approach for a continuous user authentication scheme
Kaburu, Dennis
The advent of the internet and associated technologies have revolutionized the way we live and work. Today, organizations both public and private rely heavily on computer-human interaction systems to deliver services. The quality and reliability of services delivered by these systems depends on controlled access to these systems. Within this realm, security issues of interactive systems are gaining more than ever the attention not only from a technical and security perspective but also from the user's point of view. The security community has come to understand the critical importance of usable security, which is primarily focused on designing secure systems that people can use. In mission, critical systems like online examination and military intelligence, there is need to verify constantly the identity of the user throughout the session of interaction (referred to as “continuous user authentication”). Design and development of continuous user authentication schemes represents a cross-roads priority problem, between security and usability, which emerge from contradictory requirements posed by different stakeholders, inherent to the function and purpose of each security mechanism. Information security experts and information security researchers’ goal is to ensure a high security continuous user authentication scheme while at the same time user experience design experts and researchers (UX) envisage an adaptable, user-friendly solution. This makes the service providers of continuous authentication schemes find a viable balance among security and usability attributes. Accordingly, researchers have proposed a number of approaches to address the issues of continuous user authentication. However, these approaches require user collaboration, which affects user performance on the core tasks in the business processes because of user task interruptions. Thus, the approaches have usability challenges.
Henceforth, this work attempts to revisit the definition of usable security by advocating for an alternative approach that enhances the alignment of security and usability attributes to achieve a better synergetic relationship in continuous user authentication schemes. The main focus is to improve usability of user interactions in continuous user authentication schemes according to a user perceived trust obtained from a user dynamic behavior and cognitive-centered technique that reduces disruption of a user during re-authentication. The high level objectives of this thesis are (i) to develop an adjustable threshold approach for a continuous user authentication scheme that enhances synergetic relationship between usability and security attributes; (ii) to develop a low disruptive re-authentication technique that applies when the trustworthiness of a user is below the adjustable threshold; (iii) to validate the re-authentication technique.
2019-11-01T00:00:00ZAn adoption model to support citizens' participation in eGovernanceNakawuka, Josephinehttp://hdl.handle.net/10570/95142022-03-14T07:15:07Z2020-12-01T00:00:00ZAn adoption model to support citizens' participation in eGovernance
Nakawuka, Josephine
As a solution to the low citizen engagement, it is important to increase the number of citizens who participate in policy-making and governance. To fully enjoy the benefits of eGovernance, the citizens should be able to participate in it fully through offering their views, contributions, and ideas in order to build general development of their societies and country at large.
Despite the countless benefits of citizen participation in eGovernance, it is still low in the governance space. The aim of this study was to identify the factors affecting citizen participation, design a model to support citizen participation in eGovernance, and also evaluate this model to understand its contribution to eGovernance.
The study employed the Participatory Action Research methodology because it clearly mapped out our objectives and its cycle was the most relevant for our results achievement. With the use of purposive sampling, convenience sampling, snowball sampling, and data analysis software, relevant data for the research was collected, analyzed, and used to fulfill the objectives of this study.
This research provided a solution to the ailing number of citizens participating in eGovernance in the country through the development of an eGovernance adoption model for citizens to support their participation in eGovernance. The study entailed the detailed description of eGovernance in society, citizen participation in eGovernance, the role of Web 2.0 technologies in eGovernance citizen participation, and their contribution to the fulfillment of the study objectives. This study also suggested areas of future research to strengthen eGovernance as a whole and also the overall participation of citizens in eGovernance.
A thesis submitted to the directorate of research and graduate training in partial fulfilment of the requirements for the award of Master of Science in Information Systems of Makerere University
2020-12-01T00:00:00Z