Browsing School of Computing and Informatics Technology (CIT) Collection by Type
Now showing items 21-40 of 93
-
E-procurement: improving management of public procurement in Uganda's Central Government
(2007-04)The aim of this study was to design and implement an e-procurement information system that may be adopted for the public procurement in the central government of Uganda in order to ease analysis and dissemination of ... -
The effect of user interface design on software development
(2007-02)The purpose of this study was to show that the improvement of the user interface of any software application can greatly affect the application’s performance and marketing. This would effectively change its software ... -
Enhancing insurance regulation using information technology: the Uganda Motor Insurance Database
(2009-11)This research sought to investigate the practices in motor insurance underwriting and supervision in Uganda, and to establish how information technology can be used to enhance the supervisory role of the Uganda Insurance ... -
Enhancing property rates management using N-TIER architecture: a case study of Kampala City Council
(2007-04)Web technology has become the principle platform for electronic commerce, electronic business, and the digital firm because it provides so many benefits. By using Internet technology, organizations can reduce communication ... -
Evaluating the effectiveness of information communication technology use in urban hospitals in Uganda
(2007-02)The primary objective of the study was to assess the use of information communication technology in hospitals in Uganda. This study took place in three hospitals; that is: Mulago Hospital, Butabika Hospital and Kibuli ... -
An ICT framework to enhance food security in rural communities of Uganda
(2009-10)In the past decade, Information and Communication Technology (ICT) has increasingly shown great potential in supporting developmental initiatives. It was against such background that the researcher set to establish the ... -
Implementing bandwidth management in a low-bandwidth environment
(2009-07)The Internet has revolutionized the way organizations operate by providing them with the means for gathering and sharing of information. As the Internets popularity has increased, so has networked multimedia applications ... -
Improving the RSA cryptographic algorithm using double encryption
(2006-02)Cryptographic algorithms are essential parts in network security, and cryptography is one of the main tools for privacy, trust, access control, electronic payments, corporate security, and countless other fields. The RSA ... -
Influence of ICT on the banking industry: the case of Kampala
(2007-08)The research aimed at establishing the influence of ICT on the banking industry because there was an empirical desire to investigate how ICT is related to the banking industry in Kampala. The research was carried out using ... -
An information integration framework for Donor funded projects
(2009-05)Donor Funded Projects (DFPs) are organizations which are born out of a need to address development shortcomings, are time bound often in remote locations. They also tend to be funded by limited budgets and set-up in an ... -
An information portal for career guidance: the case of Ordinary Level in Uganda
(2006-02)The purpose of this study was to develop an Information portal for career guidance to provide expert advice to Uganda Ordinary Level secondary school students. This report describes the developed information portal providing ... -
An information support system for industrial development in Uganda with special reference to the small-scale sector: a proposal
(Addis Ababa University, 1994-05)The role of information in the scientific, technical and socio-economic development of nations is becoming widely accepted. In what has come to be referred to as the “information age”, a larger percentage of people in the ... -
An integrated management information system
(2006-02)An Integrated Management Information System support the Management of Uganda Prisons Service in producing the required reports in the quickest time possible. It was set up with the following capabilities: Management was ... -
An integrated reporting system using data warehousing: case study of National Medical Stores
(2008-10)Many Corporations today have vast amounts of data from their transactional systems which they use for their day to day operations. However, tools that enable consolidation of this data for other enteprise wide tasks like ... -
An internal intrusion prevention model for a distributed organisation
(2008-10)Information security has never been a tougher challenge with the security attacks being both internal and external. Most organizations focus great amounts of attention and funds on securing the perimeter of their network ... -
An intrusion detection system for academic institutions
(2007-07)As organizations go online, a number of advantages are realized and as a result academic institutions have not been left behind in this move. However most of the techniques organizations have used to guard against unauthorized ... -
A Loan assessment system for Centenary Rural Development Bank
(2005-11)The study on Centenary Rural Development Bank which focused on analyzing the loan assessment system was carried out purposely to overcome the challenges that are currently being experienced as a result of lack of good ... -
Managing financial and administrative records for enhanced service delivery: a case study of selected Sub-Counties in Hoima District, Uganda
(Makerere University, 2009-10)The issue of poor financial and administrative records management systems in the sub-counties of Uganda, despite the initiatives to improve upon them, has been of great concern to the Ministry of Local Government. This has ... -
Managing spam through mapping anti-spam software to e-mail policy: a case study of the Copperbelt University, Zambia
(2008-10)The emergence of unsolicited commercial electronic mail (UCE) also known as spam in 1978 has become a big global problem. What is being experienced now is that the numbers of unsolicited commercial electronic mails are ... -
Model-based testing of network security protocols in Java card applications
(2006-10)This research presents a combination of verification and conformance testing techniques for systems that implement network security protocols. We investigate model-based methods for detecting vulnerabilities in network ...