KIU Institutional Repository
Research and publications for Kampala International University Community
Communities in DSpace
Select a community to browse its collections.
Recent Submissions
Item
A Critical Analysis of the Doctrine of Indoor Management Rule under Company.
(Kampala International University, Masters of Arts in Law, 2023-09) Amna Ahmed Alnour Ibreel
The study was focused on “a critical analysis of the doctrine of indoor management rule under company law” which analyzed the doctrine of indoor management rule under company law in Uganda. According to this doctrine, persons dealing with the company need not inquire whether internal proceedings relating to the contract are followed correctly, once they are satisfied that the transaction is in accordance with the memorandum and articles of association. The doctrines of constructive notice and indoor management are essentially rules of prudence which facilitate business transactions between a company and an outsider. The indoor management rule is a doctrine under the company law which is globally accepted as it’s an exception to the doctrine of constructive notice and somewhat reducing its harshness. In companies law the doctrine of constructive notice is a doctrine where all persons dealing with a company are deemed (or construed) to have knowledge of the company’s Articles of Association and Memorandum of Association. Therefore, it protects the company from the actions of outsiders while the doctrine of indoor management protects the outsider person from the illegal actions of the company. However the following are the objectives of the study analyzed: To examine the doctrine of indoor management under company law in Uganda, to examine the exceptions to the doctrine of indoor management prescribed in The Companies Act and to assess the application of the doctrine of indoor management Uganda.
Item
UTILIZATION OF BLOCKCHAIN TECHNOLOGY BY UPDF FOR SUPPLY CHAIN TRANSPARENCY AND TRACEABILITY
(Journal of Applied Sciences, Information and Computing (JASIC), 2023-11) Sulle Tabu Ale & V. S. Manjula
To sustain ethical sourcing practices, prevent the sale of counterfeit goods, and increase consumer confidence,
organizations must provide transparency and traceability in their supply chains. This case study focuses on the
Uganda People's Defense Forces (UPDF) and examines the creation and implementation of a blockchain-based
application for improving supply chain transparency and traceability. The main goal is to look into how a
blockchain application may enhance supply chain management, decrease corruption, and increase
accountability in the UPDF's logistics and procurement procedures. In order to provide transparency,
immutability, and decentralized control, the app will use blockchain technology to record and verify each stage
of the supply chain, from purchase through delivery. The investigation will take into account whether the
UPDF has access to the infrastructure and training required to use blockchain technology. A mixed-methods
approach will be used to combine quantitative data from transaction logs and supply chain records with
qualitative data from stakeholder interviews and observations. The study will evaluate the app's effects on
supply chain efficiency, transparency, and traceability as well as any risks and rewards of integrating
blockchain technology into the UPDF's supply chain ecosystem. Finally, this technique seeks to advance
knowledge of how blockchain technology might enhance supply chain management in governmental and
military contexts by examining the adoption of a blockchain-based app within the UPDF's supply chain. The
results will advise policymakers, procurement officers, and R researchers on the applicability of block chain based apps for boosting supply chain transparency. They will offer insights into the viability, effectiveness,
and potential barriers of using blockchain solutions
Item
ICT-ENABLED SOLUTIONS TO FARMERS INCREASE CROP YIELDS WHILE REDUCINGTHEIRUSE OFENERGY
(2023-07) Dr. V. S. Manjula , Fatou Marega , Robert Ssali Balagadde
This book chapter explores the role of Information and Communication Technology (ICT)-enabled solutions
in agriculture to increase crop yields while simultaneously reducing energy consumption. It discusses
various ICT tools and technologies, including precision agriculture, data analytics, remote sensing, and
smart irrigation systems, and their applications in optimizing resource allocation,improving decision-making
processes, and promoting sustainable practices. The chapter highlights the benefits, challenges, and future
prospects of implementing these ICT-enabled solutions in agricultural systems.
Item
IMPACT OF DIGITIZATION OF SUSTAINABLE AGRICULTURE IN UGANDA: A CASE STUDY
(Journal of Applied Sciences, Information and Computing (JASIC), 2023-07) Nabulongo Ali, V. S. Manjula and Fatou Marega
Uganda has made outstanding progress in agricultural output, which is crucial for preserving the
safety of the country's food supply. The role of technology and digitization in promoting
sustainable agriculture practices in Uganda. The case study will focus on various innovative
initiatives and solutions that have been implemented in the country to enhance agricultural
productivity, reduce environmental impact, and improve livelihoods. By examining the current
state of technology adoption in Ugandan agriculture, analyzing successful case studies, and
identifying challenges and opportunities, this research will provide valuable insights into the
potential of technology and digitization to drive sustainable agricultural development in Uganda."
Item
IDENTIFICATION AND MITIGATION OF THE VULNERABILITY OF WEB APPLICATIONS IN INSTITUTIONS OF HIGHER EDUCATION
(Journal of Applied Sciences, Information and Computing, 2023-07) Sabo Muhammed, Muwanga Zake, V.S. Manjula and Auwal Saleh
The security of information technology, specifically web applications, has become an area of concern
today. Computer cybercrime is now a significant problem that affects more than just businesses and
organizations. Higher education institutions also began to experience computer threats that revealed their
information assets. Universities, polytechnics, colleges of education, research centers, and other
postsecondary institutions are probably the most vulnerable because they house sensitive data on their
faculty, staff, and students, as well as academic records of scientific and technological advancements and
research. The first step in an information system security strategy is risk analysis management It helps in
assessing the risk of information assets to know their security level or status, and assist in define a security
control measures and implementation of technical plan to avoid threats that exploit some vulnerability that
could cause severe damage to an asset or infrastructure of institutions higher education (IHEs). This article
presents some recommendations to perform a risk analysis management in IHEs to accessed threats and
vulnerability that helps to lower the risk of their information assets. This article presents existing
educational threat and vulnerability on their web applications. Ensuring security is a goal of every
organization regardless of its size or purpose and also proposed a risk management model. With the
information technology, an organization may be considered secure when it ensures the confidentiality,
integrity, and availability of information and IT assets. Confidentiality may be broken due to theft of
sensitive information such as trade secrets, clients’ personal information.