Information Systems
Permanent URI for this collection
Browse
Browsing Information Systems by Subject "Model"
Now showing 1 - 2 of 2
Results Per Page
Sort Options
- ItemA model for a secure social media usage in selected medical institutions in Uganda(Kampala International University, College of Computing and mathmatics, 2023-09) Mutebi Joeecently, the ubiquitous nature of Social Media (SM) usage, characterized by free flow of information have captivated the interest of higher education including medical institutions. Ironically, the balance of choice between SM usage and medical information safety has generated conflict of interest between the two viewpoints. Thus, hampering ratification (adoption) of SM usage in medical institutions. Fortunately, a socio-technical information security approach, coupled with usable-security principles have the potential to mitigate information security challenges on SM usage. Whereas related studies have remained optimistic, the key SM usage factors responsible for medical information breaches are scantily defined and documented. Thus, the purpose of this study was to identify the key information security factors, and develop a model for adopting a secure SM usage in medical institutions in Uganda. The study followed functionalism paradigm based on post-positivism philosophy, abductive reasoning approach, and online survey techniques involving 710 respondents. The key statistical analysis tools employed include both descriptive and inferential statistics (regression analysis). Notably, 27% to 42% of the respondents acknowledged occurrence of medical information breaches due to SM usage. The key SM usage factors identified include; visibility, learnability, user satisfaction, help and documentation, user language, security, privacy and confidentiality. Regression analysis results (R2 = 0.68) imply that 68% of the changes in dependent variable was attributed to the changes in independent variables. Relatively, the social dimension of SM usage have more influence on SM usage and medical information safety, compared to the technical dimension. Overall, this study provides empirical and theoretical basis for medical institutions, researchers, and system developers to rationalize the vulnerable aspect of SM usage, and effectively leverage SM usage in their operations.
- ItemA model for measuring levels of end-users’ acceptance and use of Hybrid Library services and its applicability to Universities(Makerere University, 2010-10) Prisca, Tibenderana Kateete GThis study concerns the acceptance and use of Information Communication technology (ICT) services in libraries with particular reference to universities in developing countries. It is recognized that for information systems to be of value to an individual or groups of individuals the system should be accepted and used. The fairly recent shift in developing countries from mainly paper-based library services to electronic library services (c-library services) using ICT infrastructure has raised questions regarding their acceptance and utilization. Whereas there is published evidence of the acceptance of use of technologies, there is a lack of similar evidence for c-library services. Most studies on acceptance and use of technology have been carried out in settings found in developed countries which have different contextual factors present in developing countries such as low technological development, low level of awareness and low resource capacity such as finance and human resource. This makes it inappropriate to extrapolate the findings from Developed countries to Developing countries (DCs). The opportunity to modify and adapt some of these models for groups in developing countries exists and this study builds on the work by Venkatesh et a! (2003) which capitalized on commonalities of the best aspects of each of some existing models to develop a model called “The Unified Theory of Acceptance and Use of ‘I’echnology” (U’l’AUT). Using U’l’AUT as a foundation, this study set out to design a model for measuring levels of end-users’ acceptance and usc of c-library services in university settings in Uganda, as a representative of other developing countries. A cross sectional survey design was used to collect data from eight universities in Uganda to design an Electronic Library Services Acceptance and Use Model (ELSAUM). The study data ~~as examined for the mean, standard deviation, skewness. Kurtosis. and Shapiro-Wilk test statistic with the corresponding level of significance. The designed model has four independent constructs of performance expectance, relevance, social influence and facilitating conditions: four moderator variables of gender, age. Experience and awareness and together influence the dependent constructs of behavior intentions, usage behavior and expected benefits ‘Flie model was validated using data extracted from the main survey of 445 respondents. Results show that university communities have intentions to use c—library services. ‘The findings show that major determinants of end-users behavior intentions and usage behavior of c-library services were relevance, social influence and facilitating conditions. Some of the recommendations of the research are that: Governments should support Universities with the provision of ICT services; Librarians in the DCs should use validated instruments with the provision of ICT services; The need to merge the two professions of Information Systems and Library Science, because it appears that currently both professionals do almost similar functions with regard to ICI services. ‘This research contributes to technology adoption and library science literature, as well as to e library practice: its emphasis was on developing Countries. Many avenues for future research have been opened.