Information Systems

Permanent URI for this collection

Browse

Recent Submissions

Now showing 1 - 4 of 4
  • Item
    A model for a secure social media usage in selected medical institutions in Uganda
    (Kampala International University, College of Computing and mathmatics, 2023-09) Mutebi Joe
    ecently, the ubiquitous nature of Social Media (SM) usage, characterized by free flow of information have captivated the interest of higher education including medical institutions. Ironically, the balance of choice between SM usage and medical information safety has generated conflict of interest between the two viewpoints. Thus, hampering ratification (adoption) of SM usage in medical institutions. Fortunately, a socio-technical information security approach, coupled with usable-security principles have the potential to mitigate information security challenges on SM usage. Whereas related studies have remained optimistic, the key SM usage factors responsible for medical information breaches are scantily defined and documented. Thus, the purpose of this study was to identify the key information security factors, and develop a model for adopting a secure SM usage in medical institutions in Uganda. The study followed functionalism paradigm based on post-positivism philosophy, abductive reasoning approach, and online survey techniques involving 710 respondents. The key statistical analysis tools employed include both descriptive and inferential statistics (regression analysis). Notably, 27% to 42% of the respondents acknowledged occurrence of medical information breaches due to SM usage. The key SM usage factors identified include; visibility, learnability, user satisfaction, help and documentation, user language, security, privacy and confidentiality. Regression analysis results (R2 = 0.68) imply that 68% of the changes in dependent variable was attributed to the changes in independent variables. Relatively, the social dimension of SM usage have more influence on SM usage and medical information safety, compared to the technical dimension. Overall, this study provides empirical and theoretical basis for medical institutions, researchers, and system developers to rationalize the vulnerable aspect of SM usage, and effectively leverage SM usage in their operations.
  • Item
    Modeling end user’s adoption of e-government in the democratic republic of Congo:
    (Kampala International University, College of Computing and mathmatics, 2022-10) Ladislas, Elias Semajeri
    In recent years, electronic government (E-Government) has grown increasingly essential. It is a digital interaction system between a government and other parties such as citizens, businesses, workers, ministries, and other government entities. The current transition in developing countries from mostly paper-based government services to electronic government services (e-government services) utilizing ICT infrastructure has prompted concerns about their acceptance and use. The majority of research on technology acceptability and use have been conducted in developed nations, which have distinct contextual characteristics than developing countries, such as low technical progress, limited information, and limited financial and human resource capability. As a result, extrapolating results from developed countries to developing countries is incorrect. Therefore it is important to examine the significant factors that have impact on e-government low adoption and use, taking into account adapted factors for the Democratic Republic of Congo such as cultural, social, geographical, technical, political and economic issues. To design an adoption model, researcher employed a cross-sectional survey approach to collect data from 430 respondents. The mean, standard deviation, skewness, Kurtosis, and test statistic, as well as the related degree of significance, were calculated from the research data. To investigate the relationship between the included information security parameters and e-government adoption, as well as to assess the constructed model, correlation and regression analyses were undertaken.The analysis validated the expected relationship, and the results were utilized to enhance an existing model in order to create one that was appropriate for the research. The model shows that Information security factors such as like Confidentiality, Integrity, Availability, Accountability, and Non-repudiation, may be utilized to forecast the adoption of e-government in a G2C context. As a consequence of these results, the study produced a set of suggestions that may be used as guidelines for the effective deployment of e-Government systems and services based on users' perceptions, attitudes, beliefs, requirements, and preferences
  • Item
    E-Procurement and Supply Management System for Kampala International University: Design, Development and Implementation
    (Kampala International University,Degree Doctor Of Philosophy In Management Information Systems, 2012-11) Kimwise, Alone
    The purpose of this study was to test the null hypothesis of no significant difference on the existing procurement and supply management system and the proposed E-PSMS for KIU and to validate the proposed E-PSMS for Kampala International University. The general objective of this study was to design, develop and implement the proposed E-Procurement and Supply Management System (PEPSMS) at KIU. The specific objectives were to: (i) determine the demographic characteristics of respondents in regard to: age, gender, level of education, department of service, number of years working with KIU and ICT knowledge. (ii) Examine appraisal level of the Existing Procurement and Supply Management SYSTEM (EPSMS) by users in regard to customer satisfaction, business process, learn and growth plus finance. (iii) design, develop and implement a PEPSMS for KIU. (iv) determine assessment level by the "users" of the proposed PEPSMS after implementation. (v) establish whether there is a significant difference in the level of assessment between the EPSMS and the PEPSMS. Quasi-experimental design (assessment of the EPSMS) - post test design (after the implementation of the PEPSMS) was used on a total sample of 29 respondents and t-sample test was used to test the null hypothesis. Findings show that, the Level of assessment of the existing procurement and Supply Management System (EPSMS) by the respondents was fair in terms of customer satisfaction, business process, finance, learn and growth. Further more there was a significant difference in level of assessment of the EPSMS and the PEPSMS before and after implementation. However, the researcher recommends that KIU provides opportunities to its staff members who had low ICT knowledge to go for further training as revealed by the study; and full support by management of KIU should be accorded to the PEPSMS because without it, sustainability of the system will not be realized.
  • Item
    A model for measuring levels of end-users’ acceptance and use of Hybrid Library services and its applicability to Universities
    (Makerere University, 2010-10) Prisca, Tibenderana Kateete G
    This study concerns the acceptance and use of Information Communication technology (ICT) services in libraries with particular reference to universities in developing countries. It is recognized that for information systems to be of value to an individual or groups of individuals the system should be accepted and used. The fairly recent shift in developing countries from mainly paper-based library services to electronic library services (c-library services) using ICT infrastructure has raised questions regarding their acceptance and utilization. Whereas there is published evidence of the acceptance of use of technologies, there is a lack of similar evidence for c-library services. Most studies on acceptance and use of technology have been carried out in settings found in developed countries which have different contextual factors present in developing countries such as low technological development, low level of awareness and low resource capacity such as finance and human resource. This makes it inappropriate to extrapolate the findings from Developed countries to Developing countries (DCs). The opportunity to modify and adapt some of these models for groups in developing countries exists and this study builds on the work by Venkatesh et a! (2003) which capitalized on commonalities of the best aspects of each of some existing models to develop a model called “The Unified Theory of Acceptance and Use of ‘I’echnology” (U’l’AUT). Using U’l’AUT as a foundation, this study set out to design a model for measuring levels of end-users’ acceptance and usc of c-library services in university settings in Uganda, as a representative of other developing countries. A cross sectional survey design was used to collect data from eight universities in Uganda to design an Electronic Library Services Acceptance and Use Model (ELSAUM). The study data ~~as examined for the mean, standard deviation, skewness. Kurtosis. and Shapiro-Wilk test statistic with the corresponding level of significance. The designed model has four independent constructs of performance expectance, relevance, social influence and facilitating conditions: four moderator variables of gender, age. Experience and awareness and together influence the dependent constructs of behavior intentions, usage behavior and expected benefits ‘Flie model was validated using data extracted from the main survey of 445 respondents. Results show that university communities have intentions to use c—library services. ‘The findings show that major determinants of end-users behavior intentions and usage behavior of c-library services were relevance, social influence and facilitating conditions. Some of the recommendations of the research are that: Governments should support Universities with the provision of ICT services; Librarians in the DCs should use validated instruments with the provision of ICT services; The need to merge the two professions of Information Systems and Library Science, because it appears that currently both professionals do almost similar functions with regard to ICI services. ‘This research contributes to technology adoption and library science literature, as well as to e library practice: its emphasis was on developing Countries. Many avenues for future research have been opened.