Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 10 of 10

Full-Text Articles in Databases and Information Systems

Service-Oriented Framework For Developing Interoperable E-Health Systems In A Low-Income Country, Bonface Abima, Agnes Nakakawa, Geoffrey Mayoka Kituyi Oct 2023

Service-Oriented Framework For Developing Interoperable E-Health Systems In A Low-Income Country, Bonface Abima, Agnes Nakakawa, Geoffrey Mayoka Kituyi

The African Journal of Information Systems

e-Health solutions in low-income countries are fragmented, address institution-specific needs, and do little to address the strategic need for inter-institutional exchange of health data. Although various e-health interoperability frameworks exist, contextual factors often hinder their effective adoption in low-income countries. This underlines the need to investigate such factors and to use findings to adapt existing e-health interoperability models. Following a design science approach, this research involved conducting an exploratory survey among 90 medical and Information Technology personnel from 67 health facilities in Uganda. Findings were used to derive requirements for e-health interoperability, and to orchestrate elements of a service oriented …


Factors Influencing Knowledge Transfer In Onshore Information Systems Outsourcing In Ethiopia, Solomon A. Nurye, Alem Molla, Temtim Assefa Desta Oct 2019

Factors Influencing Knowledge Transfer In Onshore Information Systems Outsourcing In Ethiopia, Solomon A. Nurye, Alem Molla, Temtim Assefa Desta

The African Journal of Information Systems

Knowledge transfer in onshore information systems (IS) outsourcing projects in Africa is an important but under-researched phenomenon. This study focuses on the client-vendor perspective and examines the factors that influence knowledge transfer in onshore information systems outsourcing in Ethiopia. Conceptually, knowledge-based perspectives of IS outsourcing is used to identify an initial set of factors to frame the empirical study. This is followed by semi-structured interviews with ten project managers. The findings indicate that five key factors, namely mutual absorptive capacity, mutual learning intent, mutual trust, mutual disseminative capacity and project staff turnover influence knowledge transfer in outsourced IS projects. The …


Semantic Data Storage In Information Systems, Jean Vincent Fonou Dombeu, Raoul Kwuimi May 2018

Semantic Data Storage In Information Systems, Jean Vincent Fonou Dombeu, Raoul Kwuimi

The African Journal of Information Systems

The storage and retrieval of information are important functions of information systems (IS). These IS functions have been realized for decades, due to the maturity of the relational database technology. In recent years, the concept of Semantic Information System (SIS) has emerged as IS in which information is represented with explicit semantic based on its meaning rather than its syntax to enable its automatic and intelligent processing by computers. At present, there is a shortage of discussions on the topic of semantic data storage in IS as compared to the relational database storage counterpart. This study uses a combination of …


Systematic Analysis Of Enterprise Perception Towards Cloud Adoption In The African States: The Nigerian Perspective, George A. Oguntala, Prof. Raed A. Abd-Alhameed, Dr. Janet O. Odeyemi Sep 2017

Systematic Analysis Of Enterprise Perception Towards Cloud Adoption In The African States: The Nigerian Perspective, George A. Oguntala, Prof. Raed A. Abd-Alhameed, Dr. Janet O. Odeyemi

The African Journal of Information Systems

The desirous benefits of cloud computing such as high return on investment through efficient resource management, high application throughput and on-demand capabilities have resulted in the unprecedented global acceptance of the computing paradigm. However, research on cloud adoption indicates that fewer organisations in the African states are adopting cloud services. Thus, the purview of the paper is to examine the factors responsible for the poor adoption of cloud computing in most African enterprises using Nigeria as a case study. The study focus on the perception of IT and non-IT employees towards cloud computing. Moreover, the paper reviews the literature on …


Development And Semantic Exploitation Of A Relational Data Model For Service Delivery In South African Municipalities, Kgotatso Desmond Mogotlane, Jean Vincent Fonou Dombeu Oct 2016

Development And Semantic Exploitation Of A Relational Data Model For Service Delivery In South African Municipalities, Kgotatso Desmond Mogotlane, Jean Vincent Fonou Dombeu

The African Journal of Information Systems

Relational databases (RDB) are the main sources of structured data for government institutions and businesses. Since these databases are dependent on autonomous hardware and software they create problems of data integration and interoperability. Solutions have been proposed to convert RDB into ontology to enable their sharing, reuse and integration on the Semantic Web. However, the proposed methods and techniques remain highly technical and there is lack of research that focuses on the empirical application of these methods and techniques in information systems (IS) domains. This study develops and semantically exploits a relational data model of the South African Municipalities Information …


Towards Self-Emancipation In Ict For Development Research: Narratives About Respect, Traditional Leadership And Building Networks Of Friendships In Rural South Africa, Kirstin Krauss May 2012

Towards Self-Emancipation In Ict For Development Research: Narratives About Respect, Traditional Leadership And Building Networks Of Friendships In Rural South Africa, Kirstin Krauss

The African Journal of Information Systems

In this paper, the author contends that if the outsider-researcher involved in Information and Communication Technology for Development really wants to make a difference and honestly address the emancipatory interests of the developing community, social transformation will have to occur on both sides of the “development divide.” This statement implies both an understanding of the researcher’s own ethnocentrism, prejudice, assumptions and inabilities as well as local concerns, needs, expectations and realities. Using critical social theory as a position of inquiry and learning from the enculturation phases of critical ethnographic fieldwork in a deep rural part of South Africa, the paper …


The Mississippi Digital Library’S Civil Rights Thesaurus: An Evolving Authority Control Tool For Civil Rights-Related Headings In Metadata Records, Kathleen L. Wells Oct 2010

The Mississippi Digital Library’S Civil Rights Thesaurus: An Evolving Authority Control Tool For Civil Rights-Related Headings In Metadata Records, Kathleen L. Wells

The Southeastern Librarian

The online Civil Rights Thesaurus (CRT) at the University of Southern Mississippi (USM) had its beginnings in the digitization of civil rights materials in the university’s McCain Library and Archives in the early 2000s. The materials included oral history interviews, letters, newspaper clippings, photographs, and other items from the rich history of the civil rights movement in Mississippi, including materials from the Freedom Summer of 1964. In addition to the creation of digitized images, making these materials available online as the Civil Rights in Mississippi Digital Archive included the formulation of descriptive records using Dublin Core metadata and the development …


Save Gas Using Your Office Computer From Home, Steve Duckworth, Damon Armour, Jeff Heck Jan 2010

Save Gas Using Your Office Computer From Home, Steve Duckworth, Damon Armour, Jeff Heck

Georgia Library Quarterly

The article discusses the protocols used to establish remote computer connections from home. The Remote Desktop Protocol (RDP) used in Windows 7 connecting to a Windows 2008 server reportedly allows the playing of high-definition video using Media Player. It is stated that commercial product connections which may bypass security infrastructure are risky because of the home computer's possible insecurity and that home devices used for business purposes may be legally searched by the state.


After The System Upgrade Or Migration: A Cataloging Checklist, Sheryl Stump, Rick Torgerson Apr 2008

After The System Upgrade Or Migration: A Cataloging Checklist, Sheryl Stump, Rick Torgerson

The Southeastern Librarian

At present. integrated library system (ILS) upgrades and migrations seem to be coming faster and more frequently. The reasons for this trend are many. among them being: 1) hardware upgrades are common due to the need for more memory to run the software; 2) software upgrades and migrations are desired because of the promise of new or improved features; 3) changes in system vendor ownership can affect changes in their software; 4) software and hardware upgrades are needed due to the advanced age of either or both; and 5) system upgrades on a yearly basis may be necessary to prevent …


Metadata Basics: A Literature Survey And Subject Analysis, Nicole Mitchell Oct 2006

Metadata Basics: A Literature Survey And Subject Analysis, Nicole Mitchell

The Southeastern Librarian

Librarians today are wrestling with an everchanging digital environment. In some way oranother, we must all adapt to new technologies, skills, and ways of thinking. What comes to mind when you hear the word “metadata?” Is itintimidating? Do metadatists and catalogers explain the term adequately? While this articleby no means captures all there is about metadata, it is intended to provide librarians with a basic understanding of what is involved in metadatawork.