Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 11 of 11

Full-Text Articles in Physical Sciences and Mathematics

Factors Influencing The Perceptions Of Human-Computer Interaction Curriculum Developers In Higher Education Institutions During Curriculum Design And Delivery, Cynthia Augustine, Salah Kabanda Apr 2024

Factors Influencing The Perceptions Of Human-Computer Interaction Curriculum Developers In Higher Education Institutions During Curriculum Design And Delivery, Cynthia Augustine, Salah Kabanda

The African Journal of Information Systems

Computer science (CS) and information systems students seeking to work as software developers upon graduating are often required to create software that has a sound user experience (UX) and meets the needs of its users. This includes addressing unique user, context, and infrastructural requirements. This study sought to identify the factors that influence the perceptions of human-computer interaction (HCI) curriculum developers in higher education institutions (HEIs) in developing economies of Africa when it comes to curriculum design and delivery. A qualitative enquiry was conducted and consisted of fourteen interviews with HCI curriculum developers and UX practitioners in four African countries. …


Service-Oriented Framework For Developing Interoperable E-Health Systems In A Low-Income Country, Bonface Abima, Agnes Nakakawa, Geoffrey Mayoka Kituyi Oct 2023

Service-Oriented Framework For Developing Interoperable E-Health Systems In A Low-Income Country, Bonface Abima, Agnes Nakakawa, Geoffrey Mayoka Kituyi

The African Journal of Information Systems

e-Health solutions in low-income countries are fragmented, address institution-specific needs, and do little to address the strategic need for inter-institutional exchange of health data. Although various e-health interoperability frameworks exist, contextual factors often hinder their effective adoption in low-income countries. This underlines the need to investigate such factors and to use findings to adapt existing e-health interoperability models. Following a design science approach, this research involved conducting an exploratory survey among 90 medical and Information Technology personnel from 67 health facilities in Uganda. Findings were used to derive requirements for e-health interoperability, and to orchestrate elements of a service oriented …


Challenges And Success Factors Of Scaled Agile Adoption – A South African Perspective, Lucas Khoza, Carl Marnewick May 2021

Challenges And Success Factors Of Scaled Agile Adoption – A South African Perspective, Lucas Khoza, Carl Marnewick

The African Journal of Information Systems

Agile methods and Agile scaling frameworks have become a solution for software-developing organizations striving to improve the success of software projects. Agile methods were developed for small projects, but due to their benefits, even large software-developing organizations have adopted them to scale their software projects. This quantitative study was undertaken to deepen the researchers’ understanding of the critical success factors and challenges of Scaled Agile from the South African perspective. A simple random sampling method was used. Data was collected with the use of an online structured questionnaire and the response rate was 70%. The results reveal that customer satisfaction …


On The Yellow Brick Road, A Path To Enterprise Architecture Maturity, Avsharn Bachoo Oct 2019

On The Yellow Brick Road, A Path To Enterprise Architecture Maturity, Avsharn Bachoo

The African Journal of Information Systems

This study concentrated on the relationship between the Enterprise Architecture (EA) maturity of an organization and the business value associated with it in the South African financial services environment. It was developed within the critical realism philosophy, which states that mechanisms generate events by accentuating the underlying EA mechanisms that lead to business value, as well as provide insights into the opportunities and challenges organizations experienced as they progressed to higher levels of maturity. Constructed using the resource-based view of the firm as the underlying theoretical framework, this research examined EA as an intangible resource and maturity as a source …


Accessibility And Usability Of Government Websites In Tanzania, Joel S. Mtebe, Aron W. Kondoro Sep 2017

Accessibility And Usability Of Government Websites In Tanzania, Joel S. Mtebe, Aron W. Kondoro

The African Journal of Information Systems

The government of Tanzania has been embracing information systems specifically websites in order to widen access to government services, lower administrative costs, and to increase public participation in decision making. As a result, almost every ministry, department, and agency (MDA) has developed a website of different kind. However, the majority of existing websites were developed without sufficiently considering user needs which indicates that they do have some usability and accessibility problems. This study used SortSite tool to evaluate accessibility and usability of government websites taking a sample of 22 websites. The report from the SortSite tool was then checked against …


A Framework To Manage Sensitive Information During Its Migration Between Software Platforms, Olusegun Ademolu Ajigini, John Andrew Van Der Poll, Jan H. Kroeze Phd Apr 2016

A Framework To Manage Sensitive Information During Its Migration Between Software Platforms, Olusegun Ademolu Ajigini, John Andrew Van Der Poll, Jan H. Kroeze Phd

The African Journal of Information Systems

Software migrations are mostly performed by organisations using migration teams. Such migration teams need to be aware of how sensitive information ought to be handled and protected during the implementation of the migration projects. There is a need to ensure that sensitive information is identified, classified and protected during the migration process.

This paper suggests how sensitive information in organisations can be handled and protected during migrations, by using the migration from proprietary software to open source software to develop a management framework that can be used to manage such a migration process. The research employed a sequential explanatory mixed …


A Context-Aware Model To Improve Usability Of Information Display On Smartphone Apps For Emerging Users, Felix F. Ntawanga, Andre P. Calitz, Lynette Barnard Sep 2015

A Context-Aware Model To Improve Usability Of Information Display On Smartphone Apps For Emerging Users, Felix F. Ntawanga, Andre P. Calitz, Lynette Barnard

The African Journal of Information Systems

Smartphones have become a reliable technology for accessing information and services in rural communities. Mobile applications, such as social media and news apps running on smartphones, are no longer exclusively utilised by users in developed communities. Mobile applications are accessed in highly contextualised environments. This paper discusses a context-aware model that was implemented to improve the usability of information presented on smartphone applications for emerging users. User evaluation was conducted within a remote area in South Africa with a sample of users, most of whom did not have prior experience in using computer applications. The results of the evaluation present …


Genetic Algorithm Based Model In Text Steganography, Christine K. Mulunda, Peter W. Wagacha, Alfayo O. Adede Oct 2013

Genetic Algorithm Based Model In Text Steganography, Christine K. Mulunda, Peter W. Wagacha, Alfayo O. Adede

The African Journal of Information Systems

Steganography is an ancient art. It is used for security in open systems. It focuses on hiding secret messages inside a cover medium. The most important property of a cover medium is the amount of data that can be stored inside it without changing its noticeable properties. There are many sophisticated techniques with which to hide, analyze, and recover that hidden information. This paper discusses an exploration in the use of Genetic Algorithm operators on the cover medium. We worked with text as the cover medium with the aim of increasing robustness and capacity of hidden data. Elitism is used …


Hybrid Spread-Spectrum Tcp For Combating Fraudulent Cyber Activities Against Reconnaissance Attacks, Simon Enoch Yusuf, Olumide Longe Apr 2013

Hybrid Spread-Spectrum Tcp For Combating Fraudulent Cyber Activities Against Reconnaissance Attacks, Simon Enoch Yusuf, Olumide Longe

The African Journal of Information Systems

The inefficiencies of current intrusion detection system against fraudulent cyber activities attracts the attention of computer gurus, also known as “hackers” to exploit known weakness on a particular host or network. These hackers are expert programmers who mainly focus on how the Internet works, and they interact with each other to know its strengths and weaknesses. Then they develop advanced tools which an average attacker with little background can use to know the liveness, reachability and running service on the network. Once an attacker identifies these details, he can accurately launch an effective attack and get maximum benefit out of …


Towards Self-Emancipation In Ict For Development Research: Narratives About Respect, Traditional Leadership And Building Networks Of Friendships In Rural South Africa, Kirstin Krauss May 2012

Towards Self-Emancipation In Ict For Development Research: Narratives About Respect, Traditional Leadership And Building Networks Of Friendships In Rural South Africa, Kirstin Krauss

The African Journal of Information Systems

In this paper, the author contends that if the outsider-researcher involved in Information and Communication Technology for Development really wants to make a difference and honestly address the emancipatory interests of the developing community, social transformation will have to occur on both sides of the “development divide.” This statement implies both an understanding of the researcher’s own ethnocentrism, prejudice, assumptions and inabilities as well as local concerns, needs, expectations and realities. Using critical social theory as a position of inquiry and learning from the enculturation phases of critical ethnographic fieldwork in a deep rural part of South Africa, the paper …


Deployment Evaluation Of Accounting Information Systems In Libyan Commercial Banks, Omar Sharkasi, Martin George Wynn Nov 2011

Deployment Evaluation Of Accounting Information Systems In Libyan Commercial Banks, Omar Sharkasi, Martin George Wynn

The African Journal of Information Systems

This article reports on the recent implementation and current deployment of accounting information systems in Libyan commercial banks. A case study approach is adopted that moves from an initial screening of the 14 main Libyan banks to a final in-depth study of just three banks. Business process modeling and systems profiling are used to assess the status of the banks in terms of systems use, process change and information systems strategy development. Libyan banks are well advanced in their installation of modern packaged software but could be used to greater effect to optimize business processes and improve efficiencies. Training and …