Pub Date : 1900-01-01DOI: 10.4018/IJICTRAME.290833
O. C. Agbonifo, S. I. Olotu, T. Ademujimi
{"title":"BusTimer: A Voice-Based Automated Enquiry System for Public Transport","authors":"O. C. Agbonifo, S. I. Olotu, T. Ademujimi","doi":"10.4018/IJICTRAME.290833","DOIUrl":"https://doi.org/10.4018/IJICTRAME.290833","url":null,"abstract":"","PeriodicalId":418993,"journal":{"name":"Int. J. ICT Res. Afr. Middle East","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115017733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/IJICTRAME.2017010103
Said Jafari
This paper presents the survey conducted to assess end-user engagement in building organisation’s security. A total of forty-eight (48) responses were collected from fifteen (15) mid-sized business organisations and institutions in Tanzania. The results show that little has been done to facilitate end-user engagement in building secure organisation. Also, the survey showed that old security problem such as passwords sharing still exist. The findings from this paper can be used by security officers and implementers within organisation to build and maintain sustainable secure organisation. KEywORdS Organisation Security, Security Culture, Security, Survey, User Engagement
{"title":"Enhancing Security Culture through User-Engagement: An Organisational Perspective","authors":"Said Jafari","doi":"10.4018/IJICTRAME.2017010103","DOIUrl":"https://doi.org/10.4018/IJICTRAME.2017010103","url":null,"abstract":"This paper presents the survey conducted to assess end-user engagement in building organisation’s security. A total of forty-eight (48) responses were collected from fifteen (15) mid-sized business organisations and institutions in Tanzania. The results show that little has been done to facilitate end-user engagement in building secure organisation. Also, the survey showed that old security problem such as passwords sharing still exist. The findings from this paper can be used by security officers and implementers within organisation to build and maintain sustainable secure organisation. KEywORdS Organisation Security, Security Culture, Security, Survey, User Engagement","PeriodicalId":418993,"journal":{"name":"Int. J. ICT Res. Afr. Middle East","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116900062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/IJICTRAME.2016010102
Frank Makoza, W. Chigona
This paper presents an analysis of stakeholders of the national Information and Communication Technology ICT policy subsystem using the Advocacy Coalition Framework ACF. The study focused on the context of a developing country, Malawi, which was analysed using qualitative data gathered through semi-structured interviews and policy documents. The findings showed there was diversity in the stakeholders for national ICT policy who were engaged in different roles of the policy process despite being a unitary policy subsystem. The stakeholders included officials from government departments, donors, academia, private sector organisations, the media, law enforcement agents and telecom operators. Some of the roles of the stakeholders were related to policy formulation, implementation, regulation, ICT investment, and support. The study contributes towards the literature of national ICT policy in the context of developing countries. A further study is recommended to consider the interests of informal stakeholders not represented in the national ICT policy subsystem.
{"title":"Ex-Post Stakeholder Analysis of National ICT Policy Subsystem: Case of Malawi","authors":"Frank Makoza, W. Chigona","doi":"10.4018/IJICTRAME.2016010102","DOIUrl":"https://doi.org/10.4018/IJICTRAME.2016010102","url":null,"abstract":"This paper presents an analysis of stakeholders of the national Information and Communication Technology ICT policy subsystem using the Advocacy Coalition Framework ACF. The study focused on the context of a developing country, Malawi, which was analysed using qualitative data gathered through semi-structured interviews and policy documents. The findings showed there was diversity in the stakeholders for national ICT policy who were engaged in different roles of the policy process despite being a unitary policy subsystem. The stakeholders included officials from government departments, donors, academia, private sector organisations, the media, law enforcement agents and telecom operators. Some of the roles of the stakeholders were related to policy formulation, implementation, regulation, ICT investment, and support. The study contributes towards the literature of national ICT policy in the context of developing countries. A further study is recommended to consider the interests of informal stakeholders not represented in the national ICT policy subsystem.","PeriodicalId":418993,"journal":{"name":"Int. J. ICT Res. Afr. Middle East","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131125419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/IJICTRAME.2018010102
Eyal Zisser
{"title":"Israel in the Middle East the Aftermath of the Arab Spring (2010-2017): An Involved Observer from the Sidelines","authors":"Eyal Zisser","doi":"10.4018/IJICTRAME.2018010102","DOIUrl":"https://doi.org/10.4018/IJICTRAME.2018010102","url":null,"abstract":"","PeriodicalId":418993,"journal":{"name":"Int. J. ICT Res. Afr. Middle East","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121432169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/IJICTRAME.2017010104
Rahma Bashary, Dennis M. Lupiana
Patent information is an essential ingredient for fostering innovations. Although most of developed countries have been using patent information as a source of technological information to assist R&D companies and organizations, Tanzania is lagging behind. Recognizing the critical role of patent information in nurturing innovations, Tanzania has recently engaged in conducting awareness training on patent information to researchers and innovators. Despite the effort, ICT Innovators in Tanzania are not keen in using patent information. The authors’ preliminary study indicated that 47% of respondents had knowledge of patent databases and 61% of them believe that the information can improve their innovative ideas. In contrary, 77% of the respondents had never access the databases. These revelations led us to conduct a study to determine factors that hinder ICT Innovators in Tanzania from using patent information to improve their innovative ideas. The study was conducted at BUNI Innovation Hub and DTBi Incubator in Dar es Salaam where 70 ICT Innovators and 3 Innovation Managers were involved. The study employed self-administered questionnaires and interview for collecting data. The study revealed that lack of patent search skills, language used in patent documents, subscription fees, unreliable electricity supply and limited access to the Internet are among the factors. KEywoRdS ICT, Innovation, Patent Database, Patent, Tanzania
{"title":"Leveraging Patent Information to Improve ICT Innovations in Tanzania","authors":"Rahma Bashary, Dennis M. Lupiana","doi":"10.4018/IJICTRAME.2017010104","DOIUrl":"https://doi.org/10.4018/IJICTRAME.2017010104","url":null,"abstract":"Patent information is an essential ingredient for fostering innovations. Although most of developed countries have been using patent information as a source of technological information to assist R&D companies and organizations, Tanzania is lagging behind. Recognizing the critical role of patent information in nurturing innovations, Tanzania has recently engaged in conducting awareness training on patent information to researchers and innovators. Despite the effort, ICT Innovators in Tanzania are not keen in using patent information. The authors’ preliminary study indicated that 47% of respondents had knowledge of patent databases and 61% of them believe that the information can improve their innovative ideas. In contrary, 77% of the respondents had never access the databases. These revelations led us to conduct a study to determine factors that hinder ICT Innovators in Tanzania from using patent information to improve their innovative ideas. The study was conducted at BUNI Innovation Hub and DTBi Incubator in Dar es Salaam where 70 ICT Innovators and 3 Innovation Managers were involved. The study employed self-administered questionnaires and interview for collecting data. The study revealed that lack of patent search skills, language used in patent documents, subscription fees, unreliable electricity supply and limited access to the Internet are among the factors. KEywoRdS ICT, Innovation, Patent Database, Patent, Tanzania","PeriodicalId":418993,"journal":{"name":"Int. J. ICT Res. Afr. Middle East","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114725987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/IJICTRAME.2017010102
R. Mushi, Said Jafari, Almar Ennis
Mobile technology has experienced a huge acceptance by many users in the current generation. This is due to the benefits offered through its use by individuals and organisations. Similarly, technology adoption studies have widely been used to uncover factors which determine their adoption in different contexts. Some of the scenarios in technology adoption differ due to the specific technology which is under study. For instance, mobile phone technology differs from other computing technologies in several aspects due to its nature i.e. mobility. These differences come along with some different insights concerning the adoption of mobile phones in a particular context. Highlighting important issues on studying the adoption of mobile technology is necessary, especially in developing countries where SMEs are engaging in the usage of mobile phones to accomplish business processes. Thus, this paper provides set of metrics for measuring adoption of mobile phone technology in SMEs. This qualitative study uses a combination of critical literature reviews and interviews conducted by involving key stakeholders of SMEs in Tanzania. This paper shows that among the existing metrics which are used in measuring adoption of other computing technologies, only value creation metric has more realistic grounds to explain the extent of mobile phones adoption in the context of SMEs. KEywoRdS Acceptance, ICT, Metrics, Mobile Phone Technology, SME, Technology Adoption
{"title":"Measuring Mobile Phone Technology Adoption in SMEs: Analysis of Metrics","authors":"R. Mushi, Said Jafari, Almar Ennis","doi":"10.4018/IJICTRAME.2017010102","DOIUrl":"https://doi.org/10.4018/IJICTRAME.2017010102","url":null,"abstract":"Mobile technology has experienced a huge acceptance by many users in the current generation. This is due to the benefits offered through its use by individuals and organisations. Similarly, technology adoption studies have widely been used to uncover factors which determine their adoption in different contexts. Some of the scenarios in technology adoption differ due to the specific technology which is under study. For instance, mobile phone technology differs from other computing technologies in several aspects due to its nature i.e. mobility. These differences come along with some different insights concerning the adoption of mobile phones in a particular context. Highlighting important issues on studying the adoption of mobile technology is necessary, especially in developing countries where SMEs are engaging in the usage of mobile phones to accomplish business processes. Thus, this paper provides set of metrics for measuring adoption of mobile phone technology in SMEs. This qualitative study uses a combination of critical literature reviews and interviews conducted by involving key stakeholders of SMEs in Tanzania. This paper shows that among the existing metrics which are used in measuring adoption of other computing technologies, only value creation metric has more realistic grounds to explain the extent of mobile phones adoption in the context of SMEs. KEywoRdS Acceptance, ICT, Metrics, Mobile Phone Technology, SME, Technology Adoption","PeriodicalId":418993,"journal":{"name":"Int. J. ICT Res. Afr. Middle East","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122941149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}