Browsing by Author "Mbabazi, Businge Phelix"
Now showing 1 - 4 of 4
Results Per Page
Sort Options
Item Information System (Is) Models: Technology as a Service for Agricultural Information Dissemination in Developing Countries (Uganda). A Systematic Literature Review(International Journal of Scientific and Management Research, 2022) Byamukama, Willbroad; Kalibwani, Mbarara Rebecca; Mbabazi, Businge PhelixThis article summarizes the current literature by reviewing the concepts, applications, and development of technology adoption models and theories that are supported by the literature review, with the novelty technology's prospective application being the main focus. These included, but were not limited to, the concepts of Diffusion of Innovations (DIT) (Rogers, 1995), Theory of Reasoned Action (TRA) (Fishbein and Ajzen, 1995), and Diffusion of Innovations (DIT) (Rogers, 1995). Theory of Planned Behavior (TPB) (Ajzen, 1985, 1991), Theory of Planned Behaviour, (Taylor and Todd, 1995), the Technology Acceptance Model (TAM) (Davis, Bogozzi and Warshaw, 1989, Technology Acceptance Model two (TAM2) Venkatesh and Davis (2000), Technology Acceptance Model three (TAM3) Venkatesh and Bala (2008), Unified Theory of Acceptance Model (UTAUT) Venkatesh et al; 2012 and the Extended Unified Theory of Acceptance Model (UTAUT2) Venkatesh et al; 2016. These assessments can give some information on technology adoption levels and potential applications for future researchers to consider, recognize and comprehend the underlying technology models and ideas that will have an impact on the preceding, current and future applications of technology adoption and agricultural information dissemination by smallholder rural farmers.Item Towards Personalized Learning Environment in Universities In Developing Countries through Blended Learning: A Case of Muni University(International Refereed Journal of Arts, Science & Commerce, 2018) Oroma, Josephat O.; Ali, Guma; Mbabazi, Businge PhelixPersonalized Learning Environment (PLE) is the future of education at higher education institutions (HEIs), and blended learning is a means to achieve it in emerging regions. However, several challenges hamper its implementation. This study therefore uses a combination of research approaches to investigate these challenges and report on the experience of more than a year of adoption and implementation of blended learning in Muni University in an effort to improve the quality of education as well as to set in the foundation for PLE.A total of 200 questionnaires were distributed and total of 165 were collected, making a return rate of 82.5%. The results indicate that, the respondents had skills and university has the will to implement blended learning environment however, critical issues related to user training, technical support and proper benchmarking were insufficiently included as essential and integral part of the implementation. The study recommends that self-enrolment of the students be enabled and Coverage must be extended, Training should be given to students, FAQs should be included and enrolment process should be simplified.Item Unintentional human insider threats mitigation measures in universities in Uganda(International Journal of Multidisciplinary Research and Development, 2016) Mbabazi, Businge Phelix; Peterand, Jehopio; Muwanga – Zake, JWFThe purpose of this research paper to indentify the unintentional human insider threats and assess the various unintentional Human Insider threats mitigation measures currently used in universities in Uganda. It also intends to know the mitigation measures are actually being implemented in the universities in Uganda. The primary data was collected by using survey method. Sampling was all from ICT Staff members and the various heads of Departments who are in charge of handling institutional data. The questionnaires were distributed to 212 respondents from conveniently selected respondents from different Nine (9) Universities in Uganda. Reliability and validity of the constructs tests were carried out and all were found to be above the recommended values and Descriptive Statistics and coefficient of Variation was used to analyze these constructs. The study found out that sharing of secondary storage devices like flash discs, CD, Hard disks, Losing of Secondary storage devices like flash disks, CD, Hard and Working on a mobile device e.g. Laptop while travelling, Leaving computers unattended to were the top ranked insider threats and Usability of security tools were being implemented while Technological measures, Security training and awareness, Deterrence measures were partly implemented and Motivation measures, and Time pressure and Workload were sometimes implemented. Its recommend to further investigate on the other unintentional mitigation measure which can be used in mitigating other insider threats on institutional data security for example hackers and none human threats to information security such natural disasters and systems failures.Item The Use of Information and Communication Technology (ICT) and the Challenges Faced by Ugandan Smallholder Farmers. Review Article.(East African Journal of Agriculture and Biotechnology, 2022) Byamukama, Willbroad; Kalibwani, Rebecca; Mbabazi, Businge PhelixThe influence of ICT use on smallholder farmers in rural farming is examined in this article, as well as the obstacles that ICT use presents. The paper reviews that ICT plays a very important role in the dissemination of improved service technologies to farmers. The review stresses that ICTs are often used as an associate degree economical tool to induce non-progressive farmers to connect to extension information and to inform them adopt technology quicker. On the impacts of ICT on farmers, it is absolute that it considerably exaggerates agricultural development by serving to farmers to access relevant information through ICT and creates awareness of the market system among farmers and advert of the products and services. Likewise, the review known as some constraints by farmers within the course of the utilization the use of ICT embeds inadequate ICT facilities and personnel in rural areas, unstable Power provide in rural communities and farmers’ perception of the ICT skills. The solutions to the constraints by farmers within the usage of ICT is the event of the ICT within the reach and data of farmers, supporting farmers in capability building before the utilization of the ICT devices, and steadily provide power in rural communities.