Recent Submissions

  • The Effectiveness of Adaptation Methods in Improving User Engagement and Privacy Protection on Social Network Sites 

    Namara, Moses; Sloan, Henry; Knijnenburg, Bart P. (Proceedings on Privacy Enhancing Technologies, 2021)
    Research finds that the users of Social Networking Sites (SNSs) often fail to comprehensively engage with the plethora of available privacy features— arguably due to their sheer number and the fact that they are often ...
  • Privacy at a Glance: The User-Centric Design of Glanceable Data Exposure Visualizations 

    Wilkinson, Daricia; Bahirat, Paritosh; Namara, Moses; Lyu, Jing; Alsubhi, Arwa; Qiu, Jessica; Wisniewski, Pamela; Knijnenburg, Bart P. (Proceedings on Privacy Enhancing Technologies, 2020)
    Smartphone users are often unaware of mobile applications’ (“apps”) third-party data collection and sharing practices, which put them at higher risk of privacy breaches. One way to raise awareness of these practices ...
  • Cross-Cultural Perspectives on eHealth Privacy in Africa 

    Namara, Moses; Wilkinson, Daricia; Byron M., Lowens; Knijnenburg, Bart P.; Orji, Rita; Sekou, Remy L. (Thriving Communities, 2018)
    The African continent is making considerable strides to develop and implement technology-driven health innovations. Policymakers are increasingly acknowledging the rising concerns for online personal privacy and data ...
  • An Inconvenient Trust: User Attitudes Toward Security and Usability Tradeoffs for Key-Directory Encryption Systems 

    Bai, Wei; Kim, Doowon; Namara, Moses; Qian, Yichen; Gage Kelley, Patrick; Mazurek, Michelle L. (USENIX, 2016)
    Many critical communications now take place digitally, but recent revelations demonstrate that these communications can often be intercepted. To achieve true message privacy, users need end-to-end message encryption, ...
  • Optimized Association Rule Mining with Genetic Algorithms 

    Wakabi–Waiswa, Peter P.; Baryamureeba, Venansius; Sarukesi, Karunakaran (IEEE, 2011)
    The mechanism for unearthing hidden facts in large datasets and drawing inferences on how a subset of items influences the presence of another subset is known as Association Rule Mining (ARM). There is a wide variety ...
  • Cyber Crime in Uganda: Myth or Reality? 

    Tushabe, Florence; Baryamureeba, Venansius (World Academy of Science, Engineering and Technology, 2005)
    There is a general feeling that Internet crime is an advanced type of crime that has not yet infiltrated developing countries like Uganda. The carefree nature of the Internet in which anybody publishes anything at anytime ...
  • Collaborative Framework for Supporting Indigenous Knowledge Management 

    Mondo, Theodora Mwebesa T.; Baryamureeba, Venansius; Williams, D. (Makerere University, 2007)
    Indigenous knowledge (IK) is an integral part of the culture and history of local communities. We need to learn from local communities to enrich the development process. IK systems are also dynamic; new knowledge is ...
  • Approaches Towards Effective Knowledge Management for Small and Medium Enterprises in Developing Countries - Uganda 

    Habinka, Annabella; Sol, Henk; Baryamureeba, Venansius (IIMC International Information Management Corporation, 2009)
    In developing countries, many Small and Medium Enterprises (SMEs) collapse due to complex factors. Knowledge shortage and fragmented information are their key challenges as a result of obsolete technology and exposure. ...
  • Structural Feature Engineering approach for detecting polymorphic malware 

    Masabo, Emmanuel; Kaawaase, Kyanda Swaib; Sansa-Otim, Julianne; Hanyurwimfura, Damien (IEEE, 2017)
    Currently, malware are distributed in a polymorphic form. There are very smart and obfuscated. This serves the purpose of hardening detection or simply making it impossible. Researchers have mainly resorted to static ...
  • Robust Mobile Cloud Services Through Offline Support 

    Omwenga Momanyi, Maxwell; Sansa-Otim, Julianne Suzanne; Namulindwa Lumala, Agnes F. (IEEE, 2012)
    Cloud computing improves the efficiency of mobile applications. This is because data storage and processing are moved from the low resourced mobile devices to the cloud. Mobile cloud computing however, faces the challenge ...
  • Performance of the Energy Aware Routing Protocol in Wireless Sensor Networks with mobile nodes 

    Fote Kamanyi, Antonia; Ngubiri, John; Sansa-Otim, Julianne (International Conference on Wireless Networks (ICWN), 2012)
    Wireless Sensor Networks (WSNs) are increasing in popularity. This is due to several applications (like car tracking, acute patient monitoring and forest fire detection). Energy in WSNs is a scarce resource and therefore ...
  • Online Agriculture Information System for Uganda 

    Oyo, Benedict; Magara, Stephen; Andogah, Geoffrey (ISTAfrica, 2012)
    Over the last decade, agricultural output in Uganda has generally been declining yet the population is rapidly growing. This implies that interventions by government and other development partners through: improved seeds, ...
  • Integrating Action Research and System Dynamics: Towards a Generic Process Design for Participative Modelling 

    Oyo, Benedict; Williams, Ddembe; Barendsen, Erik (IEE, 2009)
    The process of building system dynamics models ranges from linear iterative phases to the circular iterative phases. However, while all these process designs are well known and explicit to system dynamics modellers, ...
  • A Teaching and Learning Softboard Application 

    Andresile, Peter; Oyo, Benedict (ResearchGate, 2010)
    A soft-board application allows users to write, draw, and manipulate graphics just like they would do with physical aids such as chalk/white boards or pen and paper. These applications have over the years advanced from ...