6 research outputs found

    A Realist Evaluation of the Sustainability of Disease Surveillance Intervention Outcomes in Sub-Saharan Africa

    Get PDF
    In recent years, the use of Information and Communication Technologies (ICTs) and to improve disease surveillance has been on the increase. This is in line with the notion that ICTs improve timeliness, availability and quality of public health data. Sub-Saharan Africa (SSA) is burdened with increasing health challenges and poor health infrastructure. Thus, an explosion of ICT-based health surveillance interventions to curb these challenges. However, despite the implementation of these interventions, important questions around the effectiveness and sustainability still remain. This study proposes a realist evaluation of disease surveillance intervention outcomes from a sustainability perspective to uncover what works, for whom, under what conditions and why? We also discuss how the complex adaptive systems theory and affordance theory provide a lens for investigating this phenomenon. The results of this study will contribute to the evidence based movement for Information Systems (IS) research and practice in SSA

    Camouflages and Token Manipulations-The Changing Faces of the Nigerian Fraudulent 419 Spammers

    Full text link
    The inefficiencies of current spam filters against fraudulent (419) mails is not unrelated to the use by spammers of good-word attacks, topic drifts, parasitic spamming, wrong categorization and recategorization of electronic mails by e-mail clients and of course the fuzzy factors of greed and gullibility on the part of the recipients who responds to fraudulent spam mail offers. In this paper, we establish that mail token manipulations remain, above any other tactics, the most potent tool used by Nigerian scammers to fool statistical spam filters. While hoping that the uncovering of these manipulative evidences will prove useful in future antispam research, our findings also sensitize spam filter developers on the need to inculcate within their antispam architecture robust modules that can deal with the identified camouflages

    Regulatory Perspective on Nuclear Cyber Security: The Fundamental Issues

    Get PDF
    We are living in a digital and information-driven age; hence need to retain information on virtually every aspect of our lives, nuclear information inclusive. Security in computer systems is strongly related to the notion of dependability. For such system to be reliable and secure in a nuclear facility, unauthorized logic changes must be prevented - confidentiality, field device inputs and outputs must remain immutable throughout their usable lifetime - integrity, and everything should remain in an operable state - availability. The dynamic and complex nature of cyber threats has made it a serious challenge to secure computer systems in nuclear facilities. Despite the adoption of varied cyber security services, policies, mechanisms, strategies and regulatory frameworks like confidentiality, integrity, availability, non-repudiation, encipherment, defence-in-depth, design basis threat, IAEA technical guidance documents such as: GS-R-1, GS-R-2, NSS13, NSS17, NST036, NST045, and NST047, IEEE standard 7-4.3.2-2010, NIST SP 800-53, NIST SP 800-82, NEI 08-09 and country-specific requirements such as: 10 CFR 73.54, 10 CFR 73.1, RG 5.71 (USNRC), KINS/RG-N08.22 (South Korea) respectively, the threats remain persistent. This paper is aimed at providing a regulatory perspective on nuclear cyber security, its relationship to nuclear safety and security, regulatory requirements and cyber security global best practice recommendations and strategies to prevent its occurrence. This is imperative as Nigeria prepares to join the league of countries with operational nuclear power plants and reactors by its approval and adoption of the nuclear power programme roadmap in 2007

    The Impact of ICT Projects on Developing Economies: The Case of People with Physical Disabilities in Nigeria

    Get PDF
    This study investigates the use of computers by People with Disabilities (PWDs) and whether it improves capability and human development in sub-Saharan Africa. Based on a case study’s findings and interviews with PWDs, we build on the Technology-Augment Capability Approach to show how computers as technical objects and caregivers as non-technical objects facilitate four key capabilities for PWDs, namely (1) Capability to education, (2) Capability to socio-economic activities, (3) Capability to social relations, (4) Informational capabilities and capability to employment. However, PWDs’ ability to convert the use of computers into capabilities is influenced by conversion factors, such as personal, social, environmental, technological, choice, and agency. Furthermore, our findings show also that there are enabling factors, such as accessibility, technological know-how, computer features, and Internet connectivity which facilitate PWDs’ achieved functionings

    Outcomes of M-health Implementation on Health Workers’ Transformation in Child Health Care Service Delivery: A Case of ALMANACH

    No full text
    The child mortality rate remains significantly high in many developing countries despite recent contemporary approaches to reducing child mortality rates across the globe. This is especially the case for armed-conflict settings such as Syria, Nigeria, and Niger where approximately 6 million children under the age of five died in 2015. Mhealth is considered a promising information and communication technologies in improving child health outcomes in such a peculiar setting with severe health care deficit. This study is concerned with the analysis of the outcomes of implementing mHealth for health workers\u27 transformation in child health care. To illuminate such an investigation, the study employs the lens of the Cultural-Historical Activity Theory (CHAT). Concepts from CHAT are elaborated to give a deep underpinning of the implementation of ALAMANCH as an alternative model of activity in the child health care activity system. An action research case study approach was used to investigate this study. Observations and interviews were used as the drivers for data collection with semi-structured interviews as the main source of data collection. A total of 31 one-on-one semi-structured interviews were conducted with the health workers while a total of twelve sessions of observation were made in ten PHCs to observe pre and post ALAMANACH implementation processes. Our findings suggest that mHealth implementation has transformed the activities of health workers by creating new roles, division of labor, and new tools in the child health care service delivery system

    Mathematical Modelling of the Spatial Distribution of a COVID-19 Outbreak with Vaccination Using Diffusion Equation

    No full text
    The formulation of mathematical models using differential equations has become crucial in predicting the evolution of viral diseases in a population in order to take preventive and curative measures. In December 2019, a novel variety of Coronavirus (SARS-CoV-2) was identified in Wuhan, Hubei Province, China, which causes a severe and potentially fatal respiratory syndrome. Since then, it has been declared a pandemic by the World Health Organization and has spread around the globe. A reaction–diffusion system is a mathematical model that describes the evolution of a phenomenon subjected to two processes: a reaction process, in which different substances are transformed, and a diffusion process, which causes their distribution in space. This article provides a mathematical study of the Susceptible, Exposed, Infected, Recovered, and Vaccinated population model of the COVID-19 pandemic using the bias of reaction–diffusion equations. Both local and global asymptotic stability conditions for the equilibria were determined using a Lyapunov function, and the nature of the stability was determined using the Routh–Hurwitz criterion. Furthermore, we consider the conditions for the existence and uniqueness of the model solution and show the spatial distribution of the model compartments when the basic reproduction rate R01 and R0>1. Thereafter, we conducted a sensitivity analysis to determine the most sensitive parameters in the proposed model. We demonstrate the model’s effectiveness by performing numerical simulations and investigating the impact of vaccination, together with the significance of spatial distribution parameters in the spread of COVID-19. The findings indicate that reducing contact with an infected person and increasing the proportion of susceptible people who receive high-efficacy vaccination will lessen the burden of COVID-19 in the population. Therefore, we offer to the public health policymakers a better understanding of COVID-19 management
    corecore