42 research outputs found

    Determinants of Mobile Health Adoption in Burundi

    Get PDF
    Mobile health (or mHealth) can be broadly defined as the use of mobile devices and technologies to provide healthcare services. The potential of mHealth interventions to address healthcare issues, particularly in developing countries, is widely recognised. Although mHealth has yielded positive outcomes in various contexts, there is a need for designing mHealth interventions that are specifically tailored to the context of individual countries in order to increase the prospects of adoption. It is in this context that, using the Diffusion of Innovation (DOI) theory, this paper investigates the determinants for the adoption of mobile health by healthcare professionals in Burundi. From a sample of 212 primary healthcare professionals, this paper analyses what can influence Burundi’s primary healthcare workers to adopt mobile health. The results indicate that the relative advantages associated with mHealth interventions are perceived as predictors of mHealth adoption in Burundi. Moreover, work-related factors coupled with one’s experience with mobile devices are the DOI compatibility factors that influence the adoption of mHealth by Burundi’s healthcare professionals. mHealth being a new concept with the Burundi’s healthcare system, trialability and observability were found to have a significant influence on its adoption. However, mHealth complexity was found to have no influence on mHealth adoption. This paper advocates for education and awareness programs tailored specifically towards mHealth adoption by primary healthcare workers. It further recommends that the country leverage its East African Community (EAC) membership by forging partnerships with other EAC members in order to be acquainted with and learn from evidence-based outcomes of successful mHealth interventions within the region

    Investigating Secure Agile Requirements Engineering Practices in Software Development

    Get PDF
    The aim of this research study was to assess Agile RE practices in the South African software development industry and investigate secure Agile RE initiatives towards developing secure products. This qualitative research study was contextualized in seventeen South African software development companies. The researchers used structured interviews and document reviews as the primary data collection instruments. Qualitative data was analyzed inductively using content analysis. Emanating from the research were recommendations to guide a regular software developer on good Agile RE practices. The study concluded that although Agile Software Development is practiced in the South African software industry, there needs to be stricter adherences to the Agile Manifesto and Agile Security Manifesto in requirements engineering

    Mobile Malware Implications for IT Management

    Get PDF
    Since the turn of the century malicious software, called malware, has been generated to infect not only computer systems but also ‘smart’ mobile phones. This malicious code is designed specifically to infect the mobile devices and disrupt the operation of the device or to send messages or make calls, resulting in financial loss to the user. The paper analyses trends in mobile malware from the listings of the malware descriptions. These trends show the increasing severity of the mobile malware problem, the introduction of new malware types, and the changing focus on the malware objectives; predictions of possible future trends are made. The implications of these trends for organisational management are discussed, and possible countermeasures to the risks are suggested

    Privacy, security, trust, risk and optimism bias in e-government use: The case of two Southern African Development Community countries

    Get PDF
    Background: Many Southern African Development Community (SADC) countries are adopting and implementing e-government systems to improve the efficiency and effectiveness of their service delivery systems, and Zimbabwe and Zambia are not an exception. However, scholars have noted that the acceptance and utilisation of e-government systems by citizens in Zimbabwe and Zambia is affected by many factors, among others, perceived privacy, perceived security, perceived trust, perceived risk and optimism bias. Objectives: The aim of this study was to investigate the effect of privacy, security, trust, optimism bias and perceived risk on citizens’ use behaviour of e-government systems in the SADC. Method: This study proposes an e-government utilisation model. A quantitative design was employed to collect data from a survey of 489 e-government users in Zambia and Zimbabwe to test the model fit using structural equation modelling. Results: Perceived lack of privacy, security, trust; perceived risk and optimism bias were all confirmed as salient factors affecting the utilisation of e-government systems by citizens in Zambia and Zimbabwe. The structural equation model results confirmed the model fit of the proposed e-government research model. All eight hypotheses for this study were confirmed. Conclusion: The findings of this study provide pointers to practitioners, decision-makers and policymakers on e-government matters on the need to seriously consider privacy, security, risk and trust issues of e-government systems to encourage the utilisation of such systems by citizens

    INFORMATION-BASED CONFLICT IN AFRICA

    Get PDF
    For a long time, the African continent was regarded as the ‘Dark Continent’. The rapid assimilation of information technologies into the African economies has placed Africa firmly on a trajectory that will see it compete and integrate with the developed world. As nations and organisations become more information-centric, it is natural that conflicts and competition amongst the various nations or organisations will become increasingly information-based. In this article, the authors reflect upon information-based conflict in Africa. Areas of information conflict that are discussed include censorship, communications intercepts, the use of information and communications to instigate violence and uprisings, and the possibility of cyberwarfare. The article shows that the use of technology to conduct information conflict in Africa is prevalent, and that it is likely to increase

    Uncovering Web search tactics in South African higher education

    Get PDF
    Background: The potential of the World Wide Web (‘the Web’) as a tool for information retrieval in higher education is beyond question. Harnessing this potential, however, remains a challenge, particularly in the context of developing countries, where students are drawn from diverse socio-economic, educational and technological backgrounds. Objectives: The purpose of this study is to identify the Web search tactics used by postgraduate students in order to address the weaknesses of undergraduate students with regard to their Web searching tactics. This article forms part of a wider study into postgraduate students’ information retrieval strategies at the University of KwaZulu-Natal, Pietermaritzburg campus, South Africa. Method: The study utilised the mixed methods approach, employing both questionnaires (Phase 1) and structured interviews (Phase 2), and was largely underpinned by Bates’s model of information search tactics. This article reports and reflects on the findings of Phase 1, which focused on identifying the Web search tactics employed by postgraduate students. Results: Findings indicated a preference for lower-level Web search tactics, despite respondents largely self-reporting as intermediate or expert users. Moreover, the majority of respondents gained their knowledge on Web searching through experience and only a quarter of respondents have been given formal training on Web searching. Conclusion: In addition to contributing to theory, it is envisaged that this article will contribute to practice by informing the design of undergraduate training interventions to proactively address the information retrieval challenges faced by novice users. Subsequent papers will report on Phase 2 of the study

    On characteristic initial data for a star orbiting a black hole

    Full text link
    We take further steps in the development of the characteristic approach to enable handling the physical problem of a compact self-gravitating object, such as a neutron star, in close orbit around a black hole. We examine different options for setting the initial data for this problem and, in order to shed light on their physical relevance, we carry out short time evolution of this data. To this end we express the matter part of the characteristic gravity code so that the hydrodynamics are in conservation form. The resulting gravity plus matter relativity code provides a starting point for more refined future efforts at longer term evolution. In the present work we find that, independently of the details of the initial gravitational data, the system quickly flushes out spurious gravitational radiation and relaxes to a quasi-equilibrium state with an approximate helical symmetry corresponding to the circular orbit of the star.Comment: 20 pages, 10 figure

    The incorporation of matter into characteristic numerical relativity

    Full text link
    A code that implements Einstein equations in the characteristic formulation in 3D has been developed and thoroughly tested for the vacuum case. Here, we describe how to incorporate matter, in the form of a perfect fluid, into the code. The extended code has been written and validated in a number of cases. It is stable and capable of contributing towards an understanding of a number of problems in black hole astrophysics.Comment: 15 pages + 4 (eps) figure

    Black Hole Data via a Kerr-Schild Approach

    Get PDF
    We present a new approach for setting initial Cauchy data for multiple black hole spacetimes. The method is based upon adopting an initially Kerr-Schild form of the metric. In the case of non-spinning holes, the constraint equations take a simple hierarchical form which is amenable to direct numerical integration. The feasibility of this approach is demonstrated by solving analytically the problem of initial data in a perturbed Schwarzschild geometry.Comment: 13 pages, RevTeX forma

    High-powered Gravitational News

    Get PDF
    We describe the computation of the Bondi news for gravitational radiation. We have implemented a computer code for this problem. We discuss the theory behind it as well as the results of validation tests. Our approach uses the compactified null cone formalism, with the computational domain extending to future null infinity and with a worldtube as inner boundary. We calculate the appropriate full Einstein equations in computational eth form in (a) the interior of the computational domain and (b) on the inner boundary. At future null infinity, we transform the computed data into standard Bondi coordinates and so are able to express the news in terms of its standard N+N_{+} and N×N_{\times} polarization components. The resulting code is stable and second-order convergent. It runs successfully even in the highly nonlinear case, and has been tested with the news as high as 400, which represents a gravitational radiation power of about 1013M/sec10^{13}M_{\odot}/sec.Comment: 24 pages, 4 figures. To appear in Phys. Rev.
    corecore