East African Journal of Information Technology最新文献

筛选
英文 中文
The Mediating Role of Teacher Training and Learner Orientation in ICT Integration for Competence-Based Curriculum Implementation in Kyaka II Refugee Settlement 教师培训和学习者导向在信息与传播技术整合促进基于能力的课程实施中的中介作用
East African Journal of Information Technology Pub Date : 2024-07-23 DOI: 10.37284/eajit.7.1.2056
Jessica Kabasiita, Edmond Kagambe, Tawheed Kasiita, Maliko Kisembo, Aisha Namubiru, Edith Namutebi
{"title":"The Mediating Role of Teacher Training and Learner Orientation in ICT Integration for Competence-Based Curriculum Implementation in Kyaka II Refugee Settlement","authors":"Jessica Kabasiita, Edmond Kagambe, Tawheed Kasiita, Maliko Kisembo, Aisha Namubiru, Edith Namutebi","doi":"10.37284/eajit.7.1.2056","DOIUrl":"https://doi.org/10.37284/eajit.7.1.2056","url":null,"abstract":"This study explored the impact of teacher training and learner orientation on the integration of Information and Communication Technologies (ICTs) within the Competence-Based Curriculum (CBC) in secondary schools in Kyaka II Refugee Settlement. Despite significant efforts to improve education in refugee contexts, effective ICT integration remains a complex challenge. The research examined how teacher training and learner orientation influence ICT usage, teacher preparedness, and student engagement in this distinctive educational environment. Utilizing a descriptive survey design and questionnaires, data was collected from 455 participants, including 89 purposively selected teachers and 366 randomly selected students. Data was analyzed using SPSS to generate descriptive statistics. The findings indicate that comprehensive teacher training positively affects ICT integration, with trained educators demonstrating enhanced confidence and competence in using ICT tools, as evidenced by a moderate positive correlation coefficient (r = 0.54). Oriented learners exhibited increased interest and engagement in ICT-driven learning. The study identified a gap between training outcomes and practical classroom application, suggesting a need for more hands-on and continuous professional development. Challenges such as inadequate ICT infrastructure, poor internet connectivity, and limited administrative support were significant barriers to optimal ICT integration. The study recommends implementing ongoing, hands-on teacher training programs, improving ICT infrastructure, establishing robust support systems within schools, and enhancing student access to ICT resources to address these challenges and support effective ICT integration in refugee education settings","PeriodicalId":509108,"journal":{"name":"East African Journal of Information Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141813058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Leveraging Technology for Government Service Delivery: Suggestions for Securing the eCitizen Services in Kenya 利用技术提供政府服务:确保肯尼亚电子公民服务的建议
East African Journal of Information Technology Pub Date : 2024-02-14 DOI: 10.37284/eajit.7.1.1757
Lucy W. Maina, Godfred Ohndyl Otieno
{"title":"Leveraging Technology for Government Service Delivery: Suggestions for Securing the eCitizen Services in Kenya","authors":"Lucy W. Maina, Godfred Ohndyl Otieno","doi":"10.37284/eajit.7.1.1757","DOIUrl":"https://doi.org/10.37284/eajit.7.1.1757","url":null,"abstract":"Governments across the world have increasingly embraced e-governance in the provision of public services. This development has significantly reduced bureaucracy, enhanced efficiency, reduced corruption and fundamentally transformed public service delivery. However, the adoption of these copyright technology solutions, owned by international corporations, non-state actors, mostly multinational corporations (MNCs), have equally exposed user governments, such as Kenya, to significant cyberspace security threats, service disruptions, exposed national security, interferences to national independence and loss of national sovereignty. These threats arise from the activities of offensive states, non-states and individuals taking advantage of the integrated and dependent internet connectivity networks. This paper is an extract from a study conducted on Information Security Threats to eCitizen Services in Kenya. The research presents findings on information security measures to secure eCitizen services in Kenya.  The case study adopted a descriptive research design that targeted 12,000 respondents (users) from 51 Huduma Centres countrywide. Purposive sampling was applied to select Huduma Centres and 10% of respondents from each centre.  About 1,200 questionnaires were issued with a return rate of 966 responses at 80%. The study applied both quantitative and qualitative techniques in analysis. The hypothesis was tested at a 5% significance level. The study identified 10 categories of security measures, six of which are discussed in this paper i.e., National capabilities, institutional policies, capacity development, backups, physical access, professional certification, frequent ICT audits, firewalls and management security reviews. The study recommends locally modelled technological solutions, mutually beneficial cyber security collaboration, frequent infrastructure security audits, user capacity training and restructuring national security organs to create cyberspace manning capabilities. These sectoral changes will enhance preventive, defensive and offensive capabilities against arising cyberspace threats from geopolitical, technological, economic and security competition and rivalries among global nations, non-state actors and malicious individuals","PeriodicalId":509108,"journal":{"name":"East African Journal of Information Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139778638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Leveraging Technology for Government Service Delivery: Suggestions for Securing the eCitizen Services in Kenya 利用技术提供政府服务:确保肯尼亚电子公民服务的建议
East African Journal of Information Technology Pub Date : 2024-02-14 DOI: 10.37284/eajit.7.1.1757
Lucy W. Maina, Godfred Ohndyl Otieno
{"title":"Leveraging Technology for Government Service Delivery: Suggestions for Securing the eCitizen Services in Kenya","authors":"Lucy W. Maina, Godfred Ohndyl Otieno","doi":"10.37284/eajit.7.1.1757","DOIUrl":"https://doi.org/10.37284/eajit.7.1.1757","url":null,"abstract":"Governments across the world have increasingly embraced e-governance in the provision of public services. This development has significantly reduced bureaucracy, enhanced efficiency, reduced corruption and fundamentally transformed public service delivery. However, the adoption of these copyright technology solutions, owned by international corporations, non-state actors, mostly multinational corporations (MNCs), have equally exposed user governments, such as Kenya, to significant cyberspace security threats, service disruptions, exposed national security, interferences to national independence and loss of national sovereignty. These threats arise from the activities of offensive states, non-states and individuals taking advantage of the integrated and dependent internet connectivity networks. This paper is an extract from a study conducted on Information Security Threats to eCitizen Services in Kenya. The research presents findings on information security measures to secure eCitizen services in Kenya.  The case study adopted a descriptive research design that targeted 12,000 respondents (users) from 51 Huduma Centres countrywide. Purposive sampling was applied to select Huduma Centres and 10% of respondents from each centre.  About 1,200 questionnaires were issued with a return rate of 966 responses at 80%. The study applied both quantitative and qualitative techniques in analysis. The hypothesis was tested at a 5% significance level. The study identified 10 categories of security measures, six of which are discussed in this paper i.e., National capabilities, institutional policies, capacity development, backups, physical access, professional certification, frequent ICT audits, firewalls and management security reviews. The study recommends locally modelled technological solutions, mutually beneficial cyber security collaboration, frequent infrastructure security audits, user capacity training and restructuring national security organs to create cyberspace manning capabilities. These sectoral changes will enhance preventive, defensive and offensive capabilities against arising cyberspace threats from geopolitical, technological, economic and security competition and rivalries among global nations, non-state actors and malicious individuals","PeriodicalId":509108,"journal":{"name":"East African Journal of Information Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139838285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Framework for Guiding the Design of Interactive Systems for Communication through Activities in Higher Learning Institutions 指导设计高等院校通过活动进行交流的互动系统的框架
East African Journal of Information Technology Pub Date : 2024-01-05 DOI: 10.37284/eajit.7.1.1671
Anthony Mwombeki, N. Shidende, Leornard Mselle
{"title":"A Framework for Guiding the Design of Interactive Systems for Communication through Activities in Higher Learning Institutions","authors":"Anthony Mwombeki, N. Shidende, Leornard Mselle","doi":"10.37284/eajit.7.1.1671","DOIUrl":"https://doi.org/10.37284/eajit.7.1.1671","url":null,"abstract":"Human-computer interaction is paramount in the process of designing interactive-computer systems with high capabilities of guaranteeing users’ satisfaction. However, lack of suitable frameworks complicates their effective design. This study investigated suitable frameworks capable of guiding appropriate design of interactive systems for communication through activities (ISCA) in higher learning institutions in Tanzania. These systems are necessary for augmenting communication thereby overcoming persistent challenges related to their reliance on face-to-face, phone-based, and social networking websites communications. This study used a thorough user centred design approach where a framework for human activity design-centred (HADC) was employed. Authors qualitatively analysed data on communication and interaction issues from participants involved. Design science research was then combined with activity theory to develop a four-phased methodology which was used to design an intended human activity interactive communication (HAIC) framework. The findings confirmed that interactions design techniques based on human-activities undertaken are fundamental in designing communication frameworks capable of guiding suitable design of interactive systems in a particular setting. In the context of this study, and with ISCA need, the obtained HAIC framework was found to be appropriate. This study found out that the current user-centred design approach does not explain precisely how designers can employ activity-based interaction design techniques into the design process. Thus, the study contributes to the literature on users’ involvement in interactive systems’ design through the HADC framework provided","PeriodicalId":509108,"journal":{"name":"East African Journal of Information Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139380989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信