Browsing by Author "Kondo, Tabu S"
Now showing 1 - 2 of 2
Results Per Page
Sort Options
Item An empirical study on E-learning adoption in Tanzanian secondary schools(The University of Dodoma, 2016) Kondo, Tabu SThe overall goal of this research work was to develop and validate an e-Learning adoption model in Tanzanian secondary schools as literature had not revealed any comprehensive model that is specifically used in determining the adoption of e-Learning in Tanzanian secondary schools. The existence of this gap encouraged the carrying out of this research to empirically test and validate the combination of the Technology Acceptance Model (TAM), Task Technology Fit (TTF) and Technology Readiness Index (TRI) as well as other variables including Bilingualism and Support which were refined from the principles of e-Learning adoption. Therefore, in order to fill the gap, this research developed a validated model with relevant hypotheses which were tested for their predictive value. The model was initially applied and tested in teaching and learning ordinary level mathematics; however, it has broad application in evaluating the overall impact and effectiveness across a range of learning options. The key findings of this research confirmed the applicability of the developed model to explain e-Learning adoption in Tanzanian secondary schools. Furthermore, the research results showed that perceived usefulness, readiness and support were key determinants of the actual use of e-Learning, which in turn improved the academic performance of students. In addition, perceived TTF was found to significantly affect support and readiness while perceived ease of use and bilingualism were key determinants of perceived usefulness and readiness respectively. The findings also showed the importance of the developed e-Learning adoption model in specifying factors that can motivate students to use e-Learning in Tanzanian secondary schools.Item Quantifying vulnerabilities: A systematic review of the state-of-the-art Web-Based Systems(University of Dar es Salaam, 2024) Masue, Wilbard G.; Ngondya, Daniel; Kondo, Tabu SWeb-based Systems Vulnerabilities (WSVs) have been existing over a long time in all Open System Interconnection (OSI) layers. WSV tends to affect online business operations by letting attackers to gain unauthorized access. Different researchers have been publishing common WSVs regularly. From the published vulnerabilities, it can be noted that the ranking of vulnerabilities is not static. Prevalence of common vulnerabilities tends to vary with time. Moreover, ranking of vulnerabilities from various practitioners, such as OWASP and CWE, at a particular point in time tends to be different because of different approaches and sources. This work sought to come up with an objective way of establishing the latest ranking of common WSV by conducting a Systematic Literature Review from scholarly sources. This study extracted 127 publications from Scholarly Databases: Association of Computing Machineries, ScienceDirect, Springer, IEEE, and Google scholar. After the review, only 62 articles were considered based on five inclusion and exclusion criteria. The review reveals that cross site script, structured query language injection, broken authentication and session management, operating system command injection and file inclusion are the most common WSV.