Browsing by Author "Yonah, Zaipuna O."
Now showing 1 - 3 of 3
Results Per Page
Sort Options
Item Critical issues and challenges in developing mobile-based health systems: case of Tanzania(IJCSIS, 2017) Chali, Frederick Henri; Yonah, Zaipuna O.; Kalegele, KhamisUtilization of mobile devices worldwide is increasing every day. This has created an increasing demand for mobile apps, the development of which is not seamlessly without challenges. We conducted a research survey to identify and confirm the known challenges and issues that are faced by mobile app developers in their development work in developing countries particularly Tanzania. This survey was done in three regions of Tanzania: Dar es Salaam, Dodoma and Arusha; because most of the mobile apps developers are located in these regions and e Health information systems were used as a case for this purpose. Methodology used was literature, interview, questionnaire, and observation. This paper presents an overview of the identified challenges and issues facing mobile app developers and the proposed data exchange solution. These findings have justified our ongoing research on interoperability of multiple databases through a single mobile applicationItem A secure maturity model for protecting e-government services: a case of tanzania(ACSIJ Advances in Computer Science: An International Journal, 2014) Waziri, Mohamed D.; Yonah, Zaipuna O.E-Government Maturity Models (eGMMs) are widely used in the implementation and development of e-Government services. These models outline various stages for e-Government development. Information security and privacy are considered as the most significant challenges in implementing e-Government services, but unfortunately very few designs of eGMMs have considered security as a specific issue. However, even these few security responsive models consider security mostly at the transaction stage, and as such it is insecure to depend on security mechanisms provided at transaction stage only. This paper develops a four-stage holistic secured eGMM for protecting e-Government services with Tanzania used as a case study. The proposed secured e-Government maturity model has been designed by including the security layers which consist of technical and non-technical security related aspects in each of its four maturity stages. The model design process is based on the ISO/IEC 27002 security standard and is guided by a design science research methodology. The paper main contribution is the proposed secured eGMM that addresses both technical and non-technical security related aspects at its maturity stages.Item Towards a secure maturity model for protecting e-government services in tanzania: a stakeholders view(Advances in Computer Science: an International Journal, 2014) Wazir, Mohamed D.; Yonah, Zaipuna O.E-Government Maturity Models (eGMMs) are widely used as a tool for guiding the development and implementation of e-Government services. The government of Tanzania recognizes that e-Government services can accelerate the achievement of a sustainable social and economic development in the country. However, despite the good benefits provided by e-Government services, information security and privacy are the most significant obstacles for e-Government services adoption. Unfortunately, very few designs of e-GMMs have considered security as a specific issue. However, even these few security responsive models consider security mostly at the transaction stage. Responding to this security weakness of eGMMs, in our earlier work a holistic secure e-Government maturity model that includes security layers consisting of technical and non-technical security related aspects in each of its four maturity stages was developed, but the model was not yet tested and evaluated. This paper reports on the tests and the validation of the proposed secure model. The applied evaluation criteria were: simplicity, reliability, accessibility and usability, dynamics and flexibility, applicability, coverage and completeness, and compliance with legal aspects. Primary data were collected from five Tanzanian public organization using questionnaires. The collected data were processed and analyzed using the SPSS. The overall results show that the model designs meet all required specifications to successfully secure e-Government services, and the model was accepted by majority of the respondents at different organizational levels (strategic, tactical, and operational).