Information Technology Research Papers/Topics

Network Downtime in Government Department :an Investigation of this common Phenomenon with suggestion of best practices and best technologies

Abstract: Network downtime is the period in which a computer system is unavailable or system fails to provide/perform its primary functions. System reliability and/or availability are very Key as an unavailable system is a failing system. It is very common is Botswana for government clients to forfeit being serviced because the government department system is down. The primary aim of this project was to investigate the causes of system/network downtimes in Botswana government department. Thr...

Distribution Efficiency of E-services in the Health Insurance Sector : The Case of Botswana

Abstract: Nowadays customers have become empowered by information communication technologies. This state of customers has brought enormous pressure to bear on organizations, thus, organizations have to stay relevant, market-oriented and profitable. The insurance sector is one that is constantly challenged by its exposure to ICT and the associated need for e-services by myriad customers. With increasing competition in the health insurance environment, it is necessary for the sector to underst...

Usage of E-Learning Platforms amongst Private Tertiary Students: A Case Study of Botho University

Abstract: Since the integration of technology in teaching and learning, it has been observed that there is improvement in the acquisition and retention of knowledge. There is also existing body of research on adoption of e-learning platforms by students in institutions of Higher Education across the world. However, few of the existing studies has involved students in private tertiary education institutions in Botswana. Therefore, this study has set out to explore student usage of e-learning ...

Effects of Technology Acceptance Model on Internet Banking Adoption, at Barclays Bank, Tsabong (Botswana)

Abstract: Abstract The purpose of this study was to reviews the effects of the technology acceptance model on internet banking adoption at Barclays bank, Tsabong (Botswana). The primary objective of the study was to investigate the factors which influence the customer‟s behavioral intention to accept internet banking. This research adopted a descriptive research design, following a survey design strategy. A positivism research philosophy was adopted, where the data collection was done foll...

Memetic Optimization with Cryptographic Encryption for Secure Medical Data Transmission in IoT-Based Distributed Systems

Abstract: In the healthcare system, the Internet of Things (IoT) based distributed systems play a vital role in transferring the medical-related documents and infor mation among the organizations to reduce the replication in medical tests. This datum is sensitive, and hence security is a must in transforming the sensational contents. In this paper, an Evolutionary Algorithm, namely the Memetic Algo rithm is used for encrypting the text messages. The encrypted information is then inserted int...

Deployment of IoV for smart cities: applications, architecture, and challenges

Abstract: The Internet of Vehicles (IoV) is a convergence of the mobile Internet and the Internet of Things (IoT), where vehicles function as smart moving intelligent nodes or objects within the sensing network. This paper gives two contributions to the state-of-the-art for IoV technology research. First, we present a comprehensive review of the current and emerging IoV paradigms and communication models with an emphasis on deployment in smart cities. Currently, surveys from many authors hav...

Computerised Accounting Software; A Curriculum that Enhances an Accounting Programme

Abstract: There has been an outcry in commerce and industry about students who fail to perform in the accounting department due to lack of “practical accounting skills”. It is from this background that the researchers were motivated to investigate the impact of a Computerised Accounting Software Curriculum that enhances an Accounting Programme. At Botho University a degree in Bsc Hons in Accounting is offered and it is perceived that the graduates of this programme will be all rounded af...

Pathway Staff Management System

TABLE OF CONTENT ACKNOWLEDGEMENT...........................................................................................................................2 DECLARATION .......................................................................................................................................3 DEDICATION..........................................................................................................................................4 ABSTRACT..................................

Assessing the Perception and Challenges of Online Learning by Students in some Selected Tertiary Institutions in Ghana

TABLE OF CONTENT CONTENT............................................................................................................................ PAGE DECLARATION ACKNOWLEDGEMENT.. i DEDICATION.. ii TABLE OF CONTENT.. iv LIST OF TABLES. vii LIST OF FIGURES. vii ABSTRACT.. viii   CHAPTER ONE.. 1 1.0      INTRODUCTION.. 1 1.1      Background of the Study. 1 1.2      Problem Statement2 1.3      Objective of the study. 4 1.3.1       Main objective. 4 1.3.2     �...

Impact of Agricultural Land Acquisition for Urbanisation on Agricultural Activities of Affected Households in Bumbogo Sector

Abstract The procedure by which the government obtains agricultural land for urbanization involves acquisition of agricultural land from multiple users, transferring it into non-farming land, and then developing and establishing infrastructure on the non-agricultural region. Land acquisition for urbanization had a substantial influence on agriculture in the Bumbogo sector. 2002, 2012, and 2022 are the most recent 20 years. In this study, conduction of surveys in a range of communities to find...

Understanding Network Preference of People

Emmanuel, O. (2008). Taking risky opportunities in youthful content creation: teenagers' use of social networking sites for intimacy, privacy and self-expression. New Media & Society, 10(3), 393-411

Online Medical Appointment Booking System: Case Study - Bamboo Hospital

Table of Contents DECLARATION  APPROVAL  DEDICATION  LIST OF FIGURES  ABBREVIATIONS AND TERMS  ABSTRACT  CHAPTER ONE  INTRODUCTION  1.0 Introduction  1.1 General introduction  1.2 Background of the Study  1.3 Problem Statement  1.4 General O b je c t iv e  1.5 Specific Objectives  1.6 Research Questions  1.6.1 General Research Question  1.6.2 Specific Research Questions  1.7 Significance of the Study  1.8.1 Content scope  1.8.2 Geographical  1.8.3 Time Scope  1.9 Study Li...

Telecommunication Services and Economic Development in Mogadishu Somalia

ABSTRACT  Since destruction of Somali central government in 1991, a number of telecommunication companies have been established to provide telecommunication services in Mogadishu Somalia that there is no significant studies have been done to determine the contribution of telecommunication services on the economic development in Mogadishu Somalia. Therefore, the study was conducted to examine the relationship between telecommunication service and economic development in Mogadishu Somalia. The...

Factors Influencing Implementation of Information Technology Policy (Case Study of Federal Institute of Industrial Research, Oshodi, Nigeria)

ABSTRACT  This study aimed at establishing the factors which influence implementation of Information Technology Policy in the selected organization (Federal Institute of Industrial Research, Nigeria). The sample size of 124 was selected from the target population of 1 80 using Sloven’s formula of sample size computation. The data analysis was made using Statistical Package for Social Sciences (SPSS. 20). The major findings of the study were there is strong significant and positive correlat...

Enhancement of Image Steganography Using Compression Techniques

ABSTRACT  In a world of digital technology, maintaining the security of the secret data has become a great challenge. One way to achieve this is to encrypt the message before it is sent. But encryption draws the attention of third parties, which may cause the third party to seek to break the encryption and to detect the original message. Another way is steganography, steganography is the art and science of writing hidden Messages in such a way that no one, apart from the sender and intended ...


1 - 15 Of 393 Results