du.sePublications
Change search
Refine search result
1 - 7 of 7
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • chicago-author-date
  • chicago-note-bibliography
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 1.
    Asiimwe, Edgar Napoleon
    Dalarna University, School of Technology and Business Studies, Information Systems.
    Opinions of social web users on privacy and online DAM2010In: Journal of Digital Asset Management, ISSN 1743-6540, Vol. 6, no 6, p. 312-318Article in journal (Refereed)
    Abstract [en]

    The web today hosts thousands of web user profiles. These profiles contain information, which is sensitive – a reason why the information is protected from illegal use by privacy policies. This kind of information is at times referred to as online digital assets. Online digital assets are either hosted on private or government websites and online systems depending on where users are registered. There is a possibility that after death or impairment of a user, the confidentiality of online digital assets may be compromised due to absence of ownership and weak legal policies. This may result into privacy infringement of the owner, that is, the deceased or the impaired as well as other people related to the affected user such as those that have had sensitive conversations with him or her. Using Facebook as a case study, this research examined social web users’ opinions on privacy and online digital assets management (DAM) after death or impairment of a user. The study used an online questionnaire to collect opinions from 22 Facebook users. Results show that the majority of respondents consider privacy and online DAM to be important issues. On the other hand, other Facebook users think that privacy in social networking websites is a mere illusion. There are also users who are not familiar with the concept of DAM and do not have any means of managing their assets in case of impairment or death.

  • 2.
    Asiimwe, Edgar Napoleon
    et al.
    Dalarna University, School of Technology and Business Studies, Information Systems. Örebro University.
    Grönlund, Åke
    Örebro university.
    E-waste management in East African community2012In: Handbook of Research on E-Government in Emerging Economies: Adoption, E-Participation, and Legal Frameworks / [ed] Kelvin Joseph Bwalya; Saul F.C. Zulu, IGI Global, 2012, p. 307-327Chapter in book (Refereed)
  • 3.
    Asiimwe, Edgar Napoleon
    et al.
    Dalarna University, School of Technology and Business Studies, Information Systems. Örebro university.
    Grönlund, Åke
    Örebro universitet.
    MLCMS actual use, perceived use, and experiences of use2015In: ijEDict - International Journal of Education and Development using Information and Communication Technology, ISSN 1814-0556, E-ISSN 1814-0556, Vol. 11, no 1, p. 101-121, article id 1931Article in journal (Refereed)
    Abstract [en]

    Mobile learning involves use of mobile devices to participate in learning activities. Most elearning activities are available to participants through learning systems such as learning content management systems (LCMS). Due to certain challenges, LCMS are not equally accessible on all mobile devices. This study investigates actual use, perceived usefulness and user experiences of LCMS use on mobile phones at Makerere University in Uganda. The study identifies challenges pertaining to use and discusses how to improve LCMS use on mobile phones. Such solutions are a cornerstone in enabling and improving mobile learning. Data was collected by means of focus group discussions, an online survey designed based on the Technology Acceptance Model (TAM), and LCMS log files of user activities. Data was collected from two courses where Moodle was used as a learning platform. The results indicate positive attitudes towards use of LCMS on phones but also huge challenges whichare content related and technical in nature.

  • 4.
    Asiimwe, Edgar Napoleon
    et al.
    Dalarna University, School of Technology and Business Studies, Information Systems. Örebro university.
    Grönlund, Åke
    Örebro university.
    On mobile learning with Learning Content Management Systems: a contemporary literature review2014In: Mobile as a Mainstream – Towards Future Challenges in Mobile Learning: 13th World Conference on Mobile and Contextual Learning, mLearn 2014, Istanbul, Turkey, November 3-5, 2014, Proceedings / [ed] Marco Kalz, Yasemin Bayyurt & Marcus Specht, 2014, p. 131-145Conference paper (Refereed)
    Abstract [en]

    Learning Content Management Systems (LCMS) are important tools for organizing learning material and communication. Increasingly mobile technologies are used for internet access; particularly important in developing countries where broadband is scarce. Mobile LCMS introduce specific challenges, which are yet not fully addressed. This paper reviews the literature on mobile LCMS for the purpose of identifying current research focus, research gaps, and future research directions regarding how to bridge the gaps and leverage CMS technology to support “mobile learning”. The concept matrix method is used to collect and analyze literature. Five prominent research areas are found; Use, access, design and infrastructure; communication and collaboration; engagement and knowledge development; content and service delivery; and implementation experiences and evaluation. A major gap identified is that research does neither clearly nor thoroughly address the intersection between learning and technology. Adjusting technologies to learning contexts and environments is a key area for future research.

  • 5.
    Asiimwe, Edgar Napoleon
    et al.
    Dalarna University, School of Technology and Business Studies, Information Systems. Örebro University.
    Grönlund, Åke
    Örebro University.
    Wairagala, Wakabi
    Örebro University.
    Using technology for enhancing transparency and accountability in low resource communities: experiences from Uganda2013In: ICT for Anti-Corruption, Democracy and Education In East Africa / [ed] Katja Sarajeva, Stockholm: Spider , 2013, p. 37-51Chapter in book (Other academic)
    Abstract [en]

    This study aimed at investigating the user needs, practices, experiences and challenges faced in promoting transparency and accountability using ICT in low-resource communities. The research was conducted on two ICT4D (Information and Communication Technology for Development) initiatives, a call center, and a telecenter supported by two projects; (1) “Promoting Social Accountability In The Health Sector In Northern Uganda”, (2) “Catalyzing Civic Participation And Democracy Monitoring Using ICTs”. The two projects sought to fight corruption by increasing transparency and accountability using ICT to enable “whistle-blowing,” i.e., reporting misconduct in service provision. The projects are based in Uganda and are carried out by Spider (Swedish Program for ICT in Developing Regions) partner organizations: Transparency International (TI) Uganda and Collaboration International ICT Policy in East and Southern Africa (CIPESA). Using interviews, focus group discussions and observations, the study addressed three research questions: (1) How have the two projects provided citizens a trusted and effective channel for “whistle-blowing”? (2) What are the enabling factors for whistle-blowing through ICT and challenges that affect whistle-blowers and how can the challenges be overcome?

    The ICT service-delivery monitoring and reporting methods used by projects include toll free phone calls, blogs, radio talk shows, SMS and e-mail for reaching out; and processes for verification of reports and for communicating reports to government. There are results that indicate these methods are sound enough to serve the purposes of transparency and accountability, and the track record exhibits real change achieved in many instances. ICT users are optimistic and trustful of these ICT methods. Effective whistle-blowing includes efficient and effective reporting processes, convenience in reporting, actual service delivery improvements, availability and privacy, and affordability. There are also a number of challenges, including user education, gender issues, and general issues pertaining to the business model, including economic sustainability and finding the most effective scope of the operations.

  • 6.
    Asiimwe, Edgar Napoleon
    et al.
    Dalarna University, School of Technology and Business Studies, Information Systems. Örebro University.
    Khan, Sana Zubair
    Dalarna University, School of Technology and Business Studies, Information Systems. Örebro University.
    Ubiquitous computing in education: a SWOT analysis by students and teachers2013In: QScience Proceedings: Vol. 2013, 2013Conference paper (Refereed)
    Abstract [en]

    Learning from anywhere anytime is a contemporary phenomenon in the field of education that is thought to be flexible, time and cost saving. The phenomenon is evident in the way computer technology mediates knowledge processes among learners. Computer technology is however, in some instances, faulted. There are studies that highlight drawbacks of computer technology use in learning. In this study we aimed at conducting a SWOT analysis on ubiquitous computing and computer-mediated social interaction and their affect on education. Students and teachers were interviewed on the mentioned concepts using focus group interviews. Our contribution in this study is, identifying what teachers and students perceive to be the strength, weaknesses, opportunities and threats of ubiquitous computing and computer-mediated social interaction in education. We also relate the findings with literature and present a common understanding on the SWOT of these concepts.

    Results show positive perceptions. Respondents revealed that ubiquitous computing and computer-mediated social interaction are important in their education due to advantages such as flexibility, efficiency in terms of cost and time, ability to acquire computer skills. Nevertheless disadvantages where also mentioned for example health effects, privacy and security issues, noise in the learning environment, to mention but a few. This paper gives suggestions on how to overcome threats mentioned.

  • 7.
    Asiimwe, Edgar Napoleon
    et al.
    Dalarna University, School of Technology and Business Studies, Information Systems.
    Lim, Nena
    Usability of government websites in Uganda2010In: Electronic Journal of e-Government, ISSN 1479-439X, E-ISSN 1479-439X, Vol. 8, no 1, p. 1-12Article in journal (Refereed)
    Abstract [en]

    Government websites offer great benefits to citizens and governments. Such benefits, however,cannot be realized if websites are unusable. This study investigates usability of government websites in Uganda.Using the feature investigation method, the study evaluated four Ugandan government websites according tothree perspectives. Results show that websites are partially usable in the design layout and navigationperspectives but are rather weak in stating legal policies. Evaluation results provide the Ugandan governmentwith a clear picture of what needs to be improved according to international website design standards. Moreover,the parsimonious evaluation framework proposed in the research is useful for any country that wants to do aquick and easy evaluation of their government websites.

1 - 7 of 7
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • chicago-author-date
  • chicago-note-bibliography
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf