Theses and Dissertations
Permanent URI for this collection
Browse
Browsing Theses and Dissertations by Title
Now showing 1 - 20 of 56
Results Per Page
Sort Options
Item A Centralised Hadoop-Based Framework for Big Data Analytics in Prime Ministerial Offices: A Namibian Case Study(Namibia University of Science and Technology, 2025-09-30) Haitamba, Pombili I.P.Big Data is reshaping the way governments operate, influencing how decisions are made and services delivered. However, most governments, particularly in developing countries, face challenges in managing the growing volume of data generated across public institutions. These challenges can be attributed to a lack of expertise in handling complex and diverse datasets generated in high volume which are becoming difficult for traditional databases to manage. In Namibia, the Office of the Prime Minister (OPM) plays a significant role in coordinating governance and public service administration. The OPM has a mandate to oversee Information and Communication Technology (ICT) in the Public Service and promote e-governance initiatives, which involve the usage and handling of data. However, despite its central role, data from different government ministries remains fragmented, building up silos. This fragmentation limits the government's ability to extract value from the data, hinders coordination across ministries, and ultimately leads to poor service delivery. This study addressed the challenges of data fragmentation within the OPM. It explored the feasibility of designing a centralised database system using Hadoop to integrate and analyse big data across ministries, with the goal of improved administrative efficiency, enhanced public service delivery, and promoting e-governance. Synthetic datasets were generated in Mockaroo, to represent datasets from government ministries. A Hadoop-based setup was undertaken to simulate a centralised database framework integrating all government ministries’ data in Hadoop Distributed File System (HDFS) for storage. A MapReduce job was run in Hadoop, using Java code for analyses across ministries, from Ministry of Home Affairs, Immigration, Safety and Security (MHAISS), Ministry of Labour (MoL), and Ministry of Education, Arts and Culture (MEAC). The job compared poverty indicators based on birth year, educational achievement, and employment status across the three ministries and aggregated the results for regional poverty analysis. The findings of this research show that Hadoop is a cost-effective, open-source framework that has the capabilities to store versatile datasets that currently exists within the Namibian public service into one centralised database that supports big data analysis. The processing layer of Hadoop, MapReduce was able to process a job in minutes that would normally take five to seven working days to complete in the OPMs current administration. Adopting this framework would enable the OPM to make informed decisions backed by evidence, eliminate inefficiencies in public service delivery, and enhance public trust through improved service delivery.Item A MACHINE LEARNING-DRIVEN APPROACH FOR ACCIDENT PREDICTION AND TRAFFIC SAFETY ANALYSIS IN NAMIBIA(Namibia University of Science and Technology, 2024-12) Ngolo, MariaGlobally, road traffic accidents contribute a large portion of injuries, fatalities, and significant economic losses and ongoing research has projected that by 2030, car crashes would be the 5th top reason for loss of life around the world. The key cause of traffic accidents is hard to determine nowadays because of a complex mix of factors, such as road conditions, weather conditions, and the mental condition of the drivers, to list a few. Without a thorough understanding of the characteristics and causes, intelligence-led countermeasures to decrease crashes cannot be created or implemented. Therefore, if traffic accident characteristics can be better understood, it might be easier to take some mitigative action. Nowadays, the utility of machine learning methods in the field of road traffic crashes is gaining traction. The objective of this dissertation is to analyse historical data for a five-year period (2018-2023) and to understand the patterns in accident occurrences by making use of machine learning methods. Machine learning models as such Random Forest, Support Vector Machine, K-Nearest Neighbours, Association Rule Algorithm (AARA), and k-Clustering were employed on the dataset. The Apriori Association Rule algorithm explored the rules with high lift and high support, respectively. The research shows that the Random Forest model is the reliable model in predicting crash severity, reaching an accuracy of approximately 81%. Factors such as junction type, poor road sign conditions, uncontrolled traffic, weather, lighting, road surface, vehicle type, and driver behaviours were identified as the significant variables influencing road accidents. Pedestrian, rollovers, and collision are the leading crash causes of the road accidents, and they are associated with uncontrolled traffic and daylight. Additionally, the research shows notable differences in accident rates by region, month, year, day of the week, and hour of the day, underscoring the impact of geographical features, seasonal trends, and commuting habits on accident rates. The findings indicate that high traffic volumes and urban congestion are the main causes of the greatest accident rates in metropolitan areas, especially in the Khomas Region of Namibia. Further, more accidents are happening more toward the weekend as compared to weekdays and during night hours.Item AN EXAMINATION OF THE SAFETY AND WELFARE STRATEGIES OF PRINT JOURNALISTS REPORTING ON COVID-19 IN NAMIBIA(Namibia University of Science and Technology, 2025-01) PAHEJA, SIRIRIKA.The role of the media during a crisis cannot be over emphasised. During the outbreak of the Covid-19 pandemic, the media assumed a central position in sharing health information during this unprecedented time. In recognition of the significance of journalism, the Namibian government classified journalists as essential workers, allowing them to collaborate freely with healthcare workers during lockdowns. However, being frontline workers raised pertinent issues about the safety and welfare of journalists as they faced challenges, including job losses, mental health problems arising from poor psychosocial care and challenges of working in far-flung regions with meagre resources. Using a qualitative approach and the Protection Motivation Theory, this study examined the safety and welfare strategies employed by selected print journalists in Namibia while reporting on Covid-19. The study assessed selected Namibian print journalists’ perception of their vulnerability to Covid-19, the safety and welfare strategies employed during the COVID-19 pandemic and the effectiveness of the safety and welfare strategies employed when reporting during the COVID-19 pandemic. The Namibian, New Era and Namibian Sun newspapers participated in the study. The study found that journalists felt vulnerable, and experienced emotional and psychological challenges while reporting on Covid-19. The study further observed that various safety and welfare strategies were used by journalists. These included, among others, self-talk and introspection, innovation, escapism, institutional support and adapting and adhering to established health protocols. The study found that while basic support for journalists was provided, mental health support was notably absent despite its crucial role in ensuring that journalists work in a conducive environment. The study concluded that the lack of proper and adequate institutional support for journalists, particularly covering COVID-19 pandemic, compromised both their physical and emotional safety. This undermined their ability to perform their professional duties effectively.Item ASSESSING THE ADAPTIVE CAPACITY OF SELECTED NAMIBIAN PRINT AND BROADCAST MEDIA IN RESPONSE TO CHANGES IN PRACTICE IMPOSED BY COVID-19(Namibia University of Science and Technology, 2025-01) Lamyaa, LinusThe COVID-19 pandemic significantly disrupted the global media landscape, posing unprecedented challenges for journalists and media organisations. This study examines how media and journalists in Namibia responded to changes in journalism practices imposed by COVID-19. Using an exploratory research design and adopting a qualitative research approach, this study assessed changes to journalism practice as a result of the Covid-19 pandemic, and how journalists and media organisations responded to the changes. Data was collected through in-depth interviews with journalists and media practitioners, from selected print and broadcast media, to understand their experiences and adaptations during the pandemic. Findings reveal that the Namibian media industry underwent substantial transformations, including a shift from traditional newsroom operations to remote and digital reporting. The study also found that misinformation was a major challenge, necessitating rigorous fact-checking and verification processes to maintain credibility and public trust. Financial constraints further exacerbated the difficulties, with many media organisations experiencing significant revenue losses, leading to salary cuts, job redundancies, and shifts in business models. Additionally, the pandemic took a toll on journalists' mental health, with many reporting stress and burnout due to increased workloads, job insecurity, and exposure to distressing news. Despite these challenges, journalists demonstrated resilience by embracing digital transformation, collaborative reporting, and innovative storytelling techniques. Alternative revenue streams, including digital subscriptions and external funding sustained media operations. The study concludes that while COVID-19 accelerated digital transformation and innovation in journalism, it also exposed vulnerabilities in financial sustainability and journalists’ well-being. Strengthening institutional support, investing in digital infrastructure, and implementing mental health initiatives are recommended to enhance media resilience in future crises. These findings contribute to the broader discourse on media adaptation in crisis situations.Item Assessing The Efficacy of Artificial Intelligence Chatbots for Delivering Public Information: A Case Study of the “Being A Public Servant in Namibia - The Pocket Guide 2.0 Pocket Bot”(Namibia University of Science and Technology, 2025-01-31) Nassauw, C.C.The research evaluated the Namibian government's "Being a Public Servant in Namibia – The Pocket Guide 2.0 Pocket Bot" artificial intelligence chatbot which serves as a digital self-service tool for civil servants. The research aimed to determine whether the chatbot fulfils its intended purpose to deliver precise and easily accessible public information to its users. The research employed an exploratory qualitative case study methodology. Twenty civil servants including administrative staff, technical experts, and management personnel participated in semi-structured interviews to gather data. The interview data analysis through thematic methods showed that the users appreciated the chatbot because it provided quick access at all times. The users also highlighted three main concerns with the chatbot system which included its user interface design ,its natural language processing capabilities, and the accuracy of its policy-aligned information. Recommendations were drawn from the research findings for the purpose of improving the chatbot interface, expanding its subject matter coverage, enhancing its response speed, and accuracy to fulfil civil servants’ needs. The recommendations provide guidance to policymakers and government agencies for enhancing chatbot services, enabling them to deliver public information more efficiently while improving user satisfaction.Item ASSESSING THE STRATEGIC ROLE OF INTERNAL COMMUNICATION AT THE MINISTRY OF HOME AFFAIRS, IMMIGRATION, SAFETY AND SECURITY IN NAMIBIA(Namibia University of Science and Technology, 2023-05-04) KADHIKWA, SAKEUS IITA.Internal communication has long been the lifeblood of successfully and effectively managed organizations, especially when such communication is strategically managed. Though literature has established the benefits of internal communication, especially when it comes to employee engagement, commitment, and improved corporate reputation, research assessing the strategic role of internal communication in government departments is limited. The aim of the study was to assess the strategic role of internal communication at the Ministry of Home Affairs, Immigration, Safety and Security in Namibia. To achieve this objective, four secondary objectives were pursued. The first secondary objective focused on examining the challenges faced by the Department of Home Affairs and Immigration in implementing the internal communication strategy. The second objective focused on analyzing the impact of internal communication on service delivery, while the third focused on internal communication and employee morale. The last objective examined the alignment between internal communication and the department’s strategy. Data for the study were collected using a structured interview guide. Face-to-face online were conducted with a conveniently selected sample of 25 participants. The methodology that was employed was a qualitative research approach that followed a case study research design. Several challenges affecting the effective implementation of the internal communication strategy were identified. Furthermore, it was noted that participants had mixed views about the role of internal communication and service delivery, as well as its strategic role in the organization. Based on these findings, the study makes recommendations and suggestions for future research.Item ASSESSING THE USE OF SOCIAL MEDIA IN THE PUBLIC RELATIONS PRACTICES OF THE GOVERNMENT INSTITUTION PENSION FUND (GIPF) OF NAMIBIA(NAMIBIA UNIVERSITY OF SCIENCE AND TECHNOLOGY, 2022-01) KAPENDA, JAIRUS JULIUSSocial media have a significant role as a communication tool used by public relations practitioners in disseminating and sharing information as well as obtaining feedback from clients. When used effectively as a communication tool, social media can help address complaints, do market research to identify the needs of the clients and can help any organisation identify new market niches. Despite the essential role of social media, many organisations, including Government Institution Pension Fund (GIPF) Namibia are still not using social media to their maximum and are still opting for traditional methods of communication by the public relations practitioners. This study was conducted using a mixed-method approach. This study assessed the use of social media in public relations practices of the GIPF. The study adopted a quantitative approach, using a case study research design. The study population comprised GIPF staff members and clients. Hence, the sample consisted of 200 participants. A convenient sampling method was used to select a sample. A structured questionnaire with mixed questions collected both qualitative and quantitative data. The major findings of the study were that social media has a great impact on public relations practices and traditional social media platforms, notably Facebook, Instagram and Twitter remained popular. The recommendations were based on the research findings. Hence, the study recommends that various strategies can be used to enhance social media use and visibility. It was also recommended that public relations practitioners should be trained so that their awareness and use of social media is improved.Item AN AUDIENCE ANALYSIS OF HOW THE YOUTH FACT-CHECK ‘FAKE NEWS’ CIRCULATED ON SOCIAL MEDIA IN OMBILI AND HOCHLAND PARK, NAMIBIA(NAMIBIA UNIVERSITY OF SCIENCE AND TECHNOLOGY, 2021-07) HANGULA, RAFAEL. NThe proliferation of "fake news” have massive implications, especially at the times of elections. People who live in marginalised communities are the most exposed to fake news and least armed to decode coordinated information campaigns (information disorders). As a result, it may affect the practice of active citizenship by news consumers as their voting decisions may base on misconceptions. The net effect of this is that, their voting behaviours are done on the basis of highly distorted information whereby those who are most privileged are in a position to make voting decisions on the basis of truthful and credible information. This study explored how the youth in Namibia fact-checked news and information circulated on social media platforms during the 2019 electoral campaign. Firstly, it examined the major forms or types of fake news produced in Namibia before, during and soon after the elections. Secondly, it examined the criteria used by the youth in Ombili and Hochland Park to determine the truthfulness and accuracy of news and information. Thirdly, it assessed the newsworthy factors that the youth in Ombili and Hochland Park consider before sharing news on social media. This research employed virtual ethnography, qualitative content analysis,to understand, and document the types of fake news produced, and circulated in Namibia. Focus Groups Discussions (FGDs), and face-to-face interviews were then employed to get a sense of how young people sift through fake news. Grounded in Hall’s Encoding and Decoding model, fabricated contents, manipulated contents, misleading contents, conspiracy theories and imposter contents were observed in 2019 elections. The study revealed that there was systematic abuse of mainstream brands to spread information disorders to confuse and disorient voters. In addition, these types of fake news were fueled by the poor coordination, and delays in communication from the Electoral Commission. Most of the fake news were aimed at discrediting and casting aspersions on the candidature of Dr Hage Geingob of the Swapo Party, and Dr Panduleni Itula, who was an Independent Candidate at the time. This study found that young citizens’ ability to decode fake news is influenced by the level of education, literacy skills, class differences and media exposure as pointed out by Hall’s theory. Therefore, this study would add that availability of resources to fact check online news and information and political affiliation are also key in fighting fake news. The study recommends that government should ensure that its citizens have access to quality information through tasked institutions, to avoid fabrications, and distribution of information disorders, and provide a room for media and digital literacy campaigns in order to enhance skills of citizens of deconstructing coordinated information disorders, especially on social media platforms. News consumers need to embrace the concept fact checking before agreeing, and distributing information from social media as this would protect them from making decisions that are based on misconceptions, which could affect others.Item AUTOMATED FRAUD DETECTION IN NAMIBIA’S PUBLIC INSTITUTIONS' FINANCIAL TRANSACTIONS USING MACHINE LEARNING: A DEEP LEARNING APPROACH(Namibia University of Science and Technology, 2024-12) Johannes, Pandeni PaavoFinancial fraud continues to be a significant concern in public-sector financial operations, undermining the credibility of financial statements and eroding public trust. Traditional methods used by financial experts, such as auditing, are frequently ineffective in addressing the growing complexity of fraudulent activities and effectively mitigating associated risks. This study aimed to tackle this issue by creating an automated fraud detection system based on deep learning designed for Namibia's public sector financial transactions. The Ministry of Finance provided the primary data for the study through the Office of the Auditor-General, which included accounts payable records from public entities with large transaction volumes for the fiscal years 2021/2022 and 2022/2023. The task of fraud detection is framed as a classification problem. The study explored three common deep learning models: Autoencoders, Generative Adversarial Networks (GAN) and Convolutional Neural Networks (CNN). These models' performance was evaluated using historical and simulated financial data, focusing on accuracy, inference time, and resource utilisation. A comparative analysis revealed that the CNN model performed exceptionally well, with the highest accuracy (0.95), F1-score (0.98), and lowest false positive rate (0.038). In contrast, the GAN model excelled in inference time (7.17 ms per transaction) and precision (0.99). This study proposes a scalable, data-driven approach to improving fraud detection in large public-sector financial datasets, thereby increasing accountability in Namibia's public financial systems.Item A Bio-Immunology Inspired Security Model to Defend Industrial Control Systems from Advanced Persistent Threats(Namibia University of Science and Technology, 2019-01) Chitauro, MercyIndustrial Control Systems (ICS) control critical industrial processes. For example, there are ICS networks that control electricity, water distribution, food, and pharmaceutical and beverage production. Historically, ICS networks were safe from network attacks because they were not interconnected to business Information Technology (IT) networks and the Internet. However, with the passage of time, ICS were interconnected to business networks. Because traditional IT networks are built on the TCP/IP suite, ICS became susceptible to network attacks that already existed in TCP/IP networks and to ICS specific attacks. Successful attacks in ICS networks may compromise the ICS infrastructure, system configurations and components. ICS security standards and frameworks were drafted and approved by different organisations for use in the implementation of ICS security. ICS can be secured using these standards or any other means as recommended by ICS security experts. Even though ICS are secured using these recommended methods, they are still being successfully attacked by Advanced Persistent Threats (APTs). APTs are targeted attacks which are successful because they do not attack any system that they might be in but become active in only those systems they were designed for. APTs have the ability to circumvent available security control and regular intrusion detection systems, and in addition, antiviruses are not able to detect APTs. There is no known technique available to identify APTs that attack ICS because APTs are discovered after they have been in the system for some time and usually only after they have executed their payload. Subsequently, this means that present ICS security implementations are not capable of defending ICS when they are attacked by APTs. By design, ICS security systems should be capable of defending ICS components from any attacks. They are likened to the biological immune system which is responsible for detecting and protecting the biological body from harmful microorganisms. The biological immune system’s most crucial function is that of preventing infections and eradicating already establishedItem CO-DESIGNING A CYBERSECURITY PRACTICES FRAMEWORK FOR UNDERSERVED RURAL COMMUNITIES(Namibia University of Science and Technology, 2024-06-30) Nhinda, Gabriel TuhafeniThe increasing ubiquity of digital technologies and the Internet has resulted in societies becoming heavily dependent on them for communication, healthcare, education, business operations, and social interaction. While digital transformation promises many benefits, it also presents significant challenges, particularly in ensuring safe and secure online participation. Cybersecurity, as a critical enabler of digital trust, is essential for inclusive and resilient digital societies. However, in underserved rural communities, especially in the Global South, cybersecurity practices remain largely unfamiliar due to limited telecommunications infrastructure, socio-economic inequality, and low digital literacy. This study addresses this gap by co-designing a cybersecurity practices framework with and for underserved rural communities. Rooted in a multidisciplinary approach, the research integrates elements of human-computer interaction (HCI), community engagement, and behavioural insights. A qualitative methodology was employed, using co-design sessions, focus group discussions, and interviews, to understand community-specific perceptions and practices of cybersecurity. The study draws on indigenous philosophies of Ubuntu and Uushiindaism to contextualise security as a communal, ethical, and relational construct. The framework was evaluated through a two-pronged process: expert focus groups (ex-post) and community-based co-design sessions (exante and ex-post). Evaluation centred on ecological utility—ensuring contextual relevance, cultural fidelity, sustainability, comprehensibility, and local ownership. The study further maps key actors and relationships influencing cybersecurity practices in rural contexts, including interactions with national agencies, community policing units, local radio, and ministries responsible for awareness and legislation. This research contributes to a more inclusive understanding of cybersecurity by recognising the socio-cultural dynamics that shape digital safety in underserved communities. It bridges the gap between globally dominant cybersecurity paradigms and the lived realities of rural African users. The framework empowers communities to engage confidently with technology, facilitates digital access to essential services, promotes skills transfer through seasonal resident engagement, and supports the preservation of indigenous languages. For policymakers, developers, and educators, it offers actionable insights into designing secure, contextually appropriate technologies for the margins while ensuring broader applicability across user groups.Item Design of a Model for Augmenting Digital Forensics into Information System Audit in The Financial Sector(Namibia University of Science and Technology, 2024-09) Iipumbu, ErickyAudits of information systems demonstrate whether IT controls are effective in protecting company property, ensuring data integrity, and aligning with the organisation's overarching objectives. Information System auditors evaluate all components of financial and business controls, including information technology systems and physical and logical security protocols. As long as cyberattacks continue to occur in the financial sector, it is increasingly important to take robust measures to ensure the integrity and security of information systems. New models that incorporate digital forensics methods into the audit process have emerged as a result of the fact that traditional audit processes frequently fail to meet evolving objectives. Based on the findings of a systematic literature review that demonstrated that the evidence-gathering techniques employed in information system audits are inadequate for assessing the efficacy of internal controls, this study proposes a model that integrates digital forensics into information system auditing that was designed using Design Science Research techniques. The model is envisaged to improve the information system auditing process by augmenting digital forensics processes into information system auditing. The model incorporates key digital forensic components embedded into audit procedures to enhance the accuracy and reliability of evidence collection, ensure the integrity and authenticity of digital evidence, and facilitate a more detailed analysis of audit data. The inclusion of these digital forensic techniques is essential for addressing complex cyber threats and fraud within the financial sector, providing auditors with robust tools to conduct more thorough and defensible investigations, and ensuring compliance with industry standards and regulatory requirements. In summary, the proposed approach offers a structured approach to the integration of digital forensic methodologies into the auditing process and establishes guidelines, in a manner that ensures audit opinions for information systems auditors are unqualified rather than qualified and disclaimer.Item DESIGNING A BRING YOUR OWN DEVICE SECURITY AWARENESS MODEL FOR MOBILE DEVICE USERS IN NAMIBIAN ENTERPRISES(NAMIBIA UNIVERSITY OF SCIENCE AND TECHNOLOGY, 2023-05-30) Shihepo, EsterThe phrase Bring Your Own Device (BYOD) also known as Dual-Use Devices is a mutual practice which has increased employees’ access to new mobile technologies and a rising trend within many organisations. The concept refers to employers allowing their employees to bring their personal mobile devices to workplaces and use them as their workstations. Enterprises are enjoying the benefits of BYOD, which allows them to cut operational costs as they do not need to purchase computers for their employees. Employees are enjoying the comfort and convenience offered by BYOD; however, this exposes organisations to security breaches. There is currently a lack of security awareness among mobile device users within enterprises against BYOD cyber threats. The situation has made it difficult for organisations to monitor the usage of resources among the mobile users towards protecting the confidentiality, integrity, and availability of corporate data. Moreover, cyber attackers see more potential with mobile devices as company and personal data get mixed up on such devices. Although the BYOD concept has not been formally implemented within the enterprise, it does not mean that the enterprise data is not prone to attackers. This study presents a BYOD Security Awareness Model designed following Design Science Research methods based on findings of a single case study conducted in one of the enterprises in Windhoek, Namibia. Qualitative research following the interpretivism philosophy was used. To select participants, purposeful random sampling method was used for this study. Data was collected using interviews, a questionnaire and through literature review. Furthermore, the study implemented the qualitative content analysis as the data analysis technique. The study identified malware and network spoofing as some of the BYOD related threats affecting the case enterprise. The researcher observed lack of end user awareness on BYOD security as a cause of BYOD related security threats. The study identified four main components of the model namely: BYOD threats, security awareness, policy and access control. The BYOD security awareness model will be a guideline to Namibian enterprises in creating BYOD security awareness among their mobile devices with the aim to safeguard the organisational data. Furthermore, the findings will also contribute to the new technology horizon of Namibia’s future BYOD security awareness by motivating enterprises to implement mechanisms that will protect the enterprise confidential information. Since Namibia is reported as one of the least ranked countries in Africa in terms of cyber security, the model is a guideline on how enterprises can create BYOD security awareness among users within their enterprises and improve their security posture as well as that of the nation. Additionally, the model will also contribute to the BYOD security awareness knowledge to researchers and practitioners through conference papers and thesis publication.Item DESIGNING A CLOUD BASED ELEARNING IMPLEMENTATION MODEL FOR HIGHER AND TERTIARY INSTITUTIONS IN NAMIBIA(Namibia University of Science and Technology, 2017-02) Chitauro, ShadreckMain stream academic institutions are aiming to improve from past trends and venturing into new emerging technologies for quality delivery of teaching and learning. One of these trends that enhance teaching and learning is termed eLearning. ELearning is when teaching and learning is facilitated through the use of information communication technologies. ELearning is highly popular because it is flexible, it supports self-paced learning, and learners can access learning material anywhere, anytime and in the absence of the instructor. The problem with eLearning is that of managing data, ensuring security, limited server space, infrastructure sourcing and expensive maintenance. In addition to these problems, most academic institutions in the developing world are unable to fully finance eLearning systems and the skills for the support of these systems. Higher and tertiary institutions in Namibia which also use eLearning in their day to day teaching and learning activities are faced with slow bandwidth challenges. However, cloud computing can ease the financial burdens and reduce support issues brought about by lack of information technology skills and infrastructure. A qualitative case study at one Namibian tertiary institution was used in which interviews and experiments were used to obtain data. ELearning administrators at the case site were interviewed and it was established that at this tertiary institution the eLearning system also experiences infrastructure problems, support issues due to lack of expertise and insufficient human resources. In addition, their eLearning server reduces performance as the number of concurrent users connecting to it increases. Thus, migrating to a public cloud would solve most of these issues but there was no concrete plan as to how to migrate to cloud. Consequently, this research used design science research to design a cloud based implementation model for higher and tertiary institutions in Namibia so that academic institutions can seamlessly migrate to cloud. An experimental cloud was setup using a cloud based implementation model. The results of the experiment proved that the biggest challenge being faced by this tertiary institution’s eLearning server can be overcome. One of the challenges that could be solved is that the server is slow due to the ratio of RAM on the server, which is not proportionally adequate to the number of users. Most eLearning technical challenges and technical support challenges were solved. The use of cloud computing was proposed as a solution to these challenges.Item Designing a Health Information System Adoption Roadmap for Quality Healthcare in Namibia(Namibia University of Science and Technology, 2019-07) Mutelo, Sinte ChristabelThe Ministry of Health and Social Service (MoHSS), as part of the government of The Republic of Namibia and with the help of Non-Governmental Organisation (NGOs), has implemented Health Information Systems (HIS) within its different directorates to maximise the quality of care. Healthcare Information Systems offer benefits such as improving service delivery, providing real-time information, reducing organisation and personnel costs, and improving the quality of patient care. However, these benefits may not be seen in organisations where systems implementation and the adoption of policies and procedures are not adequately custom-made for systems users. Currently, the MoHSS has over 60 systems within its different directorates, with some functional and some not. Furthermore, there is no roadmap to guide the Ministry in the planning and adopting of HIS and the integration of existing systems donated by NGOs. Hence, to ensure maximised potential of the HIS, the MoHSS should have a clearly documented and ready-for-implementation roadmap that can serve as a strategic guide to the implementation of HIS. This research provides a roadmap which will guide HIS adoption to enhance quality healthcare in Namibia. Based on the research objectives, a qualitative method approach was selected. A case study strategy was adopted for the Ministry of Health and Social Services. Interviews, documents, and questionnaires were used to collect data about the case studies. Activity Theory (AT) was applied during data analysis. AT provided a deeper understanding about employees and technologies that could affect the development of a roadmap. The findings showed that governance, stakeholder involvement, HIS strategic plans, HIS experts and IS infrastructures are factors to take into consideration in the adoption of HIS by the Ministry. A roadmap for the implementation of HIS was developed based on the interpretation of the data. The roadmap provides a guide for the planning, selection, implementation, and adoption of HIS to produce quality healthcare services in Namibia.Item Designing an algorithm that can influence children’s behaviour online and raise their cyber security awareness.(Namibia University of Science and Technology, 2020-12-18) Kavikairiua, JennypharThe Internet offers children incredible opportunities by enhancing their communication, social connections and technical skills. But it can't just guarantee them a secure environment. With no experience and knowledge, children's behaviours potentially expose them to cyber criminals as they share information innocently and become friends with strangers. Cyber security threats are highly present in social media and many people don't know about them. In particular, children voluntarily reveal personal and private details about themselves from which cybercrimes can emerge either in their real world or in the virtual world, if this shared information ends up in the wrong hands. This is most likely due to previous knowledge or exposure of the children on the Internet. This study sought to examine the online habits and actions of children who are vulnerable to cybercrimes and evaluated suitable behaviour influencing tools for children’s online activities. Employing a design science research method began with a comprehension of the problem. This was achieved by analysing the literature and the research findings that were self-constructed, as well as the use of open-ended questionnaires and close-ended questions. Once the problem was identified, the next step was to identify ideas which could solve the problem. These ideas were taken from the domains which were considered important to solve the problem. The behaviour influencing algorithm was then designed and evaluated following the literature and persuasion theory, as a solution to overcome the children’s insecure behaviour problem online. The vital contribution of the research is that it can benefit children that will be introduced to this algorithm by influencing and assisting them on how to securely behave online. In addition, the thesis provides contributions to the knowledge base by identifying and analysing the online activities and behaviours of children which can expose children to cybercrimes and it also provided some guidelines on how to influence children’s online behaviour, which can be used elsewhere in the world.Item Designing an Automated e-Readiness Assessment Tool to Assess Local Authorities in Namibia(Namibia University of Science and Technology, 2019-01) Cloete, AngeloE-Readiness assessments have been identified as a pre-requisite for successful systems implementations and therefore it is a pre-requisite for e-Government as well. It is however difficult to use existing e-Readiness assessment tools as most have been designed to cater for a specific context. In the absence of previous assessments, the level of e-Readiness of local authorities in Namibia is undetermined. The aim of the study is to design an automated assessment tool to assess the level of e-Readiness of Local Authorities, focusing in particular on the Municipality of City of Windhoek. This assessment will be carried out using the newly designed automated assessment tool. Two online surveys were designed and conducted. One was specifically designed for the Information Communication Technology Department and another one was designed for the staff members of all other departments. The surveys measured the e-Readiness of the Local Authority in terms of online service provision, its computer systems, hardware/network infrastructures and the skills set of employees. The findings indicate that the use of Information and Communication Technology (ICT) in research efforts, greatly improves the process, as the automated e-Readiness assessment tool delivered faster assessments and at a lesser cost. The results from the automated assessment tool shows that it can be used to measure e-Readiness at different Local Authorities.Item Designing an Interactive Game for Preventing Online Child Abuse in Namibia(Namibia University of Science and Technology, 2018-12) Muntuumo, JosephinaIn the wake of digitalisation, technology has changed the world, connecting people with information and services at the touch of a finger. Regular Internet access, smartphones and other technological advances have made the world a global village by bringing people from various geographical locations together. Despite the positive changes, the pace and scale of this technological revolution have created space for nefarious actors. Identity theft, data breaches, fake news, phishing and hacking are among the many dangers many people face online. Namibia has been grappling with issues centering on cyber security education, policy and lack of online safety awareness. In recent years, Namibia has experienced cybercrime, money laundering and child abuse initiated on the online platform. As such, this study developed an interactive video game to teach online safety in Namibia to combat online child abuse. An online survey, game design challenge workshops, and focus groups were used to gather information. A total of 84 relevant stakeholders (students, parents, teachers, and game developers) participated in two game design challenge workshops and alpha and beta testing sessions. These workshops followed a solid co-design practice. We designed and developed two Namibian inspired game prototypes that were combined into one game which was implemented and tested during this study. All the game prototypes followed an iterative process of information gathering and sharing stories of online inappropriate behaviours, drawing storyboards, designing wireframes, and testing with cognitive walkthroughs and a think-aloud protocol, alpha and beta testing. The final game is called Onlinicus- Share your Story versioned in 2D and 3D respectively. The uniqueness of this game comes from the scenario design as the game concept is entirely story based. The use of predefined personas and utilising participants’ own stories contributed to the richness of the stories and games developed.Item Developing a cybersecurity framework for the banking sector of Namibia(Namibia University of Science and Technology, 2021-08-20) Nawa, Eva-Lisa TuwilikaThe banking sector represents a vast assortment of firms, agencies and institutions with operations ranging from small community banks to massive international corporations. Managing the banking sector in Namibia presents a herculean task to regulators charged with its regulation oversight on cyber risks. The management of cybersecurity takes on greater complexity in considering multinationals with global partners and operations in countries with varying levels of cybersecurity sophistication. With the increase of cyber-attacks worldwide and banking institutions being key targets, the degree of risks from cybersecurity threats that banks are facing has grown rapidly in recent years. The increasing threats place sensitive data and organisational security at risk. This is exacerbated by the absence of a recognised cybersecurity framework that can safeguard the online transactions of financial data between banks and customers in the banking sector. To overcome these problems, a Namibia Banking Cybersecurity Framework (NBCF) to guide banking institutions in safeguarding the online transactions of financial data between banks and customers was developed. A qualitative research approach using the Design Science Research Methodology (DSRM) was adopted to address the research objectives. This research was conducted in the commercial banks of Namibia and involved their staff. In addition to data collected from literature reviews, data were also collected from a sample of 6 out of 10 licenced banks in Namibia using semi-structured interviews. The selection of the banks was done using the purposive sampling method and universally accepted ethical standards were considered. Data were analysed through a technique known as coding. The study identified various elements which are essential for a cybersecurity framework: data protection and privacy, human factors such as soft skills, Principle of Least Privilege (POLP), public knowledge on information security practices, aspect of disaster recovery documentation, and cyber breach simulations. The NBCF framework is proposed as a guideline on how the Namibian banking institutions can securely build cyber resiliency, manage their cyber risks and strategies and also help in implementing an appropriate level of rigor for their cybersecurity programmes. The NBCF framework should therefore guide the adoption of cybersecurity best practices in the Namibian banking sector. In addition, the framework is envisaged to complement the current Namibian government initiatives and the long-term goals of Vision 2030 such as the strategy of attaining infrastructure development as stated in the Harambee Prosperity Plan which highlights the urgent necessity to invest in cybersecurity. Expert reviews of the proposed framework were conducted and they yielded that the framework is relevant, applicable, usable and understandable in combating cybersecurity issues in the Namibian banking sector.Item Developing A Data-Driven Financial Model for Decision Support in Evaluating Investment Portfolio Performance(Namibia University of Science and Technology, 2025-09-12) Nghilundwa, PendapalaContemporary financial markets demonstrate heightened complexity and volatility, necessitating sophisticated instruments for the precise assessment of investment portfolios. This research explores the application of machine learning (ML) models to predict Month-to-Date (MTD) returns, aiming to enhance financial decision-making. Conventional models frequently exhibit insufficient flexibility to fluctuating market conditions, highlighting the necessity for data-driven approaches that prioritise portfolio-specific metrics, such as Market Value Dirty and Year-to-Date (YTD) returns. Meanwhile, macroeconomic variables such as gross domestic product (GDP) growth, inflation, and interest rates played a secondary role. The study employed a quantitative method, using secondary data from January 2017 to August 2024, which comprised financial measures and macroeconomic variables. Four machine learning models were developed, namely Random Forest, Gradient Boosting, XGBoost and Long Short-Term Memory (LSTM). Data preprocessing and feature engineering played a critical role in model development. Feature engineering involved creating cumulative MTD returns, moving averages (5-day and 10-day), and volatility metrics to capture market trends and risk dynamics. These features were derived from daily returns, grouped by year and month, and calculated using rolling operations. Data normalisation was applied to standardise input variables, and missing values resulting from rolling operations were filled to ensure dataset completeness. The dataset was then divided into training and testing datasets using a 1:1 ratio. Model performance was evaluated using mean squared error (MSE) and R-squared (R²) metrics, with cross-validation assuring robustness. Among the models, Gradient Boosting attained the lowest mean squared error (MSE: 2.39 × 10⁻⁶) and the highest R² (0.922), outperforming Random Forest (MSE: 2.72×10⁻⁶, R²: 0.911), XGBoost (MSE: 3.13×10⁻⁶, R²: 0.898), and LSTM (MSE: 3.98×10⁻⁶, R²: 0.870). Feature importance analysis highlighted Market Value Dirty, YTD Return, and Benchmark (BM) Size as the most influential predictors. At the same time, macroeconomic variables such as interest rates and inflation contributed minimally to short-term forecasting. This demonstrates the dominance of portfolio-specific metrics in predicting MTD returns. While LSTM excelled in capturing temporal relationships, its predictive accuracy lagged due to volatility during high-risk periods. The results affirm the effectiveness of machine learning models in enhancing financial decision-making. Gradient Boosting and Random Forest models offer accurate predictions and valuable insights into key portfolio-specific factors, underscoring their utility for risk management and strategic planning. The dissertation recommends further exploration of hybrid models, the inclusion of additional macroeconomic variables, and the integration of real-time data to enhance predictive accuracy and robustness. These improvements establish data-driven approaches as essential instruments for financial firms operating in unpredictable markets.
- «
- 1 (current)
- 2
- 3
- »