Theses and Dissertations
Permanent URI for this collection
Browse
Browsing Theses and Dissertations by Title
Now showing 1 - 20 of 45
Results Per Page
Sort Options
Item A MACHINE LEARNING-DRIVEN APPROACH FOR ACCIDENT PREDICTION AND TRAFFIC SAFETY ANALYSIS IN NAMIBIA(Namibia University of Science and Technology, 2024-12) Ngolo, MariaGlobally, road traffic accidents contribute a large portion of injuries, fatalities, and significant economic losses and ongoing research has projected that by 2030, car crashes would be the 5th top reason for loss of life around the world. The key cause of traffic accidents is hard to determine nowadays because of a complex mix of factors, such as road conditions, weather conditions, and the mental condition of the drivers, to list a few. Without a thorough understanding of the characteristics and causes, intelligence-led countermeasures to decrease crashes cannot be created or implemented. Therefore, if traffic accident characteristics can be better understood, it might be easier to take some mitigative action. Nowadays, the utility of machine learning methods in the field of road traffic crashes is gaining traction. The objective of this dissertation is to analyse historical data for a five-year period (2018-2023) and to understand the patterns in accident occurrences by making use of machine learning methods. Machine learning models as such Random Forest, Support Vector Machine, K-Nearest Neighbours, Association Rule Algorithm (AARA), and k-Clustering were employed on the dataset. The Apriori Association Rule algorithm explored the rules with high lift and high support, respectively. The research shows that the Random Forest model is the reliable model in predicting crash severity, reaching an accuracy of approximately 81%. Factors such as junction type, poor road sign conditions, uncontrolled traffic, weather, lighting, road surface, vehicle type, and driver behaviours were identified as the significant variables influencing road accidents. Pedestrian, rollovers, and collision are the leading crash causes of the road accidents, and they are associated with uncontrolled traffic and daylight. Additionally, the research shows notable differences in accident rates by region, month, year, day of the week, and hour of the day, underscoring the impact of geographical features, seasonal trends, and commuting habits on accident rates. The findings indicate that high traffic volumes and urban congestion are the main causes of the greatest accident rates in metropolitan areas, especially in the Khomas Region of Namibia. Further, more accidents are happening more toward the weekend as compared to weekdays and during night hours.Item ASSESSING THE STRATEGIC ROLE OF INTERNAL COMMUNICATION AT THE MINISTRY OF HOME AFFAIRS, IMMIGRATION, SAFETY AND SECURITY IN NAMIBIA(Namibia University of Science and Technology, 2023-05-04) KADHIKWA, SAKEUS IITA.Internal communication has long been the lifeblood of successfully and effectively managed organizations, especially when such communication is strategically managed. Though literature has established the benefits of internal communication, especially when it comes to employee engagement, commitment, and improved corporate reputation, research assessing the strategic role of internal communication in government departments is limited. The aim of the study was to assess the strategic role of internal communication at the Ministry of Home Affairs, Immigration, Safety and Security in Namibia. To achieve this objective, four secondary objectives were pursued. The first secondary objective focused on examining the challenges faced by the Department of Home Affairs and Immigration in implementing the internal communication strategy. The second objective focused on analyzing the impact of internal communication on service delivery, while the third focused on internal communication and employee morale. The last objective examined the alignment between internal communication and the department’s strategy. Data for the study were collected using a structured interview guide. Face-to-face online were conducted with a conveniently selected sample of 25 participants. The methodology that was employed was a qualitative research approach that followed a case study research design. Several challenges affecting the effective implementation of the internal communication strategy were identified. Furthermore, it was noted that participants had mixed views about the role of internal communication and service delivery, as well as its strategic role in the organization. Based on these findings, the study makes recommendations and suggestions for future research.Item ASSESSING THE USE OF SOCIAL MEDIA IN THE PUBLIC RELATIONS PRACTICES OF THE GOVERNMENT INSTITUTION PENSION FUND (GIPF) OF NAMIBIA(NAMIBIA UNIVERSITY OF SCIENCE AND TECHNOLOGY, 2022-01) KAPENDA, JAIRUS JULIUSSocial media have a significant role as a communication tool used by public relations practitioners in disseminating and sharing information as well as obtaining feedback from clients. When used effectively as a communication tool, social media can help address complaints, do market research to identify the needs of the clients and can help any organisation identify new market niches. Despite the essential role of social media, many organisations, including Government Institution Pension Fund (GIPF) Namibia are still not using social media to their maximum and are still opting for traditional methods of communication by the public relations practitioners. This study was conducted using a mixed-method approach. This study assessed the use of social media in public relations practices of the GIPF. The study adopted a quantitative approach, using a case study research design. The study population comprised GIPF staff members and clients. Hence, the sample consisted of 200 participants. A convenient sampling method was used to select a sample. A structured questionnaire with mixed questions collected both qualitative and quantitative data. The major findings of the study were that social media has a great impact on public relations practices and traditional social media platforms, notably Facebook, Instagram and Twitter remained popular. The recommendations were based on the research findings. Hence, the study recommends that various strategies can be used to enhance social media use and visibility. It was also recommended that public relations practitioners should be trained so that their awareness and use of social media is improved.Item AN AUDIENCE ANALYSIS OF HOW THE YOUTH FACT-CHECK ‘FAKE NEWS’ CIRCULATED ON SOCIAL MEDIA IN OMBILI AND HOCHLAND PARK, NAMIBIA(NAMIBIA UNIVERSITY OF SCIENCE AND TECHNOLOGY, 2021-07) HANGULA, RAFAEL. NThe proliferation of "fake news” have massive implications, especially at the times of elections. People who live in marginalised communities are the most exposed to fake news and least armed to decode coordinated information campaigns (information disorders). As a result, it may affect the practice of active citizenship by news consumers as their voting decisions may base on misconceptions. The net effect of this is that, their voting behaviours are done on the basis of highly distorted information whereby those who are most privileged are in a position to make voting decisions on the basis of truthful and credible information. This study explored how the youth in Namibia fact-checked news and information circulated on social media platforms during the 2019 electoral campaign. Firstly, it examined the major forms or types of fake news produced in Namibia before, during and soon after the elections. Secondly, it examined the criteria used by the youth in Ombili and Hochland Park to determine the truthfulness and accuracy of news and information. Thirdly, it assessed the newsworthy factors that the youth in Ombili and Hochland Park consider before sharing news on social media. This research employed virtual ethnography, qualitative content analysis,to understand, and document the types of fake news produced, and circulated in Namibia. Focus Groups Discussions (FGDs), and face-to-face interviews were then employed to get a sense of how young people sift through fake news. Grounded in Hall’s Encoding and Decoding model, fabricated contents, manipulated contents, misleading contents, conspiracy theories and imposter contents were observed in 2019 elections. The study revealed that there was systematic abuse of mainstream brands to spread information disorders to confuse and disorient voters. In addition, these types of fake news were fueled by the poor coordination, and delays in communication from the Electoral Commission. Most of the fake news were aimed at discrediting and casting aspersions on the candidature of Dr Hage Geingob of the Swapo Party, and Dr Panduleni Itula, who was an Independent Candidate at the time. This study found that young citizens’ ability to decode fake news is influenced by the level of education, literacy skills, class differences and media exposure as pointed out by Hall’s theory. Therefore, this study would add that availability of resources to fact check online news and information and political affiliation are also key in fighting fake news. The study recommends that government should ensure that its citizens have access to quality information through tasked institutions, to avoid fabrications, and distribution of information disorders, and provide a room for media and digital literacy campaigns in order to enhance skills of citizens of deconstructing coordinated information disorders, especially on social media platforms. News consumers need to embrace the concept fact checking before agreeing, and distributing information from social media as this would protect them from making decisions that are based on misconceptions, which could affect others.Item AUTOMATED FRAUD DETECTION IN NAMIBIA’S PUBLIC INSTITUTIONS' FINANCIAL TRANSACTIONS USING MACHINE LEARNING: A DEEP LEARNING APPROACH(Namibia University of Science and Technology, 2024-12) Johannes, Pandeni PaavoFinancial fraud continues to be a significant concern in public-sector financial operations, undermining the credibility of financial statements and eroding public trust. Traditional methods used by financial experts, such as auditing, are frequently ineffective in addressing the growing complexity of fraudulent activities and effectively mitigating associated risks. This study aimed to tackle this issue by creating an automated fraud detection system based on deep learning designed for Namibia's public sector financial transactions. The Ministry of Finance provided the primary data for the study through the Office of the Auditor-General, which included accounts payable records from public entities with large transaction volumes for the fiscal years 2021/2022 and 2022/2023. The task of fraud detection is framed as a classification problem. The study explored three common deep learning models: Autoencoders, Generative Adversarial Networks (GAN) and Convolutional Neural Networks (CNN). These models' performance was evaluated using historical and simulated financial data, focusing on accuracy, inference time, and resource utilisation. A comparative analysis revealed that the CNN model performed exceptionally well, with the highest accuracy (0.95), F1-score (0.98), and lowest false positive rate (0.038). In contrast, the GAN model excelled in inference time (7.17 ms per transaction) and precision (0.99). This study proposes a scalable, data-driven approach to improving fraud detection in large public-sector financial datasets, thereby increasing accountability in Namibia's public financial systems.Item A Bio-Immunology Inspired Security Model to Defend Industrial Control Systems from Advanced Persistent Threats(Namibia University of Science and Technology, 2019-01) Chitauro, MercyIndustrial Control Systems (ICS) control critical industrial processes. For example, there are ICS networks that control electricity, water distribution, food, and pharmaceutical and beverage production. Historically, ICS networks were safe from network attacks because they were not interconnected to business Information Technology (IT) networks and the Internet. However, with the passage of time, ICS were interconnected to business networks. Because traditional IT networks are built on the TCP/IP suite, ICS became susceptible to network attacks that already existed in TCP/IP networks and to ICS specific attacks. Successful attacks in ICS networks may compromise the ICS infrastructure, system configurations and components. ICS security standards and frameworks were drafted and approved by different organisations for use in the implementation of ICS security. ICS can be secured using these standards or any other means as recommended by ICS security experts. Even though ICS are secured using these recommended methods, they are still being successfully attacked by Advanced Persistent Threats (APTs). APTs are targeted attacks which are successful because they do not attack any system that they might be in but become active in only those systems they were designed for. APTs have the ability to circumvent available security control and regular intrusion detection systems, and in addition, antiviruses are not able to detect APTs. There is no known technique available to identify APTs that attack ICS because APTs are discovered after they have been in the system for some time and usually only after they have executed their payload. Subsequently, this means that present ICS security implementations are not capable of defending ICS when they are attacked by APTs. By design, ICS security systems should be capable of defending ICS components from any attacks. They are likened to the biological immune system which is responsible for detecting and protecting the biological body from harmful microorganisms. The biological immune system’s most crucial function is that of preventing infections and eradicating already establishedItem CO-DESIGNING A CYBERSECURITY PRACTICES FRAMEWORK FOR UNDERSERVED RURAL COMMUNITIES(Namibia University of Science and Technology, 2024-06-30) Nhinda, Gabriel TuhafeniThe increasing ubiquity of digital technologies and the Internet has resulted in societies becoming heavily dependent on them for communication, healthcare, education, business operations, and social interaction. While digital transformation promises many benefits, it also presents significant challenges, particularly in ensuring safe and secure online participation. Cybersecurity, as a critical enabler of digital trust, is essential for inclusive and resilient digital societies. However, in underserved rural communities, especially in the Global South, cybersecurity practices remain largely unfamiliar due to limited telecommunications infrastructure, socio-economic inequality, and low digital literacy. This study addresses this gap by co-designing a cybersecurity practices framework with and for underserved rural communities. Rooted in a multidisciplinary approach, the research integrates elements of human-computer interaction (HCI), community engagement, and behavioural insights. A qualitative methodology was employed, using co-design sessions, focus group discussions, and interviews, to understand community-specific perceptions and practices of cybersecurity. The study draws on indigenous philosophies of Ubuntu and Uushiindaism to contextualise security as a communal, ethical, and relational construct. The framework was evaluated through a two-pronged process: expert focus groups (ex-post) and community-based co-design sessions (exante and ex-post). Evaluation centred on ecological utility—ensuring contextual relevance, cultural fidelity, sustainability, comprehensibility, and local ownership. The study further maps key actors and relationships influencing cybersecurity practices in rural contexts, including interactions with national agencies, community policing units, local radio, and ministries responsible for awareness and legislation. This research contributes to a more inclusive understanding of cybersecurity by recognising the socio-cultural dynamics that shape digital safety in underserved communities. It bridges the gap between globally dominant cybersecurity paradigms and the lived realities of rural African users. The framework empowers communities to engage confidently with technology, facilitates digital access to essential services, promotes skills transfer through seasonal resident engagement, and supports the preservation of indigenous languages. For policymakers, developers, and educators, it offers actionable insights into designing secure, contextually appropriate technologies for the margins while ensuring broader applicability across user groups.Item DESIGNING A BRING YOUR OWN DEVICE SECURITY AWARENESS MODEL FOR MOBILE DEVICE USERS IN NAMIBIAN ENTERPRISES(NAMIBIA UNIVERSITY OF SCIENCE AND TECHNOLOGY, 2023-05-30) Shihepo, EsterThe phrase Bring Your Own Device (BYOD) also known as Dual-Use Devices is a mutual practice which has increased employees’ access to new mobile technologies and a rising trend within many organisations. The concept refers to employers allowing their employees to bring their personal mobile devices to workplaces and use them as their workstations. Enterprises are enjoying the benefits of BYOD, which allows them to cut operational costs as they do not need to purchase computers for their employees. Employees are enjoying the comfort and convenience offered by BYOD; however, this exposes organisations to security breaches. There is currently a lack of security awareness among mobile device users within enterprises against BYOD cyber threats. The situation has made it difficult for organisations to monitor the usage of resources among the mobile users towards protecting the confidentiality, integrity, and availability of corporate data. Moreover, cyber attackers see more potential with mobile devices as company and personal data get mixed up on such devices. Although the BYOD concept has not been formally implemented within the enterprise, it does not mean that the enterprise data is not prone to attackers. This study presents a BYOD Security Awareness Model designed following Design Science Research methods based on findings of a single case study conducted in one of the enterprises in Windhoek, Namibia. Qualitative research following the interpretivism philosophy was used. To select participants, purposeful random sampling method was used for this study. Data was collected using interviews, a questionnaire and through literature review. Furthermore, the study implemented the qualitative content analysis as the data analysis technique. The study identified malware and network spoofing as some of the BYOD related threats affecting the case enterprise. The researcher observed lack of end user awareness on BYOD security as a cause of BYOD related security threats. The study identified four main components of the model namely: BYOD threats, security awareness, policy and access control. The BYOD security awareness model will be a guideline to Namibian enterprises in creating BYOD security awareness among their mobile devices with the aim to safeguard the organisational data. Furthermore, the findings will also contribute to the new technology horizon of Namibia’s future BYOD security awareness by motivating enterprises to implement mechanisms that will protect the enterprise confidential information. Since Namibia is reported as one of the least ranked countries in Africa in terms of cyber security, the model is a guideline on how enterprises can create BYOD security awareness among users within their enterprises and improve their security posture as well as that of the nation. Additionally, the model will also contribute to the BYOD security awareness knowledge to researchers and practitioners through conference papers and thesis publication.Item DESIGNING A CLOUD BASED ELEARNING IMPLEMENTATION MODEL FOR HIGHER AND TERTIARY INSTITUTIONS IN NAMIBIA(Namibia University of Science and Technology, 2017-02) Chitauro, ShadreckMain stream academic institutions are aiming to improve from past trends and venturing into new emerging technologies for quality delivery of teaching and learning. One of these trends that enhance teaching and learning is termed eLearning. ELearning is when teaching and learning is facilitated through the use of information communication technologies. ELearning is highly popular because it is flexible, it supports self-paced learning, and learners can access learning material anywhere, anytime and in the absence of the instructor. The problem with eLearning is that of managing data, ensuring security, limited server space, infrastructure sourcing and expensive maintenance. In addition to these problems, most academic institutions in the developing world are unable to fully finance eLearning systems and the skills for the support of these systems. Higher and tertiary institutions in Namibia which also use eLearning in their day to day teaching and learning activities are faced with slow bandwidth challenges. However, cloud computing can ease the financial burdens and reduce support issues brought about by lack of information technology skills and infrastructure. A qualitative case study at one Namibian tertiary institution was used in which interviews and experiments were used to obtain data. ELearning administrators at the case site were interviewed and it was established that at this tertiary institution the eLearning system also experiences infrastructure problems, support issues due to lack of expertise and insufficient human resources. In addition, their eLearning server reduces performance as the number of concurrent users connecting to it increases. Thus, migrating to a public cloud would solve most of these issues but there was no concrete plan as to how to migrate to cloud. Consequently, this research used design science research to design a cloud based implementation model for higher and tertiary institutions in Namibia so that academic institutions can seamlessly migrate to cloud. An experimental cloud was setup using a cloud based implementation model. The results of the experiment proved that the biggest challenge being faced by this tertiary institution’s eLearning server can be overcome. One of the challenges that could be solved is that the server is slow due to the ratio of RAM on the server, which is not proportionally adequate to the number of users. Most eLearning technical challenges and technical support challenges were solved. The use of cloud computing was proposed as a solution to these challenges.Item Designing a Health Information System Adoption Roadmap for Quality Healthcare in Namibia(Namibia University of Science and Technology, 2019-07) Mutelo, Sinte ChristabelThe Ministry of Health and Social Service (MoHSS), as part of the government of The Republic of Namibia and with the help of Non-Governmental Organisation (NGOs), has implemented Health Information Systems (HIS) within its different directorates to maximise the quality of care. Healthcare Information Systems offer benefits such as improving service delivery, providing real-time information, reducing organisation and personnel costs, and improving the quality of patient care. However, these benefits may not be seen in organisations where systems implementation and the adoption of policies and procedures are not adequately custom-made for systems users. Currently, the MoHSS has over 60 systems within its different directorates, with some functional and some not. Furthermore, there is no roadmap to guide the Ministry in the planning and adopting of HIS and the integration of existing systems donated by NGOs. Hence, to ensure maximised potential of the HIS, the MoHSS should have a clearly documented and ready-for-implementation roadmap that can serve as a strategic guide to the implementation of HIS. This research provides a roadmap which will guide HIS adoption to enhance quality healthcare in Namibia. Based on the research objectives, a qualitative method approach was selected. A case study strategy was adopted for the Ministry of Health and Social Services. Interviews, documents, and questionnaires were used to collect data about the case studies. Activity Theory (AT) was applied during data analysis. AT provided a deeper understanding about employees and technologies that could affect the development of a roadmap. The findings showed that governance, stakeholder involvement, HIS strategic plans, HIS experts and IS infrastructures are factors to take into consideration in the adoption of HIS by the Ministry. A roadmap for the implementation of HIS was developed based on the interpretation of the data. The roadmap provides a guide for the planning, selection, implementation, and adoption of HIS to produce quality healthcare services in Namibia.Item Designing an algorithm that can influence children’s behaviour online and raise their cyber security awareness.(Namibia University of Science and Technology, 2020-12-18) Kavikairiua, JennypharThe Internet offers children incredible opportunities by enhancing their communication, social connections and technical skills. But it can't just guarantee them a secure environment. With no experience and knowledge, children's behaviours potentially expose them to cyber criminals as they share information innocently and become friends with strangers. Cyber security threats are highly present in social media and many people don't know about them. In particular, children voluntarily reveal personal and private details about themselves from which cybercrimes can emerge either in their real world or in the virtual world, if this shared information ends up in the wrong hands. This is most likely due to previous knowledge or exposure of the children on the Internet. This study sought to examine the online habits and actions of children who are vulnerable to cybercrimes and evaluated suitable behaviour influencing tools for children’s online activities. Employing a design science research method began with a comprehension of the problem. This was achieved by analysing the literature and the research findings that were self-constructed, as well as the use of open-ended questionnaires and close-ended questions. Once the problem was identified, the next step was to identify ideas which could solve the problem. These ideas were taken from the domains which were considered important to solve the problem. The behaviour influencing algorithm was then designed and evaluated following the literature and persuasion theory, as a solution to overcome the children’s insecure behaviour problem online. The vital contribution of the research is that it can benefit children that will be introduced to this algorithm by influencing and assisting them on how to securely behave online. In addition, the thesis provides contributions to the knowledge base by identifying and analysing the online activities and behaviours of children which can expose children to cybercrimes and it also provided some guidelines on how to influence children’s online behaviour, which can be used elsewhere in the world.Item Designing an Automated e-Readiness Assessment Tool to Assess Local Authorities in Namibia(Namibia University of Science and Technology, 2019-01) Cloete, AngeloE-Readiness assessments have been identified as a pre-requisite for successful systems implementations and therefore it is a pre-requisite for e-Government as well. It is however difficult to use existing e-Readiness assessment tools as most have been designed to cater for a specific context. In the absence of previous assessments, the level of e-Readiness of local authorities in Namibia is undetermined. The aim of the study is to design an automated assessment tool to assess the level of e-Readiness of Local Authorities, focusing in particular on the Municipality of City of Windhoek. This assessment will be carried out using the newly designed automated assessment tool. Two online surveys were designed and conducted. One was specifically designed for the Information Communication Technology Department and another one was designed for the staff members of all other departments. The surveys measured the e-Readiness of the Local Authority in terms of online service provision, its computer systems, hardware/network infrastructures and the skills set of employees. The findings indicate that the use of Information and Communication Technology (ICT) in research efforts, greatly improves the process, as the automated e-Readiness assessment tool delivered faster assessments and at a lesser cost. The results from the automated assessment tool shows that it can be used to measure e-Readiness at different Local Authorities.Item Designing an Interactive Game for Preventing Online Child Abuse in Namibia(Namibia University of Science and Technology, 2018-12) Muntuumo, JosephinaIn the wake of digitalisation, technology has changed the world, connecting people with information and services at the touch of a finger. Regular Internet access, smartphones and other technological advances have made the world a global village by bringing people from various geographical locations together. Despite the positive changes, the pace and scale of this technological revolution have created space for nefarious actors. Identity theft, data breaches, fake news, phishing and hacking are among the many dangers many people face online. Namibia has been grappling with issues centering on cyber security education, policy and lack of online safety awareness. In recent years, Namibia has experienced cybercrime, money laundering and child abuse initiated on the online platform. As such, this study developed an interactive video game to teach online safety in Namibia to combat online child abuse. An online survey, game design challenge workshops, and focus groups were used to gather information. A total of 84 relevant stakeholders (students, parents, teachers, and game developers) participated in two game design challenge workshops and alpha and beta testing sessions. These workshops followed a solid co-design practice. We designed and developed two Namibian inspired game prototypes that were combined into one game which was implemented and tested during this study. All the game prototypes followed an iterative process of information gathering and sharing stories of online inappropriate behaviours, drawing storyboards, designing wireframes, and testing with cognitive walkthroughs and a think-aloud protocol, alpha and beta testing. The final game is called Onlinicus- Share your Story versioned in 2D and 3D respectively. The uniqueness of this game comes from the scenario design as the game concept is entirely story based. The use of predefined personas and utilising participants’ own stories contributed to the richness of the stories and games developed.Item Developing a cybersecurity framework for the banking sector of Namibia(Namibia University of Science and Technology, 2021-08-20) Nawa, Eva-Lisa TuwilikaThe banking sector represents a vast assortment of firms, agencies and institutions with operations ranging from small community banks to massive international corporations. Managing the banking sector in Namibia presents a herculean task to regulators charged with its regulation oversight on cyber risks. The management of cybersecurity takes on greater complexity in considering multinationals with global partners and operations in countries with varying levels of cybersecurity sophistication. With the increase of cyber-attacks worldwide and banking institutions being key targets, the degree of risks from cybersecurity threats that banks are facing has grown rapidly in recent years. The increasing threats place sensitive data and organisational security at risk. This is exacerbated by the absence of a recognised cybersecurity framework that can safeguard the online transactions of financial data between banks and customers in the banking sector. To overcome these problems, a Namibia Banking Cybersecurity Framework (NBCF) to guide banking institutions in safeguarding the online transactions of financial data between banks and customers was developed. A qualitative research approach using the Design Science Research Methodology (DSRM) was adopted to address the research objectives. This research was conducted in the commercial banks of Namibia and involved their staff. In addition to data collected from literature reviews, data were also collected from a sample of 6 out of 10 licenced banks in Namibia using semi-structured interviews. The selection of the banks was done using the purposive sampling method and universally accepted ethical standards were considered. Data were analysed through a technique known as coding. The study identified various elements which are essential for a cybersecurity framework: data protection and privacy, human factors such as soft skills, Principle of Least Privilege (POLP), public knowledge on information security practices, aspect of disaster recovery documentation, and cyber breach simulations. The NBCF framework is proposed as a guideline on how the Namibian banking institutions can securely build cyber resiliency, manage their cyber risks and strategies and also help in implementing an appropriate level of rigor for their cybersecurity programmes. The NBCF framework should therefore guide the adoption of cybersecurity best practices in the Namibian banking sector. In addition, the framework is envisaged to complement the current Namibian government initiatives and the long-term goals of Vision 2030 such as the strategy of attaining infrastructure development as stated in the Harambee Prosperity Plan which highlights the urgent necessity to invest in cybersecurity. Expert reviews of the proposed framework were conducted and they yielded that the framework is relevant, applicable, usable and understandable in combating cybersecurity issues in the Namibian banking sector.Item Development and usability evaluation of a mobile-based cross-platform interactive museum guide- iMuseum.(Namibia University of Science and Technology, 2019-08) Kandjimi, HermanPublic participation and visitor satisfaction in museums are directly related to the experience of learning, discovery and involvement in motivating learning behaviours. In most cases, visitors’ experiences are significantly improved if they gain substantial knowledge on each artefact of interest from the museum guides and this is critical to user satisfaction, however, the ratio of human guides to visitors is grossly inadequate. A visitor touring in a group is hardly taken care of individually by the human guide. In addition, existing information systems for museums guides are often limited to museum-based gadgets or platform-specific smart devices provided by the museums, but not always familiar to the visitor. This study explored alternative ways that avail museum content to a broader user base while offering an increasing and personalised interactive content through multiple visitors' own smart devices. A constructive research methodology that uses quantitative and qualitative data plus incremental software prototyping development and testing were used in this study, with the main objective of producing a location-aware interactive virtual guide that is easy to use, stable and able to run on a broad range of mobile device operating systems. The outcome systems were developed with AngularJS Framework (Web application) and Ionic Framework (cross-platform mobile application), these two combined constitutes an overall museum’s mobile guide system-iMuseum. The system aims to offer the museum a platform that will enable more visitors to have individual experience and interact with historical artefacts, plus additionally offer relevant information when and wherever a visitor needs it without having an employee going around with everyone. This study was contextualized to Namibian museums using the Independence Memorial Museum (IMM) as a testing site. The contributions of this study can then be used to implement related systems in other learning and cultural heritage institutions like galleries, libraries, achieves and museums(GLAM).Item Development of a citizen-centric e-government model for effective service delivery in Namibia(Namibia University of Science and Technology, 2019-04) Fröhlich, KarinE-Government is regarded as an important tool to help governments meet their goals. The theory of New Public Management arguably motivated the use of Information Communication Technologies (ICTs) in government with the idea of improving service delivery. However, e-Government use by citizens remains low. On the other hand, government’s vision of an inclusive e-Government has to still yield results, as many citizens are still not using the available e-government services. This challenge is common across Africa given the limited resources and other socio-economic challenges that are often given a higher priority over e-Government initiatives. This study used a public value theory to understand expectations of citizens from e-Government as suggested in the literature. The public value theory was adapted to the Namibian context using the available literature. Critical factors for attaining a citizen-centric e-Government were grouped into three main groups namely achievement of socially desirable outcomes, efficiency of public organizations and the delivery of public service. This study went on to identify key supportive factors for a government to achieve citizen-centric e-Government. This included access to ICT infrastructure, ICT skills, citizen’s attitude, creating local partnerships and understanding the citizen’s information needs. This study is a mixed method approach where qualitative and quantitative data (through questionnaires and interviews) were used as a data collection method. This study was conducted in seven (7) out of the fourteen (14) regions in Namibia. The participants are from seven (7) regional offices and one hundred and eighty-eight (188) respondents, and eight participants who took part in the interviews. The selection was done using the appropriate sampling procedures. Statistical analysis was used to carry out on the data gathered by use of a questionnaire while a content analysis was used on data gathered by use of interviews. The findings show that citizens are ready to embrace e-Government, though a lot still needs to be done in the area of provision of infrastructural facilities. At the end, a citizen-centric e-Government model for effective service delivery in Namibia was developed.Item DEVELOPMENT OF AN ADOPTION MODEL OF DIGITAL SERVICES FOR UNEMPLOYED YOUTH IN AN INFORMAL SETTLEMENT IN NAMIBIA(2018-04) Kambunga, Asnath PaulaABSTRACT Youth unemployment has become an increasing socio-economic issue in Namibia. Thus, numeral initiatives have been started to fight this trend in order to empower the current marginalised and unemployed youth to sustain a livelihood. This includes skills training opportunities, services and technology development. However, the adoption and integration of such services and technologies has not always been successful. Consequently, this study aims to investigate and implement an appropriate adoption model for youth services in Namibia. Different existing technology adoption models were evaluated in relation to the context of marginalised youth in urban areas, especially informal settlements of Windhoek. For the purpose of this study, youth from the Havana informal settlement were involved in designing and assessing technologies and services suitable to them, at the same time as the development of the proposed technology adoption strategy. The technology adoption strategy was adapted alongside the successful deployment of NamStarter a crowdfunding system for social entrepreneurship initiatives in Havana. An action research methodology was used as the approach to carry out the research and interventions. Based on our empirical results we argue that an appropriate technology adoption model in the context of informal settlements does not rely on the assumption that users pre-formulate intent before an action, as framed in the theory of reasoned action, which has been the basis for many mainstream technology adoption models. Contrary we propose a technology adoption model relying on behaviour or technology use prior to attitude change. The model emphasises factors of social influence and enablers creating capabilities as the main drivers for technology adoption in informal settlements.Item The effect of group a streptococcus on maternal and neonatal morbidity in Windhoek(Namibia University of Science and Technology, 2019-10) Vries, Azaria AmadeaPurpose of the research: Globally, puerperal infections cause morbidity in 5-10% of all pregnant women each year. To date, there is very little data in Namibia on the colonization and antibiotic susceptibility patterns of S. pyogenes in pregnant women and neonates. This study aimed at determining the prevalence, antimicrobial susceptibility patterns and genetic based resistance of the isolates from pregnant women at 35 weeks to 37 weeks gestation and neonates at 6 week postdelivery follow up at the Windhoek Central Hospital (WCH) maternity ward.Item Efficient hybrid deep reinforcement learning mechanism for distributed denial of service attack detection in software defined networks(NAMIBIA UNIVERSITY OF SCIENCE AND TECHNOLOGY, 2022-05) Musa, Gabriel, PreciousThe Internet architecture remains fixed since its invention but the Software Defined Network (SDN) comes with more flexibility, innovation, and programmability aspects being a very promising network architecture. However, the centralized control architecture in SDN represents a single point of failure. This vulnerability is prone to Distributed Denial of Service attack (DDoS) which remains a common and sophisticated attack on computer networks. With the controller faced with DDoS attacks while already overloaded with decision making, it raises a major security concern for SDN and therefore necessitates an efficient DDoS attack detection mechanism. This study aimed at designing a mechanism that accurately detects DDoS attacks while using minimum computational resources. We introduced a Hybrid Deep Reinforcement Learning Mechanism (HDRLM) for the SDN at the controller. An evaluation of literature was conducted to identify DRL algorithms that are accurate at the same time efficient. Double Deep Q-Network and Deep Q Network (DQN) were identified, and Deep Q-Network (DQN) was adopted in the study. To confirm the performance, simulated experimentation was used. Using the Design Science approach, a hybrid mechanism using the Deep Q Network algorithm that combines two different Deep Learning Neural networks for value approximation was designed. The HDRLM was demonstrated through experimentation in which the CICIDS2017 dataset was used to train and evaluate its performance. Detection accuracy of 98.16% was obtained and an 8% on CPU usage during detection, an improvement of the resource usage of the state-of-the-art detection mechanism. A positive upward trajectory of the accumulated rewards demonstrated that the mechanism was able to learn the environment by itself. Despite not achieving the highest accuracy, the HDRLM achieved a reasonably higher detection rate without consuming more computational resources compared to available mechanisms. This study provides a mechanism and an approach to designing mechanisms that reduce the cost of detectionItem An empirical study of the planning and implementation of competency based education and training in vocational education training centres in Namibia: The case of Namibia Training Authority.(2014) Bock, LukasNamibia is currently undergoing a dramatic reform of its overall development strategy through its national statement, Vision 2030. As part of the response to make Vision 2030 a reality, the government came up with an Education and Training Sector Improvement Programme (ETSIP), which represents the education and training sector’s response to the call of Vision 2030. Its key purpose is to substantially enhance the sector’s contribution to the attainment of strategic national developmental goals and to facilitate the transition to a knowledge-based economy. The emphasis, according ETSIP, is on enhancing the quality of life for all and that calls for the intended rapid economic growth to be accompanied by equitable social development, according to Vision 2030. These twin goals of growth with equity are to be pursued within a broader strategic framework of transforming the economy into a knowledge-based economy (ETSIP, 2006). However, a critical impediment to the acceleration of growth, according to ETSIP, is the sluggish and sometimes even declining productivity in some of the sectors. This could be ascribed to the shortage of skilled workers on various levels and of various areas within industry. Without acceleration of economic growth, it is difficult for Namibia to create jobs to curb the current 51% unemployment rate, especially jobs that signal productivity growth, reduce poverty and attain equitable social development. Employers note the shortage of qualified artisans and technical staff as a constraint on increasing their productivity (ETSIP, 2006). One way of addressing this burning issue of skills shortages and unemployment, by the Namibian government, was the establishment of The Namibian Training Authority (NTA) under the Vocational, Education and Training Act (2008), with the aim of taking over management and direction of Vocational Education Training (VET) in Namibia. One of the strategic objectives for the restructuring is to improve the quality of VET, by establishing a Competency Based Education and Training (CBET) Programme (NAMCOL, 2011). The purpose of this case study was thus, to uncover the perceived (understood) effectiveness, of the transformation process of developing and implementing the CBET Program as a method of training in vocational training centres in Namibia by the NTA. An interpretive philosophical overview with a qualitative approach was found suitable for this study. The research design was a case study; and the specific research method for data collection was semi- structured interviews that were conducted at the research site; the NTA. A non-probability sampling technique was chosen and participants were selected purposively. The unit of analysis were those managers directly involved in the transformation process. Data were organised, categorised and interpreted in such a way that it would reflect the issues covered by the data obtained from the six subjects, which can then be adequately summarised in order to draw conclusions, for the purpose of making relevant recommendations. Looking at the change management strategies utilised (or not) by NTA in the transformation process, will hopefully, promote an understanding or inform practice in similar situations. It could, furthermore, be useful for investigating how an individual or programme changes over time, perhaps as the result of certain circumstances or interventions. The results could be used as a guiding tool to inform others of some of the realities that could be expected and how these realities can be dealt with when going through a process of change. It could also put other change agents at ease knowing that, there are companies out there experiencing similar obstacles as those faced by them and yet they were able to pull through successfully. The effectiveness could only be determined in terms of the research questions formulated by the main research question. From the findings, it can be deduced that the implementation of the new system was not totally ineffective, but also not a hundred percent effective. Research question four was not achieved at all, meaning that in the absence of a proper change management model or strategic plan the implementation was not really successful. Recommendations were given by the participants themselves on how to improve the effectiveness there off.
- «
- 1 (current)
- 2
- 3
- »