ARTICLE TYPE: Research
DOI Link :: http://doi-ds.org/doilink/10.2016-56941953/
DOI Link :: http://doi-ds.org/doilink/10.2018-76787574/
System security is a key contributor to effective use of IT innovations such as results management information systems (RMIS) in universities in Uganda. However, the optimal use is realized once appropriate and modern security technologies are implemented and RMIS users fully adopted to them. Most universities in Uganda have invested in security but operational inefficiency remains a daunting trait. With a sample of 300 respondents drawn from the academic management sector, of 10 selected chartered universities in Uganda, results indicate that indeed security is a key factor. Particularly when role definition, policy framing and events monitoring are considered students’ results cease to be mismanaged. The study thus recommends that for optimal security realization, rotational and regular audit trails of RMIS users should suffice to counteract the highly skilled user manipulations which may be a threat to the RMIS in Universities in Uganda.
Keywords: System Security, Effective Use, Results Management Information Systems.
- Alexander, P.P. (2012). A Practical System to Manage and Control Digital Media. Journal of Computer Information System Vol. 47, (4) PP. 45-51
- Bhardway, M. and Singh, A.J. (2011). Automated Integrated University Results System. Himachal Pradesh University Journal: PP. 1-9
- Bisaso, R. (2014). The Gaps in Training Makerere University Staff in IT in Education management on www.ahero.uwc.ac.za retrieved on 10 March, 2014
- Chaudhari, S.Z. & Venkatachalam, P. (2013). Conceptual Framework for Geospatial Data Security. International Journal of Database Management System Vol. 5, (5) PP. 83-91
- Dellaportas, R., Peter, S., Perera, L. & Richardson, B. (2010). M-Learning in an Off-Campus Environment: Using iPods in Accounting Education, in FAANZ 2010: Accounting and Finance Association of Australia and New Zealand Annual conference, AFAANZ, [Christchurch, New Zealand], PP. 1-33.
- Dhakaa, B., Gwala, D., Sharma, M. & Shrivastava, V. (2013). A General Evolution of Key Using Quantum Cryptography Management for Transcript. International Journal of Advanced Computer Technology Vol. 2, (3) PP. 23-32
- Gupta, B. (2013). Cloud Computing. International Journal of Advanced Computer Technology Vol. 1, (2) PP. 90-105
- Islam, A.K.M.N. (2013). The Determinant of the Post-Adoption Satisfaction of Educations with an E- learning System. Journal of Information System Education Vol. 22, (4) PP.95-111
- Jansen, W. (2011). Journal of Information System Security. Vol. 7, (1) PP. 46-58
- Lakhtaria, K.I. & Nagamalai, D. (2010). Design and Deployment of Web 2.0 Enabled Services over Next Generation Network Platform. International Journal of Database Management Systems Vol. 2, (3) PP. 47-55
- Lawal, O.W., Loyinmi, A. C. & Abolarinwa, AJournal of Education and Practice www.iiste.org Vol.4, (8) Pp. 8
- Lian, S. (2008a). . Auerbach Publication, Taylor and Francis Group.
- Lunsford, D.L. (2013). Virtualization Technologies in Information Systems Education. Journal of Information System Education Vol. 20, (3) PP. 117-123
- Mufeti, T.K., Mbale, J. & Suresh, N. (2013). The Effect of Distributed Electronic Notes for Students: Ethical Consideration Raised by Computer Science Faculty of the University of Namibia. Journal of Information System Education Vol. 22, (3) Pp. 22
- Nohlberg, M., Wangler, B. and Kowalski, S. (2011). Journal of Information System Security. Vol. 7, (2) PP. 44-53
- Parker, C.L., Crocker, C., Nussey, J., Springate, J. & Hutchings, D. (2013). Evaluation of a Teaching Tool–Wiki- in Online Graduate education. Journal of Information System Education Vol. 21, (1) PP. 34-47
- Patidar, V.K., Raghuvanshi, A. & Shrivastava, V. (2013). Literature Survey of Association Rule Based Techniques for Preserving Privacy. International Journal of Advanced Computer Technology Vol. 2, (3) PP. 23-35
- Raghavan, V. & Ramsundhar, V. (2013). Based on HDFS Safety Measures of Construction of Secret Storage Cloud. International Journal of Computer Science and communication Networks Vol. 3, (4) PP. 307-312
- Ramesh, B.K.B. (2013). ZEND: Survey of the Exam System. International Journal of Computer science and Communication Networks Vol. 2, (2) PP. 272-276
- Rogers, E.M. (2003). The Diffusion of Innovations (5th Ed.) NY: Free Press
- Rosso, M.A., McLelland, M.K., Jansen, B.J. & Fleming, S.W. (2013). Using Google AdWords in the MBA MIS Course. Journal of Information System Education Vol. 20, (1) PP. 233-245
- Sahin, I. (2006). Detailed Review of Rogers’ Diffusion of Innovations Theory and Education Technology Related Studies based on Rogers’ Theory. The Turkish Online Journal of Education Technology- TOJET Vol. 5, (2) PP. 56-67
- Saxena, V.S., Barkha, K. & Kalpana, G. (2013). Study of School Based Service Software: With Reference To Fedena. Journal of Engineering, Computers and Applied Sciences (JECandAS) Vol. 2, (6) PP. 56-68
- Schultz, C. (2013). Information Security Trends and Issues in the Moodle E- learning Platform: An Ethnographic Content Analysis. Journal of Information System Education Vol. 23, (4) PP. 78-90
- Seshasaayee, A. & Subramanian, S. (2013). Review of Potential Threats in Cloud Computing. International Journal of Advanced Computer Technology Vol. 2, (7) PP. 193-197
- Singh, A., Mangalaraj, G. & Taneja, A. (2013). Bolstering Teaching through Online Tools. Journal of Information System Education Vol. 21, (1) PP. 67-74
- Subramanian, R. (2009). Security, Privacy and Politics in India: A Historical Review. Journal of Information System Security, Vol. 5, (4) PP. 89-96
- Vinothkumar, J., Ramsundhar, V. & Raghavan, V. (2013). Enterprise Service on the Cloud by a Technique to Maintain Variability. International journal of computer science and communication networks Vol. 3, (4) PP. 313-320
- William, J. & Chinn, S.J. (2013). Using Web 2.0 to Support the Active Learning Experience. Journal of Information System Education Vol. 20, (2) PP. 67-78
- Wyld, D.C. (2009). The Utility of Cloud Computing as a New Pricing and Consumption Model for IT. International Journal of Database Management Systems Vol. 3, (1) PP. 1-19.