<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
<channel>
<title>Faculty of Science</title>
<link>http://dissertations.umu.ac.ug/xmlui/handle/123456789/5</link>
<description>FoSci</description>
<pubDate>Mon, 27 Apr 2026 22:26:14 GMT</pubDate>
<dc:date>2026-04-27T22:26:14Z</dc:date>
<item>
<title>Amobile health application for supporting physical exercises and diet of type 2 diabetic patients during self-management</title>
<link>http://dissertations.umu.ac.ug/xmlui/handle/123456789/1825</link>
<description>Amobile health application for supporting physical exercises and diet of type 2 diabetic patients during self-management
Ambrose, Mugisha
Background: Self-management is an important factor in control of type 2 diabetes mellitus and&#13;
preventing of its complications.Global statistics have indicated steady increase in this chronic&#13;
disease and at Mbarara Regional Referral Hospital (MRRH) with prevalence rate of 9%This is&#13;
attributed by sedentary lifestyle, decreased health services and aging population. Diabetic&#13;
patients always find challenges in management of this chronic condition with poor medication,&#13;
improper follow up, lack of knowledge and information on disease management, high burden of&#13;
expensive costs, reduction of patient‟s productivity and cause of psychosocial distress.There&#13;
have been advancements in mobile applications for diabetes self-management. However,&#13;
physical exercises and diet are neglected. This study shows how to designand developa type 2&#13;
manager application that supports physical exercise and diet which improves their lifestyle.&#13;
Objective: This study aimed at improving type 2 diabetes self-management by designing and&#13;
developing a type 2 manager application with a recommender algorithm on physical exercises,&#13;
diet and availing educative information to type 2 diabetes patients during self-management.&#13;
Methods:The study used scope review methodology approach to get quick overview of existing&#13;
applications and theirgaps. Following agile methodology type 2 diabetes manager was designed&#13;
and developed with iterative approach from various user feedback to meet their needs.&#13;
Latertested among purposively recruited Participant with technologyacceptance model (TAM)&#13;
serving as the conceptual framework to assess feasibility and acceptability.&#13;
Results: The application was named “Type 2 manager”.it comprised of features like Type 2&#13;
diabetes mellitus Monitor to capture data on self-management assessment and information board&#13;
to provide educativeinformation. User feedback demonstrated application feasibility and&#13;
acceptability with improved health status of patients adjusting to participate in physical exercises&#13;
and dietary changes. Barriers to application usewere language, technicaldifficulties.&#13;
Recommendations centered on customizing Type 2 manager application in local languages,&#13;
organizing training to potential app users and involving health workers.&#13;
Conclusions: The incorporation of user centered features which engage Type 2 diabetes Mellitus&#13;
patients in self-management can improve health outcomes. Self-management is a significant&#13;
factor in blood sugar control. Future applications developers should extend this technology in&#13;
other chronic diseases management considering cost implication of the application in mind.
Naigende Duncan; Naigende Duncan
</description>
<pubDate>Sun, 01 Sep 2024 00:00:00 GMT</pubDate>
<guid isPermaLink="false">http://dissertations.umu.ac.ug/xmlui/handle/123456789/1825</guid>
<dc:date>2024-09-01T00:00:00Z</dc:date>
</item>
<item>
<title>An online community policing management system</title>
<link>http://dissertations.umu.ac.ug/xmlui/handle/123456789/1823</link>
<description>An online community policing management system
Andrew, Abila
This study focused on the design and implementation of a community policing crime reporting&#13;
system based on HCI for Kampala Metropolitan Police to improve adoption and sustainability&#13;
which handles effectively and efficiently reporting of crimes within the community. The system&#13;
was able to address the problem of inconveniences of crimes reporting and creating awareness of&#13;
the police to the public and world at large. The system was implemented using Dream weaver&#13;
cs6, PHP, Wamp server fireworks, Photoshop. The introduction looks at the background,&#13;
problem statement, and objectives of the study, purpose of study, scope of study and the&#13;
significance of the study. Literature review covers a few different existing literatures about my&#13;
study. It looks at what different scholars say about system development and designing.&#13;
Methodology looks at the study area, methods and techniques that we used in data collection,&#13;
analysis and processing. It also includes the design of the research, the technologies that we used&#13;
in developing the system. System analysis and design captures the analysis and design of the&#13;
system. The systems analysis looks at user, system, functional and nonfunctional requirements.&#13;
The systems design shows the picture representation of the system development is the&#13;
description of how the system works and screen shots of the interfaces that users will interact&#13;
with while using the system Finally chapter six looks at the discussions, a brief conclusion of the&#13;
study, recommendations, and limitations of the study. Then finally references and appendixes too&#13;
showing the system codes used while designing the system
Sheba Rusoke Nyakaisiki; Sheba Rusoke Nyakaisiki
</description>
<pubDate>Sun, 01 Sep 2024 00:00:00 GMT</pubDate>
<guid isPermaLink="false">http://dissertations.umu.ac.ug/xmlui/handle/123456789/1823</guid>
<dc:date>2024-09-01T00:00:00Z</dc:date>
</item>
<item>
<title>Adoption of records management system for prison service in developing countries</title>
<link>http://dissertations.umu.ac.ug/xmlui/handle/123456789/1812</link>
<description>Adoption of records management system for prison service in developing countries
Monica, Navuga Linda
The Uganda Prisons Service (UPS) currently relies on manual, paper-based systems for records&#13;
management and failed to adapt the electronic data management system, yet the former is prone&#13;
to inefficiencies, errors, and security vulnerabilities. These outdated practices hinder the effective&#13;
management of inmate information, legal proceedings, and rehabilitation programs. As a result,&#13;
UPS faces operational inefficiencies and compromised data integrity. Moreover, the failure to&#13;
adopt to a robust Records Management System (RMS) complicates UPS's ability to comply with&#13;
legal and regulatory requirements, further increasing administrative burdens (Okello-Obura &amp;&#13;
Matovu, 2017).&#13;
In the context of developing countries like Uganda, the adoption of modern RMS faces several&#13;
challenges, including limited financial resources, inadequate infrastructure, lack of technical&#13;
expertise, and resistance to change (Musoke, 2019; Ndagire &amp; Kyeyune, 2021). These barriers&#13;
hinder the successful implementation and utilization of RMS, impeding efforts to modernize&#13;
prison administration. The Technology Acceptance Model (TAM) as developed by (Davis, 1989)&#13;
offers a useful framework for understanding the factors that influence technology adoption,&#13;
focusing on perceived usefulness (PU) and perceived ease of use (PEOU) as primary&#13;
determinants (Ken, 2021).&#13;
Lack of an accurate and easily available prisoner file system can result in cases of missing or&#13;
incomplete case files, inconsistent data, data redundancy, data insecurity, improper backup&#13;
procedures that cause reports to be produced late, and problems gaining access to data files.&#13;
Because of this, inmates have served longer sentences and prison administrators have made wise&#13;
decisions. Additionally, the system is prone to mistakes, which has led to expensive and&#13;
ineffective planning (Auditor General's Office Report 2021).
Kasozi Brian; Kasozi Brian
</description>
<pubDate>Sun, 01 Sep 2024 00:00:00 GMT</pubDate>
<guid isPermaLink="false">http://dissertations.umu.ac.ug/xmlui/handle/123456789/1812</guid>
<dc:date>2024-09-01T00:00:00Z</dc:date>
</item>
<item>
<title>A data breach management system for evaluating breaches in health care data</title>
<link>http://dissertations.umu.ac.ug/xmlui/handle/123456789/1802</link>
<description>A data breach management system for evaluating breaches in health care data
Nasasira, Racheal
Background: On a global scale, a series of systems have been developed for cyber security and&#13;
assessment of data breaches. However, in many Low and Middle-Income Countries, data breach&#13;
systems around health technologies are undeveloped in handling hacking intrusions, insider&#13;
threats, Data on the move, physical theft, human error, accidental, internet exposure and&#13;
unauthorized access and little study has been done to come up with a system to specifically&#13;
assess and address the data breaches in health Information systems. To address the gap, this&#13;
study developed a data breach management system to evaluate data breaches in healthcare data at&#13;
the Uganda Cancer Institute at Mulago National Referral Hospital, Central Uganda.&#13;
Methods: This study used a cross-sectional qualitative study design, carried out at Uganda&#13;
Cancer Institute, a public health facility in Uganda. The qualitative approach offered in-depth&#13;
analysis offering insights and comprehension of the problem context. Scoping review&#13;
methodology was applied for literature search, agile methodology using user centered design was&#13;
used to design the System and TTAT theory evaluated the accuracy of the System deigned.&#13;
Results: Drawing from TTAT model theory, the researcher found that the system for healthcare&#13;
data breaches of health information systems generally feasible for assessment of data breaches&#13;
for health care data at Uganda Cancer Institute at Mulago National Referral Hospital, Central&#13;
Uganda. The accuracy of the system was deemed important by the Risk tolerance, social&#13;
influence, users‘ perceived susceptibility and severity of malicious IT, a safeguarding measure's&#13;
effectiveness, costs, and users' self-efficacy toward it. Study participants found the System&#13;
useful, not costly and easy to use when assessing data breaches as visualized by graphs, a&#13;
questionnaire and percentages. Study participants described that the System assessed the&#13;
healthcare data against data breaches and gave them a percentage to ascertain data breach levels.&#13;
Participants also stated that this enabled them to understand how risky data breaches are and how&#13;
well to protect themselves.&#13;
Conclusion: the study found that the system was important for data b
Duncan Naigende; Duncan Naigende
</description>
<pubDate>Sun, 01 Sep 2024 00:00:00 GMT</pubDate>
<guid isPermaLink="false">http://dissertations.umu.ac.ug/xmlui/handle/123456789/1802</guid>
<dc:date>2024-09-01T00:00:00Z</dc:date>
</item>
</channel>
</rss>
