• English
  • Català
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Italiano
  • Latviešu
  • Magyar
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Srpski (lat)
  • Suomi
  • Svenska
  • Türkçe
  • Tiếng Việt
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Српски
  • Yкраї́нська
  • New user? Click here to register. Have you forgotten your password?
    Communities & Collections
  • English
  • Català
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Italiano
  • Latviešu
  • Magyar
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Srpski (lat)
  • Suomi
  • Svenska
  • Türkçe
  • Tiếng Việt
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Српски
  • Yкраї́нська
  • New user? Click here to register. Have you forgotten your password?
SUAIRE
  1. Home
  2. Browse by Author

Browsing by Author "Nfuka, Edephonce Ngemera"

Now showing 1 - 2 of 2
  • Results Per Page
  • Sort Options
  • Loading...
    Thumbnail Image
    Item
    Designing secure web and mobile-based information system for dissemination of students’ examination results: the suitability of soft design science methodology
    (International Journal of Computing and ICT Research, 2016-12) Mshangi, Maduhu; Nfuka, Edephonce Ngemera; Sanga, Camilius
    The trend of organizations offering services through integrated applications using web- and mobile- based information systems has raised security concerns on how to ensure security goals are attained. The foundation of many systems’ security problems is the lack of integrating secure aspects throughout the processes of architecture design of information systems. This problem is contributed by lack of systematic research methodology and standard security guidelines and principles in many organizations dealing with development of systems in Tanzania. In order to address the weakness of previous studies in the research design, this study employed soft design science methodology (integration of Soft Systems Methodology and Design Science Research); this enabled triangulation of research methodology to take place. The security goals for the proposed secure information system design architecture were explored and incorporated in all stages of the design of system architecture. The proposed secure architecture design of information system for dissemination of students’ examinations results can be replicated to schools, colleges or universities in developing countries. The study contributes to body of knowledge by developing secure information systems architecture using a system thinking engineering approach (Soft System Methodology) compounded by Design Science Research principles. The application of the system engineering approach and design principles resulted to a new strategy, secure software development life cycle (secure-SDLC), in solving real world problematic situation and filling the identified research gap in terms of knowledge in the field of information systems’ security research.
  • Loading...
    Thumbnail Image
    Item
    Using soft systems methodology and activity theory to exploit security of web applications against heartbleed vulnerability
    (International Journal of Computing and ICT Research,, 2015) Mshangi, Maduhu; Nfuka, Edephonce Ngemera; Sanga, Camilius
    The number of security incidents exploiting security holes in the web applications is increasing. One of the recently identified vulnerability in the web applications is the Heartbleed bug. The Heartbleed bug is a weakness found in OpenSSL, open source cryptographic software. In this study, both quantitative and qualitative research methodologies were employed. Case study and content/documentary analysis research methods were used to collect data for probing the web applications which are vulnerable to the bug. Due to the complexity of the problem, Soft Systems Methodology was adopted for the management of the analysis of data. The evaluation of security of web applications involved 64 selected websites of higher education institutions in Africa. SSM was supported by a theory called Activity Theory. The collected data was analysed using “R statistical computing package”. The study found that 89% of the universities web applications in Africa were vulnerable to the Heartbleed attack; and 11% of the universities web applications in Africa were not vulnerable to Heartbleed on the public announcement of the bug. But about two months later after the public announcement of the bug, 16% of the most universities web applications which were vulnerable were patched for the Heartbleed bug. The study seeks to contribute in application of Soft Systems Methodology and Activity Theory in the body of knowledge of information systems security (ISS).

Sokoine University of Agriculture | Copyright © 2025 LYRASIS

  • Privacy policy
  • End User Agreement
  • Send Feedback