Masters Theses (DISSD)

Permanent URI for this collectionhttps://repository.ium.edu.na/handle/123456789/74

Browse

Search Results

Now showing 1 - 7 of 7
  • Thumbnail Image
    Item
    Developing a framework for the adoption and use of technology for effective policing for approval by the International University of Management
    (International University of Management, 2025) Set, Ngonyofi Ndaipawa; Osakwe, Jude
    In the Windhoek City Police Department (WCP), the integration of technology has ushered in a transformation of the way police information is recorded, stored, and shared, with a keen focus on enhancing police organization and crime prevention efforts. This study, set in the Namibian context, recognizes the substantial advantages that technology brings and also acknowledges the challenges, notably the accumulation of unprocessed cases. The central aim of this study was to establish a comprehensive policing framework to guide the effective adoption and utilization of technology within the Windhoek City Police. A qualitative research approach was employed, harnessing structured interviews to collect relevant data. The specific objectives of the study encompass the identification of the various technologies utilized by the Windhoek City Police for crime prevention, an analysis of the patterns of information technology application in the police department's crime prevention efforts, an evaluation of factors that can enhance the use of technology for crime prevention, and the formulation of a systematic framework to empower the Windhoek City Police in optimizing technology for crime prevention. Notably, the research findings underscore that police officers within the WCP share a similar understanding of technology implementation, with the principal challenges identified as training and technology infrastructure key factors influencing the successful implementation of technology in policing operations. This contributes to the enhancement and implementation of policing strategic operations.
  • Thumbnail Image
    Item
    An investigation on the awareness of mobile phone security and privacy amongst IUM students
    (International University of Management, 2024) Naanda, Hilma Ndilimeke Cecilia; Ujakpa, Martin Mabeifam
    The advent of mobile phone technology has delivered numerous advantages to students, enabling them to conveniently access trustworthy and pertinent academic information crucial for making important decisions across various subjects. Many students encounter issues of uneven access to information due to shortcomings in academic support services. These challenges could be effectively addressed by utilizing mobile devices. To understand how a student uses mobile device to access information and all the security measures that are associated with it, this study investigated the awareness of mobile phone security and privacy. The study applied a qualitative research approach to collect data from 30 students using semi structured interviews. Thematic analysis was applied to examine the gathered data. The study was grounded on the Cyber Security theories on behavioural issues relating to Cyber Security specifically motivational theory. The results of the study indicate that students use mobile phones mostly for personal activities. The usage trend shifted more to academic purposes since the outbreak of COVID-19 that influenced implementation of online classes by most universities around the world including IUM. The challenges found in the study including that of scamming and hacking were due to lack of knowledge, awareness or education relating to phone / internet security and privacy. The study recommends that education on privacy and use of mobile / cell phones and / or internet be undertaken to university students to help the students understand the need of phone / internet security and privacy.
  • Thumbnail Image
    Item
    Developing a framework for integrating ICT in teaching and learning for secondary schools in Namibia: A case study of Windhoek
    (International University of Management, 2025) Mwalengwanasho, Nghifeelua Michael
    This study explored the integration of Information and Communication Technology (ICT) in secondary education within Namibia, focusing on the challenges and opportunities associated with its implementation. Through a comprehensive framework, the research identified ten strategic approaches to incorporate ICT into teaching and learning processes effectively. To gain deeper insights into the benefits of ICT integration in secondary schools, this study adopts a qualitative research approach. A semi-structured interviews were conducted to collect data from the simple size of 18 teachers. Key findings reveal that successful ICT integration necessitates a multifaceted strategy involving collaboration among educators, administrators, and government stakeholders. The study emphasises the importance of addressing digital literacy, equitable access to resources, and ongoing technical support, particularly for students in rural and disadvantaged areas. Additionally, the framework highlights the need for curriculum reform, professional development for teachers, and a supportive environment that fosters pedagogical innovation. By aligning educational practices with digital tools, Namibia can enhance student engagement and prepare its youth for the demands of the modern workforce. Future research directions include examining the impact of ICT across various subject areas to inform targeted educational policies. Overall, the study underscores the transformative potential of ICT integration in improving educational outcomes and equity in Namibia's secondary schools.
  • Thumbnail Image
    Item
    An exploration of the insider cyber threat at Nampost: Towards the development of a detection and prevention model
    (International University of Management, 2025) Nandjendja, Linekela S.
    This research was focused on exploring and addressing insider cyber threats within NamPost, specifically aiming to develop a detection and prevention model tailored to the organization's environment. The study sought to understand the nature, scope, and specific forms of insider cybersecurity threats prevalent at NamPost, Assessing the efficacy of current internal methods and identifying organizational structure flaws that heighten these risks. The goal was to fill the gap in Namibian academic literature on insider threats and provide NamPost with a robust framework for detecting and preventing insider cyber threats. The increasing sophistication of insider cyber threats presents a significant challenge for organizations like NamPost, where employees with privileged access to critical security protocols, networks, and systems are potential sources of risk. A qualitative research approach was employed, involving semi-structured interviews with 10 participants from NamPost’s ICT department. The findings reveal that high stress, job dissatisfaction, inadequate access controls, and insufficient employee training contribute to insider threats. Participants emphasized the need to foster a supportive organizational culture and implement robust access control measures to mitigate risks. Recommendations were made to expand insider cyber threat training across NamPost, particularly in underserved areas, and to involve traditional and religious leaders in promoting acceptance of these initiatives. The study concluded by suggesting future research should consider perspectives from both government and private sectors and employ quantitative methods to expand the findings.
  • Thumbnail Image
    Item
    Development of a cyber security model for crime prevention in the Namibian microlending industry
    (International University of Management, 2025) Kakona, Kelly
    The aim of this study was to design and develop a cybersecurity model that would create awareness, protect information systems, and prevent cybercrime in the Namibian micro lending industry. The types of cybersecurity threats identified in the industry included hacking, phishing, virus dissemination, logic bombs, denial of service attacks, email bombing and spamming, web jacking, cyber stalking, cyber bullying, software piracy, salami slicing attacks, identity theft, and credit card fraud. The research focused on investigating these cybercrimes due to the questionable effectiveness of the micro-lending industry's current security measures, highlighting the need for investigation within the context of the industry. The main purpose of the proposed crime prevention mechanism was to identify the current cybercrimes in the industry and understand the associated challenges. This study aimed to address the problems related to cybercrime in the micro lending industry and examine the challenges it faced in terms of cybersecurity awareness. Additionally, the research aimed to propose prevention strategies that could be implemented in the micro-lending industry. A combination of quantitative and qualitative methods was used in the research process. The study involved developing specific research questions and procedures, collecting data in the participants' natural environment, and analysing the data inductively by advancing from particulars to broad themes. The researcher then made interpretations about the meaning of the data. The performance of the proposed mechanisms was evaluated through expert reviews. The main contribution of this research was the design and development of a cybersecurity model specifically tailored to the micro-lending industry in Namibia. This model not only enhances awareness among industry stakeholders about the importance of cybersecurity but also provides practical tools and guidelines for implementing effective security measures.
  • Thumbnail Image
    Item
    Analysing Internet of things (IOT) cybersecurity in the Namibian mining industry
    (International University of Management, 2025) Shinana, Shipupeni Hiatsita
    Namibia has experienced significant digital advancements in recent years, embracing digital transformation to drive innovation, enhance competitiveness, and improve the standard of living. The integration of the Internet of Things (IoT) has transformed human existence and working conditions, particularly within enterprises, by reducing human intervention, thereby increasing efficiency and cost-effectiveness. However, alongside these benefits, IoT introduces cybersecurity risks that can be exploited by cybercriminals. This study examines IoT cybersecurity in the Namibian mining industry. A qualitative approach was adopted, with data collected through semi-structured interviews with eight mining personnel. Thematic analysis was used to analyse the finding, and it revealed four key themes: IoT deployment in the mining sector, risks and vulnerabilities of IoT devices, challenges posed by cyber-attacks, and cybersecurity strategies for IoT in mining operations. Findings identified IoT devices such as voice hubs, smart TVs, smartwatches, automation systems, and smart lighting as commonly used in the mining industry. The finding also, highlighted key threats included physical tampering, firmware manipulation, and vulnerability exploitation, with challenges ranging from financial losses to reputational damage and risks to individual safety. The study concluded that there is a need for strategies to improve IoT cybersecurity which must include education and training, contractual agreements, and adherence to policy standards. The study recommends prioritizing awareness and education on cyber-attacks among personnel and establishing a regulatory framework focused on IoT cybersecurity to enforce policies, raise awareness, and enhance the security of IoT in Namibia's mining industry.
  • Thumbnail Image
    Item
    Analysis and development of bed optimisation model case study: Windhoek central hospital, Namibia.
    (International University of Management, 2024) Stefanus, Ndjamba Chiyesu
    An efficient healthcare system aims to achieve optimal accessibility, exemplary treatments, and cost efficiency across all healthcare facilities within the system. In hospitals, a crucial factor is the bed capacity in individual wards, which not only incurs costs but also impacts the hospital's ability to accommodate and deliver exceptional care for patients. The shortage of Intensive Care Units (ICU) beds at Windhoek Central Hospital (WCH) has become a significant concern, resulting in delays in providing essential care for ICU patients and, unfortunately, patient fatalities while awaiting available beds. Current bed allocation decisions lack proper supporting evidence and quantitative model-based analyses. Despite adhering to standard guidelines from the World Health Organisation (WHO) and recommendations from the Indian Society of Critical Care Medicine (ISCCM), the number of ICU beds remains insufficient to meet the high demand in the Namibian healthcare system. To address this critical issue, there is an urgent need to implement an effective and optimised bed allocation model at WCH. This study aimed to develop a comprehensive approach for accommodating all admitted patients within the hospital, ensuring the availability of beds while remaining within the allocated budget. The primary research question focused on determining the average waiting time for ICU bed allocation at Windhoek Central Hospital in the context of patient admission. A positivist philosophy was chosen due to its structured approach in examining relationships and generalizing from data. Descriptive statistics were employed to determine the effectiveness of the bed optimisation model at Windhoek Central Hospital. The findings revealed that approximately 60% of beds were allocated to respiratory, general, and reserved bed patients, while car accident and COVID-19 patients each received 20% of the beds. On average, there were approximately 2 patients in each category. The category "Respiratory, General, Reserved Bed" showed the highest frequency, indicating a significant patient presence compared to other categories. The data points were closely clustered around the mean value, suggesting consistent allocation of beds. Based on the study's results, the hospital is recommended to invest in the development and implementation of a data-driven bed optimisation model for the ICU.