Refine
H-BRS Bibliography
- no (687) (remove)
Departments, institutes and facilities
Document Type
- Conference Object (687) (remove)
Year of publication
When entering a password (or other secrets) the typed input is most commonly masked, i.e. the characters are hidden behind bullets or asterisks. This, however, complicates the input and highly decreases the user's confident causing several issues such as login failure attempts. On the other hand, password masking is an important security requirement for a lot of applications and contexts to prevent a third person to read the password. Thus, simply dropping password masking is not feasible in general. A common solution provides the user with the choice of toggling password masking on and off, but due to distinct defaults (in dependency of the application and context) this is rather complex and confusing. Enhanced password visualization technologies beyond the simple masking of passwords can provide more sophisticated solutions from both a usability and security perspective. In this paper, available password visualization technologies are presented and discussed. Furthermore a novel password visualization approach is introduced, the TransparentMask, which provides unique properties in comparison to the existing schemes. Amongst these are the ability to detect mistakes while typing and being able to localize and correct the typo within a certain range. Finally, a security analysis of the TransparentMask shows that the protection level given by a certain password length is slightly decreased in comparison to the fully masked approach.
Data transfer and staging services are common components in Grid-based, or more generally, in service-oriented applications. Security mechanisms play a central role in such services, especially when they are deployed in sensitive application fields like e-health. The adoption of WS-Security and related standards to SOAP-based transfer services is, however, problematic as a straightforward adoption of SOAP with MTOM introduces considerable inefficiencies in the signature generation process when large data sets are involved. This paper proposes a non-blocking, signature generation approach enabling a stream-like processing with considerable performance enhancements.
This paper presents the security architecture of the @neurIST medical information system. @neurIST aims at a research and decision support system for treating diseases that unites multiple medical institutions and service providers offering technical solutions based on the Service Oriented Architecture (SOA) paradigm. The security architecture provides secure access to federated medical data spread across multiple sites and protects the privacy of the patients by pseudonymisation of the medical data required for the study.
In recent years a new category of digital signature algorithms based on Elliptic Curve Cryptography (ECC) has taken place besides well known schemes as RSA or DSA. So far it is, however, still not obvious how ECC-based signature schemes can be integrated in X.509-based Public Key Infrastructures (PKI).This paper briefly introduces cryptographic basics of signature schemes based on elliptic curves and points out the necessary cryptography parameters that are important in this context. Afterwards the structure and the encoding of X.509 certificates and Certificate Revocation Lists (CRL) are discussed regarding the integration of ECC public keys and ECC signatures respectively. The paper closes with exemplary implementations of ECC-based security systems.
The @neurIST project
(2008)
OpCog: an industrial development approach for cognitive agent systems in military UAV applications
(2008)
This work introduces Grid computing, showsits use in eHealth environments and elicits trends towards the integration of custodians in eHealth Grids. It considers security and privacy requirements for the use of Grid computing in eHealth scenariosand discusses the possible integration of different types of data custodians. Finally the paper concludes and gives an outlook on the development and deployment of eHealth Gridsinthe near future.
We present a universal modular robot architecture. A robot consists of the following intelligent modules: central control unit (CCU), drive, actuators, a vision unit and sensor input unit. Software and hardware of the robot fit into this structure. We define generic interface protocols between these units. If the robot has to solve a new application and is equipped with a different drive, new actuators and different sensors, only the program for the new application has to be loaded into the CCU. The interfaces to the drive, the vision unit and the other sensors are plug-and-play interfaces. The only constraint for the CCU-program is the set of commands for the actuators.
Das Auslesen von Messdaten in elektronischer Form ermöglicht es, diese vom Ursprung bis zur Rechnungsstellung effizient und ohne Medienbruch zu erheben und zu verarbeiten. Gerade im liberalisierten Energiemarkt ist dies von Bedeutung, da eine Vielzahl von Marktteilnehmern miteinander kommunizieren muss. Das im VERNET-Programm geförderte SELMA-Projekt verfolgt das Ziel, einen Standard für den sicheren elektronischen Austausch von Messdaten zu entwickeln und zu etablieren. Eine der zentralen Anforderungen ist die Gewährleistung der Authentizität und Integrität der über offene Netze ausgelesenen Messdaten, die über die gesamte Lebensdauer der Messdaten nachprüfbar sein sollen. Die technische Umsetzung dieser Anforderungen resultiert in einer Sicherheitsarchitektur, die durch den durchgängigen Einsatz elektronischer Signaturen gekennzeichnet ist. Mit den signierten Datensätzen können die Rechnungen von den Marktteilnehmern auf ihre Authentizität und Integrität hin überprüft werden. Dieser Beitrag zeigt die gesetzgeberischen Hindernisse auf, die bei der Umsetzung der Anforderungen an qualifizierte Signaturen im elektronischen Messdatenaustausch auftreten und wie dennoch eine größtmögliche Beweiskraft für fortgeschrittene Signaturen erreicht werden kann.
Echtzeit-orientierte Multimedia-Kommunikation im Internet eröffnet eine Vielzahl neuer Anwendungen. Diese innovative Kommunikationsplattform ist gerade für weltweit operierende Unternehmen von Interesse. So können z.B. durch die Verwendung von VoIP-Lösungen oder Groupware-Applikationen Kosten gesenkt und gleichzeitig die Zusammenarbeit der Mitarbeiter optimiert werden. Dies trifft auch für Video-Konferenzsysteme zu. Anstelle regelmäßiger Meetings, die meist mit Dienstreisen eines Großteils der Teilnehmer verbunden sind, können Konferenzen virtuell durch die Übertragung von Sprachund Videodaten über das Internet abgehalten werden. Die Akzeptanz der beschriebenen Kommunikationsanwendungen hängt stark von den Faktoren Dienstgüte und Sicherheit ab. Die Übertragung der echtzeit-orientierten Mediendaten muss möglichst kontinuierlich erfolgen, so dass sowohl eine ruckelfreie Wiedergabe der Sprache als auch der Bewegtbilder möglich ist. Da Konferenzen firmenintern und vertraulich sind, werden sie hinter verschlossener Tür abgehalten. Das Pendant in der elektronischen Welt muss eine Entsprechung anbieten. Se- curity-Mechanismen haben allerdings einen Einfluss auf Dienstgüteparameter. Dies muss bei der Entwicklung von Techniken zum Schutz multimedialer Kommunikation berücksichtigt und abgestimmt werden. Dieser Beitrag zeigt anhand des Beispiels eines Video-Konferenzsystems für das Internet, wie Sicherheitsmechanismen in echtzeit-orientierte Multimedia-Kommunikationsanwendungen unter Berücksichtigung von Quality of Service (QoS) integriert werden können.
Listen to Developers! A Participatory Design Study on Security Warnings for Cryptographic APIs
(2020)
Kontemporäre Service-orientierte Systeme sind hochgradig vernetzt und haben zudem die Eigenschaft massiv-skalierbar zu sein. Diese Charakteristiken stellen im besonderen Maße Anforderungen an die Datensicherheit der Anwender solcher Systeme und damit primär an alle Stakeholder der Softwareentwicklung, die in der Verantwortung sind, passgenaue Sicherheitsmechanismen effektiv in die Softwareprodukte zu bringen. Die Effektivität von Sicherheitsarchitekturen in service-orientierten Systemen hängt maßgeblich von der richtigen Nutzung und Integration von Security-APIs durch eine heterogene Gruppe von Softwareentwicklern ab, bei der nicht per se ein fundiertes Hintergrundwissen über komplexe digitale Sicherheitsmechanismen vorausgesetzt werden kann. Die Diskrepanz zwischen komplexen und in der Anwendung fehleranfälligen APIs und einem fehlenden Verständnis für die zugrundeliegenden Sicherheitskonzepte auf Seiten der Nutzer begünstigt in der Praxis unsichere Softwaresysteme. Aus diesem Grund ist die Gebrauchstauglichkeit von Security-APIs besonders relevant, damit Programmierer den benötigten Funktionsumfang effektiv, effizient und zufriedenstellend verwenden können. Abgeleitet von dieser Problemstellung, konzentriert sich das Dissertationsvorhaben auf die gebrauchstaugliche Ausgestaltung von Security-APIs und den Herausforderungen die sich aus den Methoden zur Evaluation der Usability in typischen Umgebungen der Softwareentwicklung ergeben.
This paper presents methods for the reduction and compression of meteorological data for web-based wind flow visualizations, which are tailored to the flow visualization technique. Flow data sets represent a large amount of data and are therefore not well suited for mobile networks with low data throughput rates and high latency. Using the mechanisms introduced in this paper, an efficient transfer of thinned out and compressed data can be achieved, while keeping the accuracy of the visualized information almost at the same quality level as for the original data.
Online media consumption is the main driving force for the recent growth of the Web. As especially realtime media is becoming more and more accessible from a wide range of devices, with contrasting screen resolutions, processing resources and network connectivity, a necessary requirement is providing users with a seamless multimedia experience at the best possible quality, henceforth being able to adapt to the specific device and network conditions. This paper introduces a novel approach for adaptive media streaming in the Web. Despite the pervasive pullbased designs based on HTTP, this paper builds upon a Web-native push-based approach by which both the communication and processing overheads are reduced significantly in comparison to the pull-based counterparts. In order to maintain these properties when enhancing the scheme by adaptation features, a server-side monitoring and control needs to be developed as a consequence. Such an adaptive push-based media streaming approach is intr oduced as main contribution of this work. Moreover, the obtained evaluation results provide the evidence that with an adaptive push-based media delivery, on the one hand, an equivalent quality of experience can be provided at lower costs than by adopting pull-based media streaming. On the other hand, an improved responsiveness in switching between quality levels can be obtained at no extra costs.
This paper gives necessary foundations to understand the mechanism of warning processing and summarizes the state of the art in warning development. That includes a description of tools, researchers use to work in this scientific field. In detail these are models that describes the human way of processing warnings and mental models. Both are presented detailed with relevant examples. The paper tells how these tools are connected and how they are used to improve the effectiveness of warnings.
Despite the lack of standardisation for building REST-ful HTTP applications, the deployment of REST-based Web Services has attracted an increased interest. This gap causes, however, an ambiguous interpretation of REST and induces the design and implementation of REST-based systems following proprietary approaches instead of clear and agreed upon definitions. Issues arising from these shortcomings have an influence on service properties such as the loose coupling of REST-based services via a unitary service contract and the automatic generation of code. To overcome such limitations, at least two prerequisites are required: the availability of specifications for implementing REST-based services and auxiliaries for auditing the compliance of those services with such specifications. This paper introduces an approach for conformance testing of REST-based Web Services. This appears conflicting at the first glance, since there are no specifications available for implementing REST by, e.g., t he prevalent technology set HTTP/URI to test against. Still, by providing a conformance test tool and leaning it on the current practice, the exploration of service properties is enabled. Moreover, the real demand for standardisation gets explorable by such an approach. First investigations conducted with the developed conformance test system targeting major Cloud-based storage services expose inconsistencies in many respects which emphasizes the necessity for further research and standardisation.
Service Security Revisited
(2014)
SOA-Readiness of REST
(2014)
Application Programming Interfaces (APIs) are a vital link between software components as well as between software and developers. Security APIs deliver crucial functionalities for programmers who see themselves in the increasing need for integrating security services into their software products. The ignorant or incorrect use of Security APIs leads to critical security flaws, as has been revealed by recent security studies. One major reason for this is rooted in usability issues. API Usability research has been deriving recommendations for designing usable APIs in general. Facing the growing relevance of Security APIs, the question arises, whether the observed usability aspects in the general space are already sufficient enough for building usable Security APIs. The currently available findings in the API Usability domain are selective fragments only, though. This still emerging field has not produced a comprehensive model yet. As a consequence, a first contribution of this paper is such a model that provides a consolidated view on the current research coverage of API Usability. On this baseline, the paper continues by conducting an analysis of relevant security studies, which give insights on usability problems developers had, when using Security APIs. This analysis leads to a proposal of eleven specific usability characteristics relevant for Security APIs. These have to be followed up by usability studies in order to evaluate how Security APIs need to be designed in a usable way and which potential trade-offs have to be balanced.
Usable security puts the users into the center of cyber security developments. Software developers are a very specific user group in this respect, since their points of contact with security are application programming interfaces (APIs). In contrast to APIs providing functionalities of other domains than security, security APIs are not approachable by habitual means. Learning by doing exploration exercises is not well supported. Reasons for this range from missing documentation, tutorials and examples to lacking tools and impenetrable APIs, that makes this complex matter accessible. In this paper we study what abstraction level of security APIs is more suitable to meet common developers’ needs and expectations. For this purpose, we firstly define the term security API. Following this definition, we introduce a classification of security APIs according to their abstraction level. We then adopted this classification in two studies. In one we gathered the current coverage of the distinct classes by the standard set of security functionality provided by popular software development kits. The other study has been an online questionnaire in which we asked 55 software developers about their experiences and opinion in respect of integrating security mechanisms into their coding projects. Our findings emphasize that the right abstraction level of a security API is one important aspect to consider in usable security API design that has not been addressed much so far.
Consolidating Principles and Patterns for Human-centred Usable Security Research and Development
(2018)
We present an evaluation of usable security principles and patterns to facilitate the transfer of existing knowledge to researchers and practitioners. Based on a literature review we extracted 23 common usable security principles and 47 usable security patterns and identified their interconnection. The results indicate that current research tends to focus on only a subset of important principles. The fact that some principles are not yet addressed by any design patterns suggests that further work on refining these patterns is needed. We developed an online repository, which stores the harmonized principles and patterns. The tool enables users to search for relevant patterns and explore them in an interactive and programmatic manner. We argue that both the insights presented in this paper and the repository will be highly valuable for students for getting a good overview, practitioners for implementing usable security and researchers for identifying areas of future research.
Cryptographic API misuse is responsible for a large number of software vulnerabilities. In many cases developers are overburdened by the complex set of programming choices and their security implications. Past studies have identified significant challenges when using cryptographic APIs that lack a certain set of usability features (e.g. easy-to-use documentation or meaningful warning and error messages) leading to an especially high likelihood of writing functionally correct but insecure code.
To support software developers in writing more secure code, this work investigates a novel approach aimed at these hard-to-use cryptographic APIs. In a controlled online experiment with 53 participants, we study the effectiveness of API-integrated security advice which informs about an API misuse and places secure programming hints as guidance close to the developer. This allows us to address insecure cryptographic choices including encryption algorithms, key sizes, modes of operation and hashing algorithms with helpful documentation in the guise of warnings. Whenever possible, the security advice proposes code changes to fix the responsible security issues. We find that our approach significantly improves code security. 73% of the participants who received the security advice fixed their insecure code.
We evaluate the opportunities and challenges of adopting API-integrated security advice and illustrate the potential to reduce the negative implications of cryptographic API misuse and help developers write more secure code.
Die soziale Netzwerkanalyse versucht menschliche Interaktion in einen analytischen und auswertbaren Zusammenhang zu bringen. Sie hat sich als Methode in den letzten Jahrzehnten über die Sozialwissenschaften hinaus in die Geschichtswissenschaften, Archäologie und Religionswissenschaften verbreitet. Dabei fanden verschiedene Paradigmenwechsel statt, zum Beispiel vom statischen Netzwerken mit dem Schwerpunkt auf quantitativ-struktureller Analyse hin zu heterogenen Handlungsnetzwerken wie zum Beispiel in der der Actor Network Theory (ANT) gewandelt. Der Fokus liegt aktuell eher auf der Frage des Informationsaustauschs und der Dynamik nicht statischer Netzwerke.
This paper gives an overview of how we can benefit from using container technology in our academic work. It aims to be a starting point for fellow researchers which also think about applying these technologies. Hence, we focus on decribing our own experiences and motivations instead of proving hard scientific facts.
Open-Source Software spielt sowohl zur Ausgestaltung von Lehr- und Lernszenarien (bspw. Organisation mit Editoren und Groupware, Kollaboration und Kommunikation via Chats und Webblogs), als auch für die Umsetzung von Forschunsprojekten (zum Beispiel Auswertung großer Datenbestände, Erprobung realer Situationen in vituellen Laboren, Evaluation neuer Oberflächenentwicklungen) eine wichtige Rolle. Um eine bestmögliche Passung der Software herzustellen, erfolgt Softwareentwicklung im Hochschulbereich entweder forschungsprojektbezogen oder Disziplin- und Einrichtungsübergreifend.
Experience made with free and open source software (FOSS) in the public research is shared with the community. The motivation for using and publishing FOSS is to increase visibility, transparancy and feedback quality while at the same time lowering software licensing costs. Also, the idea of giving back and returning a value plays a role. The most frequently given counter arguments are discussed. In the end, it’s important to embed FOSS publishing into the company’s strategy for the exploitation of scientific research results. To help with this, a checklist of criteria to indicate FOSS publishing is suggested. On the backround of wireless sensor networks, some case studies of FOSS contribution are detailed. The emphasis is on checking the original motivation and the spirit of FOSS back with the reality. Finally, further potential of publishing FOSS in the context of scientific research is identified.
Das Kernanliegen des Datenschutzes ist es, natürliche Personen vor nachteiligen Effekten der Speicherung und Verarbeitung der sie betreffenden Daten zu schützen. Aber viele Personen scheinen gar nicht geschützt werden zu wollen. Im Gegenteil, viele Endanwender willigen “freiwillig“ – bewusst oder unbewusst – in eine umfassende Verarbeitung ihrer personenbezogenen Daten ein. Warum tun Menschen dies? Es werden verschiedene Ursachen diskutiert (beispielsweise in [79]), hierzu gehören Uninformiertheit, mangelnde Sensibilität, das Gefühl der Hilflosigkeit, mangelnde Zahlungsbereitschaft und mangelnde Alternativen. Auch wenn dies in Einzelfällen zutrifft, so gibt es oft sehr wohl datenschutzfreundliche Alternativen. Beispielsweise existiert zu WhatsApp (als Instant Messaging App) die Alternative Threema. Threema gilt als EU-DS-GVO-konform und funktional durchaus mit WhatsApp vergleichbar [62]. Allerdings ist inzwischen die aktuelle Netzwerkgröße ein entscheidendes Auswahlkriterium: Im Januar 2018 hatte Threema 4,5 Millionen Nutzer [172], WhatsApp dagegen 1,5 Milliarden [171]. Dies ist ein Indiz dafür, dass WhatsApp sich quasi zum De-facto-Standard entwickelt hat und es für die einzelne Person nur schwer möglich ist, viele andere “zum Wechsel auf ein anderes Produkt zu bewegen. [. . . ] Bei Diensten mit Nutzerzahlen im Milliardenbereich kann von ’Freiwilligkeit’ nur noch bedingt gesprochen werden.“ [9]
Cancer is one of the leading causes of death worldwide [183], with lung tumors being the most frequent cause of cancer deaths in men as well as one of the most common cancers diagnosed in woman [40]. As symptoms often arise in advanced stages, an early diagnosis is especially important to ensure the best and earliest possible treatment. In order to achieve this, Computed Tomography (CT) scans are frequently used for tumor detection and diagnosis. We will present examples of publicly available CT image data of lung cancer patients and discuss possible methods to realize an automatic system for automated cancer diagnosis. We will also look at the recent SPIE-AAPM Lung CT Challenge [10] data set in detail and describe possible methods and challenges for image segmentation and classification based on this data set.
One of the biggest challenges faced by many tech start-ups from developed markets is to have validated market-fit products/services and to see their solutions implemented. In several sectors, stringent regulations, and the law of handicap of head start at home can be hurdles that limit the development and even the survival potential of theses start-ups. Tech start-ups seeking implementation, learning, and legitimacy may have a solution in expanding into emerging markets. Emerging markets offer both business opportunities in sectors in need of new technologies as they are “fertile grounds” for developing and testing internationalisation business models. We present here a process designed to help tech start-ups to identify, access, shape and seize these opportunities and to overcome their own specificities and emerging markets specificities. The three phases of the proposed process cover entry node concept, partnership, and business, operating and revenue joint models’ development. DesignScience Research Paradigm is used for the design and evaluation of the process. To show the relevance of this process, a case study on the expansion in Morocco of a Dutch start-up active in e-health is used. The study shows the importance of the process for the embeddedness in a local relevant value network with a relevant adopter’s system, a key enabler to achieve time and cost-effective expansion in that specific business and institutional contexts. A pilot to assess the proposed models and evidence of benefits is under development. To boost their chances of growth tech start-ups from developed markets should consider expansion into emerging markets in their strategy. It would be beneficial that policy makers adopt a strategy by which to assist tech start-ups in accessing value networks in emerging markets. It is also important for policy makers from emerging markets to consider developing schemes to attract tech start-ups from developed markets.
Research on entrepreneurial eco-systems is evolving with exhortations for empirical studies at regional and local levels to augment national surveys. The study, therefore, sought to explore the entrepreneurial eco-system of the Central Region, which is relatively well-endowed with natural resources but lags behind in economic advancement in Ghana. Through descriptive research design, quantitative data were collected using self-administered questionnaires from a convenience sample of 44 entrepreneurs under the presidential business support programme in the Central Region of Ghana, in 2019. Data were analysed, by conducting descriptive analysis such as means (M) and percentages and by exploratory factor analysis, with the IBM SPSS Version 25. Descriptive results of 37 valid responses showed that the respondents were satisfied, in varying degrees (M = 4.19-5.65), with 11 factors within the eco-system; the top three factors were demand, security and availability of raw materials. Respondents were, however, not satisfied with access to business development services, access to finance, rent charges and access to repairers of equipment and thus, pose as challenges to their entrepreneurial pursuits. Principal component analysis revealed inter-connectedness among the factors in the eco-system with strong loadings of measures of institutions and resource endowment under the two components of the solution. Based on the findings, it is concluded that the entrepreneurs surveyed were satisfied with more factors in the EES of the Central Region while they were dissatisfied with relatively few but critical factors in the EES, thereby posing as major challenges to their entrepreneurial activities. As an exploratory study, the findings suggest that the entrepreneurial eco-system of the Central Region of Ghana is, to some extent, supportive of entrepreneurial activities but has key challenges. To achieve maximum outcomes, policy interventions should collectively address, at a time, factors that interact strongly to influence entrepreneurship within the system.
Personal values and electronic waste disposal behaviours among households in Cape Coast Metropolis
(2021)
The study examined social values that accounted for electronic waste recycling and reuse behaviours. Via a crosscommunity survey of 193 of households in the Cape Coast Metropolis, a correlational design was employed in the study. Partial Least Squares-Structural equation modelling was used to analyse the data. Results from the analysis showed the influence of altruistic values (β = 0.275, p < 0.05) on reuse behaviour. Similarly, environmental awareness (β = 0.213, p<0.05) also showed significant influence on participation in recycling, whereas psychological ownership significantly influenced both reuse (β = 0.319, p < 0.05), and participation in recycling (β = 0.339, p < 0.05), The joint significance of altruistic values, environmental awareness and psychological ownership to explaining recycling participation was 21.3% (R2 = 0.213, p < 0.05) and that of reuse was 24.6% (R2 = 0.246, p < 0.05). The results of the study showed that individuals who are knowledgeable about the state of their environment were more likely to participate in recycling. On the other hand, individuals with altruistic values preferred giving unwanted electronic equipment to others for reuse. Altruistic values are particularly true of collectivist cultural orientation. Psychological ownership was significant in predicting both behaviours, however, the effect size on reuse was moderate. Psychological ownership due to waste aversion and frugality lead consumers to keep, and subsequently give to close relatives in their social network. It was recommended that individuals should be encouraged to patronize formal recycling services. as a way to show concern for the well-being of others by reducing pollution due to improper waste treatment. Again, like in developed economies, second-hand collection systems for unwanted electronic products can be developed, and made convenient for individuals with reusable items, who may be willing to donate or even resell.
The role of tourism entrepreneurship in rural development continues to be a subject of interest and debate among academia and practitioners. Theoretically, it is anticipated that tourism entrepreneurship will lead to livelihood diversification, enhancement and ultimately a revitalization of the rural economy. While tourism is posited as an accessible entrepreneurship pathway, there is a dearth of information regarding rural dwellers’ actual experiences with it, especially within the Ghanaian context. Using a case study approach and qualitative data from Wli; a rural tourism destination in Ghana, this paper delves into the opportunities and concerns associated with tourism entrepreneurship in rural areas. Data was obtained between November and December 2016 from 27 persons who were either tourism enterprise owners or employees. Findings from the study showed that entrepreneurial activities centred on the provision of accommodation, food and beverage, souvenir and guiding services. The nature of the activities enabled easy transfer of existing skills and knowledge. Further, entry into tourism entrepreneurship was perceived to be easy by the majority of study participants. These findings confirm the potential for tourism to be employed in boosting entrepreneurial activities in rural areas. Nevertheless, there were concerns regarding access to credit, institutional support, unhealthy competitions, low incomes, unguaranteed pensions, and seasonality and skewness of demand. These concerns threatened the growth and sustainability of tourism entrepreneurship within the community. From a policy perspective, there is a need for institutional recognition and support for tourism entrepreneurial intentions and activities in rural areas. Practice-wise, credit facilities need to be designed specifically for tourism-related rural enterprises. Further, periodic skills and knowledge augmentation programmes must be initiated to help expand the skill sets for the rural entrepreneurs. Finally, there is a need for the formation of traderelated networks to provide a platform for knowledge and experience sharing among the entrepreneurs.
Developing the Circular Economy in Uganda: Prospects for Academia-Public-Private-Partnerships
(2021)
Issues: Circular economy is a production system that optimizes the reusability of by-products/waste as raw materials. As the global population threatens to reach 9 billion by 2050, consumption levels grow proportionally, raising food, material, and energy demands. In Uganda, soil nutrient depletion and energy poverty are key challenges faced by urban and rural communities. Rampart depletion of natural resources calls for transit from the linear economic models towards sustainable production/consumption technologies. This study investigated prospects for APPP to optimize the reusability of by-products/waste as raw materials. Approach: Quantitative and qualitative tools were used to collect data via document analysis, interviews, and participant observations. The tools were administered to municipal authorities, private waste-collecting agencies in cities and municipalities; officials in Ministries of energy and Agriculture; officials in universities research units and entrepreneurs that deal in agricultural and energy products; officials from civil society organizations. Findings: there are a number of sustainability projects being undertaken by Universities and High schools, Government agencies, companies, and civil society organization isolation. Singlehandedly, individual agencies lack the requisite capacity to develop closed-loop production/consumption models. Analysis of a few successful RRR projects suggests that APPP is positioned to promote CE. Transiting towards a circular economy requires joint ventures to optimize human, technological, and financial resources and develop policy and institutional frameworks. In Uganda, recycling biotic by-products can promote environmental sustainability; reduce stress on natural resources; enable cost savings; promote green entrepreneurship, and create jobs/livelihoods. Conclusion: working jointly, CE could be enhanced via technical and business models by the academia, private capital investment by companies, community engagement by CSOs, and development of supportive policy and institutional frameworks to facilitate decision-making processes. The APPPs are positioned to use interactive platforms for creating awareness and promote sensitization about green values through education and multimedia communication platforms.
Most economies across the globe rely on entrepreneurship for growth. There is evidence to suggest that entrepreneurship creates job opportunities and spurs economic growth and development (Pacheco, Dean, & Payne, 2010; Mojica, Gebremedhin, & Schaeffer, 2010, and Solomon, 2007). Even though entrepreneurship is one of the fastest growing education disciplines globally, researchers are still divided on what should be taught and how it should be taught in institutions of higher learning. Entrepreneurial decision-making is laced with uncertainty and drawbacks. Hence, entrepreneurship learners must be taught using practical and conceptual methodologies to equip them with the requisite knowledge and skill that will enable them to confront such challenges in their entrepreneurial activities. This calls for entrepreneurship teachers to be innovative and to also encourage their learners to be innovative as entrepreneurship involves the generation of new business ideas. This paper sought to examine teaching methodologies for entrepreneurship education in institutions of higher learning in Kenya. A mixed-method approach that involved triangulation as the main data collection technique was used. Interviews were administered with teachers and learners of entrepreneurial education in Kenya, with a view to identifying the most commonly used teaching methodologies of entrepreneurial education and their shortcomings. Course outlines and curricula borrowed from twenty (20) institutions of higher learning in Kenya were reviewed. Results indicate that entrepreneurial education in Kenya is largely theoretical and does not meet the needs of the modern entrepreneur. The paper therefore recommends innovative teaching methodologies of entrepreneurial education that can be utilised by the teacher to prepare students adequately to generate entrepreneurial ideas and to identify entrepreneurial opportunities. For this reason, the paper recommends the use of such methodologies as business plan generation, idea generation, innovation, creativity, networking, opportunity recognition, expecting and embracing failure, and adapting to change.
This study sought to apply the Structure Conduct Performance paradigm to Africa´s air transport landscape in general. To do that, it examines the past, present, and future expectations of four of Sub-Saharan Africa’s biggest aviation economies, namely South Africa, Kenya, Ethiopia, and Nigeria. Secondary data containing historical passenger traffic was analysed, and predictions for growth in the next ten years were proposed. The findings suggest that the experience of the existing liberalization initiatives, such as the Yamoussoukro Declaration (YD), has produced less than expected benefits. However, the future of aviation in Africa is somewhat positive, with a growth trajectory expected to follow a linear and gradual path supported by various initiatives, including the Single African Air Transport Market (SAATM) and the African Continental Free Trade Area (AFCTA). The study’s contribution is to illuminate the current discourse on the aviation sector in Africa through the Structure-Conduct-Performance theory paradigm and suggests a conceptual model that could be applied to future studies relating to aviation in Africa.
Rural Social Entrepreneurship (RSE) is considered an essential factor for achieving Sustainable Rural Development (SRD) and improving rural people's socio-economic status through increasing production, productivity, reducing unemployment, and accelerating the progress in achieving SDGs. The paper aims at examining the role of social entrepreneurship in achieving (SRD) in Sudan with reference to Wad Balal Project for investment and rural development in Gezira State, which established in 2005 in small villages in Gezira State through mobilizing of local savings and resources for creating job opportunities, sponsoring poor households, improving the infrastructures, and reducing poverty. The study depends on cross-sectional data collected through a questionnaire and focus group discussion from 100 head of households in the village under research. A questionnaire is internally consistent, and its questions are stable. Frequencies and percentages have been used for describing the basic characteristics of the respondents. Statistical t-test was adopted to test the opinions of respondents about the role of the project based on the Likert scale. The results revealed that the project has significantly increased the opportunities of job and training as well as household income, the results also confirmed that the project has improved the status of education and health services in the village. The project has extended and established many branches; the project also diversified its investment to cover more kinds of investments, the project reinvested 50% of its profits and directed the rest to charity, and social services in the village, many lessons can be learned from the project story. The research recommended that a similar social entrepreneurship project can be generalized to more villages in Sudan and other developing countries to accelerate sustainable rural development. Local communities have to support similar initiatives for developing their villages.
There is severe clinical vitamin A deficiency (VAD) prevalence among Ghanaians and many African countries. Foodbased diets has been suggested as a more sustainable approach to solving the VAD situation in Africa. In this study, A participatory action research between orange flesh sweet potato farmers, gari processors within central region and academia was adopted to develop gari containing provitamin A beta-carotene. Gari is a major staple for Ghanaians and people in the West African subregion due to its affordability and swelling capacity. It is mainly eaten raw with water, sugar, groundnut and milk as gari-soakings or with hot water to prepare gelatinized food called gari-kai in Ghana or “eba” among Nigerians. However, gari is limited in provitamin A carotenoids. Orange fleshed sweet potato (OFSP) is known to contain large amount of vitamin A precursor. Therefore, addition of OFSP to gari would have the potential to fight the high prevalence rate of vitamin A deficiency amongst less developed regions of Africa. To develop this, different proportions of orange fleshed sweet potatoes (OFSP) was used to substitute cassava mash and fermented spontaneously to produce composite gari - a gritty-crispy ready-to-eat food product. Both the amount of OFSP and the fermentation duration caused significant increases in the β-carotene content of the composite gari. OFSP addition reduced the luminance while roasting made the composite gari yellower when compared with the cake used. Addition of OFSP negatively affected the swelling capacity of the gari although not significant. The taste, texture, flavour and the overall preferences for the composite gari decreased due to the addition of the OFSP but fermentation duration (FD) improved them. The sample with 10% OFSP and FD of 1.81 days was found to produce the optimal gari. One-portion of the optimal gari would contribute to 34.75, 23.2, 23.2, 27, 17 and 16% of vitamin A requirements amongst children, adolescent, adult males, adult females, pregnant women and lactating mothers respectively. The study demonstrated that partial substitution of cassava with OFSP for gari production would have the potential to fight the high prevalence rate of vitamin A deficiency amongst less developed regions of Africa while involvement of farmers and processors prior to the design of research phase enhanced the adoption of intervention strategies.
A school leader’s achievement is not what they study in learning institutions but the way they organize themselves into problem solving and realistic decision making. While this includes some taught hard skills, the bulk of school activities rely on soft skills. Soft skills, however, are frequently neglected, although they play an important role in school principals’ daily operations as an instructional supervisor. This study aimed to examine the relationship between soft skills training and Principals' performance. The study adopted a cross-sectional mixed survey design. Using Yamane formulae, the sample comprised of 167 principals from 286 public secondary schools in Kiambu County. These were spread proportionally across all the 12 sub-counties in the County. The principal research instrument was primarily a questionnaire. The reliability of the instrument using the Cronbach Alpha coefficient was deemed reasonable at.73. The findings showed that a substantial relationship exists between the training of the principal on soft skills and their good performance of the duties. The study suggests routine in-service training should be undertaken in the county to improve the development of soft skills. It is also advisable that undergraduate, postgraduate, or in-service training include soft skills as a unit, to build knowledge of the value of soft skills.
Studies in entrepreneurship education in hospitality and tourism has indicated that further attention could be given toward helping students to develop creativity and critical thinking skills, engage in deeper self-discovery experiences, and understand tourism more fully to help prepare them for entrepreneurial roles. This study aims at evaluating Hospitality entrepreneurial modules offered in Tourism programs in Ghanaian institutions. The curriculum of Tourism in two tertiary institutions in Ghana offering Tourism is studied. The research highlights on the need to integrate hospitality technical skills into Tourism education to create a culture that will enhance the growth of entrepreneurial hospitality into Tourism as culinary Tourism is becoming common. Some of the challenges faced by tourism students and entrepreneurship educators are highlighted. Structured interview technique was used to collect data from 20 purposive sampled students of the selected institutions. The results revealed that the level of importance and attention given to hospitality skills in tourism and the perception of students on acquisition of the required competencies is minimal. It is therefore recommended that more skills and competences in hospitality operation, food and beverage production and service be introduced in tourism education in a more holistic manner with emphasis on skill acquisition in order to make the tourism graduate more creative and critical thinker in today’s global competitive environment.
In times of climatic or political grievances that affect not only human life worldwide, but also the environment and the economic situation of a country, a change in the way of thinking about tourism is beginning and the sector of ecotourism is also becoming increasingly important in Germany. The applicability of this form of tourism in the East African destination Kenya in the form of a travel package that is both partly unique and can be designed individually describes the subject matter of this elaboration and is illustrated using the example of the charitable organization Mully Children's Family and the related registered tourism company, MCF Africa Safaris. The underlying research aims to determine how to transform the organisation's own tree planting initiative into a niche tourist market and how this must be geared to gain the interest of the German eco-tourist. Based on the evaluation of the research results, there is high potential, which is dedicated to the implementation of a form of travel consisting of the active support of the named charity and its initiative as well as individually selectable holiday activities in the target market Kenya. As a result, there are basic prerequisites, the consideration of which is essential for the successful integration of the so-called niche market tree planting and the branch-specific nature of ecotourism in the Kenyan travel market.
Kenya as a touristic destination is well known as an exotic country offering many different landscapes as well as the diversity of wildlife; this is typical for several African countries. To ensure a sustainable tourism development, different forms of tourism have to be considered. One of these forms could be eco-mountain bike cycling tours, as these tours are gaining in popularity, for example in Germany. The aim of this study was to obtain results regarding the market potential for mountain bike eco-tourism in Kenya. The up-and-coming tourism branch of mountain biking was examined in connection with the increasing demand for long-distance travel. The results of this study showed that mountain biking in exotic countries like Kenya has market potential in principle. However, it was also found that mountain biking alone is not a sufficient pull factor for tourists. The combination with other activities turned out to be promising. It was found that tourist packages that include mountain biking as an activity are perceived as attractive. Moreover, it was obtained that not only tourists who ride a mountain bike regularly are addressed as a target group. Even "regular" tourists find mountain biking an attractive (touristic) activity, especially in combination with game drives. Experts also assess the market potential for eco-mountain bike tourism as positive and find existing routes and accommodation attractive. The findings are giving indications for the possibilities to develop eco-mountain bike tourism as a touristic alternative and addition to existing touristic products.
Early Detection of UV-B Induced Damages on Apple Seedlings by Fluorescence and Reflection Techniques
(2007)