Education Inclusion
Permanent URI for this collection
Browse
Browsing Education Inclusion by Title
Now showing 1 - 2 of 2
Results Per Page
Sort Options
Item Enhancing the Effectiveness of Public Sector Monitoring and Evaluation Systems in Zanzibar Through Stakeholders’ Engagement(The Open University of Tanzania, 2023-10-16) Faki, A. J.; Matoka, C.A.; Mutasa, F.The Zanzibar public sector's monitoring and evaluation system engaged numerous stakeholders from diverse organizations. The paper assessed the effect of stakeholder Engagement on the effectiveness of the M&E system in the Zanzibar public sector. The study adopted a positivist philosophy and a quantitative approach. Data were collected through a questionnaire constructed with a points Likert scale from 170 implementers of the Zanzibar Strategy for Economic Growth and Poverty Reduction III (ZSSGRP III). Stratified and simple random samplings were used in sample selection. Both descriptive and inferential statistics were applied for data analysis. The results established that stakeholder engagement had a positive and significant effect on the effectiveness of the M&E system. The findings underscored the importance of engaging stakeholders in all stages of M&E including designing, implementation, and reporting. The study suggested the need for the Zanzibar M&E lead agency to enhance fully stakeholders’ engagement throughout the monitoring and evaluation process to nurture their skill mix potential to improve the overall effectiveness of M&E systems in the Zanzibar public sector.Item Information and cyber security maturity models: a systematic literature review(2020) Anass Rabii; Saliha AssoulPurpose – This paper aims to clarify the uncertainty reflected in the current state of information security maturity evaluation where it has not enough matured and converged so that a generic approach or many specfics approaches become the go-to choice. In fact, in the past decade, many security maturity models are still being produced and remain unproven regardless of the existence of ISO 21827. Design/methodology/approach – The authors have used the systematic literature review to summarize existing research, help identify gaps in the existing literature and provide background for positioning new research studies.Findings – The authors highlighted the prevalent influence of the ISO/IEC 27001/27002 standard but raised the necessity for an in-depth investigation of ISO 21827. The authors also made the implementation facet a central topic of our review. The authors found out that, compared to the number of proposed models, implementation experiments are lacking. This could be due to the arduous task of validation and it could also be the reason why specific models are dominant. Originality/value – While the research literature contains many experience reports and a few case studies on information security maturity evaluation, a systematic review and synthesis of this growing field of research is unavailable as far as the authors know. In fact, the authors only picked-up one bodywork