Academic literature on the topic 'Personal information management – Zimbabwe'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Personal information management – Zimbabwe.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Personal information management – Zimbabwe"

1

Mutsagondo, Samson. "Post-records survey inspections in Zimbabwe." Records Management Journal 28, no. 1 (March 19, 2018): 115–27. http://dx.doi.org/10.1108/rmj-01-2017-0001.

Full text
Abstract:
Purpose This paper aims to establish public departments’ compliance with National Archives of Zimbabwe (NAZ)’s records survey recommendations as well as to find out reasons for compliance and non-compliance. Design/methodology/approach This quantitative research used a survey research design and collected data using questionnaires, which were triangulated by document reviews and personal observation. A census approach was used where all 15 public departments upon which post-records survey inspections were conducted by Gweru Records Centre in the Midlands Province in 2016 were involved in the study. Findings The study revealed that many public departments in Zimbabwe disregarded records survey recommendations given by NAZ after records surveys. This was despite the fact that NAZ was armed with the National Archives of Zimbabwe Act (1986) which in principle is supposed to induce compliance by client departments. As a result, the records management situation in public departments has not improved much, and in some cases, it has become worse. Originality/value A lot has been published about records surveys in Zimbabwe, for example, by Chaterera (2008, 2013), Dewah (2010), Karimanzira and Mutsagondo (2015), Maboreke (2007) and Mutsagondo (2012). These studies have shown the importance of records surveys. However, none of them has evaluated the effectiveness of records surveys by examining the degree of compliance to records survey recommendations by public departments. This study thus scores a first in this regard. The study will enable NAZ to make a cost-benefit analysis of records surveys as well as to use results of this study to effect necessary operational, tactical and strategic decisions as regards the exercise.
APA, Harvard, Vancouver, ISO, and other styles
2

Moyo, Zvisinei, Juliet Perumal, and Philip Hallinger. "Struggling to make a difference against the odds: a synthesis of qualitative research on women leading schools in Zimbabwe." International Journal of Educational Management 34, no. 10 (August 27, 2020): 1577–94. http://dx.doi.org/10.1108/ijem-01-2020-0015.

Full text
Abstract:
PurposeThis paper reports on results of a systematic research synthesis of 25 studies on women in educational leadership and management in Zimbabwe. The aim of this systematic review of research was to report conclusions drawn from a synthesis of findings from studies of gender and educational leadership in Zimbabwe.Design/methodology/approachThe review used systematic methods to identify 25 research studies that examined women leading schools in Zimbabwe. Research synthesis methods used for qualitative research studies were employed in order to identify three broad themes and related subthemes across the studies.FindingsThe review identified three themes: (1) barriers to women gaining access to management positions, (2) female ways of leading, (3) context challenges for women leaders. Both barriers to gaining positions and context challenges faced in enactment of the leadership role are described. These consist of an intertwined web of personal, institutional and cultural challenges. Women's ways of leading were characterized as collegial, collaborative and caring.Research limitations/implicationsThree implications are identified. First is a need for better statistical information on gender representation in Zimbabwe and other African countries. Second is a need to design and implement training, mentoring and networking support programs for female leaders in Zimbabwe. Finally, the authors recommend that future research move toward the use of mixed methods research designs capable of achieving complementary research goals of gaining a broad perspective on the effects of female leadership and in-depth understanding of how those are achieved.Originality/valueEmpirical studies of female leadership is especially urgent in Africa where particular features embedded in the cultural context shape female access to leadership role and attitude towards efforts of women to lead.
APA, Harvard, Vancouver, ISO, and other styles
3

Chifamba, Ephraim. "Mainstreaming Gender in Pursuit of Millennium Development Goals in Water Resource Governance in Buhera, Zimbabwe." International Journal of Social Sciences and Management 1, no. 1 (January 15, 2014): 10–21. http://dx.doi.org/10.3126/ijssm.v1i1.8946.

Full text
Abstract:
Women have the primary role for the management of household water supply, sanitation and health. Water is necessary for drinking, but also for food production and preparation, personal hygiene, care of the sick, cleaning, washing and waste disposal. Because of their dependence on water resources, women have accumulated considerable knowledge about water resources, including location, quality and storage methods. However, efforts geared towards improving the management of the finite water resources and extending access to safe drinking water and adequate sanitation, have often overlooked the central role that women play in water management. The study used both qualitative and quantitative research methodologies. The research noted that despite increased gender awareness and the availability of much more information on women’s and men’s roles in water management, gender is not yet mainstreamed into this sector. The study revealed that prospects for effective gender mainstreaming in water resource management will hinge on how the main agenda can address the transformation of gender relations and treat water as a human right so as to realize the Millennium Development Goals (MDGs) in Buhera. A gender equity approach within the water sector, should strive for a more balanced division between women and men in access to information, sharing of contribution, the degree of decision making, access to resources and benefits and the control over water resources. Addressing women’s concerns and mainstreaming gender in water governance through a livelihood approach is critical because this generates an understanding of people’s livelihood strategies and their decision making mechanisms and processes. Significant support and capacity development are required to enhance the participation in decision making processes for the success of water management initiatives.DOI: http://dx.doi.org/10.3126/ijssm.v1i1.8946 Int. J. Soc. Sci. Manage. Vol.1(1) 2014 10-21
APA, Harvard, Vancouver, ISO, and other styles
4

Bernard Nkala, Charles Mudimu, and Angelbert Mbengwa Mbengwa. "Human resources for health talent management contribution: A case for health systems strengthening in the public health sector." World Journal of Advanced Research and Reviews 9, no. 2 (February 28, 2021): 192–201. http://dx.doi.org/10.30574/wjarr.2021.9.2.0062.

Full text
Abstract:
Talent Management is an essential component in transforming health systems if carefully implemented for the public sector especially in low income countries. In Zimbabwe public health sector, talent retention and engagement are viewed as amongst the challenges affecting the realisation of effective performance and productivity from the existing Health workforce. Largely, modern health care systems lack robust strategies to identify and utilize employee talent essential to help attain organisational citizenship. The study reviewed the relevancy and effectiveness of talent management practices in the public health sector using a case study of Parirenyatwa Group of Hospitals, one of the major referral hospitals in Zimbabwe. The study aimed at closing the talent pipe-line gaps as part of the Health Systems Strengthening initiative towards bringing about talent retention and engagement amongst the health workforce in public sector settings. The study assessed the impact of the existing talent management initiatives focusing on variables; recruitment and attraction perspective, compensation and rewarding component, health workforce succession management and implemented performance management system. The study obtained cross sectional data collected through a designed tool following a purposive (non-probability) sampling technique from a sample of n=200 existing health management team to assess the perception of implemented talent management approaches. The study further used responses from n=450 randomly selected health professionals recruited in the last 3 years prior to the survey to analyse the association between the variables on talent management practices namely (recruitment and selection, compensation and rewarding, succession management and performance management system) and the age of health workforce to employee engagement. The data on recruited cadres was obtained from the existing Hospital Human Resources for Health Recruitment Database. The research revealed that talent management in public health sector currently suffers from theoretical problems since the existing Human Resources for Health literature concentrates on anecdotal information. The human resource practitioners need to come up with more involving workplace activities to demystify the theory that millennials are generally finding it difficult to engage. In addition, the public sector succession planning strategies would need to be in place for the millennials well in time to adequately replace the considerable number of those at retiring stages. The Logistic regression analysis revealed recruitment and attraction perspective, and succession management positively influence health workforce engagement while adherence to implementing performance management system negatively affected employee engagement. Compensation and rewarding practices in a public health set up proved an insignificant variable to health workforce engagement hence study concluded further analysis on the impact on wider target group. The study revealed as the age increases, the health workforce become more engaged and self-motivated to develop their personal talent, thus theory suggests such are ‘Baby Boomers’ age group that do not need much push and are prepared to perfect their work talent for the benefit of the health system. The role of performance management system must be equally elevated within health system initiatives in order to achieve ultimate health workforce engagement. The study recommended the public health sector to incorporate in its human resources policy, a strategy for managing and utilisation of talent from the different health workforce generations within the health system. In improving the performance of public health systems, talent management need to be put forward in the health systems strengthening agenda in order to build highly engaged health teams. Talent management practices become essential and if carefully implemented, are likely to help public health systems retain rare skills especially in highly specialised functions. Furthermore, the organisations need to synchronise its strategic plan with the talent management strategy. There must be continuous capacity building of human resources departments to firstly own policies that influence talent management so as to ensure ultimate health workforce engagement.
APA, Harvard, Vancouver, ISO, and other styles
5

Arth, Janet M. "Personal Information Management:." Medical Reference Services Quarterly 5, no. 1 (May 20, 1986): 51–56. http://dx.doi.org/10.1300/j115v05n01_04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jones, William. "Personal Information Management." Annual Review of Information Science and Technology 41, no. 1 (2007): 453–504. http://dx.doi.org/10.1002/aris.2007.1440410117.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bolstad, Judy P. "Personal Information Management." Journal of the American Society for Information Science and Technology 59, no. 13 (November 2008): 2192–93. http://dx.doi.org/10.1002/asi.20919.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Pratt, Wanda, Kenton Unruh, Andrea Civan, and Meredith M. Skeels. "Personal health information management." Communications of the ACM 49, no. 1 (January 2006): 51–55. http://dx.doi.org/10.1145/1107458.1107490.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

DENG, Chang-Zhi. "Activity-Centered Personal Information Management." Journal of Software 19, no. 6 (October 21, 2008): 1428–38. http://dx.doi.org/10.3724/sp.j.1001.2008.01428.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Fourie, Ina. "Personal information and reference management." Library Hi Tech 29, no. 2 (June 14, 2011): 387–93. http://dx.doi.org/10.1108/07378831111138242.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Personal information management – Zimbabwe"

1

Layouni, Mohamed. "Privacy-preserving personal information management." Thesis, McGill University, 2010. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=86764.

Full text
Abstract:
The spread of Information and Communication Technologies (ICTs) has transformed the way we deliver services, and has made them in general more efficient and more accessible to users. With these improvements however came new challenges. The extensive use of electronic services in our daily life, and the massive gathering of transactional data have led to serious privacy violations.
In this thesis we provide techniques to enhance users' privacy, and to give them greater control over their data. We propose a protocol allowing users to authorize access to their remotely-stored records, according to a self-chosen privacy policy, and without the storage server learning the access pattern to their records, or the index of the queried records. This prevents the storage server from linking the identity of the party retrieving a record to that of the record owner. In many applications, the association between the identity of the record retriever and that of the record owner represents sensitive information, and needs to be kept private. The proposed protocol is called Accredited Symmetrically Private Information Retrieval (ASPIR), and uses Brands's Anonymous Credentials [Bra00] and a Symmetrically Private Information Retrieval (SPIR) scheme by Lipmaa [Lip05], as building blocks.
Next, we extend the above ASPIR protocol to a setting where the stored records belong to multiple owners simultaneously. The new protocol, called Multi-Authorizer ASPIR, allows the owners of a record to authorize access to their data according to a self-chosen privacy policy, without the storage server learning the access pattern to their record. We present constructions for settings where the retrieving party has to provide authorizations either from all the owners of the target record, or from a subset of them of size greater that a certain threshold. We also consider the case of a General Access Structure, where the retrieval is allowed only if authorizations from certain pre-defined subsets of the owners are provided. The Multi-authorizer ASPIR protocol is more efficient than ASPIR, and can be built with any SPIR primitive.
Finally, we dedicate the last part of the thesis to applying privacy preserving techniques to a real world problem. In particular, we consider the area of e-health, and provide a privacy-preserving protocol for handling prescriptions in the Belgian healthcare system.
La prolifération des services électroniques a eu des retombées positives sur nos sociétés. Les technologies de l'information ont révolutionné divers domaines clé de notre vie, notamment les services gouvernementaux, les affaires, la santé, les transports, les communications et l'éducation. Souvent, le passage au numérique, a rendu les services plus accessibles, plus rapides, plus faciles à utiliser et socialement plus inclusifs. Cependant, avec ces améliorations sont apparus aussi de nouveaux problèmes. En effet, l'utilisation des services électroniques au quotidien, et la collecte massives de données transactionnelles sur les utilisateurs, ont conduit à l'établissement de ce qu'on appelle communément les "dossiers électroniques". Un dossier électronique est une compilation de données personnelles récoltées lorsqu'un individu effectue des transactions électroniques ou reçoit des services. Ces dossiers sont de plus en plus utilisés par le gouvernement et les corporations pour prendre des décisions importantes sur les individus, sans que ces derniers ne soient capables d'y participer.
Cette thèse présente des techniques pour protéger davantage la vie privée des citoyens et leur donner plus de contrôle sur leurs données. On propose, entre autres, un protocole pour permettre à des utilisateurs d'autoriser l'accès à leurs données, sauvegardées sur un serveur distant, sans que celui-ci n'apprenne d'informations sur la fréquence et la distribution des accès, ou même sur l'indice des données récupérées. Ceci empêche le serveur d'établir des liens entre l'identité d'un propriétaire de données, et celle de l'agent qui a demandé l'accès à ses données. On peut penser à une multitude de scénarios où la divulgation de l'existence d'un tel lien est non souhaitable. Le protocole qu'on propose est nommé ASPIR de l'Anglais (Accredited Symmetrically Private Information Retrieval), et utilise les systèmes de certification de Brands [Bra00], ainsi que le système SPIR de Lipmaa [Lip05].
Dans un deuxième temps, on généralise le protocole ASPIR initial à un environnement où les entrées appartiennent à plusieurs parties. Le nouveau protocole, nommé Multi-Authorizer ASPIR, permet aux propriétaires d'autoriser l'accès à leurs données selon une politique qu'ils ont eux même choisie, et sans que le serveur n'apprenne des informations sur la fréquence et la distribution des accès. On présente des constructions pour des scénarios où le demandeur de données doit fournir une autorisation de la part de tous les (respectivement une partie des) propriétaires. Le protocole, Multi-authorizer ASPIR, est plus performant, et peut être implanté avec n'importe quel système SPIR.
Enfin, la dernière partie de la thèse est dédiée à l'application des techniques de protection de la vie privée à un exemple concret de la vie courante. L'exemple qu'on traite appartient au domaine de la santé. On présente alors un protocole pour gérer les ordonnances médicales, qui est compatible avec le système de santé Belge. Le protocole proposé préserve la vie privée des patients et des médecins.
APA, Harvard, Vancouver, ISO, and other styles
2

Franz, Thomas [Verfasser]. "Semantic Personal Information Management / Thomas Franz." München : Verlag Dr. Hut, 2010. http://d-nb.info/1009972243/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Gwizdka, Jacek, and Mark Chignell. "Individual Differences in Personal Information Management." University of Washington Press, 2007. http://hdl.handle.net/10150/105751.

Full text
Abstract:
In an increasingly complex world where people routinely handle large amounts of information, individuals are constantly challenged to manage and effectively use the information that they are responsible for. While email is the canonical example of an information overloading application, other well known PIM applications and tasks cited in earlier chapters of this book include maintaining addresses and contacts, scheduling, and organizing the various documents and bookmarks that one is interested in. Not surprisingly, there are individual differences (ID) in how, and how well, people cope with the challenge of personal information management. This greatly complicates any scientific analysis of PIM behavior. Thus, in addition to the evaluation methods discussed in the previous chapter, researchers and designers need to consider when and how individual differences should be included within parsimonious interpretations and explanations of PIM behavior. In this chapter we propose an approach where differences between individuals are considered last, after the influences of the environment and the task context have first been considered, and after group difference (e.g., between job classifications) have been investigated. We believe that this is a logical way to proceed, since like observing an ant walking over sand-dunes (cf. Simon, 1996) we should not ascribe complexities to an individual if they can instead be explained as due to properties of the environment. The goal of this chapter will be to review and synthesize some of the key findings in how PIM behavior differs between individuals. Some of the reasons why these differences occur and what can be done about them will also be discussed.
APA, Harvard, Vancouver, ISO, and other styles
4

Liu, Jamie M. Eng Massachusetts Institute of Technology. "Customizable application for personal information management." Thesis, Massachusetts Institute of Technology, 2010. http://hdl.handle.net/1721.1/61172.

Full text
Abstract:
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2010.
Cataloged from PDF version of thesis.
Includes bibliographical references (p. 83-84).
As digital content becomes increasingly pervasive in our daily lives, next-generation organizational tools must be developed to help end users curate that information. The information management tools available today are limited in several ways. They are either restrictive in how users define and organize their data, or they offer few options in how users can view and interact with that data. In this thesis, we introduce a new application geared toward the layman end user to help resolve this lack of personalization when managing data. With this tool, users can store any collection of information (i.e. to do lists, address book, DVD collection), customize how they want to view and browse that data, and create any number of visualizations for the same data set or overlapping sets of data. For example, a user might want to manage an address book for a collection of all contacts, and manage a different set of items involving all research-related items, including colleagues, in another visualization. This tool allows her to do this without duplicating the overlapping data set for contact information of colleagues, enabling her to make changes to an item in one visualization and see that change applied to any other visualization that includes the same item. Moreover, users can import data from other sources, as well as share their data with others either with a visualization, such that the receiver can interact with the visualization the user has already created, or as raw data, such that the receiver can create his or her own visualization of the data.
by Jamie Liu.
M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
5

Elsweiler, David. "Supporting human memory in personal information management." Thesis, University of Strathclyde, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.488520.

Full text
Abstract:
Personal Information Management (PIM) describes the processes by which an individual acquires, organises, and re-finds information. Studies have shown that people find PIM challenging and many struggle to manage the volume and diversity of information that they accumulate.
APA, Harvard, Vancouver, ISO, and other styles
6

Keeble, Richard John. "An adaptive environment for personal information management." Thesis, Brunel University, 1999. http://bura.brunel.ac.uk/handle/2438/6509.

Full text
Abstract:
This dissertation reports the results of research into the provision of adaptive user interfaces to support individuals in the management of their personal information. Many individuals find that they have increased responsibility for managing aspects of their own lives, including the information associated with their jobs. In contrast with traditional approaches to information management, which are generally driven by organisational or business requirements, the requirements of personal information management systems tend to be less rigidly defined. This dissertation employs research from the areas of personal information management and adaptive user interfaces - systems which can monitor how they are used, and adapt on a personal level to their user - to address some of the particular requirements of personal information management systems. An adaptive user interface can be implemented using a variety of techniques, and this dissertation draws on research from the area of software agents to suggest that reactive software agents can be fruitfully applied to realise the required adaptivity. The reactive approach is then used in the specification and development of an adaptive interface which supports simple elements of personal information management tasks. The resulting application is evaluated by means of user trials and a usability inspection, and the theoretical architectures and techniques used in the specification and development of the software are critically appraised. The dissertation demonstrates an application of reactive software agents in adaptive systems design and shows how the behaviour of the system can be specified based on the analysis of some representative personal information management tasks.
APA, Harvard, Vancouver, ISO, and other styles
7

Gyllstrom, Karl Stotts P. David. "Enriching personal information management with document interaction histories." Chapel Hill, N.C. : University of North Carolina at Chapel Hill, 2009. http://dc.lib.unc.edu/u?/etd,2727.

Full text
Abstract:
Thesis (Ph. D.)--University of North Carolina at Chapel Hill, 2009.
Title from electronic title page (viewed Mar. 10, 2010). "... in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Department of Computer Science." Discipline: Computer Science; Department/School: Computer Science.
APA, Harvard, Vancouver, ISO, and other styles
8

Matizirofa, Lazarus. "Information management and dissemination of HIV/AIDS information by NGOs in Zimbabwe: An explanatory study." Master's thesis, University of Cape Town, 2005. http://hdl.handle.net/11427/8726.

Full text
Abstract:
Includes bibliographical references (leaves 99-119).
The HIV/AIDS epidemic has become a serious health, social and economic problem in Zimbabwe. Almost 30 percent of the population had been infected by AIDS (Acquired immune Deficiency Syndrome) by 2004. The epidemic has also affected almost the entire population in one way or another - domestically, socially and economically. Zimbabwe faces a long-term development disaster because of the effects of the disease across the societal spectrum. AIDS is threatening every fibre of the nation from food supply to economic productivity, and not least human resource development. Many households have lost their principal source of income to the disease and have become impoverished. The national budget is increasingly under pressure as scarce resources are channelled to fight the HIV/AIDS pandemic. Despite a multitude of interventions aimed at preventing the scourge of the epidemic on the health system, the economy and human development, HIV/AIDS still presents a problem of enormous magnitude in Zimbabwe. It is argued that a major limitation of the various interventions to fight the pandemic has been the failure to extensively and effectively harness knowledge and disseminate information relating to all aspects of HIV/AIDS in Zimbabwe. The NGO sector, because of its grassroots involvement with the disease, is particularly well placed to fulfil such a role. The main aim of this study was to explore information and knowledge management and dissemination by HIV/AIDS NGOS in Zimbabwe. A further objective was to identity in the literature strategies that have been used, vis-a-vis modern information and knowledge management practice, in cognate sectors of development in Zimbabwe and other countries. It is argued that by applying appropriate information and knowledge management practices valuable knowledge and information that relate to how communities experience the problems and the impact associated with HlV/AIDS can be gathered and disseminated. Information and knowledge management is recommended by the United Nations' UNAIDS as the best way to harness both tacit and explicit information related to all aspects of the epidemic. A survey was conducted amongst 64 HIV/AIDS NGOs based in Harare, Zimbabwe. Data was collected using questionnaires, key informant interviews, and observation methods, and this was further supported by data collected from documentary and electronic sources. The main outcome of the study indicates that information and knowledge management is generally not well practised in the HIV/AIDS NGO sector in Zimbabwe. This is despite the fact that 75% of the NGOs had information services in place. Far too few qualified staff have been appointed to manage information services and this lack of professional skills has had a negative impact on HIV/AIDS information dissemination. It is argued that in a society such as in Zimbabwe, effective information dissemination measures are needed to assist social, economic and scientific interventions. It was further established that a sound information and knowledge management policy, and information technology developments were needed to address the information service challenges. The other main outcome showed that NGOS were not networking effectively among themselves, with government and other role players such as the private sector, educational institutions and churches, etc. Lastly, there was a strong indication that information technology, i.e., computers and accessories, the Internet, intranets, databases and audio-visuals, etc.. were not fully utilised, this is despite the fact that in other countries they have been very effective to assist in the creation, generation, gathering and diffusion of information. Based on the research outcomes, the researcher thus proposes that information and knowledge management practices should be set in place in the HIV/AIDS sector of Zimbabwe. NGOs should ensure that information services are run and manned by skilled and trained information officers. It is also suggested that government should be encouraged to become more involved and complement the work done by NGOs by reviewing the 1985 NLDS Act and other policy instruments. The study further recommends that, HIV/AIDS NGOs should work towards networking and providing a single shared dissemination source to the public, such as a national database, which would be hosted via a web-based internet portal. This would also enable NGOs to explore further networking efforts such as communities of practice (expert forums), a national HIV/AIDS bibliography and electronic publishing.
APA, Harvard, Vancouver, ISO, and other styles
9

Mago, Shamiso. "The impact of information and communication technologies (ICTs) on rural livelihoods: the case of smallholder farming in Zimbabwe." Thesis, University of Fort Hare, 2012. http://hdl.handle.net/10353/d1007185.

Full text
Abstract:
This study seeks to determine the impact of Information and Communication Technologies (ICTs) on livelihoods of smallholder farmers in Zimbabwe. The study was motivated by the fact that benefits of ICT development still need to be known among rural smallholder farmers in Zimbabwe. ICTs have been upheld as catalysts for the promotion of rural livelihoods the world over. The question that remains is whether ICTs in Zimbabwe promote livelihoods of smallholder farmers. Although the Government formulated the ICT policy in 2005, the benefits still need to be known among rural smallholder farmers in Zimbabwe. The challenges faced by smallholder farmers include limited access to ICTs, high costs in ICT services and lack of ICT infrastructural development in the country. The challenges hindered ICT benefits that are expected to accrue to smallholder farmers. This study is significant in the view that most studies on ICT have focused on the general roles of ICT on rural development without giving particular attention to smallholder farming that has a potential of reducing poverty and promoting food security. For a theoretical lens, the Sustainable Livelihood Approach was used with special attention to Chapman et al (2001)’s information wheel. Regarding methodological issues, the study followed a qualitative research methodology guided by a secondary analysis research design. Data were collected from published reports of government, reports from the Ministry of ICT, internet, journals, newspapers and periodicals. The study established that ICTs promote livelihoods of smallholder farmers through the dissemination of vital information for improvement of agricultural productivity. From the research findings, the study proposes four main recommendations. Firstly, strengthening of ICT policy for effective smallholder farmers. Secondly, the government to organise ICT awareness campaigns directed towards rural people especially smallholder farmers. Thirdly, up scaling ICT Infrastructural development .Finally, a large-scale ICTs and livelihoods research must be commissioned in the country.
APA, Harvard, Vancouver, ISO, and other styles
10

Yiu, Kelvin Shek. "Time-based management and visualization of personal electronic information." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1997. http://www.collectionscanada.ca/obj/s4/f2/dsk2/tape16/PQDD_0016/MQ29420.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Personal information management – Zimbabwe"

1

Etzel, Barbara, and Peter Thomas. Personal Information Management. London: Macmillan Education UK, 1996. http://dx.doi.org/10.1007/978-1-349-24869-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

1956-, Taylor Morris, ed. Overcoming information overload. London: Hodder, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Managing information overload. New York: AMACOM, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Agency, Massachusetts Emergency Management. Anti-terrorism personal security planning and information booklet. Boston, Mass: Commonwealth of Massachusetts, Massachusetts Emergency Management Agency, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

J, Thomas Peter, ed. Personal information management: Tools and techniques for achieving professional effectiveness. Houndmills: Macmillan, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

1961-, Thomas Peter J., ed. Personal information management: Tools and techniques for achieving professional effectiveness. Washington Square, N.Y: New York University Press, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hunter, Beverly. Guide to managing information with your personal computer. Glenview, Ill: Scott, Foresman, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Yiu, Kelvin Shek. Time-based management and visualization of personal electronic information. Ottawa: National Library of Canada = Bibliothèque nationale du Canada, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

The pastor & the personal computer: Information management for ministry. Nashville: Abingdon Press, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Essentials of health information management. 2nd ed. Boston, MA: Delmar Learning, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Personal information management – Zimbabwe"

1

Woodward, Beverly. "Information Management as Risk Management." In Personal Medical Information, 109–15. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/978-3-642-59023-8_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lee, Newton. "Personal Information Management." In Facebook Nation, 159–68. New York, NY: Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-5308-6_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Etzel, Barbara, and Peter Thomas. "Personal information management." In Personal Information Management, 8–17. London: Macmillan Education UK, 1996. http://dx.doi.org/10.1007/978-1-349-24869-8_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Etzel, Barbara, and Peter Thomas. "‘Information overload’ and information management ‘re-engineering’." In Personal Information Management, 25–31. London: Macmillan Education UK, 1996. http://dx.doi.org/10.1007/978-1-349-24869-8_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Etzel, Barbara, and Peter Thomas. "Computer software and hardware products." In Personal Information Management, 43–71. London: Macmillan Education UK, 1996. http://dx.doi.org/10.1007/978-1-349-24869-8_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Etzel, Barbara, and Peter Thomas. "From the industrial age to the information age." In Personal Information Management, 1–7. London: Macmillan Education UK, 1996. http://dx.doi.org/10.1007/978-1-349-24869-8_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Etzel, Barbara, and Peter Thomas. "Beginning to implement your personal information management strategy." In Personal Information Management, 95–108. London: Macmillan Education UK, 1996. http://dx.doi.org/10.1007/978-1-349-24869-8_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Etzel, Barbara, and Peter Thomas. "Maintaining your personal information management strategy." In Personal Information Management, 109–15. London: Macmillan Education UK, 1996. http://dx.doi.org/10.1007/978-1-349-24869-8_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Etzel, Barbara, and Peter Thomas. "Computing technology and your personal information management strategy." In Personal Information Management, 116–24. London: Macmillan Education UK, 1996. http://dx.doi.org/10.1007/978-1-349-24869-8_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Etzel, Barbara, and Peter Thomas. "Conclusions." In Personal Information Management, 125–34. London: Macmillan Education UK, 1996. http://dx.doi.org/10.1007/978-1-349-24869-8_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Personal information management – Zimbabwe"

1

Bergman, Ofer, Richard Boardman, Jacek Gwizdka, and William Jones. "Personal information management." In Extended abstracts of the 2004 conference. New York, New York, USA: ACM Press, 2004. http://dx.doi.org/10.1145/985921.986164.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Diehl, Jonathan. "Associative personal information management." In the 27th international conference extended abstracts. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1520340.1520437.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Cai, Yuhan, Xin Luna Dong, Alon Halevy, Jing Michelle Liu, and Jayant Madhavan. "Personal information management with SEMEX." In the 2005 ACM SIGMOD international conference. New York, New York, USA: ACM Press, 2005. http://dx.doi.org/10.1145/1066157.1066289.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

CHANG, YUN-KE, MIGUEL A. MORALES-ARROYO, CHAN-CHOY CHUM, TIN-SENG LIM, and KOK-YUIN YUEN. "PERSONAL INFORMATION MANAGEMENT TOOLS REVISITED." In Managing Knowledge for Global and Collaborative Innovations. WORLD SCIENTIFIC, 2009. http://dx.doi.org/10.1142/9789814299862_0024.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Al-fedaghi, Sabah. "Personal Management of Private Information." In 2006 Innovations in Information Technology. IEEE, 2006. http://dx.doi.org/10.1109/innovations.2006.301955.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bernstein, Michael S., Max Van Kleek, m. c. schraefel, and David R. Karger. "Management of personal information scraps." In CHI '07 extended abstracts. New York, New York, USA: ACM Press, 2007. http://dx.doi.org/10.1145/1240866.1240995.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Zhong, Chen. "Research on Personal Information Management." In 2013 Fifth International Conference on Computational and Information Sciences (ICCIS). IEEE, 2013. http://dx.doi.org/10.1109/iccis.2013.105.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Jones, William. "Session details: Personal information management." In CHI '09: CHI Conference on Human Factors in Computing Systems. New York, NY, USA: ACM, 2009. http://dx.doi.org/10.1145/3256942.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Chang, Yun-Ke, Miguel A. Morales-Arroyo, Chan-Choy Chum, Tin-Seng Lim, and Kok-Yuin Yuen. "Personal Digital Information Resources Management Behavior." In 2010 Seventh International Conference on Information Technology: New Generations. IEEE, 2010. http://dx.doi.org/10.1109/itng.2010.201.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Al-Fedaghi, Sabah S., and Ali M. Nour Eddine. "MYHEALTH: Personal Management of Health Information." In Twentieth IEEE International Symposium on Computer-Based Medical Systems (CBMS'07). IEEE, 2007. http://dx.doi.org/10.1109/cbms.2007.76.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography