Summary

A computer scientist with an enthusiasm in software engineering. Worked on various projects for software development analysis. Hard working individually and in a group.

Having 10 years of extensive experience in multiple disciplines such as University, educational institutions, corporate and career institutions  training and development in various technologies. I am interested in security and privacy, Requirements engineering and Organisation information systems, Cloud Computing Technologies.

Have love for nature, family and football.

 

Service

Assistant lecturer ISBAT University from 2020 march to date Full-time

Assistant lecturer ISBAT University from 2018 to 2020(part-time)

Assistant lecturer Ndejje University from 2016 t0 2019 (part-time)

Assistant lecturer Uganda Martyrs  University from 2016 to 2019 (part-time)

Research assistant – Department Of Information Engineering And Computer Science University of Trento, Italy 2015-2016

 

Education

MASTERS OF SCIENCE IN COMPUTER SCIENCE – University of Trento, Italy

POST GRADUATE DIPLOMA IN EDUCATION – Kampala University

BACHELOR’S DEGREE IN COMPUTER SCIENCE – Uganda Christian University

 

Research

E-Quality Assurance: Monitoring and Evaluation to Inform Practice and Leadership for Sustainable Higher Education, Joseph Brian Musanje Kasozi, Male Henry Kenneth, East African Quality Assurance Journal,1, 30-39, Cambridge Press, May 2018

Renewing Quality Assurance at a time of Turbulence: An attempt to boost Quality in Ugandan Higher Education, Male Henry Kenneth, Kasozi Brian, In Proceedings of 9th Annual East African Quality Assurance Network Conference, 2019, Entebbe, Uganda.

Exploring Variability with the Three-Peaks Process: Evaluation using the London Ambulance Exemplar: The objective of this study is to explore variabilities and evaluate the Three-Peaks approach of capturing variability in adaptation space. (This is my final thesis for masters at University of Trento)

Security Analysis Techniques: With Remote tower control as a case study, this paper demonstrates two techniques used for security analysis. Coras technique and SESAR Secram methodology. UNITN, Italy in 2015 https://goo.gl/ f8eoUN

Open government and privacy:

This paper seeks to identify how open government can be fully achieved while answering the challenges raised by privacy. UNITN, Italy in 2015. https://goo.gl/X5W5ab

Apply Now