Improving The Cadastral System Using Geospatial Open Source Tools: A Case Of Adama City, Ethiopia

Loading...
Thumbnail Image

Journal Title

Journal ISSN

Volume Title

Publisher

ASTU

Abstract

A Cadastre Serves As A Comprehensive Repository Of Land-Related Information, Encompassing Ownership, Use, Value, And Associated Rights, Restrictions, And Responsibilities. It Establishes A Legal Framework Governing Land Ownership, Use, And Transfer. Assessing Cadastral Information Systems Is Crucial For Accurate And Up-To-Date Land Records, Reducing Land Disputes, And Improving Land-Related Transactions. However, Outdated Systems, Inadequate Database Models, And Non-Standardized Data Models Create Challenges In Data Storage, Processing, And Sharing. This Leads To Time-Consuming Property Transactions, Difficulties In Property Tax Collection, And Limitations In Spatial Measurements And Analysis. This Research Aims To Assess And Enhance The Cadastre System In Adama City Using Geospatial Open-Source Tools. The Methods Include Literature Review, Data Collection, Evaluation Criteria Selection, System Evaluation, Gap Analysis, Requirement Analysis, Swot Analysis, And Cadastre System Design. The Swot Analysis Reveals Strengths, Weaknesses, Opportunities, And Threats. Strengths Include Physical Security And Mortgage Facilitation, While Weaknesses Include Lack Of Backup Systems, Bureaucratic Land Registration Processes, And Inefficient Access To Land Information. Opportunities Include Modern Ict Adoption, Sustainable Development Principles, Transparent Land Registers, And E-Government Practices. Threats Include Funding Limitations, Political Instability, Lack Of Expertise, And System Disruption Due To Natural Disasters. The Research Concludes That The Adama City Cadastre System Exhibits Deficiencies In Database Security, Technology Utilization, Accessibility, Adherence To Land Tenure Principles, And Data Integration. Specifically, It Highlights Shortcomings In Ensuring Data Confidentiality, Integrity, And Availability, Posing Risks Of Data Breaches And Unauthorized Access.

Description

Citation

Collections

Endorsement

Review

Supplemented By

Referenced By