MSIT Theses and Dissertations (2012)

Permanent URI for this collection

Browse

Recent Submissions

Now showing 1 - 5 of 24
  • Item
    Implementation of public key infrastructure for eprocurement system : a case of selected state corporations
    (Strathmore University, 2012-06) Kanyinyi, Lawrence K.
    The dynamic character of the world means that it can be difficult to forecast future conditions and thus flexible strategies may be needed to cope with uncertainty. E-Procurement has been seen as a response to the uncertainties of relying paper work in the procurement processes. The implementation of PKI in E-Procurement in State Corporations is an initiative that ensures security and authenticity in procurement are maintained throughout the processes. The implementation of such initiative is thus influenced by some internal and external factors and some challenges. This study evaluated the implementation of PKI in E-procurement in the Kenyan Parastatals. This was done by utilizing guidelines of three objectives that is; 1) To determine the current status of Public Key Infrastructure in state corporations, 2) To find out the challenges that state corporations experience in the implementation of Public key Infrastructure in the E-Procurement process, and 3) To establish a framework that government organizations can use in the implementation of PKI in E-Procurement processes. The target population was sixteen (16) selected Kenyan Parastatals. One respondent from Information Technology department, from each organization was purposively selected to participate in the study. A self administered questionnaire was applied in the data collection. The collected data was then be analyzed in descriptive statistics technique by using a computer aided program; Statistical Package for Social scientist (SPSS). This study found that most of the State Corporations in Kenya have online services that use PKI/SSL Certificate. In addition,secure email was the principal business function of the PKI-enabled application. It was also established that state corporations were using CA service providers to run their PKIs. The study also found that state corporations do not have a central (public/private) key server. State corporations establish a PKI or digital certificate services for authentication (Single Sign On or Access Control), transport security (e.g. IPSec, wireless) and for document Signing (or "non repudiation"). PKI can help in ensuring that bidder's information is be kept private, 111" supporting confidentiality in the processes and in ensuring identity of an individual and in promoting trust in use of the system.
  • Item
    A model for estimating network infrastructure costs : a case for all-fibre LAN networks
    Maina, Anthony Mbuki; Ateya, Ismail Lukandu
    The 21st century is an era that has been characterised by phenomenal growth in data rates at the local area network (intranet), extranet and the Internet.This trend has been pushed by the widespread deployment in organisations of “bandwidth-hungry” applications such as VoIP, security surveillance systems, video conferencing and streaming of multimedia content. Due to demand placed on network resources by these applications and services,physical layer cabling solutions have had to evolve to support faster, improved LAN technologies such as Gigabit Ethernet.Although new network architectures (such as Centralised Fibre networks) address current and long term demands of the modern networking environment, concerns have been raised about its cost viability. The key problem identified in this study was an inadequacy of suitable tools that aid decision making when estimating the cost of a network infrastructure project. Factors of importance in this regard were collected in a survey and used in development of a cost model. The model is aimed at being a tool to assist network planners in estimating LAN infrastructure costs. A network was designed based on two architectures – centralised fibre (allfibrenetwork) and hierarchical star (UTP for horizontal cabling and optical fibre for backbone cabling). Thereafter, cost of implementing these two architectures was calculated using the model. Based on the results computed from the cost model, the all-fibre network (centralised fibre architecture) was found to be more cost effective compared to the hierarchical star network
  • Item
    IT outsourcing adoption in Non-profit organizations in Kenya
    Nyoike, Simon; Kiura, Salesio
    In recent years, information technology (IT) outsourcing continues to receive favorable acceptance to maximize organization's benefits. In-turn, vast amount of information has been produced about the IT outsourcing phenomenon over the last two decades. However, few studies have examined the factors that influence IT outsourcing in non-profit's decision to adopt IT outsourcing and develop a conceptual model of ITO adoption in non-profit organizations in Kenya. Grounded in the innovation diffusion theory (IDT) and the technology-organization-environment (TOE) framework, we developed a model for ITO adoption in non-profits in Kenya.We specify five innovation characteristics (relative advantage, compatibility, complexity, trialability, and observability) and seven contextual factors (top management support, organizational competence, formalization, centralization, supporting industries e-readiness, government e-readiness and competitive pressure) as drivers and inhibitors of ITO adoption.Survey data from 45 public charities was used to test the proposed adoption model.Among the innovation characteristics; relative advantage, compatibility, trialability, and observability are significant drivers.Among the contextual variables; top management support, organizational competence; centralizational competence, centralization, supporting industries e-readiness and competitive pressure are significant. Overall, competitive pressure emerged as most significant factor; we urgue that the drive for efficiency is increased by an environment characterized by heightened scrutiny and competition for resources. Thus increasingly competitive environment led to pressure to adopt ITO.Together, these results show that IT outsourcing adoption in non-profits can be better understood by including both innovation characteristics and contextual factors, where as past literature has traditionally treated the two separately. The implications for theory and practice are discussed.
  • Item
    The Strategic value of business intelligence systems : a case study of GSM companies in Kenya
    Njuru, Julius; Acosta (Dr.), Freddie
    This research is intended to establish why companies especially in Telcom sector have low adoption rates of business intelligence tools already implemented. Telcom industry anywhere in the world is highly dynamic and super competitive. Implementation of suitable business intelligence and performance management tools can potentially tilt companies' competitive edge over competitors. However this seems not to be the case as adoption of business intelligence is still very poor. This research has unearthed various barriers to adoption to business intelligence(BI) and PM(performance management) in GSM companies in Kenya. These barriers are either operational, people and to small extent systems issues. The choice of GSM companies in Kenya was advised by the facts such as , (i) Some of GSM companies have already implemented BI systems, (ii) heterogeneity of various business applications used these companies, (iii) volumes of data generated by numerous processes, (iv) need for predictive analytics by GSM companies to predict trends in the industry and, (v) lack of or insufficient frameworks to fully help adoption BI systems hence increasing strategic value of BI projects. The research revealed an interesting observation that although many managers knew of existence of BI systems at their companies they did not know of its objectives. Also many managers used very few functionalities of BI (business intelligence) system. This clearly inhibits adoption of BI (business intelligence) and due to this it is very hard to establish strategic value of BI (business intelligence). Although management staff believe the BI(business intelligence) can help in increased profit growth, they never attributed growth of their organization to BI (business intelligence). In this consideration of the outcome, organizations need to balance between the effort of BI (business intelligence) implementation process and stimulating use and adoption of the same. To realize fully strategic value of BI(business intelligence) organization need to invest both during acquisition phase and adoption phase at almost equal measure.
  • Item
    A Model to measure information security awareness level in an organization : case study of Kenya commercial bank.
    Mugo, Eric Anderson Kabugu; Wekesa, Cyrus
    Information Security awareness forms a key basic part of Information Security Strategy within most organizations. Organizations that tend to be more conscious regarding Information Security will invest more than organizations that are less conscious. This can be seen in Financial and Telecommunications industry as compared to Agricultural industries. Information Security awareness is an investment that organizations make to ensure that the human aspect of Information Security is taken care of. Majority of organizations that invest in Information Security awareness do not measure the levels of awareness among their staff to identify the impact of their investment. Measurement of Information Security results in value add such as positive change in staff attitudes towards Information Security, respective increase in Information Security knowledge and a more secure organization. The value add comes with other added benefits such as reduced Information Security incidents and frauds, a more knowledgeable staff and an Information Security team with visibility into the general organizations predisposition to Information Security challenges as well as general awareness. This study aims at expounding on the various techniques used to impart awareness. The study aims at proposing a model that can be used to measure Information Security awareness levels in a Local financial institution. Achievement of specific objectives of the research was done through qualitative technique. Collection of data required is done from local Members of Information Security Profession who possess the required data in the area of Information Security. Following analysis of responses from the local Information Security professionals, the model developed was based on the Kruger and Kearney Model awareness measurement model with specific modifications to suit the local financial institutions' requirements. The models' modifications were based on a local banking institution for purposes of testing and validating the mode!. The modifications are as a result of the findings from the survey.