MSIT Theses and Dissertations (2009)

Permanent URI for this collection

Browse

Recent Submissions

Now showing 1 - 5 of 19
  • Item
    A requirements elicitation process model for health management information systems: case of Kenyatta National Hospital
    Gikura, Mary Wambui; Marwanga (Dr.), Reuben; Orero, Joseph Onderi; Kiraka, Ruth
    Requirements Elicitation (RE) is about learning and understanding the needs of users and stakeholders with the aim of communicating these needs to the system developers. Requirements Elicitation is an important stage in Information Systems development (ISD), and has substantial impact on software costs.RE has remained a key topic of interest for researchers and they have stated that a large number of Information Systems development (ISD) projects fail resulting in high costs to organizations. One of the reasons that these projects fail is the inability of the Information System to precisely satisfy user 's requirements which is a result of inaccurate and incomplete requirements collected in the Requirements Elicitation (RE) stage. Considering the importance of the RE stage in information systems development projects , this stage therefore becomes a critical area for IS research. This research focused on the process of RE in the development of the Heath Management Information Systems (HMIS) in Kenyatta National Hospital. Using data collected from the developers and users in the hospital the study presents a Requirements Elicitation Process model for Health Management Information systems. The results showed that the greatest challenge in the RE process was communication and the study suggests requirements prototyping to solve communication challenges. The implementation was conducted in Kenyatta national Hospital 's Comprehensive care centre. In conclusion the study elaborates a RE model that incorporates communication and requirements prototyping as key elements in the model.
  • Item
    Exploratory research on IT projects: A case study of Kenya Pipeline Company
    Omondi, Sharon Akinyi; Acosta (Dr.), Freddie
    This study was an exploratory research to demonstrate the various constraints that plagued IT projects. The Chaos Report of 2004, a survey carried out by the Standish Research Group, revealed that the 75% of all IT projects fail. 75% of all IT projects that begin, fail. IT projects are usually covered up, not rationalized to find out what went wrong and often the individuals involved are fired without getting to know the real cause of the projects failure therefore minimizing the chances of organizations learning from their mistakes. The study examined the SAP ERP implementation at KPC as its business case, the researcher's demographic was the SAP Implementation Project Team. There were two constraints identified. These constraints greatly influence the success or failure of a project, they are, Business Process Development (user requirements) and Change Management issues, of which only 25% of business process development was carried out and up to 85% of related change management issues are yet to be resolved, even after the project's closure. The use of a performance measures is strongly emphasized to aid, Business Process Development. This measure which was initially intended for organizations, to re-engineer themselves into more effective and efficient lean enterprises, was recommended for adoption in Information Technology projects; in an attempt to gain the positive aspects that lean enterprises are identified with. The researcher adopted qualitative research style, to adequately gauge the respondent's opinions, proving that the my SAP ERP implementation at the Kenya Pipeline Company (KPC) was a successful IT project.
  • Item
    Comparative study of the e-learning platforms used in Kenyan Universities : a case study of Jomo Kenyatta University of Agriculture and Technology and United States International University.
    Odhiambo, Oscar Omondi
    Kenyan universities have implemented e-learning technologies and this has been done by incorporation of open source and commercial based e-learning platforms. However, despite the implementation of these platforms as content delivery channels, students have different perceptions in regard to suability of the platform and interactivity of these very platforms. The research project took a case study of Jomo Kenyatta University of Agriculture and Technology and United States International University which uses moodle e-learning platform and WebCT e-learning platforms respectively. The objectives of this research was to evaluate the student’s usability and interactivity perceptions on both Moodle and WebCT e-learning platforms and to also develop a framework to change the student’s perception and to encourage student acceptance by making the system more appealing to them. In this research, Software Usability Measurement Inventory (SUMI) an evaluation method was sued to evaluate the suability perception. SUMI has been used because it approaches the evaluation from the end-users’ perspectives. To evaluate interactivity, the research sued Interactivity parameters that should be embedded on the e-learning platforms linear interaction read, listen and watch, response practice and feedback, create and generate that is forums and real-time communication. The research was done through interviews and questionnaires. The interviews were used to get more detailed data from the students and lecturers. The analysis of the feedback from the research reveals that students from both Jomo Kenyatta University of Agriculture and Technology and United States International University have high perceptions that e-learning platforms implemented in their institutions were not interactive and have low usability capabilities. The research recommends the features that need to be incorporated to through a guideline framework that will help increase the perceptions of students on interactivity and usability of the e-learning platforms implemented in their learning institutions.
  • Item
    Exploratory research on it projects
    (2009-07) Omondi, Sharon A.
    This study was an exploratory research to demonstrate the various constraints that plagued IT projects. The Chaos Report of 2004, a survey carried out by the Standish Research Group, revealed that the 75% of all IT projects fail. 75% of all IT projects that begin, fail. IT projects are usually covered up, not rationalized to find out what went wrong and often the individuals involved are fired without getting to know the real cause of the projects failure therefore minimizing the chances of organizations learning from their mistakes. The study examined the SAP ERP implementation at KPC as its business case, the researcher's demographic was the SAP Implementation Project Team. There were two constraints identified. These constraints greatly influence the success or failure of a project, they are, Business Process Development (user requirements) and Change Management issues, of which only 25% of business process development was carried out and up to 85% of related change management issues are yet to be resolved, even after the project's closure. The use of a performance measures is strongly emphasized to aid, Business Process Development. This measure which was initially intended for organizations, to reengineer themselves into more effective and efficient lean enterprises, was recommended for adoption in Information Technology projects; in an attempt to gain the positive aspects that lean enterprises are identified with. The researcher adopted qualitative research style, to adequately gauge the respondent's opinions, proving that the my SAP ERP implementation at the Kenya Pipeline Company (KPC) was a successful IT project.
  • Item
    Anomaly and misuse intrusion detection model : using neuro-fuzzy logic.
    (Strathmore University, 2009) Kirwa, Solomon Cheruiyot
    Intrusion detection systems are increasingly a key part of systems defense. Various approaches to intrusion detection are currently being used, but they are relatively ineffective. A major concern of existing anomaly intrusion detection approaches is that they tend to produce excessive false alarms. One reason for this is that the normal and abnormal behaviour of a monitored object can overlap or be very close to each other which makes it difficult to define a clear boundary between the two. This thesis presents a fuzzy logic model for misuse and access intrusion detection where instead of using crisp conditions, or fixed thresholds, fuzzy sets are used to represent the parameter space as defined by a human expert. This is implemented using a neuro-fuzzy system which is a high breed system combining