Browsing by Author "Sevilla, Joseph"
Now showing 1 - 10 of 10
Results Per Page
Sort Options
- ItemA Model for costing information technology services in public organizations : case study of the Kenya Revenue AuthorityOsiro, Yvonne Wafula; Sevilla, JosephPublic organizations are increasingly embracing technology as a means of achieving operational efficiency and in the process reduce the cost of doing business. It is necessary for organizations to have a clear financial visibility into their Information Technology operations. However, it is frequently observed that IT continues to drain financial resources without providing any insight on its consumption. This is partially due to the intangible nature of IT and partially due to lack of standard IT service costing frameworks. IT Managers need financial and non –financial information to have proper insight of their operations. Having a costing model enables IT departments to determine the cost of providing an individual or group of services. The objective of this research was the development of a service oriented costing model for IT services offered by public organizations, with the following specific objectives: 1. To investigate the available IT service costing frameworks and models. 2. To establish the policies and factors that determine IT service costs. 3. To develop an IT service costing model for use in public organizations. 4. To validate the effectiveness of the IT Service Costing framework developed. Using a qualitative approach, this thesis presents an IT service cost model to methodically guide public organizations in determination of costs associated with provision of an IT service. The research used a descriptive design to obtain information concerning the current status of the phenomena. A target population of thirty four senior and middle level managers from the ICT, Finance and Administration departments of the Kenya Revenue Authority were considered. Purposive sampling was used to select twenty two target respondents. Semi-structured interviews consisting both open-ended and closed questions to provide greater depth were the primary data collection method used, in addition to scholarly journals, books and websites. The model presented provides an approach to cost estimating that can simplify the determination of costs associated with an IT service. The application of suitable abstraction principles in terms of cost categories, cost types, cost activities, cost elements and cost drivers yields a modified IT service specific cost model. The approach was verified using a real service as an example to provide insight into cost structures and potential cost drivers. It was applied to a case study of the email service at the Kenya Revenue Authority and in this way the flexibility and adaptability of the model to given service-orientated scenarios was demonstrated.
- ItemAdoption of e-Assessment in Strathmore UniversityMakhanu, Everlyne; Sevilla, JosephICT can contribute to the development and efficiency of education management and administration. Efforts to introduce ICT in teaching, learning and assessment aim to help meet a wide variety of goals in the education sector. This paper is based on a research project that was carried out in Strathmore University by @iLabAfrica, funded by the Kenya Education Network (KENET). The research was driven by challenges facing traditional assessment of large classes. It aimed at identifying e-assessment tools, evaluating if differences existed between performances of students examined with traditional assessment and those examined with e-assessment and investigating the feasibility of implementing e-assessment to complement eLearning in the University. Findings revealed that a variety of tools existed and that e-assessment was better than traditional assessment in terms of students’ performance, management of large classes, flexibility and cost effectiveness
- ItemCoffee supply chain traceability model: Case of the Coffee Board of Kenya(Strathmore university, 2013-06) Mumbi, Mungai Karen; Sevilla, Joseph; Orero, Joseph Onderi; Kiraka, RuthThis thesis describes the potential impact of the introduction, implementation and integration of traceability model in the coffee industry. It seeks to identify a traceability model to be used as a blueprint in developing a traceability system for the coffee sector. This is achieved by highlighting the value chain players in the coffee sub-sector, the processes and to ensure that the system is aligned along the coffee supply chain. This technological innovation is meant to trace coffee consistently and efficiently from the point of origin to the point of consumption. Absence of the right traceability model in the coffee sector in Kenya is hindering the potential of this sector as well as limiting its growth. The value of an automated coffee traceability system would seek to integrate all the information scattered from all the supply chain player's; centralize capture; storage and retrieval of information; speed up processing of information; keep track of the production process ; generate reports; and also be used as a knowledge management tool. The methodology used was a basic survey, questionnaire and interview. Data was collected from a sample selected to represent a larger population. This sample size consists of Sasini Miller Limited and the Coffee Board of Kenya. The estimated population of CBK ICT users in the organization is 65 working with the confidence level of 95% and a confidence interval of 9, using the sample size formula 42 employees best characterized the general understanding of the entire CBK population. In this research the product-centric data model was selected owing to its critical packages of traceability and quality appropriate for the food industry. The traceability package contained entities that enabled tracing and tracking the product throughout its lifecycle and the quality package contained entities that represent the quality features of the product. Based on the data collected the traceability components missing in the current traceability system in the coffee sub-sector. The proposed model incorporates the missing traceability components and ensured that the product-centric parameters of traceability and quality are enhanced. Additional technologies included are traceability standards and bar-coding technologies thereby improving and customizing the model for the coffee sub-sector in Kenya The model ensures that adequate information is generated at the right time and is available to the next person in the supply chain. It enhances identification of the coffee product, movements and processes done in the supply chain. It also allows the supply chain players to process , store, handle and display the product safely and correctly.
- ItemCost Effective News Gathering Technique in Kenya Using Terrestrial Broadband IP Links(2013-11-18) Njoroge, Benson W.; Sevilla, Joseph; Marwanga (Dr.), Reuben; Kiraka, RuthThis study aims to understand the methodologies and challenges of the current news gathering techniques used by broadcasters in Kenya and provide guidelines and methodology for development of an economical and cost-effective alternative technique. The research adopts both an analytic and applied approach. The analytic approach aims to review and analyze the existing methodologies and techniques and the challenges associated with them. The Applied approach aims to provide a guideline and methodology for a cost-effective alternative technique using locally available computer hardware (Video input and output cards), software (MPEG4 encoders and decoders) running over terrestrial broadband IP Links. The findings indicate that majority of the broadcasters in Kenya use the traditional satellite based news gathering technique (Digital Satellite News Gathering) which exhibit expensive and proprietary hardware systems and software. These techniques are always constrained by resources such as satellite bandwidth, hardware equipments and qualified manpower. The designed cost-effective alternative technique delivers the same video quality with significantly low capital expenditure and operation costs. The cost effective technique provides good foundation for future research and development of low cost commercial news gathering systems that run on broadband IP links. Additional research and experiments are recommended for development of similar but robust, versatile and automated systems that have the encoding software embedded in the operating systems code (such as Linux and UNIX) in a scenario where the encoder and decoder computers powers on without I/O devices and starts the services at boot time. The developed technique provide the broadcasters in Kenya and other developing countries with a cheaper alternative news gathering systems that can be used where reliable and fast terrestrial fibre, microwave, WiMax , 3 G or 4G links exists. For guaranteed service, the broadcasters should ensure they use robust computers suitable for outdoor use and the bandwidth available on the terrestrial links is over 2 Mbps for video and 128 Kbps for audio. This study shows that for the fist time, the terrestrial IP broadband networks in the region can be used for news gathering services by broadcasters using low cost equipments. The economic sense of using computers shows the news gathering service can be available to broadcasters regardless of cost and resource constraints.
- ItemeLearning and the revolution in the educational sectorSevilla, JosephE-Learning is any learning that uses ICT Computer aided instruction, use of ICT, Internet. Making full use of the wide range of pedagogic opportunities provided by ICT. A very wide term encompassing many different implementations.
- ItemImplementing integrated university systemsSevilla, JosephUniversity Management Systems are systems that integrate management of the core functions of the University like Academic Management (AMS),Financial Management (FMS),Library Management (LMS), Course Management System (CMS), Human Resource Management (HRM).
- PublicationIssues and challenges in implementing quality assurance in higher education(Strathmore university, 2003) ; Gatei, Muchira; Sevilla, JosephThis paper deals with the issues and challenges facing the successful implementation of a QMS in an educational institution, namely, Strathmore University. It looks at the various steps followed to implement QMS in the University. Strathmore University (SU) decided to implement a quality assurance system in early 2003 to ensure excellence in the pursuit of its objectives. In the development of her strategic plan, the University identified the need to institute a QMS to ensure adherence to quality along the expansion path. It was a means of entrenching a systematic approach to quality management in both its administrative and academic functions. Ideally, the QMS should guarantee adherence to the University’s processes and procedures. The process of QMS entails various steps including the decision to implement quality assurance, making of quality related choices, educating staff, constituting the implementation team, defining statements, policies and processes, documentation, internal audit training and the audit process, certification and QMS monitoring and growth. The paper discusses the various challenges encountered in the steps of the QMS process. It further looks at positive and negative aspects of each step as well as the measures taken to overcome them. In conclusion, an understanding of the issues and challenges at each step of QMS implementations allows for suitable preventive and correcting actions to achieve optimal performance over time. Our conclusion would be of high interest to other local and regional universities who have decided to implement a QMS.
- ItemLearning management systemSevilla, JosepheLearning is any learning that uses ICT Computer aided instruction, use of ICT, Internet. Making full use of the wide range of pedagogic opportunities provided by ICT. A very wide term encompassing many different implementations.eLearning is not Distance Learning.Distance Learning, Blended Learning are examples of different types of eLearning.
- ItemMitigating information security vulnerabilities in public institutions : case study of teachers service commission (TSC)Kimwemwe, Emma Ngute; Sevilla, JosephWhile Information security is a major concern in the private sector, many public institutions have not given it equal attention. However, the Government has taken keen measures on embracing ICT, but the concentration has been on the productivity and efficiency leaving the systems vulnerable to various attacks. This research was intended to find out information security vulnerabilities in public institutions that are likely to be exploited to cause harm to Information systems. The security controls existing were evaluated to find out their efficiency, effectiveness and applicability. Different types of information security risks were researched with an aim of classifying them to risk levels accordingly. The study sought to find out how information systems are monitored in Teachers Service Commission (TSC) as a case study of public institutions. The research documented information systems, threats and associated risks with a view of proposing interventions to minimize impacts of risks. The research was done using action research to study the system and concurrently to collaborate with members of the system who helped come up with the framework. It focused on observation and structured interviews in gathering information about the present existing condition. Secondary data was also gathered from TSC in the form of documentation analysis and from literature review. The study presents a framework for mitigating information systems security in public organizations which describes the steps to manage systems vulnerabilities as part of dealing with information systems risks. The framework includes system identification to provide an overview and basic understanding of the system and its interconnections. Additionally, the framework includes scanning system threats and vulnerabilities, and the resulting risks levels and the management of the vulnerabilties which contains recommended safeguards to reduce the system’s risk exposure to an acceptable risk level once the recommended safeguards are implemented. Monitoring and of review of vulnerabilities should be carried out to evaluate the information systems in response to new vulnerabilities and technologies. While the study appreciates that no system can be made absolutely secure, the results led the researcher to conclude that defining information systems enables organizations to implement proper security measures on them. Mitigating system vulnerabilities helps organizations to decrease possible damage and loss due to Information Systems security attacks.This framework is therefore recommended for use in public institutions for safeguarding information systems.
- ItemMotivational factors influencing citizens to use M-Government services: a case of Kenyan ministriesMakhanu, Everlyne; Sevilla, Joseph; Marini, ClementInformation Communication Technologies (ICTS) have offered a wide range of opportunities to transform traditional governance in ways government services are offered. Growing research demonstrates the potential of mobile communications to radically transform service delivery by the government. M-Government is therefore emerging as the next big wave for ICT use in the public sector. This paper is based on a research done in 2012 at @iLabAfrica in Strathmore University as part of findings from a Masters dissertation. The purpose of the study was to investigate the role of m-government projects on service delivery to citizens in Kenya in order to enhance public service delivery. One of the study objectives was to evaluate motivational factors that influence citizens to use m-Government services. The study used a descriptive survey design and employed questionnaire and interview techniques to collect data. It was carried out in all the headquarters of 31 Ministries of the Government of Kenya in Nairobi County. Random sampling was used to select citizens in each Ministry. Purposive sampling was used to identify the government officials working in the ICT units. A questionnaire was designed to gather information. Data was analyzed and presented in frequency and percentage outcomes or tables. The findings reveal that most Kenyans contact the Government Ministries via Mobile phone mostly to enquire about a particular service, entitlement, or application. In terms of citizens’ awareness about m-Government services, 58.8% respondents were not aware of any m-Government services. Data on citizen interactions with m-government service reveals that the respondents on the whole had more negative experiences than positive experiences. This indicates that there is room for improvement in Kenyan service delivery. Kenyan citizens prefer services communicated or delivered via mobile phones because: relatively lower cost of mobile phone technology; access through shared usage and ownership; and mobile phones reach areas where there is no other ICT infrastructure. Recommendations included: services must be easy to use with valuable and timely content in order to ensure the service is relevant for end users; true transformation needs governments to pay close attention to re-engineering processes, reforming institutions, and creating an environment for greater accountability and transparency.