MSIS Theses and Dissertations (2010)
Permanent URI for this collection
Browse
Browsing MSIS Theses and Dissertations (2010) by Issue Date
Now showing 1 - 4 of 4
Results Per Page
Sort Options
- ItemA Model for e-government in local authorities in Kenya(Strathmore University, 2009) Ogot, Benter A.Many local authorities in Kenya lag behind in provision of good services to its citizens. It has been observed in other municipalities which provide satisfactory services to its citizens that c-government is an enabler for provision of good services. This research project aims at developing a framework for e-government to be used in local authorities in Kenya. This has been done by researching on e-government concepts and on how other cities in the world have used e-government to enhance service delivery and efficiency. Services offered by Kenyan municipalities are studied with the aim of identifying priority areas when developing c-government. There are 175 local authorities in Kenya. Three cities, three municipal councils, three town councils and three county councils are studied. These are examined in terms of the services they offer and the extent of IT usage in order to help identify the kinds of systems which are needed in the back office in order to give a guide as to what needs to be included in the municipality’s portals. The municipal ICT environment is also studied in order to determine what needs to be in place before the implementation of e-government and how to go about doing so. The research shows that most people come to the council to pay bills and that all the municipalities lack adequate infrastructure which needs to be addressed before c-government could be launched Out. An c-government framework has been developed which has at its foundation the infrastructure local authorities need to put in place. It has also been established that unlike the models for c-government for developed countries, mobile payment systems could be launched out at the initial stages after critical applications have been deployed as many people are more comfortable with the mobile technology rather than the internet. An implementation guideline has been produced to give a guided step on how to implement the framework. It is envisaged that this research would be useful to a municipality which would like to implement c-government but has no idea on where to start.
- ItemA Conceptual data mining model (DMM) used in Selective Dissemination of Information (SDI) : case study - Strathmore University Library(Strathmore University, 2010) Ambayo, Jackson AlungaThe process of locating and acquiring relevant information from libraries is getting more complicated due to the vast amount of information resource one has to plough through. To serve users purposefully a library should be able to avail to users’ tools and services that will lessen the task of searching of documents and be more of an information provider. A data mining model that would be used in the selective dissemination of information is proposed. The purpose would be to link users’ information needs to the available and relevant information materials. This requires technologies much like search engines that will be specialised at rummaging through library databases and mining bibliographical enthes and user details to come up with what could be the closest to determining and anticipating user patterns and demand within libraries A case study approach was taken with the collection and analysis of data. Random sampling technique facilitated the choice of 100 library users and library staff from which data was collected using self-administered and researcher administered questionnaires. Data was analyzed and presented using descriptive statistics, cross tabulations and graphs, by the use of Statistical Package for Social Sciences (SPSS) version 12. It was ascertained that there is a demand of relevant information amongst the students with academic, financial and employment information being the highest sought. The OPAC, classmate referrals were the most highly sought information seeking mechanisms relied on. Majority of the users were of the opinion that they would prefer a systems that offers them the choice of selectively acquiring and informing them of the availability of relevant resources, as well as them (users’) having doing their own searches.
- ItemAn exploratory study on the effectiveness of computer aides learning in mathematics and chemistry(Strathmore University, 2010) Sambu, Joseph KiprutoThis study was aimed to explore the effectiveness of Computer-Aided Learning (CAL) vs. classroom lecture for Chemistry and Mathematics. The objectives of this study were to: - measure the impact of CAL on academic performance, evaluate students’ attitudes. investigate their relationship with performance and also evaluate Cyber School Technology Solutions (CSTS) courseware. Sunshine Secondary School was selected to carry out this exploratory research where forty one students in a form three class were placed in two groups. (i) The control group that followed traditional lecture method with their regular teachers in the classroom and (ii) The experimental group (CAL) that used Cyber School Technology Solutions (CSTS) courseware in the Computer Lab. The survey to investigate student’s attitudes and to evaluate CSTS courseware was conducted through questionnaires which were distributed to the selected students in five secondary schools in Nairobi province and the staff teaching in the two departments of Mathematics and Chemistry. The results from this research showed no significant difference in the mean scores recorded by the subjects following CAL and those following Expository method in the post-test. The two strategies were found to be equally effective as shown by significant differences in the mean scores of pre-test and post-test. In the evaluation of the courseware, both teachers and students gave CSTS a very good rating as a learning tool. Also, a very strong and significant correlation between attitude change and performance was found. This research recommends a teaching model that incorporates the two strategies. KEY WORDS: Computer, Learning, Computer-Aided Learning
- ItemInformation technology security policy framework for small and medium size enterprises in Nairobi; Muya, Andrew Ndeti; Ateya, Ismail LukanduThe adoption of Information Communication and Technology (I.C.T) has increased tremendously over the last couple of years, especially in Small and Medium Size Enterprises (SMEs). However, most SMEs do not realize the importance of Information Technology (I.T) security policies.This research sought to (a) establish degree of use of I.T security policies in SMEs and whether these policies are equal to the business needs of SMEs; (b) establish the security threats and challenges they are exposed to; (c) identify how the I.T security policies are developed; and finally, (d) propose a framework that can be used to guide SMEs in adoption of I.T security policies. To meet these objectives, the study used a descriptive research design; research instruments used were questionnaires, interviews and discussion forums (with both student colleagues and work mates). The study established that 90% of SMEs in Nairobi do not have I.T security policies in their enterprises. Further, of the 10% who have existing policies, 5.2% have security policies that match the enterprises’ business needs. The study further observed that 82% of the businesses strongly agreed that they are in need of a comprehensive I.T security policy to counter risks / threats. Out of all the respondents, 40% strongly agreed that their businesses regularly and frequently scan critical systems for security exposures.The study further used the size of the organization in terms of personnel, the technical environment of the organization, and the ISO 17799 security policy development methodology to develop a framework that addresses comprehensively the I.T security policy development for SMEs. According to the proposed framework, if the firm is not I.T proficient (or if it is I.T proficient but small), it should outsource I.T security policy development; else, it should develop the I.T security policy internally or outsource. The framework also provides the detailed components of the I.T security policy development and its implementation.