MSIT Theses and Dissertations (2013)
Permanent URI for this collection
Browse
Browsing MSIT Theses and Dissertations (2013) by Issue Date
Now showing 1 - 20 of 30
Results Per Page
Sort Options
- ItemUnstructured supplementary service data (USSD) based prototype for credit unions’ loan request processes in Kenya(Strathmore University, 2013) Kuria, Daniel ThomiThe use of technology in credit unions‟ processes is inevitable for the sake of the unions performing optimally. The absence of readily available technology in processes such as loan acquisition has resulted into poor performance in service delivery for credit unions in Kenya. The phone based technology, Unstructured Supplementary Service Data (USSD), offers substantial communication capability that can be harnessed to perform some of the services the credit unions offer. In this thesis, the development of a USSD based prototype for the loan acquisition process of credit unions has been done as there lacks such a prototype. For credit unions to operate optimally, they have to implement current technology in their operations. Given the popularity of mobile phones in Kenya, it would be in order to base the technology of choice on mobile phones. One such technology is USSD, which can be used in such processes as loan application. The USSD based prototype has been designed such that it involves three key players; the loan applicant, the loan guarantor and the Sacco trustee. The loan applicant has to name potential guarantors and the guarantors then have to accent to guarantee the loan before the approval of the loan is done by the Sacco‟s trustee board members. Each of these players performs their respective tasks on their mobile phones. The prototype rides on the readily available GSM network to relay information between a user‟s mobile phone and the Sacco‟s servers, where then it is hosted. The prototype developed is able to validate users and ensure the loan application process meets all checks necessary before a loan is awarded. The use of the prototype in the application process costs much less in terms of money and time used as compared to a process that is not technologically endowed. The use of readily available technologies such as mobile phones and phone based USSD in offering credit union services like loan acquisition is thus a viable and recommendable undertaking. The adoption of these technologies in other credit union services like loan disbursement and repayment would further increase their optimization.
- ItemA model to guide in the adoption of bring_your_own_device concept in an organization(Strathmore University, 2013) Mwenemeru, Henry KinyuaThe study aimed at developing a model to guide in adoption of personally owned mobile handheld devices, known as bring your own device (BYOD) concept in an organization. In this study, the model of technology, Organization and environment (TOE) Framework was reviewed.TOE framework was reviewed because the three elements in the framework present both constraints and opportunities for technological innovation. Thus, these three elements influence the way a firm sees the need for, searches for, and adopts new technology. This study is exploratory and adopted survey research design in order to gain advantage from its intrinsic ability in describing the characteristics of a large population and making use of large samples, thus making the results statistically significant even when analyzing multiple variables. Mobile telephony industry was used as a case due to its advancement in technology. The sample consisted of four (4) members of management staff and two hundred and twelve (208) support staff members. Of this, three (3) managers and one hundred and forty eight (148) support staff members responded. Questionnaires and interview guides were used to collect data from the support staff and the managers respectively. Quantitative and qualitative approaches were used for data analysis. The Statistical Package for Social Sciences (SPSS) was used to run descriptive analyses to produce frequency distribution and percentages for the quantitative data. Qualitative data on the other hand was presented on narrative form. From the analysis, the study revealed the following: the main benefits of integrating BYOD concept within the organizations framework are enhancing performance, flexibility, job collaboration, job satisfaction. The main challenge lies in the organization’s policy framework which lacks BYOD concept provisions. Other challenges include losing control in managing the organizations’ information and data, employees being likely to engage in “off the clock” work that could either increase overtime expenses or the risk of off day claims and employees easily deviating from their core business. Based on the key findings, the study proposes Hybrid BYOD Model to answer to the key concerns on the adoption of BYOD concept by an organization.
- ItemFramework for ICT based agricultural information dissemination system:case of Agricultural Information Resource Center, Kenya(Strathmore University, 2013) Kathuri, Stephen IreriNetworks of information and communication technologies (ICTs) enmesh the globe and represent a transformational opportunity for farmers to receive information as and when required. While correct, the opportunity presented cannot be realized unless this technology is guided. This thesis presents research findings from a case study of Agricultural Information Resource Center (AIRC) undertaken by use of questionnaires to establish issues such as use of ICT tools, information processing and dissemination. 26 respondents were targeted and 19 responded which was a 73% response. Literature review was undertaken to establish the extent of ICTs usage, farmers‘ information needs and the review of globally existing agricultural information dissemination frameworks. From the research it was established that farmers could benefit from real time adjustment in agricultural practices provided by ICTs, ICTs creates opportunities to dissemination local knowledge which is critical to improving farmers‘ productivity, and ICTs like mobile phones may strengthen information sharing. These results meant one thing; ICTs are here with use, however, their use especially in information dissemination to farmers‘ need to be guided. The significant of this research was that a framework to guide agricultural information dissemination system was developed and validated.
- ItemFramework for data sharing between satellite campuses in public universities : the case of Jomo Kenyatta University of Agriculture and Technology (JKUAT)(Strathmore University, 2013) Maina, Esther WangechiIn the past decade Public Universities in Kenya have more than quadrupled in number from seven in 2002 to over thirty in 2013. This increase has contributed to the introduction of universities constituent campuses and colleges in all major towns in Kenya. With the satellite campuses dispersed all over the country the data being held by these campuses is distributed in heterogeneous formats and not being shared. Some campuses maintain data repository but there is no platform or policies for facilitating data sharing. Data is duplicated across satellite campuses, which makes accessibility, availability and reinforcing mechanisms for data security very difficult. There exists a major gap in data sharing with no clear framework for the universities to use. The study sought to identify the requirements for data sharing between public universities and their satellite campuses, identify platforms for data sharing between satellite campuses and use this information to propose and validate a framework for data sharing. The study was conducted through the applied research design; data was collected using structured questionnaire from JKUAT, ICT personnel and campus administrators, two questionnaires were administered to each of the 12 satellite campuses in JKUAT with an additional two for the main campus. The data was analyzed using descriptive analysis and presented in tables and figures. The study established that 83% of the respondents do not share data. Network infrastructure was the highest rated requirements for data sharing with 70.8%. A web based platform and data security were also preferred with 79.2% each. Framework that support virtualization and distributed systems was also preferred with 66.7% and 62.5% respectively. Other requirements for data sharing included data accessibility and availability. The study concludes that the university needs to come up with proper infrastructure and policies to implement data sharing due to the dispersed nature of its campuses. The study recommends use of Cloud for data virtualization and storage, combined with WebGIS and Grid technology to facilitate data sharing.
- ItemCost based data security model for organizations(Strathmore University, 2013) Maroria, EzraAs information systems threat environment continue to escalate and change, the focus on information security shifts towards effectiveness and efficiency of security countermeasure. Organizations continue to suffer the consequences of data breach with many paying high fines, loosing important data, reputation damages and even others going entirely out of business. This scenario has led to organizations layering security countermeasures one upon another from logical to physical and administrative controls to ensure they protect their assets. Ensuring strong information security is resource consuming and very costly given the limited security budget. On the other hand different information/data requires different security level depending on its nature or classification. For example some information may require basic security level because of its less sensitive nature, while others may require higher protection level because of their highly sensitive nature. This demands that information security spending be reviewed as thoroughly as other management decisions. In this research, using a qualitative and quantitative research methodology, various ways of data classification are identified, these include; classification based on type of data, owner, value of data, sensitivity of data, legal and regulatory requirement, user needs etc. The research also investigates various data security requirement and problems. Those identified include; the CIA, legal requirements, data response, utility, accountability and privacy. On data problems, networked environment, users related challenges, complexity of computing tools and integrated environments, E-commerce issues, poor data security governance and internet are identified as key challenges. The research also involves analysis of data security models where gaps and deficiencies are identified. A cost based data security model for implementing security based on data security requirements for different class of data is developed. This model is a step towards data security control costs identification and optimization where data security is implementation is informed by the data security needs.
- ItemCloud computing implementation framework: case study of directorate of e-government(Strathmore University, 2013) Karimi, Paul KabuiInformation Technology has gone through a continuous paradigm shifts. All these shifts are either driven by technological change and advancement or the requirements by the clients. Hence these shifts have made the IT industry very dynamic for particular technologies to assert themselves as the defacto technologies. The technologies must be combined to give the full potential of the combined technologies by complementing and supporting each other’s capabilities. Organizations that are progressive and take ICT as an enabler and a strategic arm in their operation must take up and adapt to such technologies so that they remain competitive in terms of service delivery, cost of production, and systems integration among other benefit. Cloud computing is the most recent paradigm in IT; it uses the many years evolved technologies together to harness the benefits accrued in each technology to create modern data centers. The cloud concept is geared to enable customers or data center user to subscribe to computing service they need without investing in acquiring computing assets. This thesis proposed a cloud computing framework using directorate of Egovernment as a case study. The directorate of e-government is mandated to manage and give policy direction for ICT in government. Currently the government ministries and department implements segregated ICT systems with full investment on hardware, software and personnel. Most of the investment does not get the full economic returns because they end up being underutilized and there is a lot of duplicated effort across the government in terms of ICT projects. The research studied the sampled ministries and departments, through personalized interviews and review of existing works and documents to understand the nature of services being offered by the departments and ministries. The results formed indicative facts of the underlying ICT services and assets base in government. The research further proposes a comprehensive collective cloud computing implementation framework which can be used to transform the current SILO based approach of implementation to Government Cloud where all the government ICT resources can be pooled and managed centrally. Respective theoretical models and framework forming the building base of cloud computing and utility services are reviewed in the literature review. The research further explained how the developed framework should be implemented in government through various discussion and recommendation. The researcher validated the proposed framework by mapping the proposed frameworks components to the know variables in cloud computing implementation and post interview and frame work review by the study respondents.
- ItemInformation systems framework for traffic congestion management: case study of Nairobi(Strathmore University, 2013) Gikonyo, Barnabas N.Traffic Management (TM) in the urban centers remains a very contentious issue and particularly in large cities. There are various methods used to manage traffic yet these methods have got their limitations and certain levels of complexities. As time becomes a remedy for success to economic growth, methods of controlling traffic and making traffic efficient to save this vital resource have took center stage in the urban centers. Historically urban centers have been identified with heavy potential of population growth. The population growth has triggered other co related activities such as line service industries which result to increase in urban migration. Most business setups are located in the urban centers and this may be the possibility of population growth. The resultant has been an increase in urban mobility and particularly to people as they get to their various destinations. Different cities have different behavioral activities as urban migration may be as well be influenced by regional cultures. Information technology has been described as immature technology however; use of the same could have resulted to positive effects in creating a standard to be adopted. Urban centers are the most affected areas in terms of vehicle traffic flow management as congestion becomes a challenge on day to day running. Appropriate use of technology in traffic management has given countries a niche in many dimensions be it cost, efficiency or effectiveness. Old technologies may not alleviate recent challenges in congestion handling, load balancing and traffic routing and hence the need to adopt a more comprehensible solution. The thesis therefore proposed a traffic management framework that will be suitable for adoption on Kenya urban centers. The Study looked at possible ways and considerations that was necessary to bring traffic congestion to the minimum. The proposed framework was also a guideline that could otherwise complement the existing guidelines and procedures that were currently in use for alleviating traffic management challenges in the urban centers. Using Nairobi city as case study, the traffic Management framework was developed, tested and observed.
- ItemThe use of ICT in leveraging basel II implementation in Kenyan banks(Strathmore University, 2013) Sego, Rahab JepkorirBasel II is the second of the Basel Accords which are recommendations on banking laws and regulations issued by the Basel Committee on Banking Supervision. The implementation of the Basel II framework in Kenyan banks is moving at a very slow pace. This has undeniably, affected the efforts of the banks to comply to international best practices standards. The major reason is the lack of development of proper systems/frameworks for realising Basel II objectives. The project analysed 45 professionals through use of a questionnaire, data recording and direct interviews. Data was presented through the use of charts and tables. The data touched on the respondent profile, employee experience, department and configuration of ICT to handle Basel II. This thesis examines the use of an ICT framework in the implementation of the Basel II in Kenyan Banks. The aim is to assess the critical ICT challenges experienced in the implementation. of Basel II, the current ICT implementation in place and propose an ICT framework that can leverage Basel II implementation in Kenyan banks. The study finds that the major challenges comprise the inability to provide consistent and correct data over time as this data is obtained from different IT systems and data owners, non-automation/ partial automation of some processes, lack of comprehensive historical data and inadequately trained human resource. Therefore, Kenyan banks will require technical assistance in order to effectively implement Basel II and consequently comply with the international banking regulatory standards of best practices. The analysis of the feedback research from the research reveals that there is need for development of clear guidelines, techniques and framework which ensures ICT enables Basel II implementation in Kenyan banks. The thesis recommends a guideline ICT framework that will leverage on Basel II implementation in Kenyan banks. This project proposes that a solution can be achieved by the use of ICT framework that supports the requirements of Pillar 1, facilitates compliance of Pillar 2 and supports the comprehensive reporting requirements of Pillar 3. Basel II provides for basic, standard and advanced approaches, with specific incremental capital adequacy, qualitative and quantitative requirements. IT is most relevant to the quantitative and qualitative requirements, which are risk management, control and governance practices.
- ItemA framework for selection of information systems : case of the Kenya Civil Service(Strathmore University, 2013) Miriti, Fridah Karen M.Organizations in the civil service should endeavour to implement information systems that meet both their organisational objectives as well as e-Government objectives. However, information systems in the civil service in Kenya are characterized as being underutilized or unutilized; focused internally and existing in silos often leading to incompatible systems; being driven by vendors, donor and development partners; or acquired through collusions between vendors and government officials. This is due to lack of a suitable framework to guide selection of information systems in civil service. The research sought to review existing frameworks used to guide selection of information systems, identify factors that need to be considered in selection of information systems, determine how these factors apply in the selection of information systems in the civil service and develop a framework that can be used to guide selection of information systems before acquisition in the civil service in Kenya. The research identified the selection process, selection criteria, decision making structure and the evaluation technique as the factors that need to be considered in selection of information systems. A survey was sent out to the forty two ministries to determine how these factors applied in the civil service. It was found that most ministries in the civil service had a formal structured process for selection of information systems, weighting and scoring of criteria and cost benefit analysis were the most frequently used evaluation techniques, availability of funds and improved service delivery were the most frequently used selection criteria, the ICT department most frequently determined which information systems should be selected for acquisition and the accounting officer made the final decision on which information systems were selected for acquisition. The results of the survey were used to develop a framework to guide the selection of information systems in the civil service. The components of the framework were based on the four factors identified for the selection of informaiton systems. The framework aims at providing a standardized formal structure for selection of information systems in the civil service that support organisational objectives as well as e-Government objectives.
- ItemInformation Technology sourcing decision framework: the case of Kenya Revenue Authority(Strathmore University, 2013) Kinyua, Florence MugureIn recent years public organizations have turned to outsourcing Information Technology (IT) related service operations, as a strategic option aimed at organizational growth and attainment of its goals. Firms undertake IT outsourcing in an attempt to lower costs, put more focus on their core business and improve quality of IT services. A great challenge for most firms lies in expressing IT initiatives in value-for-money and convincing the business that the most cost-effective solution is being sought. Information technology managers have acknowledged that process frameworks are critical determinants of successful outsourcing initiatives. KRA plans to upgrade ICT to facilitate achievement of international best practice, raise performance standards and reduce operational costs. To achieve these goals, KRA needs to assess its internal technical capacity vis-a-vis outsourcing some of the IT services and make decision on the most cost effective IT sourcing strategy. A number of frameworks exist that attempt to explain various aspects of the outsourcing process. The different aspects range from making the outsourcing decision, implementing the outsourcing decision and the subsequent monitoring and management of the outsourcing initiative. The main objective of this research was to propose an IT sourcing decision framework that would assist decision makers form a basis for their IT sourcing strategy. An in-depth research into literature, articles and journals on IT sourcing was done to establish the various aspects of outsourcing. Analysis of various available frameworks that explain the aspects of IT sourcing decision making process with their strengths and weaknesses is also performed. Online questionnaires administered to middle and senior level managers at KRA were used to establish how IT sourcing decisions are currently managed. The various aspects of IT sourcing decision making were established as why outsource, what to outsource and how to outsource. From the findings, it was also established that KRA practices selective sourcing where some activities are performed in-house while others are outsourced. It was also established that there was no clear way of measuring performance of outsourcing initiatives. Based on these findings, an Information Technology outsourcing decision framework was developed and validated.
- ItemContext-aware mobile applications development framework(Strathmore University, 2013) Gwaro, RonaldMobile application development follows a number of strategies and approaches. Recent developments in mobile applications tend to consider context to be key. This has necessitated the need for context-aware mobile applications. To fully understand mobile applications and their components, this research separates core application logic from adaptive functionality and then applies qualitative and quantitative research techniques to investigate and come up with a framework for the development of context-aware mobile applications. The research identifies the factors affecting mobile application development as; Mobile device characteristics; Mobile application development platform; Changes in the mobile environment; Mobile application operating platform; Cellular network capabilities; Human and mobile device interaction; Application consistency across different mobile devices and platforms; Nature of content and service delivery; Mobile application performance and Mobile application security considerations. The technologies used in mobile application development are identified and broadly classified as communication technologies, development platforms technologies, middleware technologies, presentation technologies and security technologies. The research findings were used to build a framework for mobile applications development using context-awareness analogy. The framework consists of two main categories of core application logic and the adaptive functionality. The core application logic has six components and each contain the most critical feature the developer should emphasize on. The adaptive functionality also has five components that the mobile application developer should consider and each contains the most critical features for emphasis. The framework is then covered on each side by the mobile application security considerations. Mobile application security affects many of the components in the framework and therefore must be considered at the component level.
- ItemThe extent of IT governance in achieving business competitiveness: a case of Kenya Airways Limited(Strathmore University, 2013) Njoga, Ayub Onyango DavidThe pervasive use of technology has created critical dependency on IT that calls for a specific focus on IT governance. There is a devaluation of the importance of IT as a strategic asset by executive management in many organizations resulting in dysfunctional governance models. The study sets to explore the IT Governance practices extent in achieving business competitiveness advantage with a view to exploring IT strategy-business strategy alignment. Despite the growing evidence that IT has become an integral part of business, IT governance is still an issue for many organizations as the executive business management often tends to view IT as a "support" function rather than as a legitimate partner for generating business value. This devaluation of the importance of IT as a strategic asset is a symptom of misalignment leading to organizations’ wastage of precious resources (capital, time and human) in an era where time is of the essence, capital is in short supply, and truly qualified IT people are still hard to find (despite the recent economic recession). The study recommends the Dee-Enn Framework of IT Governance which merges the key components of existing IT Governance frameworks such as COBIT and ISO 38500, making it a simpler model, yet more integrated and comprehensive. The framework would enable the BOD put equal emphasis on IT governance as is normally with corporate governance to facilitate its integration in the Enterprise’s Governance, Risk and Compliance (GRC) practice to form a collaboration that brings synergy, and provides better financial, operational and IT assurance to the business in the pursuit of its objectives and goals.
- ItemA framework to guide information security initiatives for banking information systems: Kenyan banking sector case study(Strathmore University, 2013) Njiru, Stella WanjiruBanks are increasingly using technology to reduce their costs and deliver high quality services. As banks continue to become very dependent on computers, millions of shillings are being spent on these information systems. But even as modern banks increasingly rely on the internet and computer technologies to make their transactions, they have become vulnerable to technologically – based fraud. This is because of the speed at which information system security is evolving and therefore leaving a gap between where information security is now and where it needs to be. To be able to deal with the widening gap in information security, the banking industry has implemented various frameworks that act as a guide when evaluating information security vulnerabilities. However, this seem not be enough as the Kenyan banking industry is still losing millions thanks to technologically- based frauds on a monthly basis. Reason being the fact that some of the frameworks are too generic and they do not match the security needs of the bank. Moreover, some of the information security controls suggested by the frameworks are outdated. This leads to short-term, incremental changes to be done on the framework that is not enough to close the gap. Case study methodology was used to find out the different challenges banks within the industry are experiencing and the kind of measures they are using to information security risks mitigation. This methodology was extremely helpful in discovering the challenges that banks are facing when using the existing framework. The research findings show that people are the largest threat to information systems as lack of proper communication (at 93%), lack of skilled labor and security awareness by customers (at 83%) were cited as a major obstacle to security effectiveness. Moreover, fraud (at 88%), careless or unaware employees (at 83 %) and internal attacks (at 77%) were cited as the threats and vulnerabilities that have increased banks’ risk exposure. To close the ever-growing gap between vulnerability does not require complex technology. Leadership and the alignment of people, processes and technology is what is most important in the transformation of information security
- ItemICT Adoption Framework in Rural Secondary Schools: Case of Meru, Kenya(Strathmore University, 2013) Gatwiri, Bundi DorothySecondary school teachers and administrators are under increasing pressure to use Information and Communication Technology to impart to students the knowledge, skills and attitudes they need to survive in the twenty first century. Secondary schools need to migrate from a teacher-centered lecture based instruction, to a student–centered interactive learning environment. To attain this aspiration, an ICT enabled Secondary school education is fundamental. The main goal is to understand how embedded use of ICT in a learning environment can improve the learner outcome. Towards this end, international and national authorities have been spending huge sums of money to facilitate the implementation of ICT in Secondary education. This is why the Kenyan government is encouraging ―…the use of ICT in schools, colleges, universities and other educational institutions in the country so as to improve the quality of teaching and learning.‖ With the Kenyan National ICT Policy in place, ICT continues to advance in Kenya. Rural areas still experience a lag in its implementation that continues to widen the digital and knowledge divides. This is as a result of lack of systematic guidelines that can be used for ICT adoption in the learning processes. With this premise the researcher embarked on a study based on the secondary schools in Kenyan rural areas, in Imenti North District, Meru County. The study revealed that, though the key players in the secondary school education system have the will to embrace modern methods of instruction and knowledge management, Information Communication Technology is being used merely for routine basic processes such as word processing and therefore missing out on its true potential value. Since most of the teachers are just certificate holders and others have no formal computer education. The study used both descriptive survey and case study, where a single rural area in Kenya was chosen and structured questions were provided to the respondents to guide them in areas of interest concerning ICT adoption in secondary schools. The framework is structured into five dimensions. Students‘ aspects, learning environments, Teacher professional ICT attributes, School ICT capacity and School Environments are discussed. Fundamental aspects of the ICT pedagogy are covered in the study. Finally, the relationships between all dimensions are explored and their components are discussed. This study has documented the progress made in secondary educational development, while it is applicable to other secondary schools with similar challenges and status in Kenya. The study has revealed the role of ICT in enhancing secondary education in Kenyan rural areas. The results of the study are a framework that can be used for adoption of ICTs in rural secondary schools. This framework was validated at Ntugi Day Secondary School, a public day secondary school within Imenti North District, Meru County in Kenya.
- ItemA framework for assessing cloud computing risk for Kenyan organizations(Strathmore University, 2013) Were, Timothy OthienoCloud computing has recently emerged as a buzz word in the distributed computing community. Many believe that Cloud is going to reshape the IT industry as a revolution. Yet for security professionals, the cloud presents a huge dilemma: How do you embrace the benefits of the cloud while maintaining security controls over your organisations’ assets? It becomes a question of balance to determine whether the increased risks are truly worth the agility and economic benefits. The author proposes a framework that borrows from other developed frameworks that will assist in the mapping out of security risks and controls that current and prospective users will need to take care of. The target group of respondents for this research are employees in the Information Technology departments in randomly selected Kenyan firms cutting across Utilities, Manufacturing, Transport, Non Governmental Organisations (NGOs), Government, Academia, Finance and ICT. Questionnaires were used with forty respondents giving their feedback. The feedback was positive with majority of the respondents having confidence in the framework – 90% of the respondents did not suggest any item for removal from the framework. They concurred that to address the risks in cloud computing, consideration has to be given to security in personnel, operational and physical issues, in addition to supply-chain assurance, portability and business continuity management. Also to be considered are environmental controls and legal and jurisdiction matters. The suggestions for additions were incorporated in the final model that was used to evaluate an existing cloud user who found areas that needed to be addressed by their Cloud Service Provider. The implication of this research is that the market is ripe and ready for cloud computing as long it can have assurance of the security and continuity of their data and systems. The research will give guidelines to those interested in implementing cloud computing on the considerations to make in order to ensure security and continuity risks of their systems are considered. The paper adds value in that cloud computing being a relatively new phenomenon, not much research has gone into its implementation, especially in Africa and more so in Kenya.
- ItemFramework for medical collaborative systems in public hospitals : case study: Mbagathi District Hospital & Health Centres(Strathmore University, 2013) Wambua, Faith MwikaliPrivate healthcare institutions in Kenya have adopted Information Communication Technologies (ICTs) in their daily operations to increase efficiency, reduce costs, to improve quality of services. Information Communication Technology has transformed business organizations globally and this is evident through the changing organizational structures, communication methods and collaboration of teams across borders. In Kenya, the current patient referral process is a manual and lengthy process that involves the constant access and transfer of referral forms and letters to and from the different levels of healthcare facilities in the country. The public hospitals in Kenya lack an online collaborative system framework for the transfer of referral records when a patient has been referred from a public hospital to a referral hospital. The purpose of this research therefore is to develop a framework for a collaborative system to carry out online referral of patients. A collaborative system also supports working together and close interaction of medical personnel working on a specific patient. A case study methodology was used to study the patient referral process in Mbagathi district hospital and public health centres. The importance of using this approach is that it is used to study real world phenomena in its original context and will be applicable in studying the procedures guide the medical transfer process and the challenges facing these processes. This research studied the current transfer of patient referral records in public hospitals, analyzed the frameworks and models developed for collaborative systems and proposed a valid framework that can be used for the implementation of a healthcare collaborative system for the public health hospitals in Kenya. The research findings show that 93% of the medical practitioners give patients referral forms to carry to the referral hospital. At the same time, 83% also indicate that feedback to the local hospital is not given. This therefore calls for a need to have an online referral system that will implement the desirable characteristics as supported by the 95% of the medical staff who participated in the research findings. Upon successful completion of this research, the public hospitals will now have a validated framework that can be used to implement a collaborative system to transfer records electronically from one hospital to another. This framework will be based on the current referral guidelines issued by the Ministry of Medical Services and Ministry of Public Health and Sanitation.
- ItemPortal to address agricultural information needs of banana farmers in Embu County(Strathmore University, 2013) Ireri, Evelyn WanjiruInformation and Communication Technologies (ICTs) are important tools to use in agriculture today. This is more so because ICTs can make significant contribution in increasing efficiency, productivity and sustainabiIity of smallscale farmers. The greatest challenge is that despite many initiatives Agricultural knowledge and information has not been tapped and content availed to farmers in an all inclusive format. Currently the available websites only provide information which is of very little value to the farmer since it does not cover the whole agricultural value chain. The design of this research was action in that it tried to understand the banana farmers' agricultural information needs and challenges that farmers face while using ICTs, interviews were conducted to banana farmers in Embu county. This information was intended to aid the researcher in developing an appropriate tool (portal) which could contain all the information a farmer is interested in throughout the agricultural value chain. The developed portal contains information from production, to value addition and marketing which is the final stage of the agricultural value chain. However, the research recommends that the agricultural extension offices should be fully equipped with computers and internet to facilitate the extension officers to be able to train the farmers on how to acquire this information through the internet using their phones or available information hubs. Findings also suggest the need for policy makers and even private sector to invest in making access to ICT tools by farmers easier.
- ItemCloud-based multi-agent supply chain system architecture(Strathmore University, 2013) Venzeslas, Oliko GabrielEfficient supply chain management is a key challenge for many organizations. This becomes even critical and complicated when the goods that these organizations deal with are considered to be life saving. The Kenya Medical Supplies Agency (KEMSA) whose mandate is to procure, store and distribute drugs and health commodities to health facilities in Kenya has not be spared by this challenge. Secondary research suggests that the main problems in KEMSA include uneven distribution of healthcare services or drugs, ineffective and inefficient supply chain systems and low availability and accessibility of healthcare products occasioned by lack of a supply management system. The development of multi agent concepts in Artificial Intelligence in recent years provides an opportunity to explore the possibility of deployment of such concepts to further enhance the supply chain systems. Cloud computing on the other hand is the delivery of computing as a service rather than a product, whereby shared resources, software, and information are provided to computers and other devices as a metered service over a network. This is an applied research and semi-structured interviews and secondary data were used. This research sought to develop architecture for a multi-agent supply chain system around a cloud in an attempt to address the supply chain management and delivery challenges at KEMSA. This research then recommended this architecture as a foundation on which Supply Chain Management software for KEMSA or other interested organizations can be built on
- ItemA framework for integration of mobile devices in distance education: a case of University of Nairobi(Strathmore University, 2013) Muchene, Joyce GathoniDistance education was introduced many years back and has continuously gained popularity among institutions. Students heartily embrace it as it gives them the flexibility they so require, while for institutions they are able to offer educational opportunities to many who would not be in a position to attend class on a daily basis. Even with the exponential growth of distance education the delivery of content is still wanting. Most distance education courses still rely on print media to deliver content to students, with minimal media being introduced to assist. However with the advancement in technology distance education should be accessible to students whenever and wherever they are. This is not so, due to over reliance of delivery modes as mentioned above. The study sought to determine how tointegrate mobile devices in distance modelearning so as to make it accessible whenever and wherever one may be. It looked upon the current mobile technologies in use by the students so as to determine the most appropriate and effective mobile technology for them. The study endeavored to propose a framework for the integration of mobile technology into distance education based on the findings. According to the study, 79.6% of the respondents own a mobile phone while 17.5% own a laptop. This shows that a majority of the students have mobile devices which are readily available for their use in learning. Further analysis on which materials they access using their mobile devices 25% stated the modules while 48.3% study notes. Therefore, a large number of students use their mobile devices to learn and the framework for the integration of mobile devices in distance learning would enable facilitate learning using mobile devices. The framework looked into specifications such as communication in the way the students and the institution can be able to communicate with one another. The other specification was administration of users, whereby users would be traces to the student management system so as to avoid duplication of data. Other specifications identified were access to courseware, to enable access regardless of location, and support for all clients, that is, traditional and mobile device clients.
- ItemFactors affecting information diffusion in healthcare : a case study of the Nairobi Hospital(Strathmore University, 2013) Mulimba, Steve JosephInformation technology (IT) has the potential to improve the quality, safety, and efficiency of health care. The main objective of the research study was therefore to establish the factors affecting information technology diffusion in healthcare. The study narrowed its research undertakings into four major factors which were; Communication, Ease of Use, Compatibility and Complexity. The literature review provides the reader with an explanation of the theoretical rationale of the problem being studied as well as what research has already been done and how the findings relate to the problem at hand. The study applied descriptive research design and the target population was 500 respondents from Top, Middle and operational levels of the institution. The study applied simple random sampling to obtain its samples. Questionnaires were the major data collection instruments and the gathered findings were analyzed through the use of quantitative analysis techniques, tables and charts to present its findings. To ensure effectiveness of information technology diffusion in healthcare proper communication should be done, health care information system should be easier to use, the technologies should be compatible with already existing organizational norms and values and the organization management should be in a position to handle complexities brought about by Information Technology.