MSIT Theses and Dissertations (2012)
Permanent URI for this collection
Browse
Browsing MSIT Theses and Dissertations (2012) by Issue Date
Now showing 1 - 20 of 24
Results Per Page
Sort Options
- ItemInvestigating applicability of Near Field Communication technology in Kenya(2012) Mulevu, Cornelius M.Mobile phones have become ubiquitous companions in our life, enabling communication nearly always and everywhere. Additionally they facilitate information access to mobile services and the internet. Besides these communication functions, they have become multimedia computing platforms, thus mobile phones are emerging with technologies like Near Field Communication technology (NFC) which is a two-way communication technology based on Radio Frequency identification (RFID). The NFC equipped phone (NFC phone) that embeds the NFC technology into cellular phone has earned increasing attention in business, such as payment and ticketing. Mobile payments are likely to emerge as the way to pay for most all goods and services, eliminating the dependence upon carrying credit and debit cards, checks and cash. An upward progression mobile payments in mature economies towards online purchases is expected. Today, SMS is the dominant medium for conducting mobile phone transactions; however, the mobile payment market is seen to use both remote mobile payments like sms and proximity mobile payments (NFC). Mobile purchases have taken place using a variety of contactless devices like NFC-enabled mobile phone. Similar to a magnetic card payment, the user simply enters a short personal security code (personal identification number, PIN), and then touches their phone to the terminal for confirmation. This provides an essential higher-level of security compared to credit cards or other payment methods that typically reside in a physical wallet. This research presents a model for Adopting NFC-Based mobile phone payment system in Kenya. It will seek to provide solution to the challenges currently faced by magnetic card based payment system. The model characterizes the issues and technologies involved in NFC based payment, and proposes an ideal adoption model for the Kenyan mobile phone payment environment.
- ItemAn evaluation and turnaround strategy for troubled ERP projects;(Strathmore University, 2012-02) Luseno, Chamwama J.A troubled system, also referred to as a challenged system, is one that is delivered; behind schedule, or exceeds budgets, yet does not meet user requirements. A lot of research has been conducted on software project failures, and literature abounds' documenting the devastation these have had on organizations world over.. ERP system implementations tend to be large, complex technology-intensive projects. They are prone to ending up troubled and inevitably fail if the necessary executive intervention is not taken in good time. Whether a troubled project succeeds or fails depends on the effectiveness of managerial actions taken to tum around or redirect such projects: Before .such actions are taken, however, management must recognize the problem and take appropriate corrective measures. This study seeks to relate symptoms documented in existing literature and troubled . . software projects to a local case and the applicability of current documented turnaround frameworks. It draws on literature on the self justification theory (Broeckner, 1992) on escalation theory. The case is based.
- ItemInformation systems security management(Strathmore University, 2012-06) Nyamongo, Doreen MoraaInstitutions of higher learning have a desire to supply knowledge to all those who seek It. Currently Universities are finding that they have to balance between their initial Goals and adoption of adequate measure to protect sensitive information about Student, alumni, workers and their business partners. Applying Information security to University IT systems is strategically important to maintaining overall business Continuity and competitive edge. Given the fad that a university environment poses Unique challenges related to diverse roles and the tendency of people viewing things Differently, it is challenging to successfully implement information systems security In such a setting. The diversification of views in/the university environment has led to Increased demands from the users of the systems hence continuous review and Improvements of this systems quality is required, It is necessary to have a high level Of information systems security management in institutions of higher learning in Kenya. : This research undertook both quantitative and qualitative approaches of information Security management in institutions of higher learning with the use of both primaries And secondary data sources. A descriptive research design was employed with the use Of questionnaires as principal data collection instrument. The questionnaire was Distributed to all the individuals in the sample. The research was carried out at all Private chartered universities in Kenya. The sample size was drawn from the lCT directors and lCT staff of these universities. Collected data was analyzed using both Quantitative and qualitative data analysis approaches, Data from the questionnaires Was checked for completeness, coded and logged into the computer system using Statistical Package for Social Science (SPSS). I In The study found out those institutions of higher/learning in Kenya is ready to adopt And improve on their information systems security management by regularly updating Management on security updates (64.5%) but ~hen having dedicated office dealing With security issues (58.1 %) and a security practitioner being part of top management (54.8%) will ensure that updates on security issues to top management are followed up And worked on, staff training on ISSM (22.6 %[), Joint, involved and support of other Departments (52.0%) will go a long way in improving the university's 18SM. However viruses (58.1%), user errors (4~.4%), theft of computers (45.2%), Compromising the system (45.1%) and system or software errors (38.7%) among Others continue to be the major challenges affecting 18SM in institutions of higher Learning. in The study concludes that institutions of higher learning should rethink their ways of Handling security of their most valued assets. Hence there is a need to highlight an effective strategy that will help institutions of higher learning to achieve effective information security management. .
- ItemImplementation of public key infrastructure for eprocurement system : a case of selected state corporations(Strathmore University, 2012-06) Kanyinyi, Lawrence K.The dynamic character of the world means that it can be difficult to forecast future conditions and thus flexible strategies may be needed to cope with uncertainty. E-Procurement has been seen as a response to the uncertainties of relying paper work in the procurement processes. The implementation of PKI in E-Procurement in State Corporations is an initiative that ensures security and authenticity in procurement are maintained throughout the processes. The implementation of such initiative is thus influenced by some internal and external factors and some challenges. This study evaluated the implementation of PKI in E-procurement in the Kenyan Parastatals. This was done by utilizing guidelines of three objectives that is; 1) To determine the current status of Public Key Infrastructure in state corporations, 2) To find out the challenges that state corporations experience in the implementation of Public key Infrastructure in the E-Procurement process, and 3) To establish a framework that government organizations can use in the implementation of PKI in E-Procurement processes. The target population was sixteen (16) selected Kenyan Parastatals. One respondent from Information Technology department, from each organization was purposively selected to participate in the study. A self administered questionnaire was applied in the data collection. The collected data was then be analyzed in descriptive statistics technique by using a computer aided program; Statistical Package for Social scientist (SPSS). This study found that most of the State Corporations in Kenya have online services that use PKI/SSL Certificate. In addition,secure email was the principal business function of the PKI-enabled application. It was also established that state corporations were using CA service providers to run their PKIs. The study also found that state corporations do not have a central (public/private) key server. State corporations establish a PKI or digital certificate services for authentication (Single Sign On or Access Control), transport security (e.g. IPSec, wireless) and for document Signing (or "non repudiation"). PKI can help in ensuring that bidder's information is be kept private, 111" supporting confidentiality in the processes and in ensuring identity of an individual and in promoting trust in use of the system.
- ItemExplosive trace detection service model(Strathmore University, 2012-10) Kipyego, Murrey M.; Lukandu, Ismail Ateya Marwanga (Dr.), Reuben Kiraka, RuthThis research describes explosive trace detection service architecture which combines the strength of the mobile phones, the polymer sensor and next generation cellular network. The aim is to create a system that will assure common men, local population and above all the nation a secured environment, without disturbing their freedom of movement. It would further help the police in detection of explosives more quickly, isolation of suicide bombers, remediation of explosives manufacturing sites, and forensic and criminal investigation. The idea is to use an explosive vapour nanosensor in wireless sensor network or embed it in a mobile phone as a cognitive radio sensor node. The sensor network connects to the mobile network through a gateway while the cognitive radio sensor node into the mobile phone connects to the mobile network by analyzing the Radio Frequency (RF) surroundings and adjusting the spectrum use appropriately. The sensor node senses the presence of the explosives in the surrounding environment of the sensor and then periodically transmits the sensed data to the explosive trace detection application through the Next Generation Mobile Network IP Multimedia Subsystem and middle-ware. The application takes sensed data and explosive vapour characteristics as inputs and using context-aware rules, determines whether certain emergency conditions are met. Then it communicates the location and concentration of the detected explosives to the respective service provider, which in turn would inform the law and enforcement agency, Police and the subscribed users. The viability of this architecture was proved by evaluation of its critical factors: heterogeneity, scalability and adaptivity. This research contributes the knowledge to the general public on the use of mobile phones to provide security services within their immediate environment. Secondly, the explosive trace detection service is a technology use case which provides insights pertinent to the application areas such as the development of the next generation network services, development of mobile phones and development of explosive trace detection equipment. Finally, the government and intelligence agencies will gain knowledge from this research significant to security policy development and law enforcement.
- ItemFramework for quality assessment of E-government services delivery in Kenya(2013-11-13) Mbulwa, Christine M.Electronic government, or e-Government, is meant to increase citizens' convenience and accessibility of government services and information as much as government's access to citizens to revolutionize their work, and change rules of doing businesses. Considering faster global growth of the Internet and Information Technology, governments have been prompted to replace their traditional service delivery methods with electronic ones. Quality of the delivered e-Government services/projects is an emerging determinant to the success or failure of e-Governments service delivery to its citizenry. Research into the determinants of assessing quality of the delivered e Government services has become a research imperative since research in this area is still in its infancy and much of the existing research is largely centered on quality of online e-Services. As a result, few attempts have been made to identify parameters that can be used in assessing quality of delivered e-Government services in the back office environment. Using qualitative approach, the research presents a framework for guiding eGovernment service providers in assessing quality of delivered e-Government services provided by the various governmental institutions. The quality framework has been developed based on a comprehensive review of the relevant literature, observations on the targeted group and semi structured interviews conducted on sampled respondents. The developed framework incorporates parameters for assessing all categories of e-Government systems. The developed framework was tested on three e-Government systems to check on its reliability. The evaluation results obtained showed the developed framework being effective in assessing quality of delivered e-Government services and pinpointed areas that required improvement for all the systems gave average results.
- ItemMobile Device Security Implementation Framework(2013-11-13) Wycliff, MumaThe advancement in the mobile industry has alienated mobile devices from their traditional roles of voice call and SMS into areas such data access and storage. The greatest headache to most data owners is thus security of the data in these mobile devices. The small size of these devices though enabling portability makes them more prone to theft or loss when compared to traditional computers. Their greater memory sizes allow these devices to hold much more information than they could originally store. To complicate the already complex situation, the existences of several security controls for mobile devices makes it a tiring task to implement mobile security with majority of organizations using ad-hoc implementations of mobile security. In this regard most organizations use mobile devices without proper security putting their businesses at great risks of data theft, security breaches and reputational damages that come with these risks. The security management of these mobile devices ranks as one of the biggest headaches for IT departments within the corporate world. This research based on a case study of Bank X, presents the concerns in the security of mobile devices and the data they contain. It further identifies the need for security of mobile devices and the available controls to mitigate the security holes they open in an organizations infrastructure. Based on research findings and literature in this area, the research proposes an implementation framework for mobile devices applicable to organizations utilizing mobile devices. The contributions of the hierarchical Framework model of mobile security and the NIST guidelines for cell phone and PDA security are considered in this research to come up with the proposed implementation framework. The results of this research not only assists in increasing the awareness on mobile device security for organizations focused on incorporating the use of mobile devices amongst their employees but also provides a standardized approach to implementation of mobile device security .
- ItemCombating insider threat using behaviour based access control(2013-11-13) Nderitu, Josephine W.Insider threat poses a great risk to financial institutions due to the mere fact that they have privilege and authentic access to corporate and customer data. Insiders are trusted persons, have legitimate access, have knowledge and skills of systems and their loopholes and they operate insider the security parameter. This level of access makes detection and prevention of malicious activities by insiders extremely difficult. The financial services sector is especially affected by insider threat as indicated by the large number of frauds perpetrated by their own employees. Regulatory requirements also require players in this industry to adequately protect customer information by ensuring that it is on a need to know basis. The problem, therefore, becomes how to separate suspicious behaviour from legitimate behaviour. Most mechanisms currently employed enforce more after-the-fact approaches that are too late into the mitigation. Access control mechanisms in use provide a more general allocation of rights to individuals internally giving them more access than they really require. This thesis conducts a descriptive research on the insider threat amongst players in the financial services sector. It looks at the understanding of security practitioners in the industry on insider threats and the mitigation strategies currently in use. User behaviours that can be considered in making access control decisions are then identified and applied in developing an access control framework. The framework utilizes a more fine grained approach to access control to make access control decisions on a real time basis hence reducing the blanket access control rights that allow users to access data they do not necessarily need. This granularity promotes a more dynamic way of access control and ensures that decisions to grant access to certain objects is evaluated at run time using a number well defined rules that apply to the user behaviour. Data used to evaluate the framework shows that a more fine grained approach to access control is successful in better mitigating the insider threat.
- ItemBest Practices in Implementing Core Banking Systems(2013-11-13) Mopel, EdwardMajority of Kenyan Banks are increasingly capitalizing on avant-garde core banking systems (CBS) for automating their transactions in order to compete amongst themselves, cater for ever growing customer needs and to comply with complex regulatory requirements (e.g. Basel II) imposed by the Central bank of Kenya. Core banking systems acquired by Kenyan banks are supplied by foreign vendors at an enormous cost. Therefore, it is vital for the individual banks that they succeed in their Core Banking System (CBS) implementations, to achieve the desired organizational objectives and CBS project outcomes. The purpose of this study was to develop core banking system implementation best practices which could be used by local banks in Kenya to make their Core Banking System projects successful. It uses a case study methodology; National Bank of Kenya (NBK) to provide answers to the research questions. Data was collected by administering questionnaires, conducting interviews and reviewing existing literature on Core Banking System projects. The survey questionnaire was distributed among 100 persons identified as sample population. Out of the 100 respondents only 82 responded, which represented a response rate of 82%. Most of the respondents were of the opinion that replacing the legacy Core Banking System (Bank master) and a number of the surrounding sub-systems with an integrated Universal Core Banking System, was the main CBS renewal driver and project goal to achieve. The study has demonstrated that user resistance to change was identified as the most encountered challenge. Further, an improved level of customer service was identified as the biggest achievement by the Bank. There were five CSFs common to all the three implementation phases. Out of the CSFs related to pre-implementation, setting project objectives and expectations has been identified as the most critical success factor. In relation to the implementation phase, vendor support and commitment has been identified as the key success factor and in relation to the post-implementation phase, excellent issue resolving mechanisms was identified as the key success factor. Based on the identified CSFs, the study develops best practices for implementing CBS projects which could be useful for local banks in their future CBS Projects in order to avoid making critical, but often underrated, mistakes that negatively affect CBS implementation and upgrading, to secure CBS implementation projects as successful and to reduce IT project failure rates.
- ItemTowards a framework for the adoption of information and communication technology by maize farmersSettim, Violet Chepkemoi; Wekesa, CyrusAgriculture is the backbone of the Kenyan economy and directly contributes to Gross Domestic Product of 25%. Maize is the major staple food and majority of Kenyan‟s cultivate it. The future of food security and welfare of the farming population will depend largely on increasing the production of maize. ICT take-up in agriculture in Kenya remains low and the agricultural communities have yet to fully embrace the potential benefits of ICT. The effective use of ICTs by maize farmers can improve their operation and support them to achieve their objectives, for example, access to information and services, social inclusion, cultural provision, education and training. The adoption of ICT among maize farmers needs to be approached in a holistic and sustainable fashion that will support their operation and enhance their productivity. The study set to establish the role of ICT in agricultural processes, factors that influence ICT use and review of various ICT technology models. The research further reviewed studies using the Technology Acceptance Model (TAM) in order to create a modified model and instrument to study the acceptance of ICT technologies by Maize farmers. In this study, we examined the relationships between the TAM constructs in some of the research that purports to explain the variance in the acceptance of different information technologies. Based upon the empirical research using the technology assessment model, a modified TAM was developed for the adoption of ICT‟s by maize farmers. The original constructs (belief, behaviour, attitude and use) were retained from TAM while the literature suggests subjective norms, government support, ICT vendors‟ support, and perceived socio economic factors to be useful antecedents for predicting perceived usefulness, perceived ease of use and behavioural intent to use. Hypotheses were discussed in this study related to the theoretical relationships between constructs and antecedents. A survey instrument was developed using existing scales from prior TAM instruments and modified them where appropriate. The resultant instrument can be used in future to test how farmers adopt and accept ICT‟s technologies. The study showed also that all the constructs of TAM had a positive correlation on ICT use and the external variables of ICT vendor support, Subjective Norms and perceived socio-economic support. Government support reported a relatively low correlation to ICT use.
- ItemMitigating information security vulnerabilities in public institutions : case study of teachers service commission (TSC)Kimwemwe, Emma Ngute; Sevilla, JosephWhile Information security is a major concern in the private sector, many public institutions have not given it equal attention. However, the Government has taken keen measures on embracing ICT, but the concentration has been on the productivity and efficiency leaving the systems vulnerable to various attacks. This research was intended to find out information security vulnerabilities in public institutions that are likely to be exploited to cause harm to Information systems. The security controls existing were evaluated to find out their efficiency, effectiveness and applicability. Different types of information security risks were researched with an aim of classifying them to risk levels accordingly. The study sought to find out how information systems are monitored in Teachers Service Commission (TSC) as a case study of public institutions. The research documented information systems, threats and associated risks with a view of proposing interventions to minimize impacts of risks. The research was done using action research to study the system and concurrently to collaborate with members of the system who helped come up with the framework. It focused on observation and structured interviews in gathering information about the present existing condition. Secondary data was also gathered from TSC in the form of documentation analysis and from literature review. The study presents a framework for mitigating information systems security in public organizations which describes the steps to manage systems vulnerabilities as part of dealing with information systems risks. The framework includes system identification to provide an overview and basic understanding of the system and its interconnections. Additionally, the framework includes scanning system threats and vulnerabilities, and the resulting risks levels and the management of the vulnerabilties which contains recommended safeguards to reduce the system’s risk exposure to an acceptable risk level once the recommended safeguards are implemented. Monitoring and of review of vulnerabilities should be carried out to evaluate the information systems in response to new vulnerabilities and technologies. While the study appreciates that no system can be made absolutely secure, the results led the researcher to conclude that defining information systems enables organizations to implement proper security measures on them. Mitigating system vulnerabilities helps organizations to decrease possible damage and loss due to Information Systems security attacks.This framework is therefore recommended for use in public institutions for safeguarding information systems.
- ItemAdoption of ICT innovations for reduced TCO and overall capital expenditureAdongo, Mark; Ateya, Ismail LukanduCompared to other industries, the pace of evolution in the field of Information Technology (IT) has been on an ever increasing upward trend for the last decade or more. This evolution can and has been witnessed both in the realms of hardware and software development, the advancements,bringing with them both positive benefits and negative effects. The benefits, in many instances do outweigh the negative effects particularly with regard to acquisition and operating cost, efficiency, effectiveness, resulting impact on end user processes and products, the list is endless. Surprisingly enough, the rate of adoption of these positive ICT innovations in the workplace and business workplace environment has not matched the rate at which the ICT industry has been churning the advancements. Much as the revolution has made it possible to deploy IT solutions at a lower cost, reducing by more than half each year for the same functionalities, statistics collected indicate that industry adoption has not matched the rate of innovation. This research sought to establish the factors that influence the adoption of ICT innovations; and hence propose a framework that can assist organizations match the rate of this evolution with an overall aim or reducing operational costs.A survey that was conducted across five local financial institutions indicated that most respondents felt and did concur with the fact that adoption of ICT innovations did indeed result into reduced total cost of ownership of IT. Results of the study also pointed to the factors that promote the adoption of ICT innovations in the financial institutions and from that, a framework for the adoption of ICT innovations was developed and validated.The framework, if applied in the manner proposed, would go a long way in assisting organizations continuously identify opportunities for reducing overall IT expenditure by embracing industry advancements in ICT that bring along these advantages.
- ItemImplementation of an information technology risk management framework : the case of Kenya Revenue AuthoritySylvia Akeyo OmoloOrganizations are becoming more aware of the importance of IT risk management and its corresponding due diligence requirements.Optimizing risk to information is a core function of most ICT departments, both to protect the enterprise as well as to satisfy government and industry mandates.IT risk management is the discipline that on assessing, mitigating, monitoring and optimizing risks to information communication and related technologies. An abundance of IT risk management approaches exist that can assist organizations in determining and controlling IT risks. However, gaps have been uncovered in existing IT risk management methodologies. This thesis aim to implement an IT risk management framework that best suits KRA's current operating environment.To achieve the objectives of this research, a descriptive research design was employed. The research began with analysis of available IT risk management framework so as to glean the strengths and weaknesses of each.The risks that KRA's IT infrastructure assets were exposed to and the current state of IT risk management activities at KRA were then established. The research culminated in the development and validation of an IT risk management framework to address these IT risk management needs of the Kenya Revenue Authority.The proposed model was envisaged to lead to a better alignment of IT risk management activities with business objectives and Enterprise-Wide risk management activities.
- ItemThe Strategic value of business intelligence systems : a case study of GSM companies in KenyaNjuru, Julius; Acosta (Dr.), FreddieThis research is intended to establish why companies especially in Telcom sector have low adoption rates of business intelligence tools already implemented. Telcom industry anywhere in the world is highly dynamic and super competitive. Implementation of suitable business intelligence and performance management tools can potentially tilt companies' competitive edge over competitors. However this seems not to be the case as adoption of business intelligence is still very poor. This research has unearthed various barriers to adoption to business intelligence(BI) and PM(performance management) in GSM companies in Kenya. These barriers are either operational, people and to small extent systems issues. The choice of GSM companies in Kenya was advised by the facts such as , (i) Some of GSM companies have already implemented BI systems, (ii) heterogeneity of various business applications used these companies, (iii) volumes of data generated by numerous processes, (iv) need for predictive analytics by GSM companies to predict trends in the industry and, (v) lack of or insufficient frameworks to fully help adoption BI systems hence increasing strategic value of BI projects. The research revealed an interesting observation that although many managers knew of existence of BI systems at their companies they did not know of its objectives. Also many managers used very few functionalities of BI (business intelligence) system. This clearly inhibits adoption of BI (business intelligence) and due to this it is very hard to establish strategic value of BI (business intelligence). Although management staff believe the BI(business intelligence) can help in increased profit growth, they never attributed growth of their organization to BI (business intelligence). In this consideration of the outcome, organizations need to balance between the effort of BI (business intelligence) implementation process and stimulating use and adoption of the same. To realize fully strategic value of BI(business intelligence) organization need to invest both during acquisition phase and adoption phase at almost equal measure.
- ItemA model for estimating network infrastructure costs : a case for all-fibre LAN networksMaina, Anthony Mbuki; Ateya, Ismail LukanduThe 21st century is an era that has been characterised by phenomenal growth in data rates at the local area network (intranet), extranet and the Internet.This trend has been pushed by the widespread deployment in organisations of “bandwidth-hungry” applications such as VoIP, security surveillance systems, video conferencing and streaming of multimedia content. Due to demand placed on network resources by these applications and services,physical layer cabling solutions have had to evolve to support faster, improved LAN technologies such as Gigabit Ethernet.Although new network architectures (such as Centralised Fibre networks) address current and long term demands of the modern networking environment, concerns have been raised about its cost viability. The key problem identified in this study was an inadequacy of suitable tools that aid decision making when estimating the cost of a network infrastructure project. Factors of importance in this regard were collected in a survey and used in development of a cost model. The model is aimed at being a tool to assist network planners in estimating LAN infrastructure costs. A network was designed based on two architectures – centralised fibre (allfibrenetwork) and hierarchical star (UTP for horizontal cabling and optical fibre for backbone cabling). Thereafter, cost of implementing these two architectures was calculated using the model. Based on the results computed from the cost model, the all-fibre network (centralised fibre architecture) was found to be more cost effective compared to the hierarchical star network
- ItemA Fraud investigative and detective framework in the motor insurance industry: a Kenyan perspectiveKisaka, George Ngosiah; Onyango-Otieno., VitalisInsurance fraud is a serious and growing problem, with fraudsters’ always perfecting their schemes to avoid detection by the basic approaches. This has caused a rise in fraudulent claims that get paid and increased loss ratios for insurance firms thereby diminishing profitability and threatening their very existence. There is widespread recognition that traditional approaches to tackling fraud are inadequate. Studies of insurance fraud have typically focused upon identifying characteristics of fraudulent claims and putting in place different measures to capture them. This thesis proposes an integrated framework to curtail insurance fraud in the Kenyan insurance industry. The research studied existing fraud detection and investigation expertise in depth. The research methodology identified two available theoretical frameworks, the Bayesian Inference Approach and the Mass Detection Tool (MDT). These were compared to comprehensive motor insurance claims fraud management with respect to the insurance industry in Kenya. The findings show that insurance claims’ fraud is indeed prevalent in the Kenyan industry. Sixty five percent of claims processing professionals deem the motor segment as one of the most fraud prone yet a paltry 15 percent of them use technology for fraud detection. This is despite the fact that significant strides have been made in developing systems for fraud detection. These findings were used to determine and propose an integrated ensemble motor insurance fraud detection framework for the Kenyan insurance industry. The proposed framework built up on the mass detection tool (MDT) and provides a solution for preventing, detecting and managing claims fraud in the motor insurance line of business within the Kenyan insurance industry.
- ItemIntegrating multimedia content with learning management systems : a case of Strathmore UniversityMuriithi, Henry MuchiriIn Kenya more and more institutions of higher learning and organizations are deploying eLearning management systems in a bid to tap into their associative benefits. However,these institutions are still not reaping the full benefits of these management systems. The attainment of these full benefits greatly relies upon the usability and the interactivity of the content provided.Research shows that a majority of learning management system users do not find existing content interactive enough since only text media is used. Multimedia content which incorporates different modes of delivery including text, videos, animations and sound enriches the learning experiences of students by catering for their varying instructional preferences. The research had its main objective as finding authoring technology that could be used to design multimedia content that addresses the mitigating factors against multimedia adoption in institutions of higher learning in Kenya. To achieve this objective, the research analyzed multimedia authoring systems deployed in several institutions of higher learning. Other objectives were to identify mitigating factors against multimedia adoption in institutions of higher learning in Kenya, to determine learning style preference distribution among undergraduate students and to test the integration of this technology with existing eLearning platforms.An exploratory research design was used in this study and in particular a cross sectional study was conducted.BB flash back authoring tool; a screen casting software was found to be most suitable to use for institutions of higher learning in Kenya. This is because of the numerous strengths that it poses such as; Multimedia files produced are relatively small and are viewable on most web browsers and platforms and the fact that screen recordings can be integrated with learning management systems.
- ItemFramework for adopting green IT in KenyaKirimi, Onesmus Mburugu; Ateya, Ismail LukanduGreen IT, also known as green computing, is an umbrella term referring to environmentally sound information technologies and systems, applications, and practices. It refers to supporting business critical computing needs with least possible amount of power or sustainable computing. In Kenya, IT operations have a significant impact on the environment, and organizations have an obligation of minimizing the negatives environmental impact of their IT operations. However, Green IT adoption requires a holistic approach in order to benefit from Green IT initiatives and practices that are increasingly becoming a focus even to government regulators in the developing countries following the signage of the Kyoto protocol in 1997. Organizations lack the understanding of having a holistic and sustainable approach in providing their services while at the same time, being environmentally friendly as they execute their business processes and strategies. This has lead them to having a more keen interest on their bottom lines while forsaking their environmental obligations in a bid to build a sustainable future by embracing green computing initiatives in the core of their business models and strategies. This research gives a perspective to this crucial need and endeavor to provide a localized framework with relation to other frameworks done across the spectrum with similar objectives in a bid to guide organizations towards a greener sustainable future. It has been established evidently from the research that policy factors, attitude and top management support have significant impact on adoption of Green IT within organizations. Moreover, it is indisputable that technology infrastructure can facilitate Green IT initiatives, but it should not be seen as an absolute answer to Green IT adoption, since it is just a tool that drives the initiative. Hence all the critical factors discussed in the validated framework in the research are interdependent and determines the adoption of Green IT initiatives in organizations. In conclusion, it is clear that all IT service providers in the region have a moral and environmental obligation to adopt new innovative Green IT approaches to stimulate the industry to not only become contributors to emission of green house gasses, but to also lead in providing localized solutions that can have impact in a achieving a sustainable environmental future.
- ItemFactors affecting last-mile internet connectivity in KenyaKarugu, JosephThere is a connectivity gap that exists between the backbone network and the last-mile access network in Kenya. This study sought to establish factors that are considered when choosing a last-mile solution; identify various types of internet last mile connectivity in Kenya; and to develop a conceptual model for selecting an internet “last mile” solution. This study used an exploratory descriptive approach. Primary and secondary data was collected from CCK, ISPs (16) and end users (24). The four factors cited as considerations for last mile connectivity included infrastructure, cost, breadth and depth, rules and regulations. These factors affect all the stakeholders. The various types of internet last mile connectivity in Kenya include the traditional LAN, analog modems, ISDN, DSL, fiber optics, Wireless networks, light waves, radio waves and satellite communication. A conceptual model for selecting an internet “last mile” solution should focus on the four important factors considered by all stakeholders namely infrastructure, cost, breadth and depth, as well as rules and regulations. A conceptual framework was developed out of the reviewed frameworks to guide the study. The framework incorporates three stakeholders of last mile connectivity namely the regulator, end users, and internet providers. This framework is different from others in that it has considered key stakeholders in the ICT sector in Kenya. This study recommends that the regulator (CCK) should encourage use of a variety of last mile solutions such as mobile phones through friendly rules and regulations. The regulator should also facilitate infrastructural development to enhance internet service providers’ operating environment. Internet providers should be innovative and add value to a variety of last mile solutions so that they can be attractive to the customers. ISPs should also provide cost friendly last mile solutions to Kenyan market. The end users should also consider other factors when choosing last mile solutions and not just cost.
- ItemA Model to measure information security awareness level in an organization : case study of Kenya commercial bank.Mugo, Eric Anderson Kabugu; Wekesa, CyrusInformation Security awareness forms a key basic part of Information Security Strategy within most organizations. Organizations that tend to be more conscious regarding Information Security will invest more than organizations that are less conscious. This can be seen in Financial and Telecommunications industry as compared to Agricultural industries. Information Security awareness is an investment that organizations make to ensure that the human aspect of Information Security is taken care of. Majority of organizations that invest in Information Security awareness do not measure the levels of awareness among their staff to identify the impact of their investment. Measurement of Information Security results in value add such as positive change in staff attitudes towards Information Security, respective increase in Information Security knowledge and a more secure organization. The value add comes with other added benefits such as reduced Information Security incidents and frauds, a more knowledgeable staff and an Information Security team with visibility into the general organizations predisposition to Information Security challenges as well as general awareness. This study aims at expounding on the various techniques used to impart awareness. The study aims at proposing a model that can be used to measure Information Security awareness levels in a Local financial institution. Achievement of specific objectives of the research was done through qualitative technique. Collection of data required is done from local Members of Information Security Profession who possess the required data in the area of Information Security. Following analysis of responses from the local Information Security professionals, the model developed was based on the Kruger and Kearney Model awareness measurement model with specific modifications to suit the local financial institutions' requirements. The models' modifications were based on a local banking institution for purposes of testing and validating the mode!. The modifications are as a result of the findings from the survey.