Browsing MSIT Theses and Dissertations (2015) by Title
Now showing 1 - 16 of 16
Results Per Page
- ItemApplication of social network analysis to study customer habits: case of Bistros(Strathmore University, 2015) Tarus, Martin KipropThis research investigates the benefits of studying customer behaviours in a bar setting to enable the business determine relevant designs when conducting a promotion which entails determining the ideal combination of categories which yields the best revenue. The combination categories can be identified through using the number of people consuming that particular category and another shared category which should gather a lot of people meaning that there would be more sales when the categories are put on a promotion. For this to happen the research has to identify relationships in the customer habits or drinking preferences with an aim or deriving usable values to be used in identifying the commonly consumed category which will in turn help in identifying the combinations. In order to study customer behaviours, the research should be able to adopt or identify tools that can be used in summarizing gathered data through usable variables required for the study and thereafter use the variables study items considered when processing for information. The study items will have to go through an algorithm which creates profiles or different groupings which make sense when the information is translated by the business directors. In this case the study will adopt concepts and ideas from illustrations and theories on how Social Network Analysis (SNA) can be used to enable bar business experience Business Intelligence (BI) through studying human behaviour with an aim of creating more opportunities for them to reap more benefits by using the data previously thought to be of no use by the business.
- ItemData centric decision making healthcare prototype(Strathmore University, 2015) Wanjugu, Sammy WamaeKenya is classified as one of the fastest growing countries in Africa. With this growth there has been increase in the application of Information and Communication Technology (ICT) in the major ministries in the government which includes the Ministry of Health. This has been in the areas of electronic medical records, technologies that assist in imaging such as MRI scans, immunizations, and appointments, among others. The Ministry of Health in Kenya uses many applications to capture data in the health facilities, which include IQCARRE and FUNSOFT. However, the reporting system used is DHIS which runs parallel to these systems hence forcing the health workers to re-enter the data for transmission to decision makers at Afya House. This causes redundancies in data entry, and increases reporting time which in turn delays necessary action by the key decision makers. A case study methodology was used to assess the decision making process in the Ministry of Health and also the activities involved in electronic data collection in Mbagathi and Kenyatta National Hospital. This was done through structured questionnaires. The results of the data analysis indicated that there was a disconnect between the data capture and reporting due to the use of different systems. The results also indicated that there was a need for a data mining based decision making system that could read the data in the data capture systems and transmit it to the decision makers. The prototype was developed and tested by both the health workers and the decision makers. From testing and responses from the health workers and decision makers, the prototype helped to standardize the reporting system and increased reporting time. The researcher recommended that the prototype be improved to cover all areas at the scope only covered patient and disease data.
- ItemFramework for an open e-learning system to enhance collaboration between students a case of universities in Kenya(Strathmore University, 2015) Mathenge, Eric N.There has been an increase in the use of Learning Management systems by institutions of higher learning worldwide. Various E-Learning systems are currently being utilized by various universities from commercial Learning Management systems such as Blackboard to open source developed systems such as Moodle Platform. Despite the various benefits that institutions obtain from implementing Learning Management Systems such as increased student participation, prompt feedback, easy access to content etc. their adoption in universities in Kenya is quite low. Challenges faced by these institutions include high cost, slow uptake by students as well as lecturers, slow development in terms of infrastructure and weak collaboration mechanisms. Furthermore, currently there the use of a platform that allows for collaborative learning between the various universities in Kenya via the E-Learning platform is not widely implemented and is still in its infancy. In developed countries in Europe and the Americas, various collaboration mechanisms via E-learning exist allowing students across various universities to access educational content stored in a different university’s learning management system portal. For example, Massachusetts Institute of Technology “Coursera” platform facilitates educational collaboration. This research proposes a framework that allows for collaboration between the various E-Learning platforms used by universities in Kenya. This raises several important issues that concern virtual group formation techniques, group regulation and role-playing by students. Other important aspects are related to the pedagogical side and include setting project development phases, assessment, tutor role, student tracking, and the tutor’s understanding and awareness of the social and cognitive processes. The framework proposes the amalgamation of student accounts using an Active Directory system to enable students to access a particular university’s extranet portal thus allowing students to access educational content of another university. Thus one student account can access various universities extranets hence enhancing educational experience for the student. Students’ views regarding the current E-learning platform they currently use and the perceptions envisaged in the implementation of an Open E-Learning platforms were captured using questionnaires which aimed to capture which facets of E-Learning would augment its use in addition to traditional face to face classroom learning. The questionnaire captured responses pertaining to system performance, system functionality, system response and system interactivity of an E-Learning system.
- ItemA framework for implementation of e-health in Kenya public hospitals(Strathmore University, 2015) Middii Edwin OdhiamboE-health has fundamentally shifted the way patients’ information is accessed and shared across health system. This advancement has greatly improved healthcare which is associated with the mission critical services that are connected with the well being of life, by providing comprehensive, reliable, accessible and timely patient information for evidence based decision to the healthcare providers. However, there are still a problem of gaps and weaknesses in the existing e-health frameworks. The main purpose of the research was to explore on ways in which e-health can be successfully be implemented. The research adopted qualitative and quantitative research methodology to investigate and come up with a framework for the implementation of e-health in public hospitals. The research instruments used were survey questionnaires, interviews. The research identifies the benefits of implementing e-health as; Enhanced health services availability and access, Improved health quality, safety and outcomes, Increased service efficiency, productivity and cost effectiveness, Improved teaching methods facilitated by e-learning system, Knowledge sharing by practitioners, Improved decision making and Reduced healthcare cost. The challenges encountered in E-health implementation are; E-health standards, ICT capacity, Elegislation, e-health infrastructure, Security and privacy issues and technical organization. The research found out that there are various areas and components that should be considered in order to successfully implement and scale up e-health uptake in the public hospitals. The areas and components include; Education/awareness, infrastructure, stakeholders, form of ehealth to be implemented, challenges in e-health implementation and uses of e-health. These findings were used to build a framework for implementation of e-health in Kenya public hospital. The framework is composed of the mentioned components and areas. The research therefore, will enhance the quick implementation and uptake of e-health in public hospitals.
- ItemA framework to achieve seamless data interchange of electronic air-waybill in e-freight systems : Case of Kenya air freight sector(Strathmore University, 2015) Koima, Norah Edigar J.The study creates a standard framework on what is required to ensure electronic air waybill data transmitted from one system to the other and be able to update all the available e-freight systems. The study does not cover the impact of the integration or development of the integration systems but provides the Framework which can be used later in the development of the system. A major challenge in the air freight sector is seamless data interchange between the e-freight systems. This challenge arises mainly because e-freight system has different message formats, use different protocols and varies in document’s information. The main objective of this research is to develop a framework that will guide the developer in e-freight system development which ensures seamless data interchange. A mixed research design approach was used which is a combination of qualitative and quantitative approach .To achieve the aim of the study a variety or research instruments were used namely; questioners, interviews and literature review. It was established that different e-freight system have major difference in terms of the message format transmitted, the protocols used and the way they have been implemented where others are web based, ERP’s and some are in house developed systems. The framework proposed has the following components: system legal requirements, system a converter including message format converter and protocol converters in case the two systems are incompatible. The framework was validated via stakeholder’s interviews and the researcher concluded that the best method of approach is to consider the IATA requirements as well as the researcher proposed framework.
- ItemA framework to enhance data quality in the banking sector in Kenya : case study of two banks in Kenya(Strathmore University, 2015) Njau, Robinson GakuoThis thesis explores data quality in the financial sector in Kenya and explores a structured method of improving data quality. The thesis gathers the statistics on the quality of data in the banking sector in Kenya and establishes the main causes of data inconsistencies. In addition, it designs a framework that will be used in the banking sector in Kenya to improve the quality of the existing data. Better quality data is important will allow banks to make better business decisions that will influence their growth positively. In developing this framework, the research looked at the different existing data quality enhancement frameworks and data quality practices in two banks in Kenya in order to create a tailored framework for the banking sector in Kenya. Lastly, the research validated the framework through the use of a focus group and Eppler and Wittig Criteria.
- ItemMobile based expert application for the early detection of diabetes in Kenya(Strathmore University, 2015) Kibui, JohnCases of type 2 diabetes have been on the increase in the last ten years and this has caused many deaths and untold suffering to victims of the disease. One of the main challenges in combating the disease is in the education of the population on the causes and risk factors associated with diabetes including lifestyle habits and how to keep the disease at bay. Early detection of the disease has also been a key necessity in order to tackle the disease and its prevalence with a vision to slowing down the spread of the disease. Consequently, the aim of this study is to come up with an early detection diabetes model. This shall be basis the various risks factors that are associated with the disease and be able to provide advice to the patient depending on an individual’s detected symptoms. The model shall be useful in the insurance sector to provide a guide at determining insurance medical premiums basis an individual exhibiting signs of early diabetes. Depending on the stage of the disease, this information shall be used by health insurance companies to determine one’s insurance premiums. Hence, this solution shall be used to assist insurance companies on how to structure their health schemes for their clients. Ideally, the solution shall work by receiving user input parameters pertaining to their health such as but not limited to their weight, height and lifestyle. These factors are compiled and depending on the input, the output generated gives an indication as to whether one is in the early stages of type 2 diabetes.
- ItemA mobile biometric based patient identification model for medical insurance services access(Strathmore University, 2015) Kihiko, AugustineMedical insurance fraud has increasingly been on the rise in Kenya. This has thwarted the efforts of the insurance companies to curb the rising fraud cases. A great challenge is insured patient identification who are under individual or corporate medical insurance cover. Currently, the healthcare industry uses photo cards to identify an insured patient. This is vulnerable to fraud, for example, through impersonation whereby an insured patient gives a non-insured patient their medical photo-card so as to fraudulently obtain medical services at various service points within a health facility. Lack of unequivocal identification of insured patients is a major contributing factor to the rising cases of medical insurance fraud. We therefore need an appropriate method to correctly identify the insured patients. In this study, we propose a biometric based solution and develop an appropriate insured patient identification system using biometric fingerprint technology to curb the challenges encountered in identification of insured patients. To achieve this biometric fingerprint identification, the insured patient fingerprints are scanned during the registration exercise and stored on an online database. Subsequent identification is achieved by obtaining a match between the registered fingerprint and the stored fingerprint and associating it with the insured patient records. Lastly, the application is then tested and the findings used to check for its appropriateness.
- ItemA model to enhance information security in the use of BYOD in Kenyan enterprises(Strathmore University, 2015) Ndwiga, AndrewIn recent years there has been drastic increase in the adoption of mobile devices for computing use. This increase has been attributed mainly to the falling mobile devices prices that make these mobile devices within easy reach of the common man. Mobile technology is now redefining the boundaries between work life and personal life. Consequently enterprise owners, employers and managers are increasingly allowing employees to use their private devices to carry out work-related tasks and access internal company resources. This increasingly popular change that is sweeping across workplaces is referred to as Bring Your Own Device (BYOD). The adoption of BYOD has raised concerns which organizations have to address. The main challenge of adopting the BYOD concept is ensuring information security. Lack of information security costs enterprises millions every year. Several security models and technical infrastructures are already in place but have had limited success in exhaustively dealing with security risks and threats. This research involves a study of the different information security risks and threats and how they are currently being dealt with. It also looks at the different BYOD adoption and security models and proposes a hybrid model that attempts to fill gaps left out by previous models. A survey was carried out to find out the existing security models in place in 61 Kenyan enterprises to better realize what gaps need to be filled. Findings of the survey show that enterprises face a number of challenges with security of the mobile devices and the information and applications they access and carry being at the top of the list. The results also show that when it comes to implementing technical counter-measures, most organizations had implemented the traditional firewall to a large extent though the primary focus of a firewall is not in securing mobile devices but in securing server farms and system perimeters. Non-technical counter-measures such as user awareness or training and mobile device security policy had been implemented to a small extent. Most of the measures in place are not specific to mobile phone use at the work place and are therefore not effective in dealing with security issues related to the adoption of BYOD.
- ItemA Prototype for secure key management(Strathmore University, 2015) Omondi, FredrickKey Management refers to the cycle of maintaining key exchange from the moment of initialization to retirement. It has proved to be a major concern for parties concerned where these keys have landed in the wrong hands through hacking and other means. The weaknesses have been perpetrated by taking advantage of weaknesses in the design of algorithms intended to manage these security keys. The problem thus exists in the secure storage and distribution of keys. The population on the case study area is Strathmore University from which the sample data is also collected for usability testing. The prototype can however work in any institutional setup where security is a highly valued concept. This research carries out an analysis of past works done on key management protocol and coming up with a solution that addressed some security vulnerabilities in these models. It combines aspects of all the architectures in an attempt to develop a unique solution that captures the strongest points from them. The proposal will design an algorithm that if implemented in code will be able to offer a more robust solution to secure key management problems. Tools used to develop the prototype are basic content management system, Joomla 3.3.6, MySql workbench for the database design and draw.io for the software modeling diagrams. These are all Open source tools and will suffice for the proof of concept being developed. The usability tests would be carried out amongst the sample users in the case study with a view of assessing their level of appreciation of the proposed solution; whether they would find it useful and collect any positive recommendations for improvement. There are many application areas that this prototype could be deployed. Other than learning institutions such as the case study area, other institutions like banks and insurance companies can still benefit from it. Modifications would however be necessary to cater for their peculiar needs.
- ItemPrototype for the authentication of university certificates : case of Strathmore University(Strathmore University, 2015) Gituma, Kamanda Ian CharlesFraudulent activities especially around enrolment when applying for jobs and other opportunities has become quite prevalent today. This enrolment fraud has had the effect of giving some individuals an unfair advantage when applying for these positions. The danger of this is that it has a tendency to affect others in a negative way. The institutions whose names are misused lose credibility in the eyes of the public. Moreover, fraud within sensitive professions like medicine could potentially put the general public at risk of harm. Institutions of higher learning therefore have a responsibility to protect themselves and their students, and thus by extension protect the general public indirectly from harm. The way they can do this is by adopting systems that allow them to more effectively authenticate the certificates that they issue to their students, so that employers know who is and isn’t valid. This research therefore seeks to examine the prevalence of enrolment fraud and how it affects prospective employers, institutions of higher education (like universities and colleges) and the general public. It looks at enrolment fraud in its most common forms. The research also aims to provide an overview of some of the most common approaches to dealing with enrolment fraud all over the world, and shows the strengths and weaknesses of these approaches. The technologies used to tackle fraud will also be explained, as well as how they can be combined in different ways to better secure documents used in institutions of higher education. The end result of this research will be a prototype which if implemented within institutions of higher learning, will allow them to better authenticate the certificates and information that they issue. This should provide prospective employers, recruiters and other educational institutions a valid service which they can use to verify the authenticity of documents which they receive during the enrolment process.
- ItemA prototype for threat detection on big data using behavioural analytics for government ministries(Strathmore University, 2015) Wambui, Macharia TerryWhile no one would dispute the capability of big data to enlighten enterprise operations, the present methods of mining and managing big data are still evolving and are posing serious security and privacy challenges. Currently the greatest challenge for most Information Technology security practioners is that they’re unable to detect unknown insider threats on company valuable data in real time. This research sought to identify the different types of data as well as insider threats associated with the different types of data. Further for detection of insider threat to be successful there is need to separate legitimate behaviour from malicious behaviour with the use of behavioural analytics and machine learning. The research further sought to review the different approaches to network anomaly detection and build on their shortcomings. The shortcomings/loopholes formed the basis for the design of the prototype. From the results of the online survey carried out among security administrators it was determined that non-technical users were the likely offenders and hence caused the greatest risk to company’s valuable data. Further technical approaches were found to be the most effective techniques in mitigating insider threats. Detection of insider threat can’t be achieved with only one technique; a combination of techniques should be put into perspective if insider threat has to be successfully mitigated. Sound organizational procedures as well as policies that include controls are crucial to support the implementation of a tool that will detect insider threats in real time.
- ItemSmart phone based mushroom farming monitoring model(Strathmore University, 2015) Rukunga, Evans MuneneAgriculture being a key indicator of Kenya‟s economy in the past and recent makes it a searing focus point for farmers who are focusing on starting or growing their agricultural ventures in the country. Notably, a majority of Kenya‟s arable land has been dedicated to agriculture given the good tropical weather favoring the agricultural sector. More specifically, mushroom farming which is a type of horticultural farming, is gaining sound ground in Kenya. However, a problem arises herein because most farmers venture into mushroom farming with little knowledge from experts mainly because information on mushroom farming has not been well consolidated for utilization by the farmers throughout all the phases in mushroom farming. Consequently, this makes it difficult for the mushroom farmers to make reference to correct literature during the mushroom farming process. The solution to this matter, that is, to effectively optimize mushroom farming, the farmers need an efficient monitoring tool to guide them on monitoring of the mushroom growth. The approach taken to achieve this was to come up with a mushroom farming monitoring tool. The monitoring happens from the planning phase to the harvesting phase. Consequently, this study proposed a mobile, to be used by the mushroom farmers for monitoring of mushroom cultivation all the way from planning to harvest of mushrooms. A mushroom monitoring model was developed, enabling farmers to track the growth of the mushrooms from planting to harvesting. Through this, the farmers are able to know when the time nears and/or reaches for a particular phase in the mushroom growing process. The model was tested on the mobile platform on phones which run on the Android Operating System, with an aim of confirming whether or not the user requirements for the proposed mushroom monitoring model were met.
- ItemA study on the influence of Information Communication Technology (ICT) adoption on bank fraud in Kenya(Strathmore University, 2015) Ngava, Angela MwikaliFraud can be seen as the deliberate distortion, dissimulation, or exclusion of the facts for the sole purpose of financial disadvantage of an individual or an organization which also includes embezzlement, theft or any attempt to steal or unlawfully obtain, misuse or harm the asset of the bank. It is a big challenge in today's businesses. Frauds in Kenyan banks only prove that financial freedom aggravates the inherent tendency of shallow markets to foster excessive speculation and worsens the systematic consequence of such unsubstantiated activity. Revelations of electronic fraud, evidence of insider trading and consequent collapse of investor interest have led to an almost unstoppable downturn in Kenyan banks. Bank frauds concern all citizens. It has become a big business today for fraudsters. This study seeks to investigate the effects of ICT adoption skills in relation to the increase of bank fraud in Kenya. The target population was the senior staffs in the five big commercial banks in Kenya, working at the headquarters in Nairobi. The research focuses on the top and middle level management staff who are directly dealing with the day to day management of the institution. The study also proposes a hybrid model to scale down the impact of this type of fraud by using a strategic fraud detection model which combines both deductive reasoning and technology to provide a more effective way to detect fraud. The second model is the IT Risk Assessment Model. This uses a comprehensive IT risk assessment process to evaluate the use of technology to identify appropriate compensating controls, while the IT audit evaluates the compliance and adequacy of these controls. The model has been tested through a panel of thirty experts within the banking sector. The results of the testing were positive.
- ItemA supply chain management prototype for milk in Kenya : case of Gakindu Dairy in Nyeri County(Strathmore University, 2015) Kiplang’at, Mursi JaphethThe Kenyan Dairy market is categorized into two; Cold chain/Formal market-Milk delivered to milk processors for processing and warm chain/Informal market - milk sold and used in unprocessed form/Raw milk. Recent studies indicate that 25% of milk marketed is sold through the formal (processed) channels. The balance 75% is sold in raw form (warm channel) or consumed on-farm. Unprocessed milk raises concerns, primarily due to low and unsafe standards of hygiene. The purpose of the study was to examine the existing supply chain management in Kenya’s Dairy industry using Gakindu dairy as a case study. Purposive sampling used to select a sample 30 respondents and data was collected using semi-structured questionnaires. The study focused on farmers in Nyeri County supplying milk to Gakindu dairy as one of the formal processors. The results showed that 57% of the respondents sold their milk through the informal chain mainly because it offered higher prices than the formal chain. The study proposed a milk supply management prototype that offers a comprehensive system of price negotiation, contracting and value chain support to the producer thus eliminating intermediaries in milk supply chain and improves the formal chain through more contracts between farmers and the processors. The findings led to recommendations on ways of formalizing the informal market, the benefits that result thereof and a supply chain management prototype being one of the strategies of increasing milk supply to formal market.
- ItemTalent management system for financial institutions in Kenya(Strathmore University, 2015) Michael, Kinuthia AntonyThis research aims to provide a solution to the question of talent management for financial institutions in Kenya. The absence of talent management systems has led to financial institutions experiencing retention problems as well as difficulties in succession planning. Applied research was adopted and data was collected through secondary sources such as literature and an interview with managers in the financial sector. Considering the presence of the millennial generation in today's workplace, the solution was based on how to reach them in the environment they are usually found in and applying best practice techniques on rewarding and retaining them. In conclusion, there is a need for the financial institutions to strategize and look into new ways of how to efficiently tap into the talent amongst the millennial generation and establish a sustainable talent pipeline in order to remain competitive in the long run.