MSIT Theses and Dissertations (2008)
Permanent URI for this collection
Browse
Browsing MSIT Theses and Dissertations (2008) by Title
Now showing 1 - 12 of 12
Results Per Page
Sort Options
- ItemA Framework for evaluating ICT use in teacher educ...Oredo, John OtienoTeachers are under increasing pressure to use Information and Communication Technology to impart to students the knowledge, skills and attitudes they need to survive in the 21st Century. The teaching profession needs to migrate from a teacher centered lecture based instruction, to a student-centered interactive learning environment. To attain this aspiration, an ICT enabled teacher education is fundamental. Towards this end, international and national authorities have been spending huge amounts of money to facilitate the implementation of ICT teacher education. This work attempts to evaluate the ueage of the available ICT facilities in Kenyan Public primary teacher colleges focusing ion the quantity of computer use,and the levels attained in terms of using ICT's support.
- ItemA GIS decision based model for determining the best path for connection to a power distribution network a case study of Kenya power and lighting company limitedKinuthia, Augustine Muturi; Kimani, StephenThe purpose of this study is to present a GIS based decision model for determining the best path for connection to a power distribution network. The model was derived from studies that consider the design of the power distribution system and the GIS field of network analysis along with the method used by KPLC for connecting premises to the distribution network. A digital map of the study area and the distribution network was generated and taking into account the distributors and distribution transformers the best path between the premises and the transformer was derived. In this study it is demonstrated that the distributors’ length and size and the distribution transformers’ capacity, load and location influence the connection of premises to the distribution network. The results also show that combining geospatial methods with the power distribution network enables engineers to visualize the spatial distribution of data in maps which yields better insight into the nature of the power distribution network.
- ItemA Software upgrades investment model : a case of Windows operating system in KenyaKimutai, Shadrack MettoThe revolution of software has introduced new actors and market mechanisms. Effective software management is crucial for development and survival of any company. IT upgrades investment in a crucial part in software management. The investments are usually costly and risky. Firms tend to treat such costs as operating expenses within the period incurred. Waiting too long may lead to lost competence, relevance and may prohibit a business from taking advantage of better vendor technologies in future, more so putting the company at risk by increasing the gap with the suitable business technology and business leadership opportunities. There are some factors which are critical in influencing the threshold point of change namely : acquisition and installation cost, change management (training and support), cost and opportunity cost. In context of both software and hardware upgrades, this project develops a simplified algorithm and tests its validity using data acquired from the Kenyan market to determine when is the appropriate time to upgrade where all costs are at minimum. The project focuses on study of Windows operating system.
- ItemAn evaluation of the use of electronic databases by academic institutions(2013-11-14) Njoroge, Rose W.The study sought to evaluate the use of electronic databases in academic institutions. A case study was done for Catholic University of Eastern Africa. The main focus for the study was to investigate the level of awareness of the electronic databases among the community in academic institutions, investigate the extent and purpose of use, find out the challenges encountered in the use of electronic resources and also find out who actually uses the electronic databases in academic institutions and for what purpose are the electronic resources being used. It also set out to investigate the relationship between the use of electronic databases and the computing skills of the patrons. Relationship between the training on the use of the electronic databases and the level of use was also investigated. A survey was done through a questionnaire which was submitted to academic staff and postgraduate students. The sample comprised of 40% (60 out of 148) of the academic staff and 40% (73 out of 182) of the postgraduate students. The study revealed that there is high awareness (94%) of the electronic databases subscription by the CUEA community; the extent of use is average (65%). Majority of the users were the postgraduate students. Challenges experienced include; lack of connectivity, slow internet connectivity, lack of personal computers and password problems.
- ItemA framework for evaluating ICT use in teacher education A case study of the primary teacher training colleges in Kenya(Strathmore University, 2008) Otieno, Oredo JohnTeachers are under increasing pressure to use Information and Communication Technology to impart to students the knowledge, skills and attitudes they need to survive in the 21st Century. The teaching profession needs to migrate from a teacher centered lecture based instruction, to a student-centered interactive learning environment. To attain this aspiration, an ICT enabled teacher education is fundamental. Towards this end, international and national authorities have been spending huge amounts of money to facilitate the implementation of ICT teacher education. This work attempts to evaluate the ueage of the available ICT facilities in Kenyan Public primary teacher colleges focusing ion the quantity of computer use,and the levels attained in terms of using ICT's support.
- ItemA Framework for optimizing internet bandwidth utilization a kenyan perspective(Strathmore University, 2008) Thaba, Davidson NjathiThe cost of internet bandwidth in Kenya, just like in other developing countries, is significantly high compared to the developed countries. The challenge of this research is to look at ways of making the most optimal use of the available bandwidth and improve performance in terms of reduced latency and better download speeds. In this dissertation, we investigate various techniques that can be used to optimize the utilization of the limited and expensive international bandwidth in developing countries. We look at the effects that content distribution networks (CDNs) and cache servers have o international bandwidth utilization as well as latency. A model of determining the point at which a content distribution network would be cost-effective is formulated. We also look at the variation in latency for content that is found within the CDNs as opposed to the origin servers. We have explored on the effect of local peering at internet exchange points and developed a model to determine the financial break-even point at which it makes a commercial sense for an ISP to join the internet exchange point in Kenya. We analyze the suitability of peering and transit models of internet exchange points as it applies to local Internet Service Providers (ISPs). Peering and transit models for inter-ISP traffic exchange are studied and we show the comparative difference each has on latency in accessing local content. Noting that spam e-mails and viruses consume a significant amount of bandwidth, we explore the effect of content filtering of that junk at the upstream Internet backbone providers. We develop a model that local ISPs can use to determine the point at which it is cost effective to invest i a spam filtering solution located at a data center within the upstream internet backbone provider. We analyze trends in internet bandwidth utilization and note that many organizations have very low utilization at night - traffic analysis and prioritization can ensure that less critical and bandwidth-hungry applications can make good use of this "night bandwidth" We argue that as framework that combines each of these techniques would result in a significant reduction on the costs incurred by Internet Service Providers to pay for international transit bandwidth, a cost that they pass directly to the local end users. We look at the metrics that can be used to determine the optimal point of introducing each of thee bandwidth saving techniques. Data collected from a local ISP has been used to validate this framework. This demonstrates that such a framework can indeed provide significant savings on international bandwidth costs and at the same time improve the user experience. Internet service providers implementing such a frame work would ultimately be able to pass the cost saving benefits to their clients.
- ItemA GIS decision based model for determining the best path for connection to a power distribution network a case study of Kenya power and lighting company limited(Strathmore University, 2008) Kinuthia, Augustine MuturiThe purpose of this study is to present a GIS based decision model for determining the best path for connection to a power distribution network. The model was derived from studies that consider the design of the power distribution system and the GIS field of network analysis along with the method used by KPLC for connecting premises to the distribution network. A digital map of the study area and the distribution network was generated and taking into account the distributors and distribution transformers the best path between the premises and the transformer was derived. In this study it is demonstrated that the distributors’ length and size and the distribution transformers’ capacity, load and location influence the connection of premises to the distribution network. The results also show that combining geospatial methods with the power distribution network enables engineers to visualize the spatial distribution of data in maps which yields better insight into the nature of the power distribution network.
- ItemInformation security awareness in the kenyan aviation industry(Strathmore University, 2008) Muendo, DanielPeople have always been an important factor in securing the information technology environment. They need to be made aware of its importance, as well as what their role is in securing information assets. Despite the widespread acceptance of t his fact many organizations still lack knowledge of information security threats caused by humans and levels of information security awareness. This research project tackles the human issues affecting information security in aviation industry and levels of information security in employees of the organizations here in Kenya. More specifically, this research provides the following : a comprehensive view of the human related information security threats, a discussion of ; a descriptive interpretive data revealing information technology manager’s perceptions about information security issues; a discussion of the level of information security awareness of employees in the aviation industry. From the results, an evaluation model for information’s security awareness is developed based on the areas of ISO/IEC 17799-2005 The research in this study suggests that there are two primary results which are shown here. The first is that leadership is elementary to the eventual effectiveness of security and the role played by an information security culture in an organization which influences the security policy and basis of information security awareness.
- ItemIT business value the case of kenyan insurance companies(Strathmore University, 2008) Muthuri, Brettah KarimiThis research addresses the perpetual problem raised by many companies on how to improve management of value from Information Technology (IT). Evidence in academic and professional literature shows firms often perceive poor returns on IT investments overall. The scope of this research is restricted to management of value from IT so as to yield business value, over the business lifetime of IT-enabled initiatives, as expressed by current theory and as demonstrated in practice. This research also develops a matrix that companies can use to determine if their approaches to IT value will bring forth some business value or not. The theoretical focus pursues models or frameworks for IT value management that attend to all the phases in the business lifetime of an IT enabled initiative and tht also tightly connect IT value management with business strategy and activities. The objectives are to assist insurance companies in Kenya improve management of value from their IT investment and specifically, to contribute to the development of theoretical considerations and frameworks in academic research targeting IT value. The value of an IT system can be considered from a number of different perspectives. Specifically, the same IT system can be valued differently across different stakeholders, time periods, usage environments and other contextual factors. When measuring the value of an IT system, it is important to consider what value perspectives are relevant and how those perspectives affect the development of value metrics. An IT value assessment framework is proposed to aid in identifying such contextual factors and exploring how those factors affect the value that is realized from an IT system. The proposed framework takes a holistic view of the organization where IT is applied to ensure that value is achieved from the investments that companies make. The holistic view ensures that all aspects of the organization have been considered including the people. The proposed framework also goes ahead to detail activities, outputs, measurement metrics that organizations can put in place to ensure they IT investments are of value to the organization.
- ItemMobile phone voting using blind signature protocol(Strathmore University, 2008) Olembo, MaureenThis project presents a generic secure electronic voting scheme for mobile phones, based on teh work of Y. Feng S Ng and S. Schwiderski-Grosche (2005), which can be implemented in contexts that require secure casting of votes such as parliamentary and national elections. The voting scheme presented is secured by use of the blind signature protocol and public key encryption. The security property of voter verification, democracy, voter anonymity and privacy, integrity and availability are achieved. Finally an analysis and design of a mobile phone voting system using the blind signature protocol is undertaken, and a simulation developed and presented.
- ItemA Secure M-payment for M-commerce in Kenya(Strathmore University, 2008) Ananda, Fanon TumainiThere has been a tremendous growth in mobile communications in Kenya over the last decade that has totally transformed how people communicate. This has presented opportunities for business to change how they operate, which includes banking services, whose infrastructure in Kenya is fairly advanced in comparison to neighbouring countries. Despite the advanced banking services available, account holders do still have problems of secure access in their transactions, especially using mobile devices. This research proposes an M-commerce model for a direct, trusted access to a client’s bank accounts via mobile devices. The methodology used for the research is based on the WebE process for M-commerce services and applications. In its implementation, it adopts a secure M-payment configuration based on a Public Key Infrastructure (PKI) for mobile devices. Further, it implements security issues through elliptic curve data signing algorithm. It should be noted that for a mobile system, it is important to implement a solution that is secure, relies on the available communication channels and works efficiently with the minimal resources available, a characteristic of mobile devices. The implementation enables the mobile device to act as a debit card and can be customized to implement security in any other transactions that utilize mobile device applications.
- ItemA Software upgrades investment model : a case of Windows operating system in Kenya.(Strathmore University, 2008) Metto, Shadrack KimutaiThe revolution of software has introduced new actors and market mechanisms. Effective software management is crucial for development and survival of any company. IT upgrades investment in a crucial part in software management. The investments are usually costly and risky. Firms tend to treat such costs as operating expenses within the period incurred. Waiting too long may lead to lost competence, relevance and may prohibit a business from taking advantage of better vendor technologies in future, more so putting the company at risk by increasing the gap with the suitable business technology and business leadership opportunities. There are some factors which are critical in influencing the threshold point of change namely : acquisition and installation cost, change management (training and support), cost and opportunity cost. In context of both software and hardware upgrades, this project develops a simplified algorithm and tests its validity using data acquired from the Kenyan market to determine when is the appropriate time to upgrade where all costs are at minimum. The project focuses on study of Windows operating system.