MSIS Theses and Dissertations (2013)
Permanent URI for this collection
Browse
Browsing MSIS Theses and Dissertations (2013) by Title
Now showing 1 - 11 of 11
Results Per Page
Sort Options
- ItemA framework for data analysis to build business requirements: A case of Barclays Kenya(Strathmore University, 2013) Kimani, Oscar IkabaThis study sought to develop a data analysis framework to build business requirements using requests logged by end users of implemented ICT solutions. The study was guided by four objectives that included review of the existing frameworks that align IT to the business. The other objectives are establishment of misalignment between the implemented ICT solutions and business requirements at both detailed and high levels, development of a data analysis framework and validation of the data analysis framework. Self-administered questionnaires supplemented electronic data that was obtained from IT help-desk. The data was cleaned up, edited, coded, tabulated, put into specific categories and frequencies of each category determined by tallying the results. Data was presented in tables, pie charts and bar graphs with textual comments for interpretation. The sample size was 1152 elements and the researcher also analyzed 42 questionnaires that had been distributed randomly to respondents across the business functions. The research findings identified several gaps in the implemented ICT solutions. Users had reported many cases of application errors, outages and other issues affecting service availability. Network issues were reported raising the issue of reliability of the IT infrastructure. There were issues on duplicated transactions, posting errors, data omissions that impacted data integrity and competency of the personnel. Some users had logged issues on automation for efficiency. However the responsiveness by the IT support teams scored highly with 81% of the respondents indicating satisfactory response of within 24 hours. The research met all the set objectives. Literature review investigated frameworks that give guidance on the support of end users, align IT to the business or provide requirements for implementation of business solution. The research findings identified several gaps affecting availability of applications, data integrity and reliability of IT infrastructure. The framework was developed using inputs, activities and outputs and validated using a different sample from the sample frame that also obtained same result.
- ItemA framework for ICT diffusion in public secondary schools in Kenya: case of Thika Municipality(Strathmore University, 2013) Phinehas, John KirimiICT diffusion in public secondary schools in Thika Municipality is still at infancy stage and already faces several challenges that may undermine the various initiatives undertaken by government and the private sector to promote the use of computers in schools. Based on literature and other research, this may be attributed to the fact that no framework for proper ICT diffusion in public secondary schools exists. Furthermore, most integration cases are done at random with no systematic approach based on existing frameworks or geared towards the actual context in the schools concerned. The study aimed at determining ICT usage level, barriers and ICT infrastructure established in the public secondary schools in Thika Municipality. Research findings revealed that ICT was very vital in teaching, learning and administration in the studied schools. A stratified and clustered random sample size of 20 teachers and 36 students from a target population of 236 teachers and 3252 students respectively. Questionnaires and In-depth interviews in students and teachers focus groups were used for the empirical research. The study is likely to provide school administrators, managers, teachers and students the way forward in ICT adoption strategies for pedagogical and administrative purposes. ICT diffusion in schools framework with the components of learning management system, ICT literacy development, ICT policies and planning, ICT curriculum and assessment was developed with an implementation checklist. The implementation would be introduced gradually through ICT advancement levels of exploration, application, assimilation and transformation. The research concluded that the level of ICT usage was generally good, ICT infrastructure was available but inadequate and existence of ICT usage barriers such as exams pressure and limited technical support.
- ItemFramework for ICT Integration into Teaching and Learning: A Case Study of Defence Forces Technical College (DEFTEC)(Strathmore University, 2013) Abdirizak, Mohamed NoorThe rapid development in Information and Communication Technology (ICT) attracts the lecturers, learners and educational institutions in terms of learning and teaching. At Defence Forces Technical College (DEFTEC) efforts are been made in terms of access to ICT related facilities. However access does not imply that the facilities are used and usage does not imply effective learning is happening. This is because the College does not have framework on how the integration of ICT into learning and teaching should be done. The purpose of the study was to investigate how lecturers and learners are integrating ICT into learning and teaching at DEFTEC. This involved determining how lecturers and students are using ICT facilities available and the level of teachers’ professional development in ICT skills and knowledge. The barriers to the integration of ICT in the college was also be analyzed. Qualitative and quantitative research methods were used and the data was collected using questionnaires, semi structured interviews, discussions and an analysis of the college documents The results of the study show that DEFTEC has not documented utilization of ICT in the process of learning and teaching. The study shows that in terms of ICT facilities the College has over the years been buying ICT facilities to some level. However, there is lack of teachers and students development in the use of ICT facilities for educational purpose. These factors and the college and human barriers are challenging the effective and efficient integration of ICT into educational process. Due to these factors, lecturers and students are using ICT based on their skills and knowledge without any guidance from the college management. The solution to the problem was to develop a framework to guide the management on how to integrate ICT into learning and teaching. This can be done by committing the integration in vision and policy document, auditing the current state of ICT integration, setting strategic targets and indicators and enforcing the use of the facilities through evaluation.
- ItemICT policy formulation by use of templates a case of Kenya Education Network Trust (KENET)(Strathmore University, 2013) Otieno, Okumu MichaelThis paper examines the formulation of ICT policies by use of templates in KENET institutions with the aim of developing a sample template and framework that can be used when using such templates. It starts by giving a background of KENET, its member institutions, and its functions. The problem statement is derived from an e-readiness survey report by KENET that revealed that most of its member institutions lacked policies and well-defined policy documents. KENET thus proposed to develop a sample ICT policy template for its member institution to aid in the formulation process. This task was never accomplished and thus prompted research into the possibility of establishing through clear objectives the approximate number of institutions that had policies and their profited methods of formulating such policies. The study also reviews different writings on policies such as policy elements and characteristics along with studying a number of policy template samples. The research employs a descriptive study and involves the distribution of online questionnaires to a target of at least 80 member institutions. Out of the 80 randomly selected member institutions, only 36 respond majority of the respondents were ICT managers. The data collected is analyzed using SPSS and presented in graphical and descriptive ways in different chapters of this study. The system developed employs software development lifecycle techniques and contains different user interfaces and a backend for administrators. The system provides an online platform for policy formulation through a proposed framework by · selecting certain policy elements from policy subcategories found under some well-defined main categories. The study reveals that despite a slight majority of KENET institutions having ICT policies, there is a minority without such policies. Most of the currently developed policies have been developed by a combination of two or more formulation methods. Most KENET members prefer to have online templates and are keen to urge KENET to provide a policy formulation template and to organize forums through which knowledge on their use can be disseminated. The objectives of this research are achieved when a sample online policy template and framework are developed and shared with selected KENET institutions. Positive feedback from member institutions justifies an achievement in policy formulation, something that can be taken up by KENET in developing a sample template for its member institutions.
- ItemIntegrating perceived security with technology acceptance model to examine consumer trust in online transactions(Strathmore University, 2013) Omondi, Christine AchiengAdvances in online shopping technology have created fresh ways of handling daily shopping interaction. User acceptance of technology has been an important field of study for quite some time now. Trust in information technology has however not been addressed to a great extent in the context of the Internet environment. Trust plays a central role in helping consumers overcome perceptions of risk and insecurity which hinder their involvement in online transactions. There have been many models proposed to explain and predict the use of a system, but the Technology Acceptance Model applied on the Internet environment has been the only one which has captured the most attention of the Information Systems community. A probability (systematic) sampling design was used to draw a representative sample of online shoppers and data collected through an online survey. We study their perceptions regarding security, trust and technology and their intentions to shop online at particular websites. There is an explanation of the main attributes of the concepts examined, with special attention being paid to the multi-dimensional nature of the variables and the relationships between them. This is followed by an examination of the validation processes of the measuring instruments. The findings of the study indicate that perceived privacy protection on information during online transactions Web site were the main factors influencing online shopping acceptance. We found that Web quality, categorized into system, information, and service quality, leads to greater trust in the company itself through the customers' perceptions about the web site's ease of use and usefulness. We also confirmed a positive relationship between customer trust in a company operating in the online environment and customer retention and intention to buy. Our study thus provided a balanced and integrative framework for influencing intention to use and to widespread adoption of online shopping. It enhanced our knowledge of the effect and relationship between perceived security and privacy on trust, which should help Web practitioners and researchers better understand user behavior in Web-based online retailing.
- ItemInteroperability framework for open source and proprietary software : a case of government of Kenya(Strathmore University, 2013) Marete, David MwendaExchange of information within the Government is usually through formal communication such as official letters, gazette notices , internal memos, circulars, print media and also through minutes . This has not been very effective, due to lack of seamless exchange of information among Government Ministries since they work independently. The main cause being lack of an interoperable platform in terms of software which would help ease exchange of information. As a result of this, a lot of inefficiencies in service delivery to the citizenry have been experienced. This has been confirmed through ratings in performance contracting of various sectors in government over the years. In order to achieve software interoperability framework within the Government, quantitative research method was used in collaboration with other research methods such as descriptive research. The research was carried out within the National Government to ascertain various issues that relate to software interoperability with a view of developing a standard framework that will act as a guideline within the National Government. Through the research , it was possible to justify how lack of this important guideline within government has led to denial of associated benefits to the citizenry. Since there is no universal standardized software interoperability framework that any Government could directly adopt without customization, it was important to develop a software interoperability framework that is based on known user requirements within the Government of Kenya hence the need for a Software Interoperability Framework. The main objective of the research being to develop software interoperability framework between open source and proprietary software, this was accomplished by enhancing an existing software interoperability conceptual model by ATHENA consortium. The framework has further been improved by introducing various parameters and components that have a direct effect on the framework due to their interrelation nature hence making the framework more comprehensive.
- ItemA location-based service mobile marketing model for small businesses: a case of Nairobi(Strathmore University, 2013) Birir, Brian KipkoechSmall businesses play a big role in Kenya's economy by creating more employment and generating more output in terms of production and income than larger businesses due to their high numbers. In Nairobi competition is the most pressing challenge for small businesses of which lack innovation and market information to keep up with customer needs. These small enterprises are located within dense markets and overcrowded streets thus making it difficult and time consuming for customers to locate them. Furthermore, small businesses have difficulty in reaching out to customers since they rely on cheap conventional means of advertising such as word of mouth and use of posters at the entrance of the business premises. An LBS mobile marketing model does not exist for the Kenyan small business market to complement other marketing methods and tools and to provide an easy way for customers to locate small businesses. A location-based service mobile marketing model has been developed to provide a solution to these problems faced. The model was tested by implementing a mobile web application prototype created from several web technologies (HTML5, Javascript, XML, PHP & MySQL). All the components of the model with the exception of one were implemented and tested. The results obtained from the testing phase showed that the function and usability features are successful. However, the compatibility tests show incompatibility with some mobile web browsers for the prototype. It is recommended that native mobile applications of the prototype be developed and all the features of the model be implemented firstly on a pilot scale and eventually on a production scale. Further research should also be done to determine user acceptance tests of the implemented model and its commercial viability to small businesses.
- ItemA mobile application prototype for information access in University environment(Strathmore University, 2013-06) Swigo, Leonard EmmanuelUniversities just like other institutions are now making the use of Information Technology (IT) to disseminate information and mostly using the website. The use of websites in disseminating the university's information limits the mobility nature of campus environment and therefore the need to make such information available to the always-moving students on campus and outside campus. The use of Mobile Applications in business has increased tremendously over the couple of years which has been influenced by the fast growing development of powerful and affordable mobile devices. The integration ofthe Mobile Apps and powerful mobile gadgets provides an opportunity to distribute Information in a quick, secure and convenient manner anywhere, anytime. This research adapting a Quasi-experimental methodology with a case study and Qualitative approach to facilitate data collection, analyzed the relevance of mobile applications in disseminating information and the limitations towards the implementation of Mobile Applications at St. John's University of Tanzania. The Population for this study comprised a total of approximately 2000 people. The Information system users were divided into two groups; students and university staff, the university staff were later stratified further into two groups, System Analysts/administrators and normal system users (students). The Primary data were gathered through interviews with both closed and open-ended questions, and participatory observation. The researcher finally developed a Prototype (in Windows Phone platform) and tested its usability, functional and compatibility (Modules and Integrated App test) as a tool to be adopted to disseminate information in university environment. The Prototype was deployed on windows phones and gave students access to the University Information such as Student's grades, Notices and timetable detail providing a controlled access through logins. Students and university staff explained to be satisfied with the application suggesting to be the most preferable means of communication in universities only that its implementations seems to be constrained by the limited skills of university's staff on mobile Applications development and the access control in such environment.
- ItemA model for Information Privacy Control Implementation on Online Social Networks(Strathmore University, 2013-05) Nyaboke, Mogire NancyResearch has shown that social network users typically understand the negative implications of unchecked exposure on social networks. Further, they are concerned about the privacy of some of their data that they consider sensitive. However many still fail to use privacy settings when they post sensitive data. As a consequence, users may share with the public private information that may be used negatively by unintended viewers. Privacy breaches have been reported many times as a result of uncontrolled social network information access. While the purpose of social networks is sharing of information, security must be preserved through control of information privacy to limit access on information to the intended audiences. Social network users have data that they would like to keep confidential as confirmed in the survey. However social networks in their original design leave the task of adjusting privacy settings to the user who as evidenced by research will often not change the default privacy settings. Consequently, the information privacy control task falls back to the social network service provider who has a corporate social responsibility to provide a secure networking environment. In effecting that responsibility, it is necessary to enforce privacy control on critical data items in order to achieve the acceptable minimum security. However there is still no widely accepted privacy enforcement model. This paper proposes an information control model targeted at designers of social networking websites. The model offers a data privacy enforcement scheme derived from analysis of sensitivity of data in relation to the security clearance level of a prospective viewer. If the sensitivity of data exceeds viewing permissions for a given prospective viewer, access is denied. However if permission level is greater than the sensitivity of data then access is granted. Enforcement actions are performed automatically by the system, while notifying the data owner using flags and allowing for a deliberate reversal of such enforcement.
- ItemPerformance appraisal prototype for academic staff : a case of Strathmore University(Strathmore University, 2013) Omogi, Geoffrey OchiengIn order for academic staff appraisal to be successful there is need for a thorough methodology and appraisal system to be put in place. The Deans and the university’s top management are often interested in knowing what each lecturer is doing with regard to learning and teaching, research, consultancy, publications, community activities, administrative activities, conference and seminar presentations. The problem is that this information is often not available in any system at the click of a button! The Deans therefore have to ask for this information from the lecturers by way of email or call for a meeting in order to get this information. This is time consuming and cumbersome. This research studied this problem and in the end developed a prototype of a computerized system that could be very useful in academic staff performance appraisal in universities. The lecturers set targets for the Key Performance Indicators at the beginning of the evaluation period and fills the actual performance at the end of the period. The Dean can log in to the system, view the lecturers in his/her faculty and appraise them. The HR Director and the DVC can view and appraise all the lecturers in the university. This means that at any given time the Dean knows the work that is being done in the faculty. The HR and DVC know the work that is being done in the whole university. They therefore are equipped with information. They know who to reward more, who to promote to the next level and who should improve. The Dean and Senior Management of the University thus know in good time whether or not the faculty is working towards achieving their strategic goals. The research methods used are interviews and document reviews. Lecturers, Deans, HR Director, DVC and The Head of Strategy were interviewed. Based on findings of the research, a computerized performance appraisal system for academic staff was developed using the waterfall model. The research recommends that private universities should adopt the computerized academic staff performance appraisal system. They should also develop elaborate academic staff appraisal procedure, implement a proper reward system, develop support mechanisms to help the lecturers achieve the performance targets set and train the lecturers and administrative staff involved in the whole process.
- ItemServer virtualization framework: case of selected government ministries, Kenya(Strathmore University, 2013) Buyeke, Zipporah NyamweyaThe very rapid development in chip technology has brought huge increases in processing capacity. Most current computer hardware is so powerful that in most cases only a small part of it, about 10 to 15 percent, is actually in use. Virtualization enables hardware to support more than one system and enables hardware utilization to go up to 75 or 80 percent. Current generation of servers have sufficiently large capacity such that even during peak load hours, the quality of service (QoS) can be guaranteed and be met while ensuring that service level agreements (SLAs) are adhered to. In the Kenya, Government ministries deploy dedicated servers are for single applications resulting in the problems of over-provisioning of resources for peak loads, underutilization of the servers, and high infrastructure maintenance costs. This research aimed at developing a framework to be used for implementation of server virtualization. Serve virtualization was first implemented the concept of virtualization in the 1960s by IBM through CTSS in order to combat the rigidity and underutilization of large, mainframe computers. Through virtualization, many scattered servers can be consolidated to a fraction of the original number, which will give a greatest ROI and increase their server utilization up to 80%. Virtualization solves efficiency problems by effectively providing a virtual, logical environment of computing resources rather than a rigid, physical environment by allowing multiple operating systems to run simultaneously on a single machine; and by tricking operating systems into thinking that a group of hardware components or servers is a single pool of computing resources. Before implementing virtualization solutions compatibility of existing software and systems, exiting licensing models, and performance overhead have to be taken into consideration. Server virtualization will enable ministries to meet the forecast for dollar-valued global IT spending. The study was exploratory and applied a case study method where the Ministries of Energy and Finance, also the Directorate of e-Government were used as cases with a sample size of 47 ICT staff. Both primary and secondary data that were collected through personal interviews and observation methods were used in the study. All government ministries have server-based systems with levels of utilization of the mid-range servers being 1% while utilization of the big servers was between 10 and 15. Server hardware purchase and ICT expenditure in the ministries were increasing. The research proposed a framework, Integrated server virtualization framework (ISVF) to be used during implementation of server virtualization in the ministries. ISVF has planning, analysis, design, implementation and support phases. When ISVF was tested, CPU usage increased from 15% to 76%, physical memory usage increased from 66% of 2GB to 78% of 8GB, and capacity of hard disk space in use was 165GB up from 6.9GB. The government should ensure that for dedicated server deployments, the numbers of servers are equivalent to the number of server-based systems; invest in equipping the ICT staff with the relevant skills to install server-based systems; implement server virtualization to enable them increase their levels of utilization of the mid-range and big servers; use the proposed Integrated framework in the implementation of server virtualization