MSIT Theses and Dissertations (2012)
Permanent URI for this collection
Browse
Browsing MSIT Theses and Dissertations (2012) by Title
Now showing 1 - 20 of 24
Results Per Page
Sort Options
- ItemA Fraud investigative and detective framework in the motor insurance industry: a Kenyan perspectiveKisaka, George Ngosiah; Onyango-Otieno., VitalisInsurance fraud is a serious and growing problem, with fraudsters’ always perfecting their schemes to avoid detection by the basic approaches. This has caused a rise in fraudulent claims that get paid and increased loss ratios for insurance firms thereby diminishing profitability and threatening their very existence. There is widespread recognition that traditional approaches to tackling fraud are inadequate. Studies of insurance fraud have typically focused upon identifying characteristics of fraudulent claims and putting in place different measures to capture them. This thesis proposes an integrated framework to curtail insurance fraud in the Kenyan insurance industry. The research studied existing fraud detection and investigation expertise in depth. The research methodology identified two available theoretical frameworks, the Bayesian Inference Approach and the Mass Detection Tool (MDT). These were compared to comprehensive motor insurance claims fraud management with respect to the insurance industry in Kenya. The findings show that insurance claims’ fraud is indeed prevalent in the Kenyan industry. Sixty five percent of claims processing professionals deem the motor segment as one of the most fraud prone yet a paltry 15 percent of them use technology for fraud detection. This is despite the fact that significant strides have been made in developing systems for fraud detection. These findings were used to determine and propose an integrated ensemble motor insurance fraud detection framework for the Kenyan insurance industry. The proposed framework built up on the mass detection tool (MDT) and provides a solution for preventing, detecting and managing claims fraud in the motor insurance line of business within the Kenyan insurance industry.
- ItemA Model for costing information technology services in public organizations : case study of the Kenya Revenue AuthorityOsiro, Yvonne Wafula; Sevilla, JosephPublic organizations are increasingly embracing technology as a means of achieving operational efficiency and in the process reduce the cost of doing business. It is necessary for organizations to have a clear financial visibility into their Information Technology operations. However, it is frequently observed that IT continues to drain financial resources without providing any insight on its consumption. This is partially due to the intangible nature of IT and partially due to lack of standard IT service costing frameworks. IT Managers need financial and non –financial information to have proper insight of their operations. Having a costing model enables IT departments to determine the cost of providing an individual or group of services. The objective of this research was the development of a service oriented costing model for IT services offered by public organizations, with the following specific objectives: 1. To investigate the available IT service costing frameworks and models. 2. To establish the policies and factors that determine IT service costs. 3. To develop an IT service costing model for use in public organizations. 4. To validate the effectiveness of the IT Service Costing framework developed. Using a qualitative approach, this thesis presents an IT service cost model to methodically guide public organizations in determination of costs associated with provision of an IT service. The research used a descriptive design to obtain information concerning the current status of the phenomena. A target population of thirty four senior and middle level managers from the ICT, Finance and Administration departments of the Kenya Revenue Authority were considered. Purposive sampling was used to select twenty two target respondents. Semi-structured interviews consisting both open-ended and closed questions to provide greater depth were the primary data collection method used, in addition to scholarly journals, books and websites. The model presented provides an approach to cost estimating that can simplify the determination of costs associated with an IT service. The application of suitable abstraction principles in terms of cost categories, cost types, cost activities, cost elements and cost drivers yields a modified IT service specific cost model. The approach was verified using a real service as an example to provide insight into cost structures and potential cost drivers. It was applied to a case study of the email service at the Kenya Revenue Authority and in this way the flexibility and adaptability of the model to given service-orientated scenarios was demonstrated.
- ItemA model for estimating network infrastructure costs : a case for all-fibre LAN networksMaina, Anthony Mbuki; Ateya, Ismail LukanduThe 21st century is an era that has been characterised by phenomenal growth in data rates at the local area network (intranet), extranet and the Internet.This trend has been pushed by the widespread deployment in organisations of “bandwidth-hungry” applications such as VoIP, security surveillance systems, video conferencing and streaming of multimedia content. Due to demand placed on network resources by these applications and services,physical layer cabling solutions have had to evolve to support faster, improved LAN technologies such as Gigabit Ethernet.Although new network architectures (such as Centralised Fibre networks) address current and long term demands of the modern networking environment, concerns have been raised about its cost viability. The key problem identified in this study was an inadequacy of suitable tools that aid decision making when estimating the cost of a network infrastructure project. Factors of importance in this regard were collected in a survey and used in development of a cost model. The model is aimed at being a tool to assist network planners in estimating LAN infrastructure costs. A network was designed based on two architectures – centralised fibre (allfibrenetwork) and hierarchical star (UTP for horizontal cabling and optical fibre for backbone cabling). Thereafter, cost of implementing these two architectures was calculated using the model. Based on the results computed from the cost model, the all-fibre network (centralised fibre architecture) was found to be more cost effective compared to the hierarchical star network
- ItemA Model to measure information security awareness level in an organization : case study of Kenya commercial bank.Mugo, Eric Anderson Kabugu; Wekesa, CyrusInformation Security awareness forms a key basic part of Information Security Strategy within most organizations. Organizations that tend to be more conscious regarding Information Security will invest more than organizations that are less conscious. This can be seen in Financial and Telecommunications industry as compared to Agricultural industries. Information Security awareness is an investment that organizations make to ensure that the human aspect of Information Security is taken care of. Majority of organizations that invest in Information Security awareness do not measure the levels of awareness among their staff to identify the impact of their investment. Measurement of Information Security results in value add such as positive change in staff attitudes towards Information Security, respective increase in Information Security knowledge and a more secure organization. The value add comes with other added benefits such as reduced Information Security incidents and frauds, a more knowledgeable staff and an Information Security team with visibility into the general organizations predisposition to Information Security challenges as well as general awareness. This study aims at expounding on the various techniques used to impart awareness. The study aims at proposing a model that can be used to measure Information Security awareness levels in a Local financial institution. Achievement of specific objectives of the research was done through qualitative technique. Collection of data required is done from local Members of Information Security Profession who possess the required data in the area of Information Security. Following analysis of responses from the local Information Security professionals, the model developed was based on the Kruger and Kearney Model awareness measurement model with specific modifications to suit the local financial institutions' requirements. The models' modifications were based on a local banking institution for purposes of testing and validating the mode!. The modifications are as a result of the findings from the survey.
- ItemAdoption of ICT innovations for reduced TCO and overall capital expenditureAdongo, Mark; Ateya, Ismail LukanduCompared to other industries, the pace of evolution in the field of Information Technology (IT) has been on an ever increasing upward trend for the last decade or more. This evolution can and has been witnessed both in the realms of hardware and software development, the advancements,bringing with them both positive benefits and negative effects. The benefits, in many instances do outweigh the negative effects particularly with regard to acquisition and operating cost, efficiency, effectiveness, resulting impact on end user processes and products, the list is endless. Surprisingly enough, the rate of adoption of these positive ICT innovations in the workplace and business workplace environment has not matched the rate at which the ICT industry has been churning the advancements. Much as the revolution has made it possible to deploy IT solutions at a lower cost, reducing by more than half each year for the same functionalities, statistics collected indicate that industry adoption has not matched the rate of innovation. This research sought to establish the factors that influence the adoption of ICT innovations; and hence propose a framework that can assist organizations match the rate of this evolution with an overall aim or reducing operational costs.A survey that was conducted across five local financial institutions indicated that most respondents felt and did concur with the fact that adoption of ICT innovations did indeed result into reduced total cost of ownership of IT. Results of the study also pointed to the factors that promote the adoption of ICT innovations in the financial institutions and from that, a framework for the adoption of ICT innovations was developed and validated.The framework, if applied in the manner proposed, would go a long way in assisting organizations continuously identify opportunities for reducing overall IT expenditure by embracing industry advancements in ICT that bring along these advantages.
- ItemAn assessment of application integration in public sector for e-government implementationJane Otoko; Ismail Lukandu AteyaThe success of e-government initiative depends on the provision of reliable data and information as governments keep data and information on their subjects. The integration of applications is a critical factor of electronic governments to facilitate easy and fast access to data. Most governments have kept data in disparate systems. One of the medium term initiatives that were to be achieved by June 2007 was the concerted automation and integration of government information and records which include implementation of integrated systems for persons, property, assets and taxation databases among others (GOK, 2004). These integrations were part of a strategy for the Kenya government to move toward an electronic government. The objective of this research is to identify the status of application integration in the public sector in Kenya, to identify factors affection its adoption and to propose a framework to guide implementation for public sector. A case study of the Ministry of State for Immigration and Registration of Persons was used to investigate integration of applications on persons’ data in Kenya. In this research, factors that affect integration obtained from the study were compared with those found in the literature review. Interviews were used to obtain these factors from a survey carried out on staff. From these, an implementation framework was proposed to be used as a tool in assessing the likelihood of a public sector agency achieving integration using a scoring method. An analysis from the study indicates that application integration has not yet permeated the public sector and that factors that lead to this state are not only technological but organizational as well as political and leadership. The research recommends that purposed plans and implementation activities be carried out to in line with the proposed framework to ensure that electronic government initiatives are achieved.
- ItemBest Practices in Implementing Core Banking Systems(2013-11-13) Mopel, EdwardMajority of Kenyan Banks are increasingly capitalizing on avant-garde core banking systems (CBS) for automating their transactions in order to compete amongst themselves, cater for ever growing customer needs and to comply with complex regulatory requirements (e.g. Basel II) imposed by the Central bank of Kenya. Core banking systems acquired by Kenyan banks are supplied by foreign vendors at an enormous cost. Therefore, it is vital for the individual banks that they succeed in their Core Banking System (CBS) implementations, to achieve the desired organizational objectives and CBS project outcomes. The purpose of this study was to develop core banking system implementation best practices which could be used by local banks in Kenya to make their Core Banking System projects successful. It uses a case study methodology; National Bank of Kenya (NBK) to provide answers to the research questions. Data was collected by administering questionnaires, conducting interviews and reviewing existing literature on Core Banking System projects. The survey questionnaire was distributed among 100 persons identified as sample population. Out of the 100 respondents only 82 responded, which represented a response rate of 82%. Most of the respondents were of the opinion that replacing the legacy Core Banking System (Bank master) and a number of the surrounding sub-systems with an integrated Universal Core Banking System, was the main CBS renewal driver and project goal to achieve. The study has demonstrated that user resistance to change was identified as the most encountered challenge. Further, an improved level of customer service was identified as the biggest achievement by the Bank. There were five CSFs common to all the three implementation phases. Out of the CSFs related to pre-implementation, setting project objectives and expectations has been identified as the most critical success factor. In relation to the implementation phase, vendor support and commitment has been identified as the key success factor and in relation to the post-implementation phase, excellent issue resolving mechanisms was identified as the key success factor. Based on the identified CSFs, the study develops best practices for implementing CBS projects which could be useful for local banks in their future CBS Projects in order to avoid making critical, but often underrated, mistakes that negatively affect CBS implementation and upgrading, to secure CBS implementation projects as successful and to reduce IT project failure rates.
- ItemCombating insider threat using behaviour based access control(2013-11-13) Nderitu, Josephine W.Insider threat poses a great risk to financial institutions due to the mere fact that they have privilege and authentic access to corporate and customer data. Insiders are trusted persons, have legitimate access, have knowledge and skills of systems and their loopholes and they operate insider the security parameter. This level of access makes detection and prevention of malicious activities by insiders extremely difficult. The financial services sector is especially affected by insider threat as indicated by the large number of frauds perpetrated by their own employees. Regulatory requirements also require players in this industry to adequately protect customer information by ensuring that it is on a need to know basis. The problem, therefore, becomes how to separate suspicious behaviour from legitimate behaviour. Most mechanisms currently employed enforce more after-the-fact approaches that are too late into the mitigation. Access control mechanisms in use provide a more general allocation of rights to individuals internally giving them more access than they really require. This thesis conducts a descriptive research on the insider threat amongst players in the financial services sector. It looks at the understanding of security practitioners in the industry on insider threats and the mitigation strategies currently in use. User behaviours that can be considered in making access control decisions are then identified and applied in developing an access control framework. The framework utilizes a more fine grained approach to access control to make access control decisions on a real time basis hence reducing the blanket access control rights that allow users to access data they do not necessarily need. This granularity promotes a more dynamic way of access control and ensures that decisions to grant access to certain objects is evaluated at run time using a number well defined rules that apply to the user behaviour. Data used to evaluate the framework shows that a more fine grained approach to access control is successful in better mitigating the insider threat.
- ItemE-land administration for citizen-centric services : case study of ministry of lands, KenyaKyalo, Joseph M.; Wekesa, CyrusIn this digital era, citizens should enjoy the benefits of online, up-to date services from the government hence enabling fast delivery of goods and services. However the land information accessibility has been difficult and costly. This is caused the manual methods of storing and disseminating the land related information. The purpose of this study was to develop a framework that can be used to create electronic land administration to facilitate online access to land information in Kenya. The objectives were to assess the land related services provided to the citizens by the Ministry of Lands; to determine the level of automation in the ministry of Lands; to develop a framework that can be used to build an electronic land administration by the ministry of lands in Kenya and to validate the proposed framework for electronic land administration. The research came up with a proposed framework that can be implemented to improve land information dissemination to the citizens. A descriptive survey design was adopted utilizing both qualitative and quantitative approaches. The approach was aimed at getting the information that describes the land information accessibility to citizens. SPSS and Ms Excel applications were used to analyze the quantitative data. Qualitative data was analyzed using thematic method by grouping the information provided by the respondents into similar themes. In findings it can be noted that most of the participants (83.0%) stored the important documents including title deeds, allotment letters in hardcopies on shelves or cabinets. Also 91.3% of the officers fail to trace clients’ records when needed monthly. Majority of the clients (65.0%) stay for more than a day awaiting for their cases to be sorted out at the ministry’s offices. Some of the conclusions made from the findings of the study are the process searching land information can be quickened by centralizing the data or information and offering the information through the internet. This also reduces the chances of some files missing. There is need for regular departmental seminars and IT training. The research developed an effective electronic land administration that can be used to facilitate online access to land information in Kenya when implemented.
- ItemAn evaluation and turnaround strategy for troubled ERP projects;(Strathmore University, 2012-02) Luseno, Chamwama J.A troubled system, also referred to as a challenged system, is one that is delivered; behind schedule, or exceeds budgets, yet does not meet user requirements. A lot of research has been conducted on software project failures, and literature abounds' documenting the devastation these have had on organizations world over.. ERP system implementations tend to be large, complex technology-intensive projects. They are prone to ending up troubled and inevitably fail if the necessary executive intervention is not taken in good time. Whether a troubled project succeeds or fails depends on the effectiveness of managerial actions taken to tum around or redirect such projects: Before .such actions are taken, however, management must recognize the problem and take appropriate corrective measures. This study seeks to relate symptoms documented in existing literature and troubled . . software projects to a local case and the applicability of current documented turnaround frameworks. It draws on literature on the self justification theory (Broeckner, 1992) on escalation theory. The case is based.
- ItemExplosive trace detection service model(Strathmore University, 2012-10) Kipyego, Murrey M.; Lukandu, Ismail Ateya Marwanga (Dr.), Reuben Kiraka, RuthThis research describes explosive trace detection service architecture which combines the strength of the mobile phones, the polymer sensor and next generation cellular network. The aim is to create a system that will assure common men, local population and above all the nation a secured environment, without disturbing their freedom of movement. It would further help the police in detection of explosives more quickly, isolation of suicide bombers, remediation of explosives manufacturing sites, and forensic and criminal investigation. The idea is to use an explosive vapour nanosensor in wireless sensor network or embed it in a mobile phone as a cognitive radio sensor node. The sensor network connects to the mobile network through a gateway while the cognitive radio sensor node into the mobile phone connects to the mobile network by analyzing the Radio Frequency (RF) surroundings and adjusting the spectrum use appropriately. The sensor node senses the presence of the explosives in the surrounding environment of the sensor and then periodically transmits the sensed data to the explosive trace detection application through the Next Generation Mobile Network IP Multimedia Subsystem and middle-ware. The application takes sensed data and explosive vapour characteristics as inputs and using context-aware rules, determines whether certain emergency conditions are met. Then it communicates the location and concentration of the detected explosives to the respective service provider, which in turn would inform the law and enforcement agency, Police and the subscribed users. The viability of this architecture was proved by evaluation of its critical factors: heterogeneity, scalability and adaptivity. This research contributes the knowledge to the general public on the use of mobile phones to provide security services within their immediate environment. Secondly, the explosive trace detection service is a technology use case which provides insights pertinent to the application areas such as the development of the next generation network services, development of mobile phones and development of explosive trace detection equipment. Finally, the government and intelligence agencies will gain knowledge from this research significant to security policy development and law enforcement.
- ItemFactors affecting last-mile internet connectivity in KenyaKarugu, JosephThere is a connectivity gap that exists between the backbone network and the last-mile access network in Kenya. This study sought to establish factors that are considered when choosing a last-mile solution; identify various types of internet last mile connectivity in Kenya; and to develop a conceptual model for selecting an internet “last mile” solution. This study used an exploratory descriptive approach. Primary and secondary data was collected from CCK, ISPs (16) and end users (24). The four factors cited as considerations for last mile connectivity included infrastructure, cost, breadth and depth, rules and regulations. These factors affect all the stakeholders. The various types of internet last mile connectivity in Kenya include the traditional LAN, analog modems, ISDN, DSL, fiber optics, Wireless networks, light waves, radio waves and satellite communication. A conceptual model for selecting an internet “last mile” solution should focus on the four important factors considered by all stakeholders namely infrastructure, cost, breadth and depth, as well as rules and regulations. A conceptual framework was developed out of the reviewed frameworks to guide the study. The framework incorporates three stakeholders of last mile connectivity namely the regulator, end users, and internet providers. This framework is different from others in that it has considered key stakeholders in the ICT sector in Kenya. This study recommends that the regulator (CCK) should encourage use of a variety of last mile solutions such as mobile phones through friendly rules and regulations. The regulator should also facilitate infrastructural development to enhance internet service providers’ operating environment. Internet providers should be innovative and add value to a variety of last mile solutions so that they can be attractive to the customers. ISPs should also provide cost friendly last mile solutions to Kenyan market. The end users should also consider other factors when choosing last mile solutions and not just cost.
- ItemFramework for adopting green IT in KenyaKirimi, Onesmus Mburugu; Ateya, Ismail LukanduGreen IT, also known as green computing, is an umbrella term referring to environmentally sound information technologies and systems, applications, and practices. It refers to supporting business critical computing needs with least possible amount of power or sustainable computing. In Kenya, IT operations have a significant impact on the environment, and organizations have an obligation of minimizing the negatives environmental impact of their IT operations. However, Green IT adoption requires a holistic approach in order to benefit from Green IT initiatives and practices that are increasingly becoming a focus even to government regulators in the developing countries following the signage of the Kyoto protocol in 1997. Organizations lack the understanding of having a holistic and sustainable approach in providing their services while at the same time, being environmentally friendly as they execute their business processes and strategies. This has lead them to having a more keen interest on their bottom lines while forsaking their environmental obligations in a bid to build a sustainable future by embracing green computing initiatives in the core of their business models and strategies. This research gives a perspective to this crucial need and endeavor to provide a localized framework with relation to other frameworks done across the spectrum with similar objectives in a bid to guide organizations towards a greener sustainable future. It has been established evidently from the research that policy factors, attitude and top management support have significant impact on adoption of Green IT within organizations. Moreover, it is indisputable that technology infrastructure can facilitate Green IT initiatives, but it should not be seen as an absolute answer to Green IT adoption, since it is just a tool that drives the initiative. Hence all the critical factors discussed in the validated framework in the research are interdependent and determines the adoption of Green IT initiatives in organizations. In conclusion, it is clear that all IT service providers in the region have a moral and environmental obligation to adopt new innovative Green IT approaches to stimulate the industry to not only become contributors to emission of green house gasses, but to also lead in providing localized solutions that can have impact in a achieving a sustainable environmental future.
- ItemFramework for quality assessment of E-government services delivery in Kenya(2013-11-13) Mbulwa, Christine M.Electronic government, or e-Government, is meant to increase citizens' convenience and accessibility of government services and information as much as government's access to citizens to revolutionize their work, and change rules of doing businesses. Considering faster global growth of the Internet and Information Technology, governments have been prompted to replace their traditional service delivery methods with electronic ones. Quality of the delivered e-Government services/projects is an emerging determinant to the success or failure of e-Governments service delivery to its citizenry. Research into the determinants of assessing quality of the delivered e Government services has become a research imperative since research in this area is still in its infancy and much of the existing research is largely centered on quality of online e-Services. As a result, few attempts have been made to identify parameters that can be used in assessing quality of delivered e-Government services in the back office environment. Using qualitative approach, the research presents a framework for guiding eGovernment service providers in assessing quality of delivered e-Government services provided by the various governmental institutions. The quality framework has been developed based on a comprehensive review of the relevant literature, observations on the targeted group and semi structured interviews conducted on sampled respondents. The developed framework incorporates parameters for assessing all categories of e-Government systems. The developed framework was tested on three e-Government systems to check on its reliability. The evaluation results obtained showed the developed framework being effective in assessing quality of delivered e-Government services and pinpointed areas that required improvement for all the systems gave average results.
- ItemImplementation of an information technology risk management framework : the case of Kenya Revenue AuthoritySylvia Akeyo OmoloOrganizations are becoming more aware of the importance of IT risk management and its corresponding due diligence requirements.Optimizing risk to information is a core function of most ICT departments, both to protect the enterprise as well as to satisfy government and industry mandates.IT risk management is the discipline that on assessing, mitigating, monitoring and optimizing risks to information communication and related technologies. An abundance of IT risk management approaches exist that can assist organizations in determining and controlling IT risks. However, gaps have been uncovered in existing IT risk management methodologies. This thesis aim to implement an IT risk management framework that best suits KRA's current operating environment.To achieve the objectives of this research, a descriptive research design was employed. The research began with analysis of available IT risk management framework so as to glean the strengths and weaknesses of each.The risks that KRA's IT infrastructure assets were exposed to and the current state of IT risk management activities at KRA were then established. The research culminated in the development and validation of an IT risk management framework to address these IT risk management needs of the Kenya Revenue Authority.The proposed model was envisaged to lead to a better alignment of IT risk management activities with business objectives and Enterprise-Wide risk management activities.
- ItemImplementation of public key infrastructure for eprocurement system : a case of selected state corporations(Strathmore University, 2012-06) Kanyinyi, Lawrence K.The dynamic character of the world means that it can be difficult to forecast future conditions and thus flexible strategies may be needed to cope with uncertainty. E-Procurement has been seen as a response to the uncertainties of relying paper work in the procurement processes. The implementation of PKI in E-Procurement in State Corporations is an initiative that ensures security and authenticity in procurement are maintained throughout the processes. The implementation of such initiative is thus influenced by some internal and external factors and some challenges. This study evaluated the implementation of PKI in E-procurement in the Kenyan Parastatals. This was done by utilizing guidelines of three objectives that is; 1) To determine the current status of Public Key Infrastructure in state corporations, 2) To find out the challenges that state corporations experience in the implementation of Public key Infrastructure in the E-Procurement process, and 3) To establish a framework that government organizations can use in the implementation of PKI in E-Procurement processes. The target population was sixteen (16) selected Kenyan Parastatals. One respondent from Information Technology department, from each organization was purposively selected to participate in the study. A self administered questionnaire was applied in the data collection. The collected data was then be analyzed in descriptive statistics technique by using a computer aided program; Statistical Package for Social scientist (SPSS). This study found that most of the State Corporations in Kenya have online services that use PKI/SSL Certificate. In addition,secure email was the principal business function of the PKI-enabled application. It was also established that state corporations were using CA service providers to run their PKIs. The study also found that state corporations do not have a central (public/private) key server. State corporations establish a PKI or digital certificate services for authentication (Single Sign On or Access Control), transport security (e.g. IPSec, wireless) and for document Signing (or "non repudiation"). PKI can help in ensuring that bidder's information is be kept private, 111" supporting confidentiality in the processes and in ensuring identity of an individual and in promoting trust in use of the system.
- ItemInformation systems security management(Strathmore University, 2012-06) Nyamongo, Doreen MoraaInstitutions of higher learning have a desire to supply knowledge to all those who seek It. Currently Universities are finding that they have to balance between their initial Goals and adoption of adequate measure to protect sensitive information about Student, alumni, workers and their business partners. Applying Information security to University IT systems is strategically important to maintaining overall business Continuity and competitive edge. Given the fad that a university environment poses Unique challenges related to diverse roles and the tendency of people viewing things Differently, it is challenging to successfully implement information systems security In such a setting. The diversification of views in/the university environment has led to Increased demands from the users of the systems hence continuous review and Improvements of this systems quality is required, It is necessary to have a high level Of information systems security management in institutions of higher learning in Kenya. : This research undertook both quantitative and qualitative approaches of information Security management in institutions of higher learning with the use of both primaries And secondary data sources. A descriptive research design was employed with the use Of questionnaires as principal data collection instrument. The questionnaire was Distributed to all the individuals in the sample. The research was carried out at all Private chartered universities in Kenya. The sample size was drawn from the lCT directors and lCT staff of these universities. Collected data was analyzed using both Quantitative and qualitative data analysis approaches, Data from the questionnaires Was checked for completeness, coded and logged into the computer system using Statistical Package for Social Science (SPSS). I In The study found out those institutions of higher/learning in Kenya is ready to adopt And improve on their information systems security management by regularly updating Management on security updates (64.5%) but ~hen having dedicated office dealing With security issues (58.1 %) and a security practitioner being part of top management (54.8%) will ensure that updates on security issues to top management are followed up And worked on, staff training on ISSM (22.6 %[), Joint, involved and support of other Departments (52.0%) will go a long way in improving the university's 18SM. However viruses (58.1%), user errors (4~.4%), theft of computers (45.2%), Compromising the system (45.1%) and system or software errors (38.7%) among Others continue to be the major challenges affecting 18SM in institutions of higher Learning. in The study concludes that institutions of higher learning should rethink their ways of Handling security of their most valued assets. Hence there is a need to highlight an effective strategy that will help institutions of higher learning to achieve effective information security management. .
- ItemIntegrating multimedia content with learning management systems : a case of Strathmore UniversityMuriithi, Henry MuchiriIn Kenya more and more institutions of higher learning and organizations are deploying eLearning management systems in a bid to tap into their associative benefits. However,these institutions are still not reaping the full benefits of these management systems. The attainment of these full benefits greatly relies upon the usability and the interactivity of the content provided.Research shows that a majority of learning management system users do not find existing content interactive enough since only text media is used. Multimedia content which incorporates different modes of delivery including text, videos, animations and sound enriches the learning experiences of students by catering for their varying instructional preferences. The research had its main objective as finding authoring technology that could be used to design multimedia content that addresses the mitigating factors against multimedia adoption in institutions of higher learning in Kenya. To achieve this objective, the research analyzed multimedia authoring systems deployed in several institutions of higher learning. Other objectives were to identify mitigating factors against multimedia adoption in institutions of higher learning in Kenya, to determine learning style preference distribution among undergraduate students and to test the integration of this technology with existing eLearning platforms.An exploratory research design was used in this study and in particular a cross sectional study was conducted.BB flash back authoring tool; a screen casting software was found to be most suitable to use for institutions of higher learning in Kenya. This is because of the numerous strengths that it poses such as; Multimedia files produced are relatively small and are viewable on most web browsers and platforms and the fact that screen recordings can be integrated with learning management systems.
- ItemInvestigating applicability of Near Field Communication technology in Kenya(2012) Mulevu, Cornelius M.Mobile phones have become ubiquitous companions in our life, enabling communication nearly always and everywhere. Additionally they facilitate information access to mobile services and the internet. Besides these communication functions, they have become multimedia computing platforms, thus mobile phones are emerging with technologies like Near Field Communication technology (NFC) which is a two-way communication technology based on Radio Frequency identification (RFID). The NFC equipped phone (NFC phone) that embeds the NFC technology into cellular phone has earned increasing attention in business, such as payment and ticketing. Mobile payments are likely to emerge as the way to pay for most all goods and services, eliminating the dependence upon carrying credit and debit cards, checks and cash. An upward progression mobile payments in mature economies towards online purchases is expected. Today, SMS is the dominant medium for conducting mobile phone transactions; however, the mobile payment market is seen to use both remote mobile payments like sms and proximity mobile payments (NFC). Mobile purchases have taken place using a variety of contactless devices like NFC-enabled mobile phone. Similar to a magnetic card payment, the user simply enters a short personal security code (personal identification number, PIN), and then touches their phone to the terminal for confirmation. This provides an essential higher-level of security compared to credit cards or other payment methods that typically reside in a physical wallet. This research presents a model for Adopting NFC-Based mobile phone payment system in Kenya. It will seek to provide solution to the challenges currently faced by magnetic card based payment system. The model characterizes the issues and technologies involved in NFC based payment, and proposes an ideal adoption model for the Kenyan mobile phone payment environment.
- ItemIT outsourcing adoption in Non-profit organizations in KenyaNyoike, Simon; Kiura, SalesioIn recent years, information technology (IT) outsourcing continues to receive favorable acceptance to maximize organization's benefits. In-turn, vast amount of information has been produced about the IT outsourcing phenomenon over the last two decades. However, few studies have examined the factors that influence IT outsourcing in non-profit's decision to adopt IT outsourcing and develop a conceptual model of ITO adoption in non-profit organizations in Kenya. Grounded in the innovation diffusion theory (IDT) and the technology-organization-environment (TOE) framework, we developed a model for ITO adoption in non-profits in Kenya.We specify five innovation characteristics (relative advantage, compatibility, complexity, trialability, and observability) and seven contextual factors (top management support, organizational competence, formalization, centralization, supporting industries e-readiness, government e-readiness and competitive pressure) as drivers and inhibitors of ITO adoption.Survey data from 45 public charities was used to test the proposed adoption model.Among the innovation characteristics; relative advantage, compatibility, trialability, and observability are significant drivers.Among the contextual variables; top management support, organizational competence; centralizational competence, centralization, supporting industries e-readiness and competitive pressure are significant. Overall, competitive pressure emerged as most significant factor; we urgue that the drive for efficiency is increased by an environment characterized by heightened scrutiny and competition for resources. Thus increasingly competitive environment led to pressure to adopt ITO.Together, these results show that IT outsourcing adoption in non-profits can be better understood by including both innovation characteristics and contextual factors, where as past literature has traditionally treated the two separately. The implications for theory and practice are discussed.