MSIS Theses and Dissertations (2013)
Permanent URI for this collection
Browse
Recent Submissions
Now showing 1 - 5 of 11
- ItemICT policy formulation by use of templates a case of Kenya Education Network Trust (KENET)(Strathmore University, 2013) Otieno, Okumu MichaelThis paper examines the formulation of ICT policies by use of templates in KENET institutions with the aim of developing a sample template and framework that can be used when using such templates. It starts by giving a background of KENET, its member institutions, and its functions. The problem statement is derived from an e-readiness survey report by KENET that revealed that most of its member institutions lacked policies and well-defined policy documents. KENET thus proposed to develop a sample ICT policy template for its member institution to aid in the formulation process. This task was never accomplished and thus prompted research into the possibility of establishing through clear objectives the approximate number of institutions that had policies and their profited methods of formulating such policies. The study also reviews different writings on policies such as policy elements and characteristics along with studying a number of policy template samples. The research employs a descriptive study and involves the distribution of online questionnaires to a target of at least 80 member institutions. Out of the 80 randomly selected member institutions, only 36 respond majority of the respondents were ICT managers. The data collected is analyzed using SPSS and presented in graphical and descriptive ways in different chapters of this study. The system developed employs software development lifecycle techniques and contains different user interfaces and a backend for administrators. The system provides an online platform for policy formulation through a proposed framework by · selecting certain policy elements from policy subcategories found under some well-defined main categories. The study reveals that despite a slight majority of KENET institutions having ICT policies, there is a minority without such policies. Most of the currently developed policies have been developed by a combination of two or more formulation methods. Most KENET members prefer to have online templates and are keen to urge KENET to provide a policy formulation template and to organize forums through which knowledge on their use can be disseminated. The objectives of this research are achieved when a sample online policy template and framework are developed and shared with selected KENET institutions. Positive feedback from member institutions justifies an achievement in policy formulation, something that can be taken up by KENET in developing a sample template for its member institutions.
- ItemIntegrating perceived security with technology acceptance model to examine consumer trust in online transactions(Strathmore University, 2013) Omondi, Christine AchiengAdvances in online shopping technology have created fresh ways of handling daily shopping interaction. User acceptance of technology has been an important field of study for quite some time now. Trust in information technology has however not been addressed to a great extent in the context of the Internet environment. Trust plays a central role in helping consumers overcome perceptions of risk and insecurity which hinder their involvement in online transactions. There have been many models proposed to explain and predict the use of a system, but the Technology Acceptance Model applied on the Internet environment has been the only one which has captured the most attention of the Information Systems community. A probability (systematic) sampling design was used to draw a representative sample of online shoppers and data collected through an online survey. We study their perceptions regarding security, trust and technology and their intentions to shop online at particular websites. There is an explanation of the main attributes of the concepts examined, with special attention being paid to the multi-dimensional nature of the variables and the relationships between them. This is followed by an examination of the validation processes of the measuring instruments. The findings of the study indicate that perceived privacy protection on information during online transactions Web site were the main factors influencing online shopping acceptance. We found that Web quality, categorized into system, information, and service quality, leads to greater trust in the company itself through the customers' perceptions about the web site's ease of use and usefulness. We also confirmed a positive relationship between customer trust in a company operating in the online environment and customer retention and intention to buy. Our study thus provided a balanced and integrative framework for influencing intention to use and to widespread adoption of online shopping. It enhanced our knowledge of the effect and relationship between perceived security and privacy on trust, which should help Web practitioners and researchers better understand user behavior in Web-based online retailing.
- ItemInteroperability framework for open source and proprietary software : a case of government of Kenya(Strathmore University, 2013) Marete, David MwendaExchange of information within the Government is usually through formal communication such as official letters, gazette notices , internal memos, circulars, print media and also through minutes . This has not been very effective, due to lack of seamless exchange of information among Government Ministries since they work independently. The main cause being lack of an interoperable platform in terms of software which would help ease exchange of information. As a result of this, a lot of inefficiencies in service delivery to the citizenry have been experienced. This has been confirmed through ratings in performance contracting of various sectors in government over the years. In order to achieve software interoperability framework within the Government, quantitative research method was used in collaboration with other research methods such as descriptive research. The research was carried out within the National Government to ascertain various issues that relate to software interoperability with a view of developing a standard framework that will act as a guideline within the National Government. Through the research , it was possible to justify how lack of this important guideline within government has led to denial of associated benefits to the citizenry. Since there is no universal standardized software interoperability framework that any Government could directly adopt without customization, it was important to develop a software interoperability framework that is based on known user requirements within the Government of Kenya hence the need for a Software Interoperability Framework. The main objective of the research being to develop software interoperability framework between open source and proprietary software, this was accomplished by enhancing an existing software interoperability conceptual model by ATHENA consortium. The framework has further been improved by introducing various parameters and components that have a direct effect on the framework due to their interrelation nature hence making the framework more comprehensive.
- ItemA model for Information Privacy Control Implementation on Online Social Networks(Strathmore University, 2013-05) Nyaboke, Mogire NancyResearch has shown that social network users typically understand the negative implications of unchecked exposure on social networks. Further, they are concerned about the privacy of some of their data that they consider sensitive. However many still fail to use privacy settings when they post sensitive data. As a consequence, users may share with the public private information that may be used negatively by unintended viewers. Privacy breaches have been reported many times as a result of uncontrolled social network information access. While the purpose of social networks is sharing of information, security must be preserved through control of information privacy to limit access on information to the intended audiences. Social network users have data that they would like to keep confidential as confirmed in the survey. However social networks in their original design leave the task of adjusting privacy settings to the user who as evidenced by research will often not change the default privacy settings. Consequently, the information privacy control task falls back to the social network service provider who has a corporate social responsibility to provide a secure networking environment. In effecting that responsibility, it is necessary to enforce privacy control on critical data items in order to achieve the acceptable minimum security. However there is still no widely accepted privacy enforcement model. This paper proposes an information control model targeted at designers of social networking websites. The model offers a data privacy enforcement scheme derived from analysis of sensitivity of data in relation to the security clearance level of a prospective viewer. If the sensitivity of data exceeds viewing permissions for a given prospective viewer, access is denied. However if permission level is greater than the sensitivity of data then access is granted. Enforcement actions are performed automatically by the system, while notifying the data owner using flags and allowing for a deliberate reversal of such enforcement.
- ItemA mobile application prototype for information access in University environment(Strathmore University, 2013-06) Swigo, Leonard EmmanuelUniversities just like other institutions are now making the use of Information Technology (IT) to disseminate information and mostly using the website. The use of websites in disseminating the university's information limits the mobility nature of campus environment and therefore the need to make such information available to the always-moving students on campus and outside campus. The use of Mobile Applications in business has increased tremendously over the couple of years which has been influenced by the fast growing development of powerful and affordable mobile devices. The integration ofthe Mobile Apps and powerful mobile gadgets provides an opportunity to distribute Information in a quick, secure and convenient manner anywhere, anytime. This research adapting a Quasi-experimental methodology with a case study and Qualitative approach to facilitate data collection, analyzed the relevance of mobile applications in disseminating information and the limitations towards the implementation of Mobile Applications at St. John's University of Tanzania. The Population for this study comprised a total of approximately 2000 people. The Information system users were divided into two groups; students and university staff, the university staff were later stratified further into two groups, System Analysts/administrators and normal system users (students). The Primary data were gathered through interviews with both closed and open-ended questions, and participatory observation. The researcher finally developed a Prototype (in Windows Phone platform) and tested its usability, functional and compatibility (Modules and Integrated App test) as a tool to be adopted to disseminate information in university environment. The Prototype was deployed on windows phones and gave students access to the University Information such as Student's grades, Notices and timetable detail providing a controlled access through logins. Students and university staff explained to be satisfied with the application suggesting to be the most preferable means of communication in universities only that its implementations seems to be constrained by the limited skills of university's staff on mobile Applications development and the access control in such environment.