Browsing MSIT Theses and Dissertations by Title
Now showing items 1-20 of 279
-
A Framework for evaluating ICT use in teacher educ...
Teachers are under increasing pressure to use Information and Communication Technology to impart to students the knowledge, skills and attitudes they need to survive in the 21st Century. The teaching profession needs to ... -
A Fraud investigative and detective framework in the motor insurance industry: a Kenyan perspective
Insurance fraud is a serious and growing problem, with fraudsters’ always perfecting their schemes to avoid detection by the basic approaches. This has caused a rise in fraudulent claims that get paid and increased loss ... -
A GIS decision based model for determining the best path for connection to a power distribution network a case study of Kenya power and lighting company limited
The purpose of this study is to present a GIS based decision model for determining the best path for connection to a power distribution network. The model was derived from studies that consider the design of the power ... -
A Model for costing information technology services in public organizations : case study of the Kenya Revenue Authority
Public organizations are increasingly embracing technology as a means of achieving operational efficiency and in the process reduce the cost of doing business. It is necessary for organizations to have a clear financial ... -
A model for estimating network infrastructure costs : a case for all-fibre LAN networks
The 21st century is an era that has been characterised by phenomenal growth in data rates at the local area network (intranet), extranet and the Internet.This trend has been pushed by the widespread deployment in organisations ... -
A Model to measure information security awareness level in an organization : case study of Kenya commercial bank.
Information Security awareness forms a key basic part of Information Security Strategy within most organizations. Organizations that tend to be more conscious regarding Information Security will invest more than organizations ... -
A requirements elicitation process model for health management information systems: case of Kenyatta National Hospital
Requirements Elicitation (RE) is about learning and understanding the needs of users and stakeholders with the aim of communicating these needs to the system developers. Requirements Elicitation is an important stage in ... -
A Software upgrades investment model : a case of Windows operating system in Kenya
The revolution of software has introduced new actors and market mechanisms. Effective software management is crucial for development and survival of any company. IT upgrades investment in a crucial part in software management. ... -
Achieving corporate agility through online social networks : a framework for Strategic Business Networks
(Strathmore University, 2011)When a computer network connects people or organizations, it is an Online Social Network. Yet the study of such computer-supported social networks has not received as much attention as studies of online person-to-person ... -
Addressing ubiquitous information dissemination in the agricultural sector (Imenti north district) :using WAE and WAP technology
(Strathmore University, 2009) -
Adoption of ICT innovations for reduced TCO and overall capital expenditure
Compared to other industries, the pace of evolution in the field of Information Technology (IT) has been on an ever increasing upward trend for the last decade or more. This evolution can and has been witnessed both in the ... -
An agency core banking application using blockchain technology
(Strathmore University, 2020)Cut throat competition between various institutions in the financial sector in Kenya particularly banks have pushed them into adopting innovative ways to serve their customers and generate revenue. One of the innovations ... -
Agent-based modeling of spread of computer virus in a college campus.
(Strathmore University, 2010)Computer and data resources are critical assets to every organization. There is need to provide confidentiality, integrity, authentication and non-repudiation for these resources. Computer virus presents a threat to the ... -
An Algorithm for identification of terror events and hotspots using K-means and discriminant analysis approach
(Strathmore University, 2021)This study aimed at developing an algorithm for the identification of terror events and hotspots using K-means clustering and discriminant analysis, with pre-terror recruitment, planning and preparatory activities as the ... -
An Algorithm for inferring consumer-to-consumer trust on twitter
(Strathmore University, 2019)Trust amongst users engaged in consumer-to-consumer (C2C) e-commerce on Twitter as well as other social media platforms has been on the decline. The cost effective manner and timely delivery of C2C content makes it possible ... -
An assessment of application integration in public sector for e-government implementation
The success of e-government initiative depends on the provision of reliable data and information as governments keep data and information on their subjects. The integration of applications is a critical factor of electronic ... -
Anomaly and misuse intrusion detection model : using neuro-fuzzy logic.
(Strathmore University, 2009)Intrusion detection systems are increasingly a key part of systems defense. Various approaches to intrusion detection are currently being used, but they are relatively ineffective. A major concern of existing anomaly ... -
An application for career path decision making among high school students: case of Nairobi
(Strathmore University, 2016)In many developing countries, young people have and are embracing formal education as this has proven to be one of the main ways of alleviating poverty. In Kenya, the level of literacy has taken an upward trajectory for ... -
Application of geographical information system (GIS) for decision making in Kenya health facilities a case study of embakasi division
(2010)The purpose of this study was to examine how tangible information and application of GIS on health facilities distribution. It examine spatial distribution (location), accessibility, reasons for choosing facilities, mode ... -
Application of permissioned block chain technology on population data consolidation and sharing
(Strathmore University, 2020)Population registers should provide the single source of truth for data regarding each resident of a jurisdiction of the register, over the lifetime of the individual. This data can then be shared and used by government ...