Browsing MSIT Theses and Dissertations (2012) by Issue Date
Now showing items 1-20 of 24
-
Investigating applicability of Near Field Communication technology in Kenya
(2012)Mobile phones have become ubiquitous companions in our life, enabling communication nearly always and everywhere. Additionally they facilitate information access to mobile services and the internet. Besides these ... -
An evaluation and turnaround strategy for troubled ERP projects;
(Strathmore University, 2012-02)A troubled system, also referred to as a challenged system, is one that is delivered; behind schedule, or exceeds budgets, yet does not meet user requirements. A lot of research has been conducted on software project ... -
Implementation of public key infrastructure for eprocurement system : a case of selected state corporations
(Strathmore University, 2012-06)The dynamic character of the world means that it can be difficult to forecast future conditions and thus flexible strategies may be needed to cope with uncertainty. E-Procurement has been seen as a response to the ... -
Information systems security management
(Strathmore University, 2012-06)Institutions of higher learning have a desire to supply knowledge to all those who seek It. Currently Universities are finding that they have to balance between their initial Goals and adoption of adequate measure to ... -
Explosive trace detection service model
(Strathmore University, 2012-10)This research describes explosive trace detection service architecture which combines the strength of the mobile phones, the polymer sensor and next generation cellular network. The aim is to create a system that will ... -
Best Practices in Implementing Core Banking Systems
(2013-11-13)Majority of Kenyan Banks are increasingly capitalizing on avant-garde core banking systems (CBS) for automating their transactions in order to compete amongst themselves, cater for ever growing customer needs and to ... -
Mobile Device Security Implementation Framework
(2013-11-13)The advancement in the mobile industry has alienated mobile devices from their traditional roles of voice call and SMS into areas such data access and storage. The greatest headache to most data owners is thus security of ... -
Framework for quality assessment of E-government services delivery in Kenya
(2013-11-13)Electronic government, or e-Government, is meant to increase citizens' convenience and accessibility of government services and information as much as government's access to citizens to revolutionize their work, and ... -
Combating insider threat using behaviour based access control
(2013-11-13)Insider threat poses a great risk to financial institutions due to the mere fact that they have privilege and authentic access to corporate and customer data. Insiders are trusted persons, have legitimate access, have ... -
A Model for costing information technology services in public organizations : case study of the Kenya Revenue Authority
Public organizations are increasingly embracing technology as a means of achieving operational efficiency and in the process reduce the cost of doing business. It is necessary for organizations to have a clear financial ... -
IT outsourcing adoption in Non-profit organizations in Kenya
In recent years, information technology (IT) outsourcing continues to receive favorable acceptance to maximize organization's benefits. In-turn, vast amount of information has been produced about the IT outsourcing phenomenon ... -
The Strategic value of business intelligence systems : a case study of GSM companies in Kenya
This research is intended to establish why companies especially in Telcom sector have low adoption rates of business intelligence tools already implemented. Telcom industry anywhere in the world is highly dynamic and super ... -
A model for estimating network infrastructure costs : a case for all-fibre LAN networks
The 21st century is an era that has been characterised by phenomenal growth in data rates at the local area network (intranet), extranet and the Internet.This trend has been pushed by the widespread deployment in organisations ... -
A Model to measure information security awareness level in an organization : case study of Kenya commercial bank.
Information Security awareness forms a key basic part of Information Security Strategy within most organizations. Organizations that tend to be more conscious regarding Information Security will invest more than organizations ... -
Adoption of ICT innovations for reduced TCO and overall capital expenditure
Compared to other industries, the pace of evolution in the field of Information Technology (IT) has been on an ever increasing upward trend for the last decade or more. This evolution can and has been witnessed both in the ... -
A Fraud investigative and detective framework in the motor insurance industry: a Kenyan perspective
Insurance fraud is a serious and growing problem, with fraudsters’ always perfecting their schemes to avoid detection by the basic approaches. This has caused a rise in fraudulent claims that get paid and increased loss ... -
Towards a framework for the adoption of information and communication technology by maize farmers
Agriculture is the backbone of the Kenyan economy and directly contributes to Gross Domestic Product of 25%. Maize is the major staple food and majority of Kenyan‟s cultivate it. The future of food security and welfare of ... -
Integrating multimedia content with learning management systems : a case of Strathmore University
In Kenya more and more institutions of higher learning and organizations are deploying eLearning management systems in a bid to tap into their associative benefits. However,these institutions are still not reaping the full ... -
Framework for adopting green IT in Kenya
Green IT, also known as green computing, is an umbrella term referring to environmentally sound information technologies and systems, applications, and practices. It refers to supporting business critical computing needs ... -
Mitigating information security vulnerabilities in public institutions : case study of teachers service commission (TSC)
While Information security is a major concern in the private sector, many public institutions have not given it equal attention. However, the Government has taken keen measures on embracing ICT, but the concentration has ...