MSIT Theses and Dissertations (2013)
Permanent URI for this collection
Now showing 1 - 5 of 30
- ItemFramework for data sharing between satellite campuses in public universities : the case of Jomo Kenyatta University of Agriculture and Technology (JKUAT)(Strathmore University, 2013) Maina, Esther WangechiIn the past decade Public Universities in Kenya have more than quadrupled in number from seven in 2002 to over thirty in 2013. This increase has contributed to the introduction of universities constituent campuses and colleges in all major towns in Kenya. With the satellite campuses dispersed all over the country the data being held by these campuses is distributed in heterogeneous formats and not being shared. Some campuses maintain data repository but there is no platform or policies for facilitating data sharing. Data is duplicated across satellite campuses, which makes accessibility, availability and reinforcing mechanisms for data security very difficult. There exists a major gap in data sharing with no clear framework for the universities to use. The study sought to identify the requirements for data sharing between public universities and their satellite campuses, identify platforms for data sharing between satellite campuses and use this information to propose and validate a framework for data sharing. The study was conducted through the applied research design; data was collected using structured questionnaire from JKUAT, ICT personnel and campus administrators, two questionnaires were administered to each of the 12 satellite campuses in JKUAT with an additional two for the main campus. The data was analyzed using descriptive analysis and presented in tables and figures. The study established that 83% of the respondents do not share data. Network infrastructure was the highest rated requirements for data sharing with 70.8%. A web based platform and data security were also preferred with 79.2% each. Framework that support virtualization and distributed systems was also preferred with 66.7% and 62.5% respectively. Other requirements for data sharing included data accessibility and availability. The study concludes that the university needs to come up with proper infrastructure and policies to implement data sharing due to the dispersed nature of its campuses. The study recommends use of Cloud for data virtualization and storage, combined with WebGIS and Grid technology to facilitate data sharing.
- ItemPortal to address agricultural information needs of banana farmers in Embu County(Strathmore University, 2013) Ireri, Evelyn WanjiruInformation and Communication Technologies (ICTs) are important tools to use in agriculture today. This is more so because ICTs can make significant contribution in increasing efficiency, productivity and sustainabiIity of smallscale farmers. The greatest challenge is that despite many initiatives Agricultural knowledge and information has not been tapped and content availed to farmers in an all inclusive format. Currently the available websites only provide information which is of very little value to the farmer since it does not cover the whole agricultural value chain. The design of this research was action in that it tried to understand the banana farmers' agricultural information needs and challenges that farmers face while using ICTs, interviews were conducted to banana farmers in Embu county. This information was intended to aid the researcher in developing an appropriate tool (portal) which could contain all the information a farmer is interested in throughout the agricultural value chain. The developed portal contains information from production, to value addition and marketing which is the final stage of the agricultural value chain. However, the research recommends that the agricultural extension offices should be fully equipped with computers and internet to facilitate the extension officers to be able to train the farmers on how to acquire this information through the internet using their phones or available information hubs. Findings also suggest the need for policy makers and even private sector to invest in making access to ICT tools by farmers easier.
- ItemAn interoperability model for mobile money transfer systems in Kenya(Strathmore University, 2013-04) Maina, Gichangi PeterMobile money transfer systems have grown in use, spread and reach over the last couple of years. Multiple platforms have been developed to deliver these mobile money transfer services. In Kenya, for example, at least four different mobile money systems exist. These systems have in fact evolved into financial services tools for both the banked and the unbanked by allowing users to fulfill multiple functions using their virtual money. However, little has been done to define standards that would allow seamless integration and interoperability of the disparate platforms. This has exposed users to various challenges, denied them flexibility and choice and has cost the service providers an obvious opportunity. This study sought to examine the impact interoperability, or lack thereof, on customer behavior as regards use of mobile money transfer services in Kenya. The descriptive research methodology was espoused for this study. It involved the application of questiom1aires and structured interviews to selected groups of people as samples. The two primary groups were mobile money system users and mobile money transfer service providers. Data was gathered to assess the nature of use of the systems for peer-to-peer money transfer transactions between scheme and non-scheme members. Based on the findings of the research, an inter-operability model that would support seamless integration between the systems was designed. The research recommends that mobile money service providers and other industry players adopt and implement the mobile money transfer interoperability model proposed so as to enhance the customer experience and enhance their product offering.
- ItemFramework for enhancing cyber security: case study of Kenyan Internet Service Providers(Strathmore University, 2013-06) Gitonga, Edward GithinjiCyber security plays an important role in ensuring an ISP's services availability so as to ensure its clients satisfaction. It is just not about detection of cyber threats but also having the best practices to thwart such attacks. This involves classifying the attacks and assessing their impact should they be successful; while doing this, it is also necessary to note the defense mechanisms currently in place and come up with the best strategies to deal with such attacks. ISPs monitor the traffic that is routed through their network, detecting threats and reporting the same to their clients for them to protect their own networks. Currently, ISPs just detect and advice their clients but it is not just about detection but most importantly what to do with the data once it is detected. Having a framework that guides an organization on what to do should a cyber attack be detected greatly improves the organization's preparedness in dealing with cyber attacks. This research undertook both quantitative and qualitative approaches of the cyber threats that Kenyan ISPs face and ways of improving their preparedness to handle cyber attacks with the use of both primary and secondary data sources. A descriptive research design was employed with the use of questionnaires as principal data collection instrument, Several cyber security frameworks were evaluated and the proposed framework borrowed from the SCADA security framework and the game theoretic data fusion approach for cyber situation awareness and impact assessment. The questionnaire was distributed to all the individuals in the sample. The sample size was drawn from the technical staff of these Kenyan ISPs. Collected data was analyzed using both quantitative and qualitative data analysis approaches. Data from the questionnaires was checked for completeness, coded and logged into the computer system using Statistical Package for Social Science (SPSS). The study found out that ISPs are interested in a framework for handling cyber attack data (100%) so as to better handle cyber threats. Also, the following was established on cyber threats: for malware, 95% agreed that it does occur; for phishing, 82% agreed; for pharming (diversion of internet traffic), 59% agreed; and for spam, 86% agreed. On whether employees in the organization are well-trained to handle cyber security threats, only 37% agreed. The study concludes with a cyber security framework composed of cyber attack classification, attacks database, impact analysis, and recommended best response strategies. The framework provides a mechanism for handling cyber attack data, from classification of the attack type, vulnerabilities' evaluation and the best strategies for preventing the attack.
- ItemInformation Technology sourcing decision framework: the case of Kenya Revenue Authority(Strathmore University, 2013) Kinyua, Florence MugureIn recent years public organizations have turned to outsourcing Information Technology (IT) related service operations, as a strategic option aimed at organizational growth and attainment of its goals. Firms undertake IT outsourcing in an attempt to lower costs, put more focus on their core business and improve quality of IT services. A great challenge for most firms lies in expressing IT initiatives in value-for-money and convincing the business that the most cost-effective solution is being sought. Information technology managers have acknowledged that process frameworks are critical determinants of successful outsourcing initiatives. KRA plans to upgrade ICT to facilitate achievement of international best practice, raise performance standards and reduce operational costs. To achieve these goals, KRA needs to assess its internal technical capacity vis-a-vis outsourcing some of the IT services and make decision on the most cost effective IT sourcing strategy. A number of frameworks exist that attempt to explain various aspects of the outsourcing process. The different aspects range from making the outsourcing decision, implementing the outsourcing decision and the subsequent monitoring and management of the outsourcing initiative. The main objective of this research was to propose an IT sourcing decision framework that would assist decision makers form a basis for their IT sourcing strategy. An in-depth research into literature, articles and journals on IT sourcing was done to establish the various aspects of outsourcing. Analysis of various available frameworks that explain the aspects of IT sourcing decision making process with their strengths and weaknesses is also performed. Online questionnaires administered to middle and senior level managers at KRA were used to establish how IT sourcing decisions are currently managed. The various aspects of IT sourcing decision making were established as why outsource, what to outsource and how to outsource. From the findings, it was also established that KRA practices selective sourcing where some activities are performed in-house while others are outsourced. It was also established that there was no clear way of measuring performance of outsourcing initiatives. Based on these findings, an Information Technology outsourcing decision framework was developed and validated.