Department of Information Technology

Browse

Recent Submissions

Now showing 1 - 7 of 7
  • PublicationOpen Access
    An Assesment of Information Technology Adoption and Performance of Employees in Public Universities in Kenya: A Case Study of Kenyatta University, Kiambu County
    (International Research Journal of Business and Strategic Management, 2023) Ondego, Christine Khasayi; Omuya, Jacqueline
    It is evident that a number of nations have shown that the revolution brought by ICT in terms of its skill-basis has raised demand for highly trained people in comparison to those with lower levels of education. The main purpose of the study was to establish how ICT information access affects employees’ performance in Public Universities in Kenya. The study was based on systems theory and Technology Acceptance Model (TAM) theory. The study adopted a survey research design because data was collected from respondents at a particular time. 230 of the study population was selected using simple random sampling method, taking care that the sample is fairly representative of the study population. The main tool that was employed for data collection was the questionnaires. The piloting of data collection instruments was undertaken in Multi Media University and Jomo Kenyatta University of Agriculture & Technology. Following piloting, the validity and reliability of the tools of data collection was ascertained. The study employed the Split-Half technique in testing reliability. The data was coded and fed into the computer for analysis using Statistical Package for Social Sciences (SPSS) version 26. In the analysis phase, descriptive statistical methods including frequency counts, percentages, tables and graphs to depict distribution and pie charts was employed. The objective of the study was the influence of ICT on information access. Based on this objective the study concluded that most of the staffs at KU use word of mouth, face to face, telephone or email to communicate. Also, the institution’s website is not equipped to support worker’s communication. There is an organization email communication but it is not well utilized. The objective recommended that the institution should equip its website, support workers communication and should have an organization email that should be used in communication.
  • PublicationOpen Access
    The Role of ICT-Based Monitoring and Evaluation Systems in Infrastructural Development in County Governments: Empirical Evidence from Machakos County, Kenya
    (International Journal of Scientific and Research Publications, 2022-12-06) Musyoka, Julius Ngila; Mutundu, Kennedy
    There exists knowledge gap in analysis of the influence of the general ICT-based M&E systems in county governments with a focus on data analysis and timely presentation to stakeholder, there an empirical gap in physical health infrastructural, road infrastructural development, market infrastructural development and sports infrastructural development ICT-based M&E. This study tried to fill the gap in knowledge by answering a question on what the role of ICT-based monitoring and evaluation systems in infrastructural development in county governments? The study used the Realist Evaluation Theory coupled with a descriptive design. The study was conducted in Machakos County, one of the 47 counties in the republic of Kenya with a target of both internal and external M&E contractors of the Machakos County Government since 2013 to 2022. The study used purposive sampling technique and census to select the study participants. Two forms of questionnaires were used to collect quantitative data; one for ICT departments and the other for M&E department of the County Government of Machakos. Interviews were used to collect qualitative data from the Heads of ICT and Project and Delivery M&E departments. The instruments were piloted at the county government of Kitui. Content validity of the instruments were assessed by experts while reliability was determined using Cronbach’s Alpha to ascertain items’ internal consistency (yielding r of at least 0.75). Descriptive and inferential statistics were used to analzyed quantitative data while the qualitative data was analzyed thematically. The study found that information and communication technology improvements had often led to new ideas. Because of technological progress, there were new methods, tools, and ways of doing things, as well as new opportunities and problems in infrastructural development in Machakos county government. In the construction industry, amenities like roads, bridges, and buildings were equipped with electronic sensors that could be accessed from afar and give information about access. Monitoring and evaluation (M&E) systems should be used by all sectors in the county to keep track of project progress, measure and evaluate project results.
  • PublicationOpen Access
    Automation-Based User Input Sql Injection Detectionand Prevention Framework
    (Computer and Information Science, 2023-03-02) Okello, Fredrick Ochieng; Kaburu, Dennis; John, Ndia G.
    Autodect framework protects management information systems (MIS) and databases from user input SQL injection attacks. This framework overcomes intrusion or penetration into the system by automatically detecting and preventing attacks from the user input end. The attack intentions is also known since it is linked to a proxy database, which has a normal and abnormal code vector profiles that helps to gather information about the intent as well as knowing the areas of interest while conducting the attack. The information about the attack is forwarded to Autodect knowledge base (database), meaning that any successive attacks from the proxy database will be compared to the existing attack pattern logs in the knowledge base, in future this knowledge base-driven database will help organizations to analyze trends of attackers, profile them and deter them. The research evaluated the existing security frameworks used to prevent user input SQL injection; analysis was also done on the factors that lead to the detection of SQL injection. This knowledge-based framework is able to predict the end goal of any injected attack vector. (Known and unknown signatures). Experiments were conducted on true and simulation websites and open-source datasets to analyze the performance and a comparison drawn between the Autodect framework and other existing tools. The research showed that Autodect framework has an accuracy level of 0.98. The research found a gap that all existing tools and frameworks never came up with a standard datasets for sql injection, neither do we have a universally accepted standard data set.
  • PublicationMetadata only
    IT Workforce Planning Practices in Kenya
    (International Journal of Innovation and Economic Development, 2022-02) Chege, Stanley; Wanyembi’s ,Gregory; Nyamboga, Constantine; Obrenovic ,Bojan
    With looming talent shortages and the mainframe era IT staff retirement, workforce planning is necessary in order to maintain business continuity. Without a dedicated workforce plan, CIOs and business leaders will be unable to meet the business requirements of the future. To 46% of business leaders, workforce planning is a top priority, yet only 13% do it effectively. The aim of the study is to provide a guidance on best practices in workforce planning to all the organizations in Kenya. The findings are that some organizations in Kenya have executed and implemented best practices in workforce planning. There is a positive relationship between good workforce planning practices and business performance.
  • PublicationOpen Access
    A Survey of Biometric Authentication Technologies Towards Secure And Robust Systems: A Case Study of Mount Kenya University
    (Computer and Information Science(Canadian Center of Science and Education), 2022) Wambui ,Boniface Mwangi; Gikandi ,Joyce W; Wambugu , Geoffrey Mariga
    In response to the increased demand for more effective authentication methods, the usage of biometric authentication to secure systems against unwanted access has grown. Because of the recent COVID-19 pandemic outbreak, any direct physical contact with the system should be avoided. Furthermore, current authentication systems lack the necessary security features, making them vulnerable to cyber risks such as forgery by unethical employees and unauthorized users. The goal of this paper is to investigate the existing biometric authentication systems and propose the best security models to overcome the weaknesses of existing technologies. The study employed mixed methodology, which was qualitative and quantitative in nature and relied on primary and secondary sources of data. The researcher collected the data from a population of 300 staff of Mount Kenya University with a sample size of 169 respondents. The R2 value on the relationship between the studied dependent and independent variables was R2 = 0.792 showing a good fit of the model since is greater than 50% of the test item used in the case study. Therefore the study recommends that institutions to implement a contactless biometric system to eliminate physical contact and use multimodal system that will help overcome the existing challenges associated with unimodal systems. There are still gaps for future researchers where they need to focus on the various decision algorithms that are best efficient in verifying users before they are authenticated in the system.
  • PublicationOpen Access
    Adapting Social Networking Sites for Scholarly Communication among Postgraduate Students in Kenyan Universities
    (SRELS Journal of Information Management, 2016-02) Nyamboga, Constantine; Chweya, Tinega Haron; Okello, Gilbert
    Information overload experienced in the information society calls for improved human information processing. Researchers around the globe are now focusing research on investigating the contributions of multimedia technologies on information processing. This research seeks to bring out the contributions of PowerPoint presentation on content recall, interpersonal interaction and attitudes towards PowerPoint presentation in communication. This research was conducted on the senior one (S1) secondary school students of GSS EPA, in Nyarugenge district, Kigali city province, Rwanda. A sample size of 180 students was selected based on Slovin's formula from a population of 330 senior one students. Through a completely randomized experimental pretest-posttest design, the sample size was randomly assigned to three groups: The group one (G1) is the control group while group two (G2) and group three (G3) experimental groups. Students in group one (G1) were exposed to only talk-and-chalk (less interactive communication strategy) while those in group two (G2) were exposed to talk-and-chalk with PowerPoint presentation and finally students in group three (G3) were exposed only to PowerPoint presentations (a more interactive communication strategy). The researchers used questionnaires, observations and test questions to collect and analyze the data collected in order to establish the relationship between multimedia and student learning attitude.
  • PublicationOpen Access
    Physicians Behavioral Approach on Health Informatics Procedure: Hypothetical Perspectives
    (International Journal of Scientific and Research Publications, 2016-03) Makori, Abanti Cyrus
    This paper presents the critical review of the literature starting from a Global Perspective of Health Informatics, the Health Informatics situations in Kenya, factors Influencing Health Informatics Adoption, Health Informatics Privacy and Security, Biometric Feature in Wireless Body Area Network. The paper also addresses Health Informatics Ethical Issues, ethical concern with Information Technology Performance, health Workers Personality Traits, theoretical models, comparison of Theories used in this Research. Ethical issues Associated with Adoption of Health Information System and then the Conceptual Model.