110 research outputs found
Impact of information communication technology infrastructure on e-banking at Barclays Bank Kenya.
Thesis (MBA)-University of KwaZulu-Natal, 2006.The purpose of this study is to examine the extent to which the existing ICT infrastructure
in Kenya affects the provision of e-banking services at Barclays Bank of Kenya. The
study also compares e-banking applications in Kenyan banks with best practice examples
from other countries. Other areas studied are the existing ICT and e-banking security
systems as well as the policy and regulatory framework that governs e-banking systems in Kenya.
The dilemma still facing the banking and ICT sectors in Kenya is whether the existing
ICT infrastructure is adequate and efficient enough to satisfy the demand for voice and
data communications required in the provision of e-banking services. The problems that
require attention are lack of appropriate equipment to serve a modem financial system
and provide the full range of e-banking services, inadequate telephone landlines due to
vandalism and failure of Telkom Kenya to expand its network. Other problems include
lack of reliable Internet connection, high access costs for landlines and Internet,
inadequate capital investment for the provision of sufficient ICT services, dumping of
contraband traffic on Telkom's network, cyber crime due to lack of proper e-banking
security systems and lack of a suitable policy and regulatory framework for Information Communication Technologies.
A qualitative research methodology and a typical case study research design are adopted
in the study. Barclays Bank of Kenya is examined as a case study. The activities of the
banking and ICT key industry players, Central Bank of Kenya, Telkom Kenya,
Communications Commission of Kenya and Today's Online, are also examined. In
addition four other commercial banks namely, Standard Chartered, Citibank, Kenya
Commercial Bank and Commercial Bank of Africa are contacted and their senior
management interviewed concerning this study. Data is collected from interviews,
archives, newspapers, published reports and the Internet.
The study findings reveal that Barclays Bank Kenya offers different forms of e-banking
services namely, Internet banking, online banking, telephone banking and mobile
banking. However, the poor state of the ICT infrastructure hinders the growth of ebanking
services in Barclays and other Kenyan banks. The existing security measures for
landlines and e-banking systems in Kenya are also incapable of preventing most forms of
risks and threats and need to be improved. Kenya also lacks a sound policy and regulatory
framework to efficiently curb these ICT and e-banking risks.
The study concludes by recommending that the Kenyan government should encourage the
private sector and development partners to invest in ICT infrastructure and that a
comprehensive review of existing laws relating to ICT and e-banking systems be done and amendments formulated
Recommended from our members
The influence of standardisation and regulation on the development of intelligent networks
In today’s global economy a flexible and responsive telecommunications infrastructure is essential to the maintenance and development of a country’s economy. Within a free market, such an infrastructure depends upon the use of common standards; either imposed as a consequence of regulation or evolved through the operation of the market. This thesis investigates the influence of regulation and standardisation on Intelligent Network telecommunications technology by addressing the hypothesis: Tight architecture-based regulation is inappropriate for a rapidly changing telecommunications environment, since that environment is continually challenging and redefining the boundaries of technological change. The multi-method approach adopted is based upon triangulation to identify multiple viewpoints. A Stakeholder Analysis was employed to help categorise those with an interest in Intelligent Networks and provide a basis for data collection. The primary data was gathered using a combination of surveys and interviews. The thesis illustrates a wide range of original research. A unique analysis framework was constructed to identify a number of factors, including technical and commercial influences and their impact on the choice of IN architecture and the implementation of regulations. This framework offers a new perspective with which to view IN architectures; leading to the development and implementation of alternative IN architecture models. A number of these architectures have been constructed, together with some novel services, to demonstrate what could be achieved by employing flexible, less detailed standards, or making use of proprietary protocols. The research concludes that tight regulation is not appropriate for Intelligent Network technology. Instead, encouragement for implementation and interconnection is better shaped through the development and adoption of de-jure standards
Creation of value with open source software in the telecommunications field
Tese de doutoramento. Engenharia Electrotécnica e de Computadores. Faculdade de Engenharia. Universidade do Porto. 200
Consuming data sources to generate actionable items
Plataforma que consumeixi sensors IoT i sistemes d'alertes per a generar accions de resposta relacionades amb els sistemes d'alerta. Per a demostrar els casos d'ús possibles s'incorporaran funcions requerides per Projectes Europeus, solucions comercials i solucions compatibles amb estàndards
Kenya ICT sector performance review, 2009/2010
Through network development Research ICT Africa (RIA) works to build an African knowledge base in support of ICT policy and regulatory design processes, and to monitor and review policy and regulatory developments on the continent. This report is based on a review of the ICT sector in Kenya from a supply side perspective. The national ICT policy of March 2006 is currently under review. Developments within the sector include increasing convergence of broadcasting and telecommunications, increased need and availability of undersea-fibre bandwidth, and the economic blueprint as factors that policy needs to take into account. This report is detailed and comprehensive
Secure interoperation of wireless technologies
Tremendous emphasis has been placed on wireless technologies recently and it is expected that mobile communications will become an even bigger key driver for growth and innovation in the near future. The purpose of this paper is to study the securing, development, integration and implementation of an always on, always available, and accessible from anywhere secure wireless communication environment. Our analysis of the different wireless technologies reveals that a number of obstacles have to be managed before truly transparent wireless public data consumer offering is available. Our concern revolves around the technical development and implementation efforts of integrated wireless technologies enveloped with management processes of change and evolution. Wireless technologies have influenced our daily lives and will undoubtedly continue to play a significant role in the future. This dissertation focuses on the interoperation of wireless technologies, exploring, evaluating and presenting representations of secure, fully integrated wireless environments. The purpose is to find a cost effective, open, viable, sustainable consumer orientated high data speed offering which not only adheres to basic security requirements but surpasses it. By bringing the network to the subscriber we generate an “always-on” and “always-available” solution for data requirements fulfilling an ever increasing human demand for access to resources anywhere, anytime. A background literature of various wireless technologies, techniques and value added services is provided. An approach for the securing of critical content over wireless links in chapter seven provides a basis for access by position concepts presented in chapter eight. This secure approach to location-aware mobile access control is an essential security enhancement in the integration and interoperation models illustrated in chapter nine. These models, appropriately named SWARM 1 and SWARM 2 (System for Wireless and Roaming Mobility), illustrate different approaches to achieving a secure, fully coherent, consumer orientated, wireless data communications environment.Dissertation (MSc (Computer Science))--University of Pretoria, 2003.Computer Scienceunrestricte
- …