110 research outputs found

    Impact of information communication technology infrastructure on e-banking at Barclays Bank Kenya.

    Get PDF
    Thesis (MBA)-University of KwaZulu-Natal, 2006.The purpose of this study is to examine the extent to which the existing ICT infrastructure in Kenya affects the provision of e-banking services at Barclays Bank of Kenya. The study also compares e-banking applications in Kenyan banks with best practice examples from other countries. Other areas studied are the existing ICT and e-banking security systems as well as the policy and regulatory framework that governs e-banking systems in Kenya. The dilemma still facing the banking and ICT sectors in Kenya is whether the existing ICT infrastructure is adequate and efficient enough to satisfy the demand for voice and data communications required in the provision of e-banking services. The problems that require attention are lack of appropriate equipment to serve a modem financial system and provide the full range of e-banking services, inadequate telephone landlines due to vandalism and failure of Telkom Kenya to expand its network. Other problems include lack of reliable Internet connection, high access costs for landlines and Internet, inadequate capital investment for the provision of sufficient ICT services, dumping of contraband traffic on Telkom's network, cyber crime due to lack of proper e-banking security systems and lack of a suitable policy and regulatory framework for Information Communication Technologies. A qualitative research methodology and a typical case study research design are adopted in the study. Barclays Bank of Kenya is examined as a case study. The activities of the banking and ICT key industry players, Central Bank of Kenya, Telkom Kenya, Communications Commission of Kenya and Today's Online, are also examined. In addition four other commercial banks namely, Standard Chartered, Citibank, Kenya Commercial Bank and Commercial Bank of Africa are contacted and their senior management interviewed concerning this study. Data is collected from interviews, archives, newspapers, published reports and the Internet. The study findings reveal that Barclays Bank Kenya offers different forms of e-banking services namely, Internet banking, online banking, telephone banking and mobile banking. However, the poor state of the ICT infrastructure hinders the growth of ebanking services in Barclays and other Kenyan banks. The existing security measures for landlines and e-banking systems in Kenya are also incapable of preventing most forms of risks and threats and need to be improved. Kenya also lacks a sound policy and regulatory framework to efficiently curb these ICT and e-banking risks. The study concludes by recommending that the Kenyan government should encourage the private sector and development partners to invest in ICT infrastructure and that a comprehensive review of existing laws relating to ICT and e-banking systems be done and amendments formulated

    Creation of value with open source software in the telecommunications field

    Get PDF
    Tese de doutoramento. Engenharia Electrotécnica e de Computadores. Faculdade de Engenharia. Universidade do Porto. 200

    Consuming data sources to generate actionable items

    Get PDF
    Plataforma que consumeixi sensors IoT i sistemes d'alertes per a generar accions de resposta relacionades amb els sistemes d'alerta. Per a demostrar els casos d'ús possibles s'incorporaran funcions requerides per Projectes Europeus, solucions comercials i solucions compatibles amb estàndards

    Kenya ICT sector performance review, 2009/2010

    Get PDF
    Through network development Research ICT Africa (RIA) works to build an African knowledge base in support of ICT policy and regulatory design processes, and to monitor and review policy and regulatory developments on the continent. This report is based on a review of the ICT sector in Kenya from a supply side perspective. The national ICT policy of March 2006 is currently under review. Developments within the sector include increasing convergence of broadcasting and telecommunications, increased need and availability of undersea-fibre bandwidth, and the economic blueprint as factors that policy needs to take into account. This report is detailed and comprehensive

    Secure interoperation of wireless technologies

    Get PDF
    Tremendous emphasis has been placed on wireless technologies recently and it is expected that mobile communications will become an even bigger key driver for growth and innovation in the near future. The purpose of this paper is to study the securing, development, integration and implementation of an always on, always available, and accessible from anywhere secure wireless communication environment. Our analysis of the different wireless technologies reveals that a number of obstacles have to be managed before truly transparent wireless public data consumer offering is available. Our concern revolves around the technical development and implementation efforts of integrated wireless technologies enveloped with management processes of change and evolution. Wireless technologies have influenced our daily lives and will undoubtedly continue to play a significant role in the future. This dissertation focuses on the interoperation of wireless technologies, exploring, evaluating and presenting representations of secure, fully integrated wireless environments. The purpose is to find a cost effective, open, viable, sustainable consumer orientated high data speed offering which not only adheres to basic security requirements but surpasses it. By bringing the network to the subscriber we generate an “always-on” and “always-available” solution for data requirements fulfilling an ever increasing human demand for access to resources anywhere, anytime. A background literature of various wireless technologies, techniques and value added services is provided. An approach for the securing of critical content over wireless links in chapter seven provides a basis for access by position concepts presented in chapter eight. This secure approach to location-aware mobile access control is an essential security enhancement in the integration and interoperation models illustrated in chapter nine. These models, appropriately named SWARM 1 and SWARM 2 (System for Wireless and Roaming Mobility), illustrate different approaches to achieving a secure, fully coherent, consumer orientated, wireless data communications environment.Dissertation (MSc (Computer Science))--University of Pretoria, 2003.Computer Scienceunrestricte
    corecore