9 research outputs found

    Towards the adoption of bring_your_own_device concept in an organization

    Get PDF
    Article published in International Journal of Social Sciences and Entrepreneurship Vol.1, Issue 11, 2014Bring_Your_Own_Device (BYOD) concept has gained momentum at the workplace in many organization but its adoption approaches are varied. An unstructured technology adoption of BYOD concepts might be catastrophic for an organization in terms of security breach, compromise in privacy, infrastructural control, among other challenges. This study aims at developing a model to guide in the adoption of BOYD concept in the telephony industry. Exploratory and adopted survey research design were used so as order to gain advantage from its intrinsic ability in describing the characteristics of a large population. The target population in the study was mobile telephony industry players with a sample consisting of four (4) members of management staff and two hundred and eight (208) other staff members. Based on the key findings, the study proposes Hybrid BYOD Model which integrates the aspect of specific Functionality model and Integrated Model of BOYD to answer to the key concerns on the adoption of BYOD concept by an organization in Kenya.Bring_Your_Own_Device (BYOD) concept has gained momentum at the workplace in many organization but its adoption approaches are varied. An unstructured technology adoption of BYOD concepts might be catastrophic for an organization in terms of security breach, compromise in privacy, infrastructural control, among other challenges. This study aims at developing a model to guide in the adoption of BOYD concept in the telephony industry. Exploratory and adopted survey research design were used so as order to gain advantage from its intrinsic ability in describing the characteristics of a large population. The target population in the study was mobile telephony industry players with a sample consisting of four (4) members of management staff and two hundred and eight (208) other staff members. Based on the key findings, the study proposes Hybrid BYOD Model which integrates the aspect of specific Functionality model and Integrated Model of BOYD to answer to the key concerns on the adoption of BYOD concept by an organization in Kenya

    Conflict resolution using statistical approach

    Get PDF
    African Journal of Mathematics and Computer Science Research Vol. 3(2), pp. 026-030, February, 2010 Available online at http://www.academicjournals.org/AJMCSR ISSN 2006-9731© 2010 Academic JournalsConflict can be described as a condition in which actions of one person prevent or compel some outcome at the resistance of the other. Quite often this can be seen as “two or more competing, often incompatible, responses to same event”. In this paper, a statistical approach to conflict resolution using the concept of bargaining game theory is presented. The approach gives chances of failure that are minimal since any offer made in a conflict situation is tied to the likelihood of it being accepted as it takes into considerations the demands from the other party. The approach presents a fair way of solving a conflict without affecting a system. An employer-employee relationship was used to illustrate the application of the approachConflict can be described as a condition in which actions of one person prevent or compel some outcome at the resistance of the other. Quite often this can be seen as “two or more competing, often incompatible, responses to same event”. In this paper, a statistical approach to conflict resolution using the concept of bargaining game theory is presented. The approach gives chances of failure that are minimal since any offer made in a conflict situation is tied to the likelihood of it being accepted as it takes into considerations the demands from the other party. The approach presents a fair way of solving a conflict without affecting a system. An employer-employee relationship was used to illustrate the application of the approach

    Conceptual framework for integration of organisation information processing theory and activity theory in enterprise systems implementation

    Get PDF
    Article published on British Journal of Mathematics & Computer Science 4(1): 61-72, 2014Implementation processes of systems in organizations follow different strategies and one of these strategies is to understand the uncertainties associated with the integration of the new system into an existing system environment so as to limit any challenges that may arise during the system implementation. Systems are implemented to address specific organizational needs,that is, activities the organization engages in. This paper explores organization information processing theory (OIPT) and activity theory in enterprise resource planning (ERP) systems implementation. A framework for the ERP implementation has been developed from a conceptual model on the interaction of organizational culture and structure. The modified model incorporates the activity theory and the OIPT and provides a formal way of bringing on board various interplaying variables in the system implementation process, more so for ERP systems.Implementation processes of systems in organizations follow different strategies and one of these strategies is to understand the uncertainties associated with the integration of the new system into an existing system environment so as to limit any challenges that may arise during the system implementation. Systems are implemented to address specific organizational needs,that is, activities the organization engages in. This paper explores organization information processing theory (OIPT) and activity theory in enterprise resource planning (ERP) systems implementation. A framework for the ERP implementation has been developed from a conceptual model on the interaction of organizational culture and structure. The modified model incorporates the activity theory and the OIPT and provides a formal way of bringing on board various interplaying variables in the system implementation process, more so for ERP systems

    Energy consumption in cloud computing environments

    Get PDF
    The conference aimed at supporting and stimulating active productive research set to strengthen the technical foundations of engineers and scientists in the continent, through developing strong technical foundations and skills, leading to new small to medium enterprises within the African sub-continent. It also seeked to encourage the emergence of functionally skilled technocrats within the continent.Datacentres are becoming indispensable infrastructure for supporting the services offered by cloud computing. Unfortunately, they consume a great deal of energy accounting for 3% of global electrical energy consumption. The effect of this is that, cloud providers experience high operating costs, which leading to increased Total Cost of Ownership (TCO) of datacentre infrastructure. Moreover, there is increased carbon dioxide emissions that affects the universe. This paper presents a survey on the various ways in which energy is consumed in datacentre infrastructure. The factors that influence energy consumption within a datacentre is presented as well.Strathmore University; Institute of Electrical and Electronics Engineers (IEEE

    Scalable dataspace construction

    Get PDF
    The conference aimed at supporting and stimulating active productive research set to strengthen the technical foundations of engineers and scientists in the continent, through developing strong technical foundations and skills, leading to new small to medium enterprises within the African sub-continent. It also seeked to encourage the emergence of functionally skilled technocrats within the continent.This paper proposes the design and implementation of scalable dataspaces based on efficient data structures. Dataspaces are often likely to exhibit a multidimensional structure due to the unpredictable neighbour relationship between participants coupled by the continuous exponential growth of data. Layered range trees are incorporated to the proposed solution as multidimensional binary trees which are used to perform d-dimensional orthogonal range indexing and searching. Furthermore, the solution is readily extensible to multiple dimensions, raising the possibility of volume searches and even extension to attribute space. We begin by a study of the important literature and dataspace designs. A scalable design and implementation is further presented. Finally, we conduct experimental evaluation to illustrate the finer performance of proposed techniques. The design of a scalable dataspace is important in order to bridge the gap resulting from the lack of coexistence of data entities in the spatial domain as a key milestone towards pay-as-you-go systems integrationStrathmore University;nstitute of Electrical and Electronics Engineers (IEEE

    Towards the adoption of bring_your_own_device concept in an organization

    No full text
    ABSRTACT Bring_Your_Own_Device (BYOD) concept has gained momentum at the workplace in many organization but its adoption approaches are varied. An unstructured technology adoption of BYOD concepts might be catastrophic for an organization in terms of security breach, compromise in privacy, infrastructural control, among other challenges. This study aims at developing a model to guide in the adoption of BOYD concept in the telephony industry. Exploratory and adopted survey research design were used so as order to gain advantage from its intrinsic ability in describing the characteristics of a large population. The target population in the study was mobile telephony industry players with a sample consisting of four (4) members of management staff and two hundred and eight (208) other staff members. Based on the key findings, the study proposes Hybrid BYOD Model which integrates the aspect of specific Functionality model and Integrated Model of BOYD to answer to the key concerns on the adoption of BYOD concept by an organization in Kenya

    Database marketing strategies in the industry: case of Kenyan organizations

    No full text
    This is one paper of Interdisciplinary Studies on Information Technology and Business (ISITB) Volume 1, Issue 1: January -March 2013Problem Statement: There are several organizations in both the private and public sector that collect information about their customers but do not proactively leverage on it. In most cases, the collected information would lie unused or underutilized for long periods and yet these same organizations do struggle business-wise. A major point is that they could actually utilize the information to create new avenues to the benefit of the organizations. Methodology: The methodology adopted for this research was to survey several private sector organizations. A sample of thirty-two (32) organizations out fifty (50) accepted to take part in the Database Marketing Survey. This survey consisted of organizations in the private sector ranging from airline industry, information and communication technology industry, retail and services and healthcare industries. We were interested to access information on what types of customer information they typically collected, stored and/or interpreted and how the organization’s databases were generally designed. Further, we needed to determine the frequencies of inaccuracies in the data collected, the liabilities/implications of incorrect data, the applied techniques (systems) to maintain data integrity and the maintenance systems and of the databases, which database formats were most successful, which procedures of data gathering were most reliable and subtly, which off-the-shelf programs were better for design of a customer database for the organizations. Results: Our preliminary analysis indicated these organizations routinely collected and stored customer information for various purposes. It was noticed that though most organizations collected data, it was mostly inaccurate, duplicate, inconsistent and non-standard. In this regard, it was extremely difficult to really harness or leverage on it. Due to this state of affairs, the organizations could not easily relate to the fact that the core data errors could be a pointer to lost revenue, lost opportunities or money wasted pursuing false assumptions or inaccurate accounts. Conclusions: The type of database design used by the private sector industries in Kenya is largely dependent on the “Off-the-Shelf” programs. The design of a customer database for an organization was largely related to the type of “off-the-Shelf” with a correlation coefficient of 0.738. Most organizations collected and stored data that can be described to be personal information from the customers and this information was predominantly used for the purposes of business growth, that is, sales at 73.91% and marketing at 56.62% though not strategically

    Mathematical Modelling of Combined Intervention Strategies for the Management and Control of Plasma Glucose of a Diabetes Mellitus Patient: A System Dynamic Modelling Approach

    No full text
    With the rapid increase of diabetes mellitus cases in the world, management and control of the disease has become a complex and highly dynamic process. This challenge requires a multifaceted approach to manage and control the complications associated with the hyperglycaemia or hypoglycaemia conditions. This paper presents a mathematical model for determining the influence of combined intervention strategies in the management and control for the plasma glucose of the type II diabetes. System dynamics (SD) techniques were used in modelling the sub-compartments of biological systems of an Identifiable Patient (IP). The system dynamic model developed gave an illustration on how typical glucose-insulin dynamics occur at different intervention strategies involving varying amounts of carbohydrates taken, intensity of physical exercises, stress levels and the amount of exogenous insulin administered. The model was conceptualized within a semi-closed loop system representing the patient ecosystem by extending the Bergman Minimal Model. Stochastic differential equations (SDE) were used to capture the non-linear, continuous time varying interactions of the measurements associated with plasma glucose-insulin dynamics. The estimated results from the model showed combined intervention strategies of reduced amounts of carbohydrates intake, reduced stress levels and varying moderately high-to-low exercise intensity at a constant unit of exogenous insulin produced good plasma glucose levels control

    User interface design standardization matrix for mobile applications

    No full text
    A Thesis submitted in partial fulfillment of the requirements for the Degree of Master of Science in Information Technology at Strathmore UniversityMobile applications are becoming increasingly popular in the modern setting due to mass adoption of mobile devices and associated technology. However, mobile applications development has been faced by many challenges specifically in user interface design. Recent studies have shown that user interfaces for mobile applications are neglected and rarely meet user needs and expectations. This is largely due to a combination of factors such lack of user participation, programming errors and crossplatform consistency. This paper adopts an exploratory research design in its attempt to provide a solution to the aforementioned problem which is attributed to lack of standardization in user interface design for mobile applications. In an attempt to address this problem, this paper analyzed the features and examined the principles of user interface design for mobile-applications. This-paper proposes a user interface design-standardization matrix as the solutions which should guide designers of user interfaces for mobile applications. The implementation of the standardization matrix is done at the design stage of the user interface and after the interface has been designed. This enables designers to compare the expected design and the actual user interface design. Adoption of this matrix by designers will lead to better quality and superior user interface designs which will in turn improve the usability of mobile applications and user experience. Therefore, the basis of this research is user interface design for mobile applications which is modeled around user interface design features and principles as the key components
    corecore