8 research outputs found

    Information Systems Investment and Value: Lessons from Kenyan Higher Education Institution

    Get PDF
    Investment in Information Systems (IS) and related technologies to enhance operational activities as well as leveraging strategic advantage in organizations has become critical. However, this can only be achieved if there is a properly laid down strategy at the corporate level and well planned deployment and implementation strategies at the project implementation level. This paper discusses findings of a research on strategic alignment practices in Kenyan public universities. The assessment focuses on levels of information systems strategic alignment at the corporate planning level and IS project implementation level. The assessment was done using a framework adapted from Luftman’s Strategic Alignment Maturity Model (SAMM) assessment framework. The research used sequential explanatory mixed method approach starting with a survey study followed by interviews to enhance the findings from the initial quantitative study. A comparison of the corporate level and IS project implementation level show the later has a higher alignment maturity level. Further probe of the quantitative findings through interviews explains the variations in each of the IS projects and between the corporate and IS project levels. The approach guides the organization in determining the factors requiring attention to improve on the overall maturity level of the organization and therefore realize business value of the IS investments. Keywords: Strategic Alignment, IS Investments, IS-Business Alignment, Information Systems, Strategic Alignment Maturity Mode

    An Analysis of Factors Influencing Implementation of Computer Based Information Systems in Public Universities in Kenya: A Case Study of Egerton University

    Get PDF
    Public universities in Kenya have continued to implement Information Systems (ISs) so as to be more efficient and competitive. However, factors that influence the implementation of ISs have not been fully analysed and documented. Therefore, the aim of this study was to identify factors influencing implementation of computer based information systems in public universities in Kenya. The study used descriptive survey design. The target population was the process owners and system users from all departments in Egerton University that have implemented IS. Stratified sampling was used to select a sample size of 306. Data for the study was collected using questionnaires. The results of the study indicated that university top management support, end-user training, understanding and approval by top management, availability of qualified and competent ICT staff were important factors for the successful implementation of Information system. The findings of this study are expected to guide the University management, other institutions of higher learning on related issues and provide a framework to describe the IS implementation process. Keywords: Computer based information system, Public Universities in Kenya, Egerton Universit

    Impact of Information Security Policies on Computer Security Breach Incidences in Kenyan Public Universities

    Get PDF
    The aim of this study was to investigate the Impact of Information Security Policies on Computer Security Beach incidences in Kenyan public universities. Information security policies are designed to safeguard network resources from security breaches.  The study utilized a questionnaire to collect primary data from Information Technology (IT) personnel in public universities with regard to their perceptions of how information security policies affect computer security breach incidents. A simple random sampling was used to identify 200 IT employees from public universities in Kenya. Pearson correlation analysis was used to study the relationships between the variables. Independent t-tests (2-tailed) and ANOVA test were used to determine the level of significance. According to the results of the study, there is a weak relationship between information security policies and security breaches. The study hopes to add to the body of academic knowledge in the public educational institutions in Kenya where information repository is a resource. Keywords: Information Security Policies, Security Breach Incidences, Kenyan Public Universitie

    Assessing the Current Status of Information Security Policies Among Saccos in Kenya

    Get PDF
    In 2013, Communication Authority of Kenya (CAK) recorded cyber-attacks amounting to Sh5.4 million loses. In April 2016, Bandari Savings and Credit Cooperative Society lost Sh5 million through fraudulent ATM withdrawals (Nation Newspapers, April 8, 2016). These examples demonstrate weaknesses that may exist from security breaches and incidents caused by people, processes, and technology. Ministry of ICT and CAK are lacking specific Information Security Models tailored towards SACCOS in Kenya. The study therefore sought to assess the current status of information security policies among SACCOS in Kenya. The study adopted descriptive research design. The unit of observation was 135 SACCOS registered with SACCO Societies Regulatory Authority (SASRA) while the unit of analysis was 270 ICT personnel working in the 135 targeted SACCOS. The study targeted the SACCOS heads of IT department. The study used Nassiuma (2000) formula to get a sample of 85 respondents. Purposive sampling was further used in selecting study participants in every SACCOS who were considered to be knowledgeable of the variables under study. The study utilized questionnaire as the survey instrument to collect both quantitative and qualitative data. The study adopted descriptive statistics. Descriptive data was presented by use of frequency tables. The study established that in all the SACCOS studied, information security policy is used. However, there are still challenges on how information security breaches and incidents can be contained based on the results of the study and therefore calls for further research in academic research. The findings of the study indicate that SACCOS were able to validate that the enhanced information security model using an integrated approach worked as planned and reported to auditors, managers and executives that incident response programs are robust and reliable. If security controls didn’t work as planned, they will need to fix them. The actions and resources needed should be included in in the report to executives in the SACCOS sector in KenyaKeywords: SACCOS, Management controls, Information Security Policies, Risk assessmentDOI: 10.7176/EJBM/11-27-09 Publication date:September 30th 201

    An Evaluation of the Perceived Effect of ICT’s on the Performance of Sacco’s in Kenya (Case of Licensed Sacco’s, Nairobi County)

    Get PDF
    Many scholars have argued that ICT is a major contributor to performance of organizations. The theorist of modernization argued that developing countries lag behind in terms of development due to their failure to adopt modernity that led to development in the developed countries. ICT is a basic infrastructure that can transform the performance of business sectors. Therefore there is need to exploit ICT to strategically position the organizations to benefit from an increasingly information driven global economy. The competitiveness of firms in the context of the current economic challenges requires effective management activities and a strategic importance directed towards a better administration of knowledge and the impact of Information Technology and Communication on organizational structures.The study therefore sought to evaluate the perceived effect of ICT on performance of Sacco’s in Kenya through a census survey of 34 licensed Sacco’s in Nairobi County. The study specifically evaluated the prospects of ICT in Sacco’s in meeting their stated objectives, the level of awareness in Kenya, the levels of innovations, existing infrastructure, integration of the cooperative processes and the perception amongst the stakeholders. The study focused on the perceived ICT factors towards performance such as innovations, infrastructure, awareness and policies. A comparative case study selected from different social economic settings and a Survey Research design were used. Data was collected using questionnaires to provide an insight into the phenomena. Keywords : Sacco’s , Innovations , Information and Communication Technology , Infrastructur

    Enhanced information security model using an integrated approach

    Get PDF
    Paper presented at the 5th Strathmore International Mathematics Conference (SIMC 2019), 12 - 16 August 2019, Strathmore University, Nairobi, KenyaOrganizational assets are mainly vulnerable to attacks from user error, hackers and crackers, viruses and cyber criminals. This has resulted in loss of trillions of dollars around the world and over 4 billion shillings in East Africa. The objective of the study is to develop an enhanced information security model using an integrated approach among SACCOS in Kenya and to test and validate the enhanced information security model. The study used descriptive research. The total population of the study comprised of 135 SACCOS. Nassiuma (2000) scientific formula was used to determine the sample size of 85 SACCOS registered with SASRA. A pilot study was carried out to test the validity of the survey instrument. Cronbachs alpha of 0.70 coefficient variation was used to assess the internal reliability of the research instrument. The results of the study revealed that the enhanced information security model is suitable to enhance the information security within the SACCOS sector. This is evident because the findings indicated that the elements of risk assessment have positive significant effect on the enhanced information security among SACCOS. Important contributions to the body of knowledge were the development of an enhanced information security model using an integrated approach for SACCOS in Kenya.Jaramogi Oginga Odinga University of Science and Technology, Kenya

    The Relationship between Teacher Characteristics and Information and Communication Technology (ICT) Integration in Public Secondary Schools in Nakuru Town Sub-County, Kenya

    Get PDF
    This study sought to examine the relationship between teacher characteristics and ICT integration in public secondary schools in Nakuru Town Sub-county. The objectives of the study were: To establish the relationship between attitude and ICT integration; to establish the relationship between motivation and ICT integration, and to determine the overall effect of teacher characteristics on ICT integration. This study employed a descriptive analysis. The data was analyzed quantitatively. The study adopted a descriptive research design. Primary data was collected using a self-administered questionnaire. The relationship between teacher characteristics and ICT integration was tested statistically using Pearson Moments Correlation. Relationships between teacher characteristics and ICT integration in public secondary schools was determined at the alpha level of p<0.05. To describe the various elements of teacher characteristics on overall ICT integration, descriptive analysis (percentages) was done. Data was presented using tables. The purposive sampling design was used in the study where one Headteacher, one Head of ICT Department and one ICT teacher were purposively sampled from each of the 22 public secondary schools yielding a sample size of 66 teachers.The study established that teachers’ characteristics affect ICT integration positively. The study is beneficial to policy makers when developing teacher programs; it also helps teachers to see that intervention programs can influence their instructional behaviors; and it also provides evidence to researchers that teacher beliefs can be challenged.The study thus recommends that policymakers should incorporate the actual use of ICT when developing teacher programs. Considering the influence of the teacher characteristics on classroom use of ICT, professional teacher development should be aware of the direct impact of these variables, especially the role of teacher ICT motivation. Keywords: Teacher characteristics, ICT integration, Attitude, Motivation

    The Effect of Teacher Characteristics on Information and Communication Technology (ICT) Integration in Public Secondary Schools in Nakuru Town Sub-County, Kenya

    Get PDF
    This study sought to examine the effect of teacher characteristics on ICT integration in public secondary schools in Nakuru Town Sub-county, Kenya. The objectives of the study were: To establish the effect of teacher educational beliefs on ICT integration; to establish the effect of self-efficacy on ICT integration. The study adopted a descriptive research design. The effect of teacher characteristics on ICT integration was tested statistically using Pearson Moments Correlation. The effect of teacher characteristics on ICT integration in public secondary schools was determined at the alpha level of p<0.05. To describe the various elements of teacher characteristics on overall ICT integration, descriptive analysis (percentages) was done. Data was presented using tables. Purposive sampling design was used in the study where one Head teacher, one Head of ICT Department and one ICT teacher were purposively sampled from each of the 22 public secondary schools yielding a sample size of 66 teachers.The findings of this study was that teacher characteristics positively affect ICT integration. The study is beneficial to policy makers when developing teacher programs; it also helps teachers to see that intervention programs can influence their instructional behaviors; and it also provides evidence to researchers that teacher beliefs can be challenged.The study thus recommends that policymakers should incorporate the actual use of ICT when developing teacher programs. Considering the influence of the teacher characteristics on classroom use of ICT, professional teacher development should be aware of the direct impact of these variables, especially the role of teacher ICT motivation. Keywords: Teacher characteristics, ICT integration, Educational beliefs, Self-efficacy
    corecore