Browsing by Author "Mbuguah, Samuel Mungai"
Now showing 1 - 20 of 46
- Results Per Page
- Sort Options
Item A Fuzzy Ontological Model for Semantic Interoperability in Distributed Healthcare Information Systems(International Journal of Research and Innovation in Applied Science, 2025-01-17) Okemwa, Joshua; Owoche, Patrick Oduor; Mbuguah, Samuel MungaiThe exchange of patient or care data across heterogeneous health systems is crucial in the modern healthcare ecosystem yet remains daunting. Integration and interoperability in siloed health applications require robust health information exchange (HIE) and a pragmatic ontological model to be successful. This paper details a prototype development endeavor and systematic review of literature that has pioneered the development of a robust, practical, and tested fuzzy ontological model to enhance semantic interoperability in siloed, distributed health systems. Leveraging the tenets, standards, LOINC codes, and developed model from this study will enable robust and flexible data mapping and sharing health data in an environment marred with ambiguities and uncertainties but requiring the sophistry of interoperabilityItem A Model for Analyzing Usage Factors in Designing User Acceptance of Biometric Voter Registration Technology(International Journal of Engineering and Applied Sciences, 2021-12-04) Nyakundi, Richard Kayanga; Mbuguah, Samuel Mungai; Makiya, RatemoModels leading to acceptance of the technology remain largely unrealized in economically transitioning countries due to low adoption of appropriate and acceptable electronic technology models. This is because electoral bodies focus on the technical supply-side factors with little emphasis on acceptable biometric technology systems. While a number of adoption models have been applied to the developed countries, they require domestication in order to address the specific client-based needs of developing nations. This study therefore was meant to provide A Model for User Acceptance of BVR Technology. This model sought to explain the low acceptance level of biometric technology acceptance that led to development of a model which best support free, fair and credible election process. A Model for Adoption and Acceptance of Successful BVR Technology is developed and validated. The findings affirm that the model can be adopted and applied in both developing and developed countries to fast track the voting process.Item Application Lifecycle Management Activities For Quality Assurance In Software Development(International Journal of Trend in Research and Development, 2017-04-26) Otibine, Tobias Okumu; Mbuguah, Samuel Mungai; Kilwake, Juma; Tsinale, Harriet LoiceLifecycle Management approaches promise more systematic and efficient ways to support the development and management of complex products. The concept of Application Lifecycle Management (ALM) indicates the coordination of activities and the management of artifacts during the software product‟s lifecycle. Most of the currently available unified ALM solutions are either based on basic version control and other 'low level' point-to-point integrations, or advocate the adoption of a new and expensive all-in-one solution from a single vendor. The problem with these current solutions is that the first does not go far enough to really provide the previously described benefits of applying an ALM solution, while the second one is often associated with high costs in tools, infrastructure and personnel which in turn affect the quality of software developed for SME‟s and middle level organizations. This paper discusses the effect of application lifecycle management activities on quality assurance in software development. The research employed multiple case study design. The data collection tools included Questionnaire, Observation and Interviews. ALM activities were found to be a direct predictor of Software quality assurance in software development. The research found out that ALM elements and their relations together with good documentation were very key in coming up with an efficient ALM solution and with improved process support and better knowledge and experience on ALM, application lifecycle management activities greatly affected the quality of software's developed thus improving on quality assurance in software development.Item Assessing Preparedness for Smart Farming and Technology Adoption among Kenyan Farmers(International Journal of Research and Innovation in Applied Science, 2024-09-16) Gichuki, Dennis Karugu; Mbuguah, Samuel Mungai; Owoche, Patrick Oduor; Oyile, Paul OduorAgriculture is crucial in reducing poverty, promoting economic prosperity, and ensuring food security for the world’s growing population, which is expected to reach 9.7 billion by 2050. This sector is vital to the global economy, contributing significantly to GDP and providing jobs for a large workforce. Precision agriculture and e-commerce advances have proven beneficial, boosting crop yields and rural incomes. Sub-Saharan Africa faces similar agricultural challenges as it anticipates a population of 2.1 billion by 2050. Although the region has made strides in expanding farmland and labour, improvements in crop yields have been limited. The digital revolution offers new opportunities to tackle issues such as undernutrition by improving access to information and technology. In Kenya, with a population projected to reach 95 million by 2050, expanding food production is a pressing challenge. Significant hurdles include declining soil fertility, inadequate water management, and a lack of technical support. While technologies like Wireless Sensor Networks (WSNs) and Machine Learning (ML) have the potential to enhance agricultural productivity, their adoption is constrained by infrastructure issues, high costs, and a shortage of technical expertise. Addressing these barriers and improving farmer education is essential to fully realising these technologies' benefits.Item Assessing the role of electronic health records standards in advancing semantic interoperability in distributed health systems in Kenya(Global Journal of Engineering and Technology Advances, 2025-06-07) Okemwa, Joshua; Owoche, Patrick Oduor; Mbuguah, Samuel MungaiAchieving semantic interoperability in distributed healthcare systems is a global challenge, especially in low-resource settings such as Kenya. Inconsistent implementation of electronic health record (EHR) standards hinders semantic interoperability by limiting the ability of distributed healthcare systems to exchange and interpret data with shared, unambiguous meaning. This study evaluates the influence of EHR standards on semantic interoperability in distributed health systems in Kenya. A mixed-method approach using descriptive and correlational research design was adopted, targeting four Level 5 public hospitals with 301 sampled respondents including system developers, health practitioners, and administrators. Statistical analyses confirmed a very weak but statistically significant correlation between EHR standards and semantic interoperability (Spearman’s ρ = 0.007, p = 0.04, N = 268). Additionally, the Kruskal-Walli’s test revealed significant differences in semantic interoperability across low, medium, and high EHR adoption groups (HStatistic = 6.52, p = 0.038), with high adopters demonstrating the highest mean rank (148.92). However, mediation analysis indicated that system usability does not significantly mediate the relationship between EHR standards and semantic interoperability (Indirect effect = -0.0004, 95% CI [-0.0125, 0.0097]). Findings highlight that EHR standards alone have limited impact, and greater interoperability gains depend on integrated approaches combining standards with usability, governance, and technical alignment.Item Association between Metabolic Syndrome and Substance Dependence: A Cross-Sectional Study in Kenya(European Journal of Medical and Health Sciences, 2022-06-28) Mbuguah, Samuel Mungai; Mecha, Ezekiel; Kirira, Peter; Njoroge, Margaret; Malala, Boniface; Gitaka, Jesse; Makokha, Francis; Mwenda, CatherineMetabolic syndrome and its defining components remain an understudied area of human health research in Kenya and Africa. Understanding the relationship between substance dependence and the occurrence of metabolic syndrome is critical in prevention and clinical management of the related complications. This was a cross-sectional study in 6 rehabilitative centers in 3 counties in Kenya with a conveniently selected sample size of 166 participants. A signed informed consent was obtained from each participant following which anthropometric and biochemical measurements were obtained. Descriptive statistics and chi-square test were used to describe the prevalence of metabolic syndrome and the relationship of the defining criteria with the substance of dependence. A quarter of the respondents were overweight and 6% obese. Fasting blood glucose was elevated in 62% of the sampled population with triglycerides having a significant variation with a mean of 216.95mg/ dL and a standard deviation of 151.107. A prevalence rate of 4.8% was established based on the Harmonized Joint Scientific Statement on Metabolic syndrome for the African region. 87.34% of the population showed at least one elevated defining criteria with alcohol as the most prevalent substance of dependence. There was statistical difference of fasting blood glucose and triglycerides with alcohol use. The findings indicate that alcohol use resulted to elevated levels of fasting blood glucose and triglycerides. There is need for emphasis on a multidisciplinary approach to substance dependence and metabolic syndrome management integrating physical activity interventions, dietary modifications and psychotherapeutic approaches.Item A conceptual model for a holistic predictive attack ability metric for secure service oriented architecture software(International Journal of Information and Communication Technology Research, 2012) Mbuguah, Samuel Mungai; Mwangi, Waweru; Song', Pang Chol; Muchiri, Geoffrey MukethaSoftware based systems are ubiquitous in modern day operations. There has been an increase in software based system attacks; leading to the need to equip the project managers, software designers and software developers with a better predictive attackability model at the architectural design stage. Attackability is a concept proposed recently in research literature to measure the extent that a software system or service could be the target of a successful attack. A literature survey of existing technical models was carried out to identify gaps in them. Also, a literature survey on, human traits that lead to human beings and the software system they man being subject to social engineering attacks was undertaken. Then a conceptual model has been proposed to extend the existing technical model and incorporate a social attackability model to produce a holistic predictive attackability model.Item Determination of User Factor Requirements for Acceptable of Biometric Voter Registration Technology(International Journal of Engineering and Applied Sciences, 2021-12-04) Nyakundi, Richard Kayanga; Mbuguah, Samuel Mungai; Makiya, RatemoVoting systems around the world are transitioning from the manual voting practices to electronic systems for better service delivery. However, even with electronic systems, credibility of the technology has been a challenge to many countries around the world. This is because of Electoral bodies focus on the technical supply-side factors with little emphasis on acceptable biometric technology systems. There has been inadequate research and development in IT models particularly leading to adoption and acceptance of BVR Technology to inform the publics’ uptake of acceptable election outcomes. While a number of adoption models have been and applied to the developed countries, they require domestication in order to address the specific client-based needs of developing nations. This study therefore was meant to establish the valid user factors that determine easy adoption and wide acceptability of the BVR Technology. Analyzing the existing BVR Technology and determination of usage factors for adoption of BVR Process formed the objectives of this study. Questionnaires and interview schedules were used as research instruments to collect data. Data was then arranged and coded for analysis. Descriptive statistics was used to analyze the collected data. Data presentation was done using tables and logical analysis. The study affirmed that paybacks, lack of reliance, negative exactitudes of technology users, inadequacy of government policy, lack of preparation in BVR technology and lack of edification in internet use led to low usage rate of BVR Technology.Item Digital Technology Access and Use among Socially and Economically Disadvantaged Groups in Turkana County, Kenya(Asian Journal of Social Science and Management Technology, 2021-10-26) Onunga, Jeremiah Osida; Mbuguah, Samuel MungaiThe involvement and experiences of socioeconomically disadvantaged people in Turkana County, Kenya, were examined in this article. This was a qualitative study that looked into how different groups use information and communication technologies (ICTs), such as the internet, smartphones, and computers. Access to digital information and communication networks, particularly via the Internet and mobile phones/smartphones, is increasingly considered as essential for full citizen engagement in modern society's economic, social, educational, political, and cultural activities. This is especially true as the prevalence of digital access and use among the general public grows fast, and as businesses and governments increasingly rely on ICT to deliver services, support, and information. Internet like water, gas, and electricity, broadband connectivity is quickly becoming a necessity. According to various researchers, a world without the Internet will become unfathomable for many people in the next few years or so, much as a world without telephones did many years ago. Data on ICT access, on the other hand, demonstrate that a large proportion of people in both the developed and developing world’s still have limited or no access to ICTs and opportunity to use themItem Discoverability a new learnability principle for children’s application software(International Journal of Computer Science & Information Technology, 2016) Okelo, Bethuel Kipchirchir; Mbuguah, Samuel MungaiFor more than two decades children’s use of multimedia was restricted to watching television and listening to music. Although some parents complained about children being addicted to listening to music the idea that children could be addicted to television was a real concern to most parents. Nowadays parents not only need to be concerned about how much television their kids are watching, but also many other forms of media that are emerging with the fast development in information and technology such as the internet, video games, tablets and smart phones. From this the researcher came to realize that children are increasingly becoming the consumers of application software facilitated by these information systems. Children spend at least three hours according to research on these media which includes the use of computers, tablets, smartphones and music. The researcher was concerned that system vendors use the same learnability principles to make applications for all age groups based on learnability principles that were designed with adult users in mind. Many interface design principles used for adult products cannot be applied to products meant for children and further yet children at different ages learn differently. The research looked at the existing learnability principles by trying to evaluate them and come up with new principle(s) that can be used to further improve the current principles so that they can be used effectively by information system designers to improve on the learnability of their application software meant for children of different age groups.Item Evaluating AI-Blockchain–IoT Capabilities and Effects on Transparency in Kenyan Seed Supply Chain(International Journal of Scientific Research in Science, Engineering and Technology, 2025-09-06) Ronoh, Lilian Cherotich; Mbuguah, Samuel Mungai; Ronoh, Richard K.Agricultural sector plays a very crucial role in Kenyan national economy and within it, is the seed sector which is it’s driver and sustainer. Despite the strides that have been made towards digitalization of the seed sector, still, there are challenges facing it, one of them being lack of transparency. This has resulted in farmers purchasing counterfeit seeds which have adverse effects on the overall crop yields and great financial losses to farmers. This study sought to evaluate the capabilities and the effects of integrating AI-Blockchain-IoT technologies to improve transparency within the seed supply chain. Data was collected from KALRO and KSC staff, farmers and agro-dealers through questionnaires and interviews and data analyses carried out were both descriptive and inferential. Findings revealed varying perceptions on the capabilities of these technologies which show that more awareness needs to be done to enlighten the stakeholders on the benefits of these technologies as well as benefits of their integration. In addition, the findings on the effects revealed that integration of AI-Blockchain-IoT technologies has a statistically significant positive effect on transparency in the seed supply chain. This study contributes to practice by providing insights into technologies that can enhance transparency so that all stakeholders can have clear visibility and access to information on the entire seed supply chain operations.Item Evaluation of guidelines for security threats in mobile-phone banking(International Journal of Engineering and Mathematical Sciences, 2018) Ngomeh, Augustine Wafula Prince; Omieno, Kelvin Kabeti; Mbuguah, Samuel MungaiGlobally, banking institutions are using mobile phones to provide financial services to reach those with or without bank accounts. However mobile phones do suffer from security threats when used for banking purposes these threats become more critical. The purpose of the research was to investigate the use of user guideline as a tool to mitigate against security threats in mobile phone banking. The objectives of the research were to determine the security threats in the mobile banking, to identify the existing guidelines in mitigating threats in mobile phone banking and to design improved user guideline to minimize the security threats in mobile phone banking. This research adopted a descriptive survey design; Qualitative approach was used in objective two which was concerned with subjective assessment of attitudes, opinions and behavior. Generally, the technique of focus group interviews and depth interviews was used in identifying the use of existing guidelines in mitigating mobile phone security threats. In objective three Simulation approach was used, which involved the construction of an artificial environment within which relevant information and data can be generated. This permitted an observation of the dynamic behavior of a system (or its sub-system) under controlled conditions. Data collection tools included use of interviews and questionnaires. Descriptive statistics was used in data analysis that included frequency percentage mean and mode. This research was expected to provide improved user guidelines that will help in the reduction of the security threats posed in mobile phone banking. The research was expected to further suggest the challenges of the existing guidelines in use to those of adoption of the designed use guidelines.Item Evaluation of the learnability principles of mobile-wireless information systems’ application software for children in Kenya(Journal of Emerging Trends in Computing and Information Sciences, 2015) Okelo, Bethuel Kipchirchir; Mbuguah, Samuel Mungai; Karume, Simon MainaMobile-wireless gadgets are becoming increasingly important in Kenya not just as a medium of social communication, but also as a medium of learning and instruction. This shift partly exploits the learnability principle in information technology, which signifies how quickly a new user can begin efficient and error-free interaction with a system. The learnability principle was originally formulated for computer-based applications intended for adults, but currently children are increasingly becoming the end users. A gap exists in research on the effects of learnability on school-aged children in urban areas of Kenya. Against this backdrop, this study aimed at gathering information on the learnability characteristics of children of different age groups. The research further explored the degree to which the mobile-wireless information systems’ applications software learnability principles are applicable to children in Kenya. The study site was Nairobi and the research participants were children ranging between the ages of 8 to 19 years. Data collection involved questionnaires and the use of tests. The research was in the form of an experiment to evaluate certain factors that affect learnability in relation to the age of the participants and their level of computer experience. The research data was recorded and analyzed by Morae, a learnability software. Major findings indicate that children between the ages of 8 and 14 years require engageability to improve their learning by using new application software, this does not mean that other users of a different age do not require this principle but the degree to which it affects them is different. As for the older kids 15 to 19 years, the findings indicated that they strongly require discoverability to improve their learnability of new application software, this does not mean that adults or children of different ages do not require this given principle but to say the degree to which it affects them varies.Item Experimental validation of the technical attack ability metrics model(International Journal of Information and Communication Technology Research, 2013) Mbuguah, Samuel Mungai; Mwangi, Waweru; Song, Pang Chol; Muchiri, Geoffrey MukethaComputer systems have become gradually and fully embedded into our daily activities. Software based systems attackers have noted these dependency, and have increased the number of attacks of such systems. Software managers and designers require a means of predicting the Attackability of system at the design state. Attackability is a concept proposed recently in literature to measure the extent that a software system or service could be the target of a successful attack. These authors have published such a conceptual model called the Holistic predictive attackability metric model for secure service oriented software. Holistic in that it comprises of a social and technical aspect. This paper is considers experimental validation of the technical metrics part of model only. The technical part uses internal software attributes; complexity cohesion and coupling (3C’s) to predict attackability an external attribute. Pilot experiments were conducted with selected objects from which relationship between Attackability and the corresponding attribute was established. A model was generated for each after carrying out Kendall Tau-b correlation, performing regression testing and curve estimation using SPSS software package. The results were then combined to generate Mean Technical attackability model metrics, which was validated through sample 12 software. Jhawk tool was used measure the 3C’s for each software. The data were to used to generate Calculated mean Technical attackability metrics. The results were tabulated against the measured mean attackability. Pearson correlation and regression testing analysis were performed. The results indicates the model and the corresponding metrics could be used in predicting the mean Technical attackability of a software system.Item Facilitating factors for cybersecurity vulnerabilities in Kenyan county governments(Asian Journal of Research in Computer Science, 2018) Chitechi, Kadima Victor; Mbuguah, Samuel Mungai; Omieno, KelvinGlobally, ICT is regarded as a driver and enabler; thus, organisations which have integrated ICT in their systems have had immense growth and output. The adoption of ICT into the Kenyan County Governments, therefore, promises equal growth and output. These benefits notwithstanding, integration of ICT systems into County Governments is faced with a number of challenges in terms of vulnerabilities and other cybersecurity risks. This paper sought to identify the key facilitators of cybersecurity vulnerabilities in Kenyan County Governments only. The exploratory research design was used as a methodology. Questionnaires and interview schedules were the main instruments of data collection. The data was analysed using descriptive and inferential statistics. The findings indicate that there is a need for County Governments in Kenya to prepare for cybersecurity related challenges through policy formulations, End-users and ICT experts awareness on cybersecurity-attacks, Management support through resources funding and cybersecurity infrastructure is key to any system controls. The solutions to cybersecurity vulnerabilities in Kenyan County governments can be solved when these keys are implemented.Item Facilitating Factors for Cybersecurity Vulnerabilities in Kenyan County Governments(Asian Journal of Research in Computer Science, 2018-11-13) Kadima, Victor Chitechi; Mbuguah, Samuel Mungai; Omieno, KelvinGlobally, ICT is regarded as a driver and enabler; thus, organisations which have integrated ICT in their systems have had immense growth and output. The adoption of ICT into the Kenyan County Governments, therefore, promises equal growth and output. These benefits notwithstanding, integration of ICT systems into County Governments is faced with a number of challenges in terms of vulnerabilities and other cybersecurity risks. This paper sought to identify the key facilitators of cybersecurity vulnerabilities in Kenyan County Governments only. The exploratory research design was used as a methodology. Questionnaires and interview schedules were the main instruments of data collection. The data was analysed using descriptive and inferential statistics. The findings indicate that there is a need for County Governments in Kenya to prepare for cybersecurity related challenges through policy formulations, End-users and ICT experts awareness on cybersecurity-attacks, Management support through resources funding and cybersecurity infrastructure is key to any system controls. The solutions to cybersecurity vulnerabilities in Kenyan County governments can be solved when these keys are implementedItem Factors influencing the selection of mobile phone among university students in Kenya(International Journal of Innovative Research and Advanced Studies, 2018) Ronoh, Richard K.; Mbuguah, Samuel Mungai; Wabwoba, FranklinMobile phone technology has reached unprecedented level leading to unconstrained selection nightmare. This study investigates the selection priorities of mobile phone among university students in Kenya. A total of 310 undergraduate students participated in the study. A survey research design was used in this study. Questionnaire was employed in collection of data and the collected data was analyzed using descriptive and inferential statistics. The findings from this study revealed that university students yearn for the latest technology phones which come with numerous features although not all features are actually used. The study established that the phone appearance, technology used in the phone, accessibility and connectivity are the most important considerations when selecting a mobile phone. The information obtained from this study will provide a baseline understanding of the factors influencing the selection and hence usage of mobile technology among university students in Kenya. Furthermore, the study shows how mobile features can be used as indicators of mobile phone selection.Item Factors that influence the choice of virtualized environments in small medium enterprises(International Journal of Advanced Research in Computer Engineering & Technology, 2017) Motochi, Vincent; Mbuguah, Samuel Mungai; Mbandu, Shem AngoloVirtualization is an emerging technology in the recent computing worlds and has become a platform for the implementation of utility computing (e.g. cloud computing) and the rising Virtual Private Networks. It helps to centralize and integrate IT resources there by reducing costs and energy usage. Organizations are implementing this technology, however, what factors determine the choice of virtual environments to be implemented? Moreover, to what extend therefore can an organization virtualize? This research proposes a paper that will investigate the above stated factors so that they can be able to breakeven and survive the ever changing economic times. The research shall achieve this by identifying and investigating factors that determine the choice of virtualized environments in these organizations. This will be accomplished by a qualitative design through a desktop research. This research is important for small and medium organizations who would need to evaluate the factors that they would consider before they choose to go virtualization. Some of the benefits that come with this technology include to reduce operating costs based on virtualization platforms, promote efficiency on clouds and enable organizations to shift the emphasis on the management, rather than ownership of ICT resources.Item Feasibility, acceptance, and workflow integration of an AI- enabled clinical decision support system for non- communicable diseases in Kiambu County, Kenya: A mixed- methods implementation evaluation(Open Research Africa, 2026-02-28) Kamau, David; Mbuguah, Samuel Mungai; Omondi, Protus; Kamau, Gideon; Mbugua, George; Ngugi, Rosslyn; Ngure, Jane; Ngaruiya, Njeri; Wamaitha, Nicole; Munene, Joan; Maina, Njogu; Gitaka, JesseBackground Non-communicable diseases (NCDs), particularly hypertension and diabetes, impose a growing burden on health systems in low- and middle- income countries like Kenya. Artificial intelligence (AI)-driven Clinical Decision Support Systems (CDSS) may enhance diagnostic accuracy and adherence to clinical guidelines, yet their feasibility and acceptability among frontline clinicians in real-world settings underexplored. Methods We conducted a mixed-methods implementation study in 10 health facilities in Kiambu County, Kenya. The evaluation comprised three components. First, a retrospective review of 1,929 patient records established baseline NCD prevalence and care patterns. Second, we assessed the clinical acceptance of the NCDAI platform, an AI-CDSS using a Large Language Model with Retrieval-Augmented Generation, through 300 independent expert physician reviews of its recommendations. Third, we captured clinician perspectives via a cross-sectional Knowledge, Attitudes, and Practices (KAP) survey (n=29) and key-informant interviews (n=11). Results The baseline cohort demonstrated a substantial NCD burden: 72.8% had a history of hypertension and 43.1% had diabetes. Expert validation showed high acceptance of AI-generated recommendations, with 67.0% “Agreed,” 26.3% “Partially Agreed,” and only 6.7% “Disagreed,” yielding 93.3% overall (partial or full) agreement. Most disagreements arose in medication and treatment plan recommendations. Clinicians demonstrated strong digital readiness; 86% reported moderate or good IT proficiency, and 69% were already aware of AI in healthcare. Patient-related factors were the most commonly cited barriers to NCD care (33%). Qualitative findings identified operational challenges particularly duplicative data entry arising from parallel paper-based workflows as the main impediment to NCDAI adoption amid high patient volumes. Conclusions An AI-driven CDSS for NCD management is feasible and highly acceptable to expert physicians and frontline clinicians in Kenya. The key barrier is not reluctance toward AI but workflow friction. Effective scale-up will require investment in digital infrastructure to enable seamless integration and replacement of paper-based systemsItem Framework for Evaluation of Effectiveness of Integrated Financial Management Information Systems Architecture Implemented in Public Hospitals in Kenya(International Journal of Scientific Research in Science, Engineering and Technology, 2020-12-12) Afwande, Margaret; Mbuguah, Samuel Mungai; Kilwake, JumaIntegrated Financial Management Information System (IFMIS), is an enterprise resource planning application that captures all functional processes and relevant financial flows within Public expenditure management. IFMIS is being adopted by the Public hospitals to promote efficiency, effectiveness, accountability, transparency, security of data management and comprehensive reporting. However the Public hospitals are loosing a lot of money through scandals and this has compromised service delivery to the Public. Therefore, the purpose of this study was to investigate the effectiveness of IFMIS as used in Public procurement services in Public Hospitals in Kenya and come up with an enhanced secure technical architecture. The objectives of the study were: to asses the extent to which IFMIS has been implemented in Public procurement services in Public hospitals in Kenya, to evaluate the effectiveness of IFMIS in enforcing logical access and technical controls in Public procurement services in Public Hospitals in Kenya and to develop a framework that will evaluate the effectiveness of IFMIS architecture that is implemented in Public procurement services in Public hospitals in Kenya .The study used mixed method research design targeting users of IFMIS. Stratified sampling was used to select the target population of 132 in 4 hospitals in Kenya. The target population was from 5 homogeneous stratum comprising of 44 Procurement Assistants, 36 Finance Assistants, 12 Audit Assistants, 28 Medical Practioneers and 12 ICT Staff. Proportional allocation method was used to calculate the sample size which was 99 respondents. The data was collected through questionnaires and direct observation. Content validity was done to ascertain the validity of the research instruments. Reliability of the instruments was carried out using test- retest technique. Internal consistence of data was computed using Cronbach Alpha Computation. Analysis of Quantitative and qualitative data was through descriptive and inferential statistics methods and content analysis respectively. The study developed a framework of enhanced technical architecture of IFMIS that would streamline procurement services in Public hospitals and improve provision of quality health care.
- «
- 1 (current)
- 2
- 3
- »
