Browsing by Author "Mbuguah, Samuel Mungai"
Now showing 1 - 20 of 22
- Results Per Page
- Sort Options
Item A conceptual model for a holistic predictive attack ability metric for secure service oriented architecture software(International Journal of Information and Communication Technology Research, 2012) Mbuguah, Samuel Mungai; Mwangi, Waweru; Song', Pang Chol; Muchiri, Geoffrey MukethaSoftware based systems are ubiquitous in modern day operations. There has been an increase in software based system attacks; leading to the need to equip the project managers, software designers and software developers with a better predictive attackability model at the architectural design stage. Attackability is a concept proposed recently in research literature to measure the extent that a software system or service could be the target of a successful attack. A literature survey of existing technical models was carried out to identify gaps in them. Also, a literature survey on, human traits that lead to human beings and the software system they man being subject to social engineering attacks was undertaken. Then a conceptual model has been proposed to extend the existing technical model and incorporate a social attackability model to produce a holistic predictive attackability model.Item Discoverability a new learnability principle for children’s application software(International Journal of Computer Science & Information Technology, 2016) Okelo, Bethuel Kipchirchir; Mbuguah, Samuel MungaiFor more than two decades children’s use of multimedia was restricted to watching television and listening to music. Although some parents complained about children being addicted to listening to music the idea that children could be addicted to television was a real concern to most parents. Nowadays parents not only need to be concerned about how much television their kids are watching, but also many other forms of media that are emerging with the fast development in information and technology such as the internet, video games, tablets and smart phones. From this the researcher came to realize that children are increasingly becoming the consumers of application software facilitated by these information systems. Children spend at least three hours according to research on these media which includes the use of computers, tablets, smartphones and music. The researcher was concerned that system vendors use the same learnability principles to make applications for all age groups based on learnability principles that were designed with adult users in mind. Many interface design principles used for adult products cannot be applied to products meant for children and further yet children at different ages learn differently. The research looked at the existing learnability principles by trying to evaluate them and come up with new principle(s) that can be used to further improve the current principles so that they can be used effectively by information system designers to improve on the learnability of their application software meant for children of different age groups.Item Evaluation of guidelines for security threats in mobile-phone banking(International Journal of Engineering and Mathematical Sciences, 2018) Ngomeh, Augustine Wafula Prince; Omieno, Kelvin Kabeti; Mbuguah, Samuel MungaiGlobally, banking institutions are using mobile phones to provide financial services to reach those with or without bank accounts. However mobile phones do suffer from security threats when used for banking purposes these threats become more critical. The purpose of the research was to investigate the use of user guideline as a tool to mitigate against security threats in mobile phone banking. The objectives of the research were to determine the security threats in the mobile banking, to identify the existing guidelines in mitigating threats in mobile phone banking and to design improved user guideline to minimize the security threats in mobile phone banking. This research adopted a descriptive survey design; Qualitative approach was used in objective two which was concerned with subjective assessment of attitudes, opinions and behavior. Generally, the technique of focus group interviews and depth interviews was used in identifying the use of existing guidelines in mitigating mobile phone security threats. In objective three Simulation approach was used, which involved the construction of an artificial environment within which relevant information and data can be generated. This permitted an observation of the dynamic behavior of a system (or its sub-system) under controlled conditions. Data collection tools included use of interviews and questionnaires. Descriptive statistics was used in data analysis that included frequency percentage mean and mode. This research was expected to provide improved user guidelines that will help in the reduction of the security threats posed in mobile phone banking. The research was expected to further suggest the challenges of the existing guidelines in use to those of adoption of the designed use guidelines.Item Evaluation of the learnability principles of mobile-wireless information systems’ application software for children in Kenya(Journal of Emerging Trends in Computing and Information Sciences, 2015) Okelo, Bethuel Kipchirchir; Mbuguah, Samuel Mungai; Karume, Simon MainaMobile-wireless gadgets are becoming increasingly important in Kenya not just as a medium of social communication, but also as a medium of learning and instruction. This shift partly exploits the learnability principle in information technology, which signifies how quickly a new user can begin efficient and error-free interaction with a system. The learnability principle was originally formulated for computer-based applications intended for adults, but currently children are increasingly becoming the end users. A gap exists in research on the effects of learnability on school-aged children in urban areas of Kenya. Against this backdrop, this study aimed at gathering information on the learnability characteristics of children of different age groups. The research further explored the degree to which the mobile-wireless information systems’ applications software learnability principles are applicable to children in Kenya. The study site was Nairobi and the research participants were children ranging between the ages of 8 to 19 years. Data collection involved questionnaires and the use of tests. The research was in the form of an experiment to evaluate certain factors that affect learnability in relation to the age of the participants and their level of computer experience. The research data was recorded and analyzed by Morae, a learnability software. Major findings indicate that children between the ages of 8 and 14 years require engageability to improve their learning by using new application software, this does not mean that other users of a different age do not require this principle but the degree to which it affects them is different. As for the older kids 15 to 19 years, the findings indicated that they strongly require discoverability to improve their learnability of new application software, this does not mean that adults or children of different ages do not require this given principle but to say the degree to which it affects them varies.Item Experimental validation of the technical attack ability metrics model(International Journal of Information and Communication Technology Research, 2013) Mbuguah, Samuel Mungai; Mwangi, Waweru; Song, Pang Chol; Muchiri, Geoffrey MukethaComputer systems have become gradually and fully embedded into our daily activities. Software based systems attackers have noted these dependency, and have increased the number of attacks of such systems. Software managers and designers require a means of predicting the Attackability of system at the design state. Attackability is a concept proposed recently in literature to measure the extent that a software system or service could be the target of a successful attack. These authors have published such a conceptual model called the Holistic predictive attackability metric model for secure service oriented software. Holistic in that it comprises of a social and technical aspect. This paper is considers experimental validation of the technical metrics part of model only. The technical part uses internal software attributes; complexity cohesion and coupling (3C’s) to predict attackability an external attribute. Pilot experiments were conducted with selected objects from which relationship between Attackability and the corresponding attribute was established. A model was generated for each after carrying out Kendall Tau-b correlation, performing regression testing and curve estimation using SPSS software package. The results were then combined to generate Mean Technical attackability model metrics, which was validated through sample 12 software. Jhawk tool was used measure the 3C’s for each software. The data were to used to generate Calculated mean Technical attackability metrics. The results were tabulated against the measured mean attackability. Pearson correlation and regression testing analysis were performed. The results indicates the model and the corresponding metrics could be used in predicting the mean Technical attackability of a software system.Item Facilitating factors for cybersecurity vulnerabilities in Kenyan county governments(Asian Journal of Research in Computer Science, 2018) Chitechi, Kadima Victor; Mbuguah, Samuel Mungai; Omieno, KelvinGlobally, ICT is regarded as a driver and enabler; thus, organisations which have integrated ICT in their systems have had immense growth and output. The adoption of ICT into the Kenyan County Governments, therefore, promises equal growth and output. These benefits notwithstanding, integration of ICT systems into County Governments is faced with a number of challenges in terms of vulnerabilities and other cybersecurity risks. This paper sought to identify the key facilitators of cybersecurity vulnerabilities in Kenyan County Governments only. The exploratory research design was used as a methodology. Questionnaires and interview schedules were the main instruments of data collection. The data was analysed using descriptive and inferential statistics. The findings indicate that there is a need for County Governments in Kenya to prepare for cybersecurity related challenges through policy formulations, End-users and ICT experts awareness on cybersecurity-attacks, Management support through resources funding and cybersecurity infrastructure is key to any system controls. The solutions to cybersecurity vulnerabilities in Kenyan County governments can be solved when these keys are implemented.Item Factors influencing the selection of mobile phone among university students in Kenya(International Journal of Innovative Research and Advanced Studies, 2018) Ronoh, Richard K.; Mbuguah, Samuel Mungai; Wabwoba, FranklinMobile phone technology has reached unprecedented level leading to unconstrained selection nightmare. This study investigates the selection priorities of mobile phone among university students in Kenya. A total of 310 undergraduate students participated in the study. A survey research design was used in this study. Questionnaire was employed in collection of data and the collected data was analyzed using descriptive and inferential statistics. The findings from this study revealed that university students yearn for the latest technology phones which come with numerous features although not all features are actually used. The study established that the phone appearance, technology used in the phone, accessibility and connectivity are the most important considerations when selecting a mobile phone. The information obtained from this study will provide a baseline understanding of the factors influencing the selection and hence usage of mobile technology among university students in Kenya. Furthermore, the study shows how mobile features can be used as indicators of mobile phone selection.Item Factors that influence the choice of virtualized environments in small medium enterprises(International Journal of Advanced Research in Computer Engineering & Technology, 2017) Motochi, Vincent; Mbuguah, Samuel Mungai; Mbandu, Shem AngoloVirtualization is an emerging technology in the recent computing worlds and has become a platform for the implementation of utility computing (e.g. cloud computing) and the rising Virtual Private Networks. It helps to centralize and integrate IT resources there by reducing costs and energy usage. Organizations are implementing this technology, however, what factors determine the choice of virtual environments to be implemented? Moreover, to what extend therefore can an organization virtualize? This research proposes a paper that will investigate the above stated factors so that they can be able to breakeven and survive the ever changing economic times. The research shall achieve this by identifying and investigating factors that determine the choice of virtualized environments in these organizations. This will be accomplished by a qualitative design through a desktop research. This research is important for small and medium organizations who would need to evaluate the factors that they would consider before they choose to go virtualization. Some of the benefits that come with this technology include to reduce operating costs based on virtualization platforms, promote efficiency on clouds and enable organizations to shift the emphasis on the management, rather than ownership of ICT resources.Item ICT personnel maturity towards green ICT in Kenya(Journal of Information Engineering and Applications, 2014) Wabwoba, Franklin; Mbuguah, Samuel Mungai; Ikoha, Anselemo Peters; Shisoka, Dorcus ArshleyThough ICT is contributing to the economy associated with innovations, inventions and rapid development in almost all aspects of human life, is responsible for climatic degradation. The rapid increase of ICT usage means more costs of doing business, energy consumption, and more environmental challenges. The rapid changing technology reaching Kenya and lack of their understanding has put a lot of pressure on both management and ICT personnel to implement them on a trial and error manner. This has limited the gains meant to be obtained from green ICT despite its technologies availability. The lack of ICT personnel capacity readiness challenges the reaping of green ICT benefits. The study was informed by the G-readiness model and the enhanced G-readiness model. This study purposed to determine the personnel capacities readiness towards green ICT in Kenya. The study was undertaken using the interpretive, inductive multi-case survey study on a population of four data centres and 116 ICT managerial, technical and user personnel that were purposively sampled. Interview, observation, questionnaire and document analysis methods were used to gather data that was triangulated to increase the reliability and validity. The study established the ICT personnel’s G-readiness was very low on both training and professional development perspectives in Kenya. The study’s findings are useful towards the strategic planning for green ICT implementation, cutting down running costs, improving environmental performance of organisations and contribution to the world of knowledge. The findings provide data for informed ICT personnel and workplace readiness alignment, decision making and ICT curriculum development. The study recommends application of green ICT based on established ICT personnel capacity, inclusion of green ICT training in the curriculum, creation of green ICT responsibilities, provision for a green ICT budget and investment into the development of green ICT personnel.Item Implementation evaluation metrics for enterprise resource planning solution – a case of Kibabii University(Current Journal of Applied Science and Technology, 2019) Mbuguah, Samuel Mungai; Wabwoba, Franklin; Wanjala, Chrispus KimengichMost institution of higher learning are implementing and Enterprise Resource planning (ERP) in automating various activities. The architecture of most of the ERP is based on the Service Oriented Architecture (SOA) where each module can be called as service. In most of the contract signed between the vendor and the university, payment is tied to the level of implementation. The Question is how to then measure the level of implementation? This paper proposes a metric that could be used in evaluation of the degree of implementation. The metric was derived based on an acceptance test on each of functionality of module as per terms of reference. The result of a test was rated as a Fail, Pass, or Query The result was then coded such that a fail was assigned a zero (0), pass one (1) and query a half (½). From which a metric was derived which measures the level implementation.Item Information security risks posed by the bluetooth security weaknesses to the bluetooth-enabled phones(Journal of Emerging Trends in Computing and Information Sciences, 2015) Wanjala, Chrispus Kimingichi; Mbuguah, Samuel Mungai; Kilwake, JumaAs the widespread use and acceptance of Bluetooth technology increases, concerns are being raised related to security vulnerabilities of this technology. Inadequate device resources and lack of user awareness has compounded this issue where the emphasis on design constraints, functionality and ease of use sometimes outweigh security concerns. The research determines vulnerability of Bluetooth security and the security risks these vulnerabilities poses to the users’ information stored in Bluetooth-enabled phones. The research design was based on multi-case study where two cases were selected. Questionnaires and interview were used in data collection. Both qualitative and quantitative approaches were used in data analysis. Descriptive statistical method was used for data analysis. The key findings from the study were that to improve security of information stored in Bluetooth-enabled phones, application layer security should be employed to provide additional security measures not provided in the current authentication and authorization process. Secondly the E0 encryption algorithm currently used for encryption is too weak and therefore the DES and AES algorithm should be used due to their efficiency and reliability. Lastly it was found out that most users have no knowledge on how to configure these devices thus manufactures of these devices should provide users with user documentation that explains the use and device configurations.Item Innovative features driving mobile phone usage by students in Kenya(International Journal of Modern Trends in Engineering and Research, 2018) Ronoh, Richard; Mbuguah, Samuel Mungai; Wabwoba, FranklinMobile phone adoption and usage enjoyed drastic and exponential success as far as the history of technology adoption goes. However, there are indications that users are becoming overwhelmed by the unconstraint addition of features and services to the mobile phone guided by the assumption that “more is better”. Currently, mobile phone features present a range of innovations that are rarely useful to majority of users. The result is that many mobile phone features are never used and yet these features significantly contribute to power consumption and cost of the mobile phone. This study investigated innovative phone features that influence mobile phone usage patterns amongst university students in Kenya. In this descriptive analytical study 310 students were selected. Data was collected using a questionnaire and interviews. An average of 24% of respondents indicated that they used most of the features provided by their mobile phones. Provision of appropriate educational programs about beneficial use of mobile phone is quite crucial.Item Integrating virtual worlds and virtual learning environments in schools in developing economies(International Journal of Information and Communication Technology Research, 2012) Omieno, Kelvin K.; Wanyembi, Gregory; Mbuguah, Samuel MungaiIn recent years there has been significant growth in the use of 3D virtual worlds for e-learning and distance education. Virtual learning environment (VLE) has achieved an adequate level of development and supports teaching and learning in an educational context, offering the functionality to manage the presentation, administration and assessment of coursework. This paper’s main philosophical claims are that virtuality is itself a bonafide mode of reality and that VLEs must be understood as a possible platform for effective and quality teaching, learning and training. The paper investigates the suitability of virtual learning in Higher Education Institutions in Africa. It also explains virtual reality principle, describes the interactive educational environment, highlights the challenges HEIs face in the traditional mode of delivery and discusses educational benefits of implementing virtual reality. A number of demonstrative examples showing how virtual world/virtual learning environments can be integrated will be shown and the potential opportunities that exist in this area discussed. The paper then proposes a model for integrating virtual world tools with the existing learning environments.Item Interface features, program complexity and memorability as indicators of learnability of mobile social software(International Journal of Science and Research, 2017) Masese, Nelson Bogomba; Muketha, Geoffrey Muchiri; Mbuguah, Samuel MungaiSocial Computing aims to support the tendency of humans to interact with mobile devices. Technology reinforces this interaction by producing appropriate responses that then lead to improved communication between humans and computational devices. Although latest developments in mobile phone technologies have opened the way for a new generation of mobile social applications that allow users to interact and share information, there is still very limited user support information on how to use different applications. This problem either increases the learning curve of the users, thereby adversely affects their overall efficiency. The main purpose of this paper is to analyze factors that affect the learnability of mobile social software. A sample of 361 respondents was selected, with 345 respondents returning feedback. Primary data was collected through the use of questionnaires and interviews targeting mobile social users in Nakuru County Kenya. Three social networks were used, namely, WhatsApp, Facebook and Twitter. Data analysis was done using descriptive statistics. Findings indicate that interface features affect learnability across the three social networks, with learnability of WhatsApp turning out to be higher than that of compared to Facebook and Twitter. Findings also indicate that more than 60% program supports compatibility with other applications while 59.4% of the respondents agreed that maintaining language is cheap across the three social networks. Other findings indicate that WhatsApp’s memorability is easy to execute compared to that of Facebook and Twitter.Item Intervention measures towards successful implementation of software projects in public universities in Kenya(Journal of Emerging Trends in Computing and Information Sciences, 2014) Soita, Peter Wekesa; Mbuguah, Samuel Mungai; Ujunju, Michael Okumu; Wanyembi, GregoryKenya is in the forefront of embracing ICT in steering her economic growth and one of the indicators that shows this commitment is the emergence of the Vision 2030. Software projects in public universities have been identified as building blocks in realizing this vision; however attempts to implement software projects in Kenyan universities have not been very successful. There is inadequate information addressing this matter because it appears no documented comprehensive study has been done to determine the causes of failure, nor outline counter measures. The study sought to identify factors that affect software project implementation in public universities; establish intervention measures towards successful implementation of software projects in public universities and develop a software implementation framework for public universities. The study focused on software project implementation at Masinde Muliro University of Science and Technology and the University of Eldoret. The study adopted a survey design. Analysis of data was done by the use of descriptive statistics. The results identified as intervention measures included ICT policies, positive, user involvement, training of users and top management support.Item A review of algorithms for determination of attackability metrics(Journal of Emerging Trends in Computing and Information Sciences, 2014) Mbuguah, Samuel Mungai; Muketha, Geoffrey Muchiri; Wabwoba, FranklinAttackability is a concept proposed recently in literature to measure the extent that a software system or service could be the target of a successful attack. A Holistic predictive attackability metrics model has been proposed in our previous study. Metrics derived from this model, their theoretical and empirical validation were proposed and evaluated. The method of measurement of these metrics is largely manual this paper illustrates algorithms that can be adopted with suitable tools to automate the collections of the attackability metrics.Item A review of mobile social software awareness and utilization(International Journal of Science and Research, 2016) Masese, Nelson; Mbuguah, Samuel Mungai; Muketha, Geoffrey MuchiriSocial software comprises a wide range of different types of activities, The most familiar are likely to be internet discussion forums, social networking and dating sites Mobile computing technologies and social software have given new challenges to technology enhanced awareness. Simple awareness system include knowing how the given system works. The objectives of the paper include To establish the level of awareness of mobile social systems, To identify commonly used tools in mobile social systems and To establish the level of utilization of using mobile social systems. This paper reviews the awarness of mobile social softare that includes Facebook,Whattapp, Twitter and linkedIn, Instagram. Primary data was used drawn from mobile social users in Nakuru County Kenya. The sample size was 361 respondents but 345 respodents returned the feed back , both descriptive and inferential statistics was used . It is evident from the study that out of More than 53.3% of respondents use WhatApp while 31.9% use facebook ,7.8% use twitter while Linkedin has lower ratings of 7.0%. The study also reveals that most of the respodents are aware of the services they utilize the service for chatting purpose with 80% followed by Messaging with 18.6 % while research work is the last one with 11%.Item Security issues in virtualized environments for small and medium enterprises(International Journal of Advanced Research in Computer Engineering & Technology, 2017) Motochi, Vincent; Mbuguah, Samuel Mungai; Mbandu, Shem AngoloVirtualization is an emerging technology in the recent computing worlds and has become a platform for the implementation of utility computing (e.g. cloud computing) and the rising Virtual Private Networks. It helps to centralize and integrate IT resources there by reducing costs and energy usage. Organizations are implementing this technology, however, what factors determine the choice of virtual environments to be implemented? Moreover, to what extend therefore can an organization virtualize? This research proposes a paper that will investigate the above stated factors so that they can be able to breakeven and survive the ever changing economic times. The research shall achieve this by identifying and investigating factors that determine the choice of virtualized environments in these organizations. This will be accomplished by a qualitative design through a desktop research. This research is important for small and medium organizations who would need to evaluate the factors that they would consider before they choose to go virtualization. Some of the benefits that come with this technology include to reduce operating costs based on virtualization platforms, promote efficiency on clouds and enable organizations to shift the emphasis on the management, rather than ownership of ICT resources.Item Social attackability metrics for software systems(International Journal of Information and Communication Technology Research, 2013) Mbuguah, Samuel Mungai; Mwangi, Waweru; Song, Pang Chol; Muketha, Geoffrey MuchiriSoftware based system have become ubiquitous in modern day activities. Software system based system are being increasing attacked, leading to the need for software system administrators, and managers to have some metrics at predicting the social engineering attackability of a such system. Researchers have identified seven human traits/attributes that make human susceptible to social engineering attacks. Yet they did not model nor come up metrics. The author has published a conceptual a holistic predictive attackability metric model and corresponding metrics to assist the system designers. The model considers the technical metrics based on cohesion, coupling and complexity as used to predict attackability. It also consider the social metrics based on human traits that make the human operators become susceptible to social engineering attacks. The identified human traits are dishonesty, social compliance, Kindness,Time pressure, Herd mentality, greed/need and distraction. This paper considers only the social metrics part of the model.To measure human traits the authors relies on the HEXACO model and Big Five personality trait models. In these model the personality trait are measured using a ranking scale based on Lickert scale. Hence each trait is measured as a percentile. However, for purpose of this paper, to postulate the metric the author considered the discrete case. Why the value of trait take either a value of “1” or “0”. To determine the relationship between traits between and attackability experts were asked to assess the trait versus attackability from which after aggregating for all traits a social attackability metrics was determined. To determine the predictive social attackability metrics each trait was considered to be equally likely to occur and hence a probability of 1/7 and this acts as factor to transform the social attackability metric into predictive attackability metrics.Item Trends in adoption of open source software in Africa(Journal of Emerging Trends in Computing and Information Sciences, 2012) Karume, Simon M; Mbuguah, Samuel MungaiIn the context of limited financial resources and capacities, Africa can examine how to better use the opportunities presented by the emergence of free and open source software (FOSS) to leapfrog into the information age and bridge the digital divide through reduced costs and less dependency on imported technology. This paper examines the adoption trends of open source software in Africa and seeks to establish the current global placing of the continent in adoption and use of FOSS. To get a better view of the current FOSS situation in Africa, the study explores the penetration of FOSS into Africa software market and how various Governments react to the use of FOSS. Through scrutiny of literature on adoption and use of open source software in Africa as well as previous and emerging initiatives to promote the use of open source software in the region, the paper presents preliminary findings of the trends observed. Further using the data gathered the paper attempts to forecast the future of FOSS in Africa and the probable implications on the development agenda of the continent.