Department of Information Technology
Permanent URI for this collectionhttp://erepository.kibu.ac.ke/handle/123456789/187
Browse
Browsing Department of Information Technology by Title
Now showing 1 - 20 of 59
- Results Per Page
- Sort Options
Item Application lifecycle management activities for quality assurance in software development(International Journal of Trend in Research and Development, 2017) Otibine, Tobias Okumu; Mbuguah, Samuel; Kilwake, Juma; Tsinale, Harriet LoiceLifecycle Management approaches promise more systematic and efficient ways to support the development and management of complex products. The concept of Application Lifecycle Management (ALM) indicates the coordination of activities and the management of artifacts during the software product‟s lifecycle. Most of the currently available unified ALM solutions are either based on basic version control and other 'low level' point-to-point integrations, or advocate the adoption of a new and expensive all-in-one solution from a single vendor. The problem with these current solutions is that the first does not go far enough to really provide the previously described benefits of applying an ALM solution, while the second one is often associated with high costs in tools, infrastructure and personnel which in turn affect the quality of software developed for SME‟s and middle level organizations. This paper discusses the effect of application lifecycle management activities on quality assurance in software development. The research employed multiple case study design. The data collection tools included Questionnaire, Observation and Interviews. ALM activities were found to be a direct predictor of Software quality assurance in software development. The research found out that ALM elements and their relations together with good documentation were very key in coming up with an efficient ALM solution and with improved process support and better knowledge and experience on ALM, application lifecycle management activities greatly affected the quality of software's developed thus improving on quality assurance in software development.Item Assessing quality of open source software based on community metrics(International Journal of Software Engineering and Its Applications, 2015) Ndenga, Malanga Kennedy; Méhat, Jean; Ivaylo, Ganchev; Wabwoba, FranklinThe purpose of this study is to analyze data from Open Source Software (OSS) community with an objective of identifying community metrics that can predict quality of OSS projects. We experimented with data from Apache OfBiz and Apache httpd-2 server OSS projects. We applied linear regression technique to the dataset to assess the strength of possible relationships of variables and also examined possible trends amongst variables. From the analysis, we found out that the size of user mailing list has a correlation with number of reported bugs. We concluded that the size of user mailing list community may not be an accurate representation of the entire user community that adopted the project basing on quality. However Backlog Management Index was found to be a better metric for assessing how projects manage issues reported by users.Item Barriers to implementation of green ICT in Kenya(International Journal of Science and Technology, 2012) Wabwoba, Franklin; Wanyembi, Gregory W.; Omuterema, StanleyInformation and Communication Technology (ICT) is playing an increasingly important role in both business and private undertakings. Its use in several areas in the world economy has brought about increased demand for electronic equipment. The rapid pace of technology advancement and the drop in hardware prices has led to increased demand and acquisition resulting in increased production and use of hardware. However, the increased ICT uptake has increased costs and demand for energy where electricity is the main power source. Electricity notably is a major contributor to climatic change because the coal or oil that helps generate it does releases carbon dioxide, pollutants, and sulphur into the atmosphere. With environmental degradation, rising costs of doing business and power demand and demand for social responsibility, going green is no longer an option. There are green ICT technologies in the market to mitigate the concerns but unfortunately they are not bearing fruit that calls for an understanding of barriers to implementation of the same in developing nations like Kenya. The study used multiple case study approach. The study population included ICT managerial, technical and end user human resource and public university ICT graduate students. The multiple study was conducted in one leading sugar manufacturing industry, a communication commission regulatory body and one public university offering ICT from certificate to PhD level. Respondents were either interviewed or responded to a questionnaire. The study established that green ICT technologies are available in Kenya and are not barriers to its implementation. The paper highlights the barriers to implementing green ICT in Kenya. The paper recommends alignment of ICT personnel towards enhancing green ICT implementation in the light of the barriers.Item Choosing tools of pedagogy (case of program visualization)(International Journal of Application or Innovation in Engineering & Management, 2012) Mutua, Stephen; Abenga, Elizabeth; Ogao, Patrick; Wabwoba, Franklin; Ikoha, AnselmoComputer aided learning has over time been integrated in traditional pedagogical approaches in order to improve the quality of education as well as skillful content acquisition. Several programs have been developed over time to be used in the classroom with the aim of improving on the mode of instruction. Program Visualization (PV) tools are an example of such developments with the desire of improving classroom experience during teaching/learning computer programming. Despite that the tools have posted positive results in various universities, teachers seem not to have widely accepted them. This paper seeks to establish the factors that influence the choice of a PV tool for teaching computer programming. The established list of factors indicates that they range from system based issues to other features beyond the system. From the results, it emerges that most teachers are not using emerging contemporary approaches but instead are making use of the traditional approach whose impact is less felt especially for technical courses like programming. These factors form part of taxonomy of PV tools for pedagogy.Item Classifying program visualization tools to facilitate informed choices: teaching and learning computer programming(International Journal of Computer Science and Telecommunications, 2012) Mutua, Stephen; Wabwoba, Franklin; Ogao, Patrick; Anselmo, Peter; Abenga, ElizabethProgram Visualization (PV) is a technique that has been found useful in teaching computing programming. This has seen proliferation in development of PV tools with an aim of enhancing teaching/learning programming over the last two decades. However, the tools usage has remained minimal. Perhaps because it becomes challenging to ascertain the appropriate tool for the right task. This paper presents a classification of program visualization tools with the focus of aiding teachers and students in choosing the most appropriate tool for an interesting experience in the classroom. The paper is based on six various PV tools evaluated over a period of two consecutive academic years in a Kenyan public University. The classification augments the Price’s taxonomy of software visualization arm of PV by presenting four basic levels which are further subdivided into lower levels.Item A conceptual model for a holistic predictive attack ability metric for secure service oriented architecture software(International Journal of Information and Communication Technology Research, 2012) Mbuguah, Samuel Mungai; Mwangi, Waweru; Song', Pang Chol; Muchiri, Geoffrey MukethaSoftware based systems are ubiquitous in modern day operations. There has been an increase in software based system attacks; leading to the need to equip the project managers, software designers and software developers with a better predictive attackability model at the architectural design stage. Attackability is a concept proposed recently in research literature to measure the extent that a software system or service could be the target of a successful attack. A literature survey of existing technical models was carried out to identify gaps in them. Also, a literature survey on, human traits that lead to human beings and the software system they man being subject to social engineering attacks was undertaken. Then a conceptual model has been proposed to extend the existing technical model and incorporate a social attackability model to produce a holistic predictive attackability model.Item Cyber security challenges to mobile banking in SACCOs in Kenya(International Journal of Computer, 2017) Nambiro, Alice Wechuli; Wabwoba, Franklin; Wasike, JothamDevelopment of mobile technology has enabled mobile devices to be adopted in daily activities. Financial institutions are adopting mobile devices for banking purposes to enable their clients to bank from anywhere at any time. Although, the adoption of mobile technology enabled convenience to the users, it has brought about a great security challenge. This paper reviews the cyber security challenges to mobile banking and ways which SACCOs minimize the impact. Findings indicate that some mitigation strategies to cyber threats to mobile banking are in place though they seem not to address the major challenges.Item Discoverability a new learnability principle for children’s application software(International Journal of Computer Science & Information Technology, 2016) Okelo, Bethuel Kipchirchir; Mbuguah, Samuel MungaiFor more than two decades children’s use of multimedia was restricted to watching television and listening to music. Although some parents complained about children being addicted to listening to music the idea that children could be addicted to television was a real concern to most parents. Nowadays parents not only need to be concerned about how much television their kids are watching, but also many other forms of media that are emerging with the fast development in information and technology such as the internet, video games, tablets and smart phones. From this the researcher came to realize that children are increasingly becoming the consumers of application software facilitated by these information systems. Children spend at least three hours according to research on these media which includes the use of computers, tablets, smartphones and music. The researcher was concerned that system vendors use the same learnability principles to make applications for all age groups based on learnability principles that were designed with adult users in mind. Many interface design principles used for adult products cannot be applied to products meant for children and further yet children at different ages learn differently. The research looked at the existing learnability principles by trying to evaluate them and come up with new principle(s) that can be used to further improve the current principles so that they can be used effectively by information system designers to improve on the learnability of their application software meant for children of different age groups.Item E-trafiki model: electronic solution architect for police highway patrolling in Kenya(2015) Tenge, Evans; Mneria, Esau; Gekombe, Dickson; Sanja, Michael; Ogalo, JamesAmong the six world regions, Africa remains least motorized but suffers the highest rates of road traffic fatalities causing deaths and fatal injuries. If these trends continue, traffic accidents will be among the top major causes of death worldwide. Highway patrolling is being used primarily for the purpose of overseeing and enforcing traffic safety compliance on roads and highways. In developing countries, traditional manual patrolling methods are still being used for traffic patrolling which is lagging behind, and it is not matched with the status of national costeffective development, reducing road accidents, reducing crime and corruption. In this paper, we're going to look this important sector and how electronic patrolling techniques and equipment have been utilized to overcome the traditional method of patrolling. We argue that developing solution architecture to expose traffic policemen to road traffic information electronically can boost their service provision and reduce road traffic accidents while at the same time be productive and cost efficient. Further, we illustrate the development of an eTrafiki framework to address these aforementioned properties to improve highway patrolling.Item Environmental implications of cell phones penetration and disposal in Kenya(International Journal of Computers & Technology, 2014) Wabwoba, Franklin; Sakwa, Thomas; Mbugua, Samuel; Kilwake, Humphrey JumaKenya has over six million active mobile subscribers who may at some point want to replace or get rid of old mobile phones. A big number of the mobile phones were recently switched off for not being genuine without a prober mechanism being put in place for the disposal. If every affected individual or otherwise disposed off phones by throwing it away then there could a serious ecological disaster in waiting. Cell phones are hazardous materials because of electromagnetic radiation and electronic composition. They have substances such as antimony, arsenic, beryllium, cadmium, copper, lead, nickel and zinc which belong to a class of chemicals known as persistent toxins. These toxins pollute and remain in the environment for long periods. There are ill-effects of wireless and telecommunication devices on the environment are disastrous. The increased use of high resolution LCD screens leads to a potentially devastating environmental challenge. There is no clear policy frame work on e-waste management with a special focus on used mobile phones in the country. A proper disposal mechanism of wireless and telecommunication devices is a necessity in KenyaItem ENVIRONMENTAL IMPLICATIONS OF CELL PHONES PENETRATION AND DISPOSAL IN KENYA(International Journal of Computers & Technology, 2014-05-25) Wabwoba, Franklin; Sakwa, Thomas; Mbugua, Samuel; Kilwake, HumphreyABSTRACT Kenya has over six million active mobile subscribers who may at some point want to replace or get rid of old mobile phones. A big number of the mobile phones were recently switched off for not being genuine without a prober mechanism being put in place for the disposal. If every affected individual or otherwise disposed off phones by throwing it away then there could a serious ecological disaster in waiting. Cell phones are hazardous materials because of electromagnetic radiation and electronic composition. They have substances such as antimony, arsenic, beryllium, cadmium, copper, lead, nickel and zinc which belong to a class of chemicals known as persistent toxins. These toxins pollute and remain in the environment for long periods. There are ill-effects of wireless and telecommunication devices on the environment are disastrous. The increased use of high resolution LCD screens leads to a potentially devastating environmental challenge. There is no clear policy frame work on e-waste management with a special focus on used mobile phones in the country. A proper disposal mechanism of wireless and telecommunication devices is a necessity in KenyaItem Evaluating the role of information and communication technology (ICT) support towards processes of management in institutions of higher learning(International Journal of Advanced Computer Science and Applications, 2012) Ujunju, Michael Okumu; Wanyembi, G.; Wabwoba, FranklinThe role of Information and Communication Technology in achieving organization’s strategic development goals has been an area of constant debate, and as well perceived in different management dimensions. Most universities are therefore employing it (ICT) as a tool for competitive advantage to support the accomplishment of their objectives. Universities are also known to have branches or campuses that need strong and steady strategic plans to facilitate their steady expansion and growth. Besides, production of quality services from the various levels of management in these universities requires quality strategic plans and decisions. In addition, to realize the steady growth and competitive advantage, ICT not only has to be an additive but a critical component towards supporting management processes in the universities. This research sought to determine the role of ICT in supporting management processes in institutions of higher learning in Kenya. The research investigated how the different levels of management used ICT in their management processes and whether the use had any effect on management processes. The research further made recommendations to the universities on better use of ICTs in their management processes. A public university in Kenya was used as a case study in this research.Item Evaluating total cost of ownership for university enterprise resource planning: case of Maseno university(2015) Owoche, Patrick Oduor; Gregory, Wanyembi; Juma, Kilwake HumphreyHigher learning institutions (HEI) are investing in IT to attain operational excellence. Organizations looking to reduce technology costs typically look for ways to reduce the Total Cost of Ownership (TCO). TCO captures all direct and indirect costs related to deploying a particular system. Understanding life-cycle costs provides opportunity to save scarce resources, improve IT and increase productivity. The study sought to analyze the TCO of university ERP system. The TCO analysis was based on Gartner’s TCO model, the Distributed Computing Chart of Account as the theoretical framework. Modified Gartner TCO model was used to determine the total cost of owning Maseno University ERP system. The aim of the study was to create awareness on life-cycle costs of ERP solutions. The results obtained indicate that operations and maintenance account for 51%, end-user usage 23% while technology acquisition costs accounted for 16 %, implementation costs with 7% and the least cost was taken by procurements costs with 3%. Case study was used in gathering both qualitative and quantitative data from Maseno University. Interviews, document analysis, and questionnaires were used to gather the research data. It is hoped that the results of this study will help HEIs improve management of their ERP systems.Item Evaluation of guidelines for security threats in mobile-phone banking(International Journal of Engineering and Mathematical Sciences, 2018) Ngomeh, Augustine Wafula Prince; Omieno, Kelvin Kabeti; Mbuguah, Samuel MungaiGlobally, banking institutions are using mobile phones to provide financial services to reach those with or without bank accounts. However mobile phones do suffer from security threats when used for banking purposes these threats become more critical. The purpose of the research was to investigate the use of user guideline as a tool to mitigate against security threats in mobile phone banking. The objectives of the research were to determine the security threats in the mobile banking, to identify the existing guidelines in mitigating threats in mobile phone banking and to design improved user guideline to minimize the security threats in mobile phone banking. This research adopted a descriptive survey design; Qualitative approach was used in objective two which was concerned with subjective assessment of attitudes, opinions and behavior. Generally, the technique of focus group interviews and depth interviews was used in identifying the use of existing guidelines in mitigating mobile phone security threats. In objective three Simulation approach was used, which involved the construction of an artificial environment within which relevant information and data can be generated. This permitted an observation of the dynamic behavior of a system (or its sub-system) under controlled conditions. Data collection tools included use of interviews and questionnaires. Descriptive statistics was used in data analysis that included frequency percentage mean and mode. This research was expected to provide improved user guidelines that will help in the reduction of the security threats posed in mobile phone banking. The research was expected to further suggest the challenges of the existing guidelines in use to those of adoption of the designed use guidelines.Item Evaluation of the learnability principles of mobile-wireless information systems’ application software for children in Kenya(Journal of Emerging Trends in Computing and Information Sciences, 2015) Okelo, Bethuel Kipchirchir; Mbuguah, Samuel Mungai; Karume, Simon MainaMobile-wireless gadgets are becoming increasingly important in Kenya not just as a medium of social communication, but also as a medium of learning and instruction. This shift partly exploits the learnability principle in information technology, which signifies how quickly a new user can begin efficient and error-free interaction with a system. The learnability principle was originally formulated for computer-based applications intended for adults, but currently children are increasingly becoming the end users. A gap exists in research on the effects of learnability on school-aged children in urban areas of Kenya. Against this backdrop, this study aimed at gathering information on the learnability characteristics of children of different age groups. The research further explored the degree to which the mobile-wireless information systems’ applications software learnability principles are applicable to children in Kenya. The study site was Nairobi and the research participants were children ranging between the ages of 8 to 19 years. Data collection involved questionnaires and the use of tests. The research was in the form of an experiment to evaluate certain factors that affect learnability in relation to the age of the participants and their level of computer experience. The research data was recorded and analyzed by Morae, a learnability software. Major findings indicate that children between the ages of 8 and 14 years require engageability to improve their learning by using new application software, this does not mean that other users of a different age do not require this principle but the degree to which it affects them is different. As for the older kids 15 to 19 years, the findings indicated that they strongly require discoverability to improve their learnability of new application software, this does not mean that adults or children of different ages do not require this given principle but to say the degree to which it affects them varies.Item Experimental validation of the technical attack ability metrics model(International Journal of Information and Communication Technology Research, 2013) Mbuguah, Samuel Mungai; Mwangi, Waweru; Song, Pang Chol; Muchiri, Geoffrey MukethaComputer systems have become gradually and fully embedded into our daily activities. Software based systems attackers have noted these dependency, and have increased the number of attacks of such systems. Software managers and designers require a means of predicting the Attackability of system at the design state. Attackability is a concept proposed recently in literature to measure the extent that a software system or service could be the target of a successful attack. These authors have published such a conceptual model called the Holistic predictive attackability metric model for secure service oriented software. Holistic in that it comprises of a social and technical aspect. This paper is considers experimental validation of the technical metrics part of model only. The technical part uses internal software attributes; complexity cohesion and coupling (3C’s) to predict attackability an external attribute. Pilot experiments were conducted with selected objects from which relationship between Attackability and the corresponding attribute was established. A model was generated for each after carrying out Kendall Tau-b correlation, performing regression testing and curve estimation using SPSS software package. The results were then combined to generate Mean Technical attackability model metrics, which was validated through sample 12 software. Jhawk tool was used measure the 3C’s for each software. The data were to used to generate Calculated mean Technical attackability metrics. The results were tabulated against the measured mean attackability. Pearson correlation and regression testing analysis were performed. The results indicates the model and the corresponding metrics could be used in predicting the mean Technical attackability of a software system.Item Facilitating factors for cybersecurity vulnerabilities in Kenyan county governments(Asian Journal of Research in Computer Science, 2018) Chitechi, Kadima Victor; Mbuguah, Samuel Mungai; Omieno, KelvinGlobally, ICT is regarded as a driver and enabler; thus, organisations which have integrated ICT in their systems have had immense growth and output. The adoption of ICT into the Kenyan County Governments, therefore, promises equal growth and output. These benefits notwithstanding, integration of ICT systems into County Governments is faced with a number of challenges in terms of vulnerabilities and other cybersecurity risks. This paper sought to identify the key facilitators of cybersecurity vulnerabilities in Kenyan County Governments only. The exploratory research design was used as a methodology. Questionnaires and interview schedules were the main instruments of data collection. The data was analysed using descriptive and inferential statistics. The findings indicate that there is a need for County Governments in Kenya to prepare for cybersecurity related challenges through policy formulations, End-users and ICT experts awareness on cybersecurity-attacks, Management support through resources funding and cybersecurity infrastructure is key to any system controls. The solutions to cybersecurity vulnerabilities in Kenyan County governments can be solved when these keys are implemented.Item Factors affecting information systems user satisfaction in Kenyan universities(Journal of Emerging Trends in Computing and Information Sciences, 2016) Nelima, Perez; Mbugua, Samuel Mungai; Kilwake, JumaThe role of information systems in providing business a competitive edge has recently been the subject of much debate. However, it has been argued that not the information system solution but their utilization is what provides the competitive advantages. For these information systems to be well utilized and provide the competitive edge for an institution, its users need to be satisfied with systems as satisfaction determines continued use of the system. Satisfaction is the extent to which users believe the information system available to them meets their information requirements. The study sought to understand the relationship between the value users attribute to information systems and the satisfaction users experience with these systems. This study analyzed information systems in two Kenyan universities to find out factors that influence information system user satisfaction. The sample was selected using both purposive sampling and simple random sampling techniques. The main instruments for data collection that were used are content analysis and questionnaires. Data was analyzed using both descriptive and inferential statistics. This study evaluated satisfaction on software quality attributes basing on the ISO/IEC 9126 software quality model. The findings show that there are a number of factors affecting satisfaction of information systems ranging from institutional factors, individual factors, system factors and infrastructural factors. Information system satisfaction differed significantly across demographic factors like age, gender, mode of study and level of study for students. There was no significant difference in satisfaction between the two universitieItem Factors affecting requirements elicitation for heterogeneous users of information systems(International Journal of Computer Science Engineering and Technology, 2015) Ronoh, Lilian Cherotich; Muchiri, Geoffrey Muketha; Wabwoba, FranklinModern organizations keep up with the fast changing technology through successful information systems development and integration to automate their business operations. Among others, this can be achieved through effective requirements elicitation which a sub-phase of requirements engineering. It is recognized as one of the most critical, knowledge-intensive phase therefore determining the overall success or failure of the information system. In a setup whereby users are heterogeneous by nature, requirements elicitation becomes quite challenging. To improve the effectiveness of the requirements elicitation process from this type of users, the analysts should determine the factors that affect this process which are unique to this type of users. To address this issue, we have conducted research in two Kenyan public universities whereby information systems users are heterogeneous in nature. The objective of the study was to determine the factors that affect requirements elicitation process among heterogeneous user groups of information systems. Nine factors were identified by using multiple regression analysis namely, users’ availability, users’ and analysts’ diverse cultural background, users’ geographical distribution, communication issues, users’ awareness and training on the process, technique used, institutional politics and bureaucracy, requirements elicitation policy and user's cooperation & motivation. These factors form a practical guide that can help analysts to consider before carrying out requirements elicitation from heterogeneous users.Item Factors influencing the selection of mobile phone among university students in Kenya(International Journal of Innovative Research and Advanced Studies, 2018) Ronoh, Richard K.; Mbuguah, Samuel Mungai; Wabwoba, FranklinMobile phone technology has reached unprecedented level leading to unconstrained selection nightmare. This study investigates the selection priorities of mobile phone among university students in Kenya. A total of 310 undergraduate students participated in the study. A survey research design was used in this study. Questionnaire was employed in collection of data and the collected data was analyzed using descriptive and inferential statistics. The findings from this study revealed that university students yearn for the latest technology phones which come with numerous features although not all features are actually used. The study established that the phone appearance, technology used in the phone, accessibility and connectivity are the most important considerations when selecting a mobile phone. The information obtained from this study will provide a baseline understanding of the factors influencing the selection and hence usage of mobile technology among university students in Kenya. Furthermore, the study shows how mobile features can be used as indicators of mobile phone selection.
- «
- 1 (current)
- 2
- 3
- »