James Ochieng Ogalo - Academia.edu (original) (raw)
Papers by James Ochieng Ogalo
Indian Journal of Image Processing and Recognition
Biometric technology utilizes biological and behavioral characteristics to automatically identify... more Biometric technology utilizes biological and behavioral characteristics to automatically identify individuals. The paper was guided by the question on how does cost implications affect for adoption of biometric application in authorization and identification in banks in Eldoret Town. Cost of implications does not influence for adoption of biometric application in authorization and identification in banks in Eldoret Town. Thus, this study will help government agencies, financial institutions and other corporate business in adopting biometric systems. The research indicated cost implications affects biometric application in authorization and identification in cyber security in banks where biometric applications in banks have insufficient technical infrastructure hence affecting inefficiency and ineffectiveness of bank operations. In conclusion, the research indicated that cost implications are a major indicator that influenced biometric application in authorization and identification ...
International Journal of Innovative Technology and Exploring Engineering
Biometric technology has been seen as a driving force for the future direction of strong authenti... more Biometric technology has been seen as a driving force for the future direction of strong authentication. Although Biometric has been deemed by many scholars as secure method of identification and verification, few banks in Kenya have implemented the use of biometric features such as fingerprints for customer and systems user identification. There are some that put in place the system but failed to fully utilize the system.What could be the key determinants to successful implementation or adoption of the biometric systems for identification and verification. What are the elements that makes it possible for a banking institution to effectively adopt and use the biometric systems for identification and verification. The study sought to determine the effect of security and privacy in biometric application for authorization and identification in cyber security in banks in Eldoret Town. The study was guided by the contingency theory, diffusion innovation theory, and unified theory of acce...
International Journal of Research and Innovation in Social Science
The library holds a central place in learning institution and its main goal is provide resource f... more The library holds a central place in learning institution and its main goal is provide resource for teaching, research, publishing, and innovation. This study sought to find out the effect of library user education on access and use of library services and resources. The study used a descriptive research design. The total target population was 640, comprising of 600 students, 30 lecturers and 10 librarians. Stratified sampling technique was used to categorize sample into student’s, lecturers and librarians. The Krejci and Morgan formula was used to calculate a sample size of 240 respondents. Data were collected using questionnaires, observation checklists, and field notes. Qualitative data were thematically analyzed and the Statistical Package for the Social Science (SPSS) was used to analyze quantitative data. The study observed that Nyeri National Polytechnic promotes fairness in the use of library, the extent in use of library resources, depends largely on users’ skill and knowle...
International journal of science & technoledge, Jul 31, 2020
The ERP system has for long been adopted in private higher learning institution and has had a sig... more The ERP system has for long been adopted in private higher learning institution and has had a significant impact on finance and accounts management, examinations management, hostels and accommodation, library management, procurement and stores management and catering management. The implementation of the ERP System in Masinde Muliro University of Science and Technology since 2012 has been characterized by dissatisfaction from both students and lecturers especially in form of service delays due to faulty queuing systems or network delays.
International Journal of Research Publications
Healthcare technology is continually changing and hospitals that want to keep up must be acquitte... more Healthcare technology is continually changing and hospitals that want to keep up must be acquitted with new technologies that maintain integrity. The urge in system users to sell patients information puts the integrity of the information systems in question and hence a problem arises in cases where trustworthy staff do not want to utilize these systems in ther service due to the possible data leakages. The Moi Teaching and Referral Hospital was the location of the research. The total participants of the study were 161 members of the MTRH. The Cochran model was used as the sample size formula before the data was analyzed using 12 Likert scale questions and Cronbach's Alpha. The findings showed that the respondents agree that misleading and deceiving system messages and alerts negatively impact system integrity. This study concluded that a statistically significant relationship exists between cybersecurity and customer satisfaction with the system; hence, improving system security improves customer satisfaction. The study recommended that since cybersecurity affects the integrity of the information system at the hospital, the management should ensure well identification and authentication techniques such as IDs and passwords are in place to identify system users and confirm that information is from a trusted source.
Information system security is important in an institution whose routine operations expose its in... more Information system security is important in an institution whose routine operations expose its information system to threats. The objectives of the study were to establish the effect of systems security threats on the utilization of information resources and to find out the challenges of information system threats on organizational information resources in Kenya School of Government. The study employed the descriptive survey research design. The study targeted 100 staff drawn from the ICT Department, secretarial and records departments. Census sampling was employed to select the sample size. Data was collected using self administered questionnaires and analyzed using descriptive statistics with the aid of Microsoft Excel. The findings were presented using tables and graphs. From the results, it was evident that there were widespread systems security threats on the utilization of information resources at the Kenya School of Government, with the illegal access to computer system being...
In his research paper, we explore factors affecting the intentions to accept mobile money payment... more In his research paper, we explore factors affecting the intentions to accept mobile money payment (MMP) by MSEs within Kisumu City, Kenya. Using Probit Regression Model, the paper examines whether mobile money payment technology acceptance level is affected by such factors like demographic Profile, Perceived Usefulness, Perceived ease of Use and Perceived Risk which can affects the intention to accept. The rationale for the investigation stems from the fact that The ICT sector in Kenyan continues to grow exponentially, with mobile penetration rate hitting 80.5 per cent, the latest sector statistics report by the Communications Authority of Kenya (CA, 2014). It concludes that the notions within the Kenyan public that demographic profile for example age and education level is a significant factor with impact on the individual MSE Owner’s intention to accept mobile money payment; Perceive Usefulness and Perceived ease of Use inclusive.
Journal of Pharmaceutical Care & Health Systems, 2021
Health records involve unique data which are highly subjected to privacy right security checks an... more Health records involve unique data which are highly subjected to privacy right security checks and its disclosure may lead to violation of this right and therefore cannot be implemented without additional consideration. The health care community has long recognized the potential for health information technology systems in its management, thus improving clinical and health care while reducing costs and this has synergized the access to health care services and information. The mobility in health care provision demands the need for sharing of patient data and this
require interoperable health information Technology infrastructure, privacy and security of the resource and this will enhance stakeholders trust and promotes health information interoperability diffusion. It has been noted that the major challenge in the integration of Health Information Record Management system is interoperability and practitioners in a private practice may have difficulty obtaining complete information about a patient who is currently being hospitalized. The study established that interoperability and privacy issues still stands out as the major hindrance to sharing of health care records. There is a need for closer collaboration and trust between the major stakeholders in the industry focusing on their inclusivity in working toward the achievement of interoperability and privacy concerns.
Keywords: Health information system; Interoperability; Privacy rights; Information technology
Bulletin of University of Agricultural Sciences and Veterinary Medicine Cluj-Napoca. Agriculture, 2021
The economy of Kenya depends mainly on agriculture where smallholder farming has a significant ro... more The economy of Kenya depends mainly on agriculture where smallholder farming has a significant role as it employs 65 percent of the work force and contributes 32 percent of Kenya’s GDP. However, the agricultural industry in Kenya is currently facing difficulties in low productivity. The rural areas have the largest concentration of poverty and food insecurity. Majority of the farming activities in Kenya are on small scale and the problems of these farmers are multifaceted including sub-divisions and small farm sizes, leading to diseconomies of scale and low productivity. The goal of this research was to develop and validate an E-agriculture Framework for Improving Agricultural Productivity among the Smallholder Farmers. Descriptive research design was used. The study was carried out in South Eastern Kenya. The target population comprised 224 meteorological staff, 421 agricultural extension officers, 208 ICT personnel and 3,833 farmers. Data was collected using self-administered ques...
It has become undisputable that the technological changes of ICT in terms of emerging trends and ... more It has become undisputable that the technological changes of ICT in terms of emerging trends and technologies are here to stay, those organizations that can effectively grasp the deep currents of technological evolution can use their experiences to protect the organization against eventual fatal technological obsolescence. Haag et al (2008), argues that ICT forms a conscious belief that all business enterprises require new operational techniques and strategies to match the learning and innovational needs, to maintain customer dynamism and quest for high quality products/ services that satisfy those needs. To manage this dilemma in a business enterprise, information and communication has become an essential ingredient for the survival and growth of a business on a day today endeavors. This requires systems to provide information and communicate them effectively in a business entity (James and Charles, 2011). On the other hand, Information and Communication Technology (ICT) has been i...
‘Internet of Things ’ is choking the world with Zettabyte scale data rate of which traditional co... more ‘Internet of Things ’ is choking the world with Zettabyte scale data rate of which traditional computing can neither store nor process. Outputs of various kinds of Research endeavors are held in different media over the years and cannot be made to “talk to each other ” to exploit each other for beneficial relative information. The prime objective is to find a platform that can easily accommodate Cloud technology which can elastically handle the big data concept. In this study a private cloud is built using Ubuntu and Eucalyptus open source software on two quad processor machines with 8GB Ram. Using Apache Flume and Hadoop analytics, Big Data obtained from Research outputs is mounted on the R-Wingu framework with capacity to data mine unstructured, unrelated data and relate the components intelligently and may be leased as Database as a Service(DaaS). Once disparate data streams are accessible in real time, in one place and a consistent fashion, data suddenly becomes much more powerf...
This paper points to the necessity to conduct research on the pedagogical readiness of instructor... more This paper points to the necessity to conduct research on the pedagogical readiness of instructors towards achieving integration of ICT’s in Technical and Vocational Education and Training (TVET) institutions in Kenya.Research on the integration of ICTs in teaching and learning in TVET institution in Kenya have been done to improve the learning process, though very little progress has been recognized toward its effective integration.TVET subsector have revealed that in spite of the many efforts that researchers and educators put over the years in preparing teachers in the educational uses of ICTs, teachers still lack the Pedagogical skills and knowledge needed to be able to teach with ICT technology successfully. The aim of the study was to investigate the Effect of Pedagogical readiness on Effective Integration of ICTs in TVET institution in Kenya with specific reference to Michuki and Thika Technical Training Institute in Murang’a and Kiambu County respectively. The relationship b...
International Journal of scientific research and management, 2017
Purpose: The purpose of the study was to determine the influence of organizational factors on in-... more Purpose: The purpose of the study was to determine the influence of organizational factors on in-housesoftware quality assurance in Strategic state corporations in Kenya.Methodology: The study used quantitative research method and applied Survey research design. Theresearch population and target group comprised 6large Strategic state corporations, three in Transport andInfrastructure sector and three in the Energy sector. These are playing a critical to the Kenyan economyand the attainment of Vision 2030. These corporations have a combined ICT work force of approximately300 personnel. From the research population, a sample of 169 respondents was scientifically selected andadministered with questionnaires using a drop and pick method. A multiple linear regression model wasused to analyze the data using statistical package for the social sciences (SPSS).Results: The study found that 38.5% of the variation in In-house Software Quality Assurance in Strategicstate corporations can be exp...
The effect of HIV/AIDS have been felt in every corner of the world either directly or indirectly.... more The effect of HIV/AIDS have been felt in every corner of the world either directly or indirectly. To date there is no drug or vaccine, cure or prevention of HIV available, Therefore to prevent infection of the virus is by avoiding behaviour that will put individual at a risk of infection such as sharing of needles and having unprotected sex.Infection is a very complex affair because many people who get infected are unaware or do not reveal the symptoms. This study intended to assess the use of condoms as a method of protection aginst HIV/AIDS infection among youths, with specific objectives of determining the extent of knowledge and popularity of condom use and further to evaluate the sourcing avenues of condoms and there respective ease of access, to find out the youths perception on the effectiveness of condoms as a method of protection against HIV infection and to determine the safety and acceptability of use. The study adopted the use of a descriptive study design with a target ...
Successful e-government implementation at county governments can potentially improve efficiency a... more Successful e-government implementation at county governments can potentially improve efficiency and effectiveness of internal administration within government, to re-locate government service from government offices to locations closer to the citizens hence fastening access to government services. However, its implementation in economically and technologically transitioning countries such as Kenya has remained problematic as majority of e-government projects end as a failure. Different scholars and practitioners attribute the failures to poor strategy, technology among other reasons while others associate the failures to the design reality gap created between the existing proposed e-government implementation models and the real contextual experiences on the ground. Most e-government implementation models adopted by developing countries originate from developed countries that are exclusively designed to cater for their specific contexts. This paper explores the extent of application ...
The use of Information communication technology in the library management has become widely appli... more The use of Information communication technology in the library management has become widely applied to almost all the services rendered by the library. It has gradually brought a revolutionary progress in the field of Librarianship. Technology has totally changed how the library discharge the services to the clients and all aspect of library management has also changed including acquisition of information sources, processing, storage, preservations and dissemination of the information resources to the library users. It has greatly contributed to the efficiency and effectiveness of service delivery of the library. The management of the library, staffs and users no longer waste a lot of time searching for the desired information sources, they retrieve just with a click of a mouse. The study was carried out to examine the challenges and opportunities of using the information communication technology in the management of Government libraries, in Kajiado County-Kenya which is one of the ...
European Journal of Information Technologies and Computer Science
The use of information and communication technology has been providing the competitive edge for u... more The use of information and communication technology has been providing the competitive edge for universities globally while Kenyan universities are not an exception. This has in turn made the universities targets of cyber-attacks and hence exposure to unprecedented security risks. The universities need to implement information security best practices and standards in their technological environments to remain secure and operational. The research sought to investigate the information security practices adopted in Kenyan public universities to protect themselves. Descriptive survey method was employed while the study was based on Operationally Critical Threats, Assets and Vulnerability Evaluation (OCTAVE) framework and other industry security best practices. The study targeted the 31 chartered public universities, which were clustered based on their year of establishment. Simple random and purposive sampling methods were utilized to select two target universities per cluster and deter...
International Journal of Managment, IT and Engineering, 2014
Firms seek to find new ways of conducting business at a cost effective manner. Information Commun... more Firms seek to find new ways of conducting business at a cost effective manner. Information Communication Technology (ICT)is seen as the preferred choice for organizations in facilitating their business operations thus improving the speed, accuracy and efficiency of the entire business processes. This study explores the opportunities, challenges, and prospects available for large Professional Firms in Kisumu City - Kenya. ICT cement and leverage the potentials of business enterprises, the purpose of this study was to examine the extent to which ICT integration matches business requirements. The specific objectives were to find out the types of risks associated with ICT use, to assess the perceived benefits of ICT use in large professional businesses enterprises in Kisumu City andto explore the various factors, if any, militating against the effective utilization of ICTs for sustainability and profitability. The study is justified in that, since ICT is regarded as an enablerthat facil...
Indian Journal of Image Processing and Recognition
Biometric technology utilizes biological and behavioral characteristics to automatically identify... more Biometric technology utilizes biological and behavioral characteristics to automatically identify individuals. The paper was guided by the question on how does cost implications affect for adoption of biometric application in authorization and identification in banks in Eldoret Town. Cost of implications does not influence for adoption of biometric application in authorization and identification in banks in Eldoret Town. Thus, this study will help government agencies, financial institutions and other corporate business in adopting biometric systems. The research indicated cost implications affects biometric application in authorization and identification in cyber security in banks where biometric applications in banks have insufficient technical infrastructure hence affecting inefficiency and ineffectiveness of bank operations. In conclusion, the research indicated that cost implications are a major indicator that influenced biometric application in authorization and identification ...
International Journal of Innovative Technology and Exploring Engineering
Biometric technology has been seen as a driving force for the future direction of strong authenti... more Biometric technology has been seen as a driving force for the future direction of strong authentication. Although Biometric has been deemed by many scholars as secure method of identification and verification, few banks in Kenya have implemented the use of biometric features such as fingerprints for customer and systems user identification. There are some that put in place the system but failed to fully utilize the system.What could be the key determinants to successful implementation or adoption of the biometric systems for identification and verification. What are the elements that makes it possible for a banking institution to effectively adopt and use the biometric systems for identification and verification. The study sought to determine the effect of security and privacy in biometric application for authorization and identification in cyber security in banks in Eldoret Town. The study was guided by the contingency theory, diffusion innovation theory, and unified theory of acce...
International Journal of Research and Innovation in Social Science
The library holds a central place in learning institution and its main goal is provide resource f... more The library holds a central place in learning institution and its main goal is provide resource for teaching, research, publishing, and innovation. This study sought to find out the effect of library user education on access and use of library services and resources. The study used a descriptive research design. The total target population was 640, comprising of 600 students, 30 lecturers and 10 librarians. Stratified sampling technique was used to categorize sample into student’s, lecturers and librarians. The Krejci and Morgan formula was used to calculate a sample size of 240 respondents. Data were collected using questionnaires, observation checklists, and field notes. Qualitative data were thematically analyzed and the Statistical Package for the Social Science (SPSS) was used to analyze quantitative data. The study observed that Nyeri National Polytechnic promotes fairness in the use of library, the extent in use of library resources, depends largely on users’ skill and knowle...
International journal of science & technoledge, Jul 31, 2020
The ERP system has for long been adopted in private higher learning institution and has had a sig... more The ERP system has for long been adopted in private higher learning institution and has had a significant impact on finance and accounts management, examinations management, hostels and accommodation, library management, procurement and stores management and catering management. The implementation of the ERP System in Masinde Muliro University of Science and Technology since 2012 has been characterized by dissatisfaction from both students and lecturers especially in form of service delays due to faulty queuing systems or network delays.
International Journal of Research Publications
Healthcare technology is continually changing and hospitals that want to keep up must be acquitte... more Healthcare technology is continually changing and hospitals that want to keep up must be acquitted with new technologies that maintain integrity. The urge in system users to sell patients information puts the integrity of the information systems in question and hence a problem arises in cases where trustworthy staff do not want to utilize these systems in ther service due to the possible data leakages. The Moi Teaching and Referral Hospital was the location of the research. The total participants of the study were 161 members of the MTRH. The Cochran model was used as the sample size formula before the data was analyzed using 12 Likert scale questions and Cronbach's Alpha. The findings showed that the respondents agree that misleading and deceiving system messages and alerts negatively impact system integrity. This study concluded that a statistically significant relationship exists between cybersecurity and customer satisfaction with the system; hence, improving system security improves customer satisfaction. The study recommended that since cybersecurity affects the integrity of the information system at the hospital, the management should ensure well identification and authentication techniques such as IDs and passwords are in place to identify system users and confirm that information is from a trusted source.
Information system security is important in an institution whose routine operations expose its in... more Information system security is important in an institution whose routine operations expose its information system to threats. The objectives of the study were to establish the effect of systems security threats on the utilization of information resources and to find out the challenges of information system threats on organizational information resources in Kenya School of Government. The study employed the descriptive survey research design. The study targeted 100 staff drawn from the ICT Department, secretarial and records departments. Census sampling was employed to select the sample size. Data was collected using self administered questionnaires and analyzed using descriptive statistics with the aid of Microsoft Excel. The findings were presented using tables and graphs. From the results, it was evident that there were widespread systems security threats on the utilization of information resources at the Kenya School of Government, with the illegal access to computer system being...
In his research paper, we explore factors affecting the intentions to accept mobile money payment... more In his research paper, we explore factors affecting the intentions to accept mobile money payment (MMP) by MSEs within Kisumu City, Kenya. Using Probit Regression Model, the paper examines whether mobile money payment technology acceptance level is affected by such factors like demographic Profile, Perceived Usefulness, Perceived ease of Use and Perceived Risk which can affects the intention to accept. The rationale for the investigation stems from the fact that The ICT sector in Kenyan continues to grow exponentially, with mobile penetration rate hitting 80.5 per cent, the latest sector statistics report by the Communications Authority of Kenya (CA, 2014). It concludes that the notions within the Kenyan public that demographic profile for example age and education level is a significant factor with impact on the individual MSE Owner’s intention to accept mobile money payment; Perceive Usefulness and Perceived ease of Use inclusive.
Journal of Pharmaceutical Care & Health Systems, 2021
Health records involve unique data which are highly subjected to privacy right security checks an... more Health records involve unique data which are highly subjected to privacy right security checks and its disclosure may lead to violation of this right and therefore cannot be implemented without additional consideration. The health care community has long recognized the potential for health information technology systems in its management, thus improving clinical and health care while reducing costs and this has synergized the access to health care services and information. The mobility in health care provision demands the need for sharing of patient data and this
require interoperable health information Technology infrastructure, privacy and security of the resource and this will enhance stakeholders trust and promotes health information interoperability diffusion. It has been noted that the major challenge in the integration of Health Information Record Management system is interoperability and practitioners in a private practice may have difficulty obtaining complete information about a patient who is currently being hospitalized. The study established that interoperability and privacy issues still stands out as the major hindrance to sharing of health care records. There is a need for closer collaboration and trust between the major stakeholders in the industry focusing on their inclusivity in working toward the achievement of interoperability and privacy concerns.
Keywords: Health information system; Interoperability; Privacy rights; Information technology
Bulletin of University of Agricultural Sciences and Veterinary Medicine Cluj-Napoca. Agriculture, 2021
The economy of Kenya depends mainly on agriculture where smallholder farming has a significant ro... more The economy of Kenya depends mainly on agriculture where smallholder farming has a significant role as it employs 65 percent of the work force and contributes 32 percent of Kenya’s GDP. However, the agricultural industry in Kenya is currently facing difficulties in low productivity. The rural areas have the largest concentration of poverty and food insecurity. Majority of the farming activities in Kenya are on small scale and the problems of these farmers are multifaceted including sub-divisions and small farm sizes, leading to diseconomies of scale and low productivity. The goal of this research was to develop and validate an E-agriculture Framework for Improving Agricultural Productivity among the Smallholder Farmers. Descriptive research design was used. The study was carried out in South Eastern Kenya. The target population comprised 224 meteorological staff, 421 agricultural extension officers, 208 ICT personnel and 3,833 farmers. Data was collected using self-administered ques...
It has become undisputable that the technological changes of ICT in terms of emerging trends and ... more It has become undisputable that the technological changes of ICT in terms of emerging trends and technologies are here to stay, those organizations that can effectively grasp the deep currents of technological evolution can use their experiences to protect the organization against eventual fatal technological obsolescence. Haag et al (2008), argues that ICT forms a conscious belief that all business enterprises require new operational techniques and strategies to match the learning and innovational needs, to maintain customer dynamism and quest for high quality products/ services that satisfy those needs. To manage this dilemma in a business enterprise, information and communication has become an essential ingredient for the survival and growth of a business on a day today endeavors. This requires systems to provide information and communicate them effectively in a business entity (James and Charles, 2011). On the other hand, Information and Communication Technology (ICT) has been i...
‘Internet of Things ’ is choking the world with Zettabyte scale data rate of which traditional co... more ‘Internet of Things ’ is choking the world with Zettabyte scale data rate of which traditional computing can neither store nor process. Outputs of various kinds of Research endeavors are held in different media over the years and cannot be made to “talk to each other ” to exploit each other for beneficial relative information. The prime objective is to find a platform that can easily accommodate Cloud technology which can elastically handle the big data concept. In this study a private cloud is built using Ubuntu and Eucalyptus open source software on two quad processor machines with 8GB Ram. Using Apache Flume and Hadoop analytics, Big Data obtained from Research outputs is mounted on the R-Wingu framework with capacity to data mine unstructured, unrelated data and relate the components intelligently and may be leased as Database as a Service(DaaS). Once disparate data streams are accessible in real time, in one place and a consistent fashion, data suddenly becomes much more powerf...
This paper points to the necessity to conduct research on the pedagogical readiness of instructor... more This paper points to the necessity to conduct research on the pedagogical readiness of instructors towards achieving integration of ICT’s in Technical and Vocational Education and Training (TVET) institutions in Kenya.Research on the integration of ICTs in teaching and learning in TVET institution in Kenya have been done to improve the learning process, though very little progress has been recognized toward its effective integration.TVET subsector have revealed that in spite of the many efforts that researchers and educators put over the years in preparing teachers in the educational uses of ICTs, teachers still lack the Pedagogical skills and knowledge needed to be able to teach with ICT technology successfully. The aim of the study was to investigate the Effect of Pedagogical readiness on Effective Integration of ICTs in TVET institution in Kenya with specific reference to Michuki and Thika Technical Training Institute in Murang’a and Kiambu County respectively. The relationship b...
International Journal of scientific research and management, 2017
Purpose: The purpose of the study was to determine the influence of organizational factors on in-... more Purpose: The purpose of the study was to determine the influence of organizational factors on in-housesoftware quality assurance in Strategic state corporations in Kenya.Methodology: The study used quantitative research method and applied Survey research design. Theresearch population and target group comprised 6large Strategic state corporations, three in Transport andInfrastructure sector and three in the Energy sector. These are playing a critical to the Kenyan economyand the attainment of Vision 2030. These corporations have a combined ICT work force of approximately300 personnel. From the research population, a sample of 169 respondents was scientifically selected andadministered with questionnaires using a drop and pick method. A multiple linear regression model wasused to analyze the data using statistical package for the social sciences (SPSS).Results: The study found that 38.5% of the variation in In-house Software Quality Assurance in Strategicstate corporations can be exp...
The effect of HIV/AIDS have been felt in every corner of the world either directly or indirectly.... more The effect of HIV/AIDS have been felt in every corner of the world either directly or indirectly. To date there is no drug or vaccine, cure or prevention of HIV available, Therefore to prevent infection of the virus is by avoiding behaviour that will put individual at a risk of infection such as sharing of needles and having unprotected sex.Infection is a very complex affair because many people who get infected are unaware or do not reveal the symptoms. This study intended to assess the use of condoms as a method of protection aginst HIV/AIDS infection among youths, with specific objectives of determining the extent of knowledge and popularity of condom use and further to evaluate the sourcing avenues of condoms and there respective ease of access, to find out the youths perception on the effectiveness of condoms as a method of protection against HIV infection and to determine the safety and acceptability of use. The study adopted the use of a descriptive study design with a target ...
Successful e-government implementation at county governments can potentially improve efficiency a... more Successful e-government implementation at county governments can potentially improve efficiency and effectiveness of internal administration within government, to re-locate government service from government offices to locations closer to the citizens hence fastening access to government services. However, its implementation in economically and technologically transitioning countries such as Kenya has remained problematic as majority of e-government projects end as a failure. Different scholars and practitioners attribute the failures to poor strategy, technology among other reasons while others associate the failures to the design reality gap created between the existing proposed e-government implementation models and the real contextual experiences on the ground. Most e-government implementation models adopted by developing countries originate from developed countries that are exclusively designed to cater for their specific contexts. This paper explores the extent of application ...
The use of Information communication technology in the library management has become widely appli... more The use of Information communication technology in the library management has become widely applied to almost all the services rendered by the library. It has gradually brought a revolutionary progress in the field of Librarianship. Technology has totally changed how the library discharge the services to the clients and all aspect of library management has also changed including acquisition of information sources, processing, storage, preservations and dissemination of the information resources to the library users. It has greatly contributed to the efficiency and effectiveness of service delivery of the library. The management of the library, staffs and users no longer waste a lot of time searching for the desired information sources, they retrieve just with a click of a mouse. The study was carried out to examine the challenges and opportunities of using the information communication technology in the management of Government libraries, in Kajiado County-Kenya which is one of the ...
European Journal of Information Technologies and Computer Science
The use of information and communication technology has been providing the competitive edge for u... more The use of information and communication technology has been providing the competitive edge for universities globally while Kenyan universities are not an exception. This has in turn made the universities targets of cyber-attacks and hence exposure to unprecedented security risks. The universities need to implement information security best practices and standards in their technological environments to remain secure and operational. The research sought to investigate the information security practices adopted in Kenyan public universities to protect themselves. Descriptive survey method was employed while the study was based on Operationally Critical Threats, Assets and Vulnerability Evaluation (OCTAVE) framework and other industry security best practices. The study targeted the 31 chartered public universities, which were clustered based on their year of establishment. Simple random and purposive sampling methods were utilized to select two target universities per cluster and deter...
International Journal of Managment, IT and Engineering, 2014
Firms seek to find new ways of conducting business at a cost effective manner. Information Commun... more Firms seek to find new ways of conducting business at a cost effective manner. Information Communication Technology (ICT)is seen as the preferred choice for organizations in facilitating their business operations thus improving the speed, accuracy and efficiency of the entire business processes. This study explores the opportunities, challenges, and prospects available for large Professional Firms in Kisumu City - Kenya. ICT cement and leverage the potentials of business enterprises, the purpose of this study was to examine the extent to which ICT integration matches business requirements. The specific objectives were to find out the types of risks associated with ICT use, to assess the perceived benefits of ICT use in large professional businesses enterprises in Kisumu City andto explore the various factors, if any, militating against the effective utilization of ICTs for sustainability and profitability. The study is justified in that, since ICT is regarded as an enablerthat facil...