<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
<title>Computer Science and  Information Technology</title>
<link href="http://repository.anu.ac.ke/handle/123456789/400" rel="alternate"/>
<subtitle>Browse within this community</subtitle>
<id>http://repository.anu.ac.ke/handle/123456789/400</id>
<updated>2026-05-14T07:47:23Z</updated>
<dc:date>2026-05-14T07:47:23Z</dc:date>
<entry>
<title>Adoption of mobile technology for knowledge management in manufacturing firms: a case study of Mahashakti Kenya Limited, Athi River</title>
<link href="http://repository.anu.ac.ke/handle/123456789/957" rel="alternate"/>
<author>
<name>Rehal, Kirandeep Kaur</name>
</author>
<id>http://repository.anu.ac.ke/handle/123456789/957</id>
<updated>2023-08-18T13:10:59Z</updated>
<published>2019-08-01T00:00:00Z</published>
<summary type="text">Adoption of mobile technology for knowledge management in manufacturing firms: a case study of Mahashakti Kenya Limited, Athi River
Rehal, Kirandeep Kaur
Knowledge management is a field with a lot of potential that can benefit individuals as well&#13;
as different types of organizations. Despite this fact, most organizations in Kenya have&#13;
focused on knowledge storage, but have not adopted sharing of the stored knowledge. This&#13;
study examined the adoption of mobile technology for knowledge management in&#13;
Mahashakti Kenya Limited, Athi River. The study was guided by the following objectives:&#13;
To assess the extent of adoption of mobile technology for knowledge management in&#13;
Mahashakti Kenya Limited, Athi River to determine mobile technology platforms used for&#13;
knowledge management in Mahashakti Kenya Limited, Athi River and to investigate the&#13;
factors affecting the adoption of mobile technology for knowledge management in&#13;
Mahashakti Kenya Limited, Athi River. The study was anchored on the Diffusion of&#13;
Innovation Theory. This study employed a descriptive survey design. The study collected&#13;
data from all the 52 employees at the Mahashakti Kenya Limited based on a census method.&#13;
The study utilized primary data which was collected using structured questionnaires, key&#13;
informant interviews and observations. Quantitative data was analyzed using descriptive,&#13;
correlation and regression statistics. Qualitative data on the other hand, was transcribed,&#13;
coded into themes and analyzed by use of content analysis. Quantitative data was presented&#13;
using charts and tables. The study found that mobile technology was used to share&#13;
information remotely in the company, share timely information and share different types&#13;
of information. In addition, mobile technology has been efficient in knowledge&#13;
management within the company. The study also found that the organization used short&#13;
message services for knowledge management, as well as multimedia messaging services,&#13;
websites, installable applications, phone calls, emails, WhatsApp, skype, zoom and flash&#13;
screens. The study further found that the presence of information technology infrastructure&#13;
and adoption of mobile technology by competitors affected the company’s strategy of&#13;
adopting the technology. However, employee and management attitude did not largely&#13;
affect the adoption of mobile technology in the company. The study concluded that the&#13;
extent of mobile technology adoption, mobile technology platforms and factors affecting&#13;
adoption of mobile technology positively influence knowledge management in Mahashakti&#13;
Kenya Limited. The study recommends integration of mobile technology to all departments&#13;
where it had not been integrated, as it has been found to be essential in knowledge&#13;
management in the company. The study also recommends adoption of other platforms such&#13;
as SharePoint and DotNet which can enable the company share information more and&#13;
widely across departments. The study finally recommends training of all employees on&#13;
mobile technology, to adopt the right attitude towards the technologies used for efficient&#13;
knowledge management.
</summary>
<dc:date>2019-08-01T00:00:00Z</dc:date>
</entry>
<entry>
<title>Developing a multi-factor authentication prototype for improved security of enterprise resource planning systems for Kenyan universities</title>
<link href="http://repository.anu.ac.ke/handle/123456789/864" rel="alternate"/>
<author>
<name>Kimani, Carolyne Wanjiru</name>
</author>
<id>http://repository.anu.ac.ke/handle/123456789/864</id>
<updated>2022-08-31T13:48:55Z</updated>
<published>2022-02-01T00:00:00Z</published>
<summary type="text">Developing a multi-factor authentication prototype for improved security of enterprise resource planning systems for Kenyan universities
Kimani, Carolyne Wanjiru
Automated systems are crucial for organizations to maintain records and transactions&#13;
effectively. Universities have increasingly adopted Enterprise Resource Planning (ERP)&#13;
systems, a software that provides integrated management of processes and transactions in real-time. ERP systems contain lots of information and are accessed by multiple users,&#13;
commonly through usernames and password authentication mechanisms. However, there&#13;
have been security and privacy concerns about ERP systems’ security, where only the&#13;
traditional authentication method of a username and password is commonly used.&#13;
Passwords have weaknesses that can be easily compromised. Thus, this research aimed at&#13;
establishing authentication methods used for ERPs in chartered Kenyan Universities and&#13;
their vulnerabilities. The study further aimed at developing and validating a multi-factor&#13;
authentication prototype to improve ERP systems security. Multi-factor authentication&#13;
which combines several authentication factors such as something the user has, knows, or&#13;
is, is a new state-of-the-art technology that is being adopted to strengthen systems’&#13;
authentication security. This research used an exploratory sequential design and a survey&#13;
for chartered Kenyan Universities. Data collection was done through document analysis,&#13;
issuing questionnaires online to the universities’ system administrators to establish ERP&#13;
authentication methods and vulnerabilities. The questionnaires were validated by carrying&#13;
out a pre-study that assessed whether the required data was captured and helped identify&#13;
areas of improvement. The data collected was analyzed using descriptive statistics,&#13;
correlation and regression, whose outcome was used as input for the development of a&#13;
multi-factor authentication prototype. The key vulnerabilities established from the survey&#13;
were password guessing, password reuse and social engineering hence the proposed multifactor authentication prototype to counter them. The independent variable factors found to&#13;
have a positive significant relationship with ERP systems security according to the&#13;
correlation were; attack tolerance, level of user training and ICT Security policy. The&#13;
regression analysis model revealed that user training was the most significant variable on&#13;
improved ERP systems security. This research hence proposed and developed a multifactor authentication prototype factoring in these variables, to contribute towards the&#13;
improvement of security of ERP systems for universities in Kenya. The final outcome of&#13;
the research was a multi-factor authentication prototype combining passwords and&#13;
biometric authentication, that requires to be coupled with effective user training and&#13;
enforcement of ICT security policies, to improve ERP systems security for Kenyan&#13;
universities. As a recommendation for further research, alternative biometric&#13;
authentication methods, integration of authentication applications and addressing other&#13;
systems security issues can be explored to further improve ERP systems security.
</summary>
<dc:date>2022-02-01T00:00:00Z</dc:date>
</entry>
<entry>
<title>Cloud computing services in Africa Nazarene University: An evaluation of affecting factors and proposed model for adoption</title>
<link href="http://repository.anu.ac.ke/handle/123456789/746" rel="alternate"/>
<author>
<name>Mutata, Mary Nzisa</name>
</author>
<id>http://repository.anu.ac.ke/handle/123456789/746</id>
<updated>2022-01-17T10:52:24Z</updated>
<published>2021-02-01T00:00:00Z</published>
<summary type="text">Cloud computing services in Africa Nazarene University: An evaluation of affecting factors and proposed model for adoption
Mutata, Mary Nzisa
Cloud computing is an internet based, remote driven and service oriented technology&#13;
emerged to provide software as a service among others. Adopting cloud computing&#13;
software as a service (SaaS) in Africa Nazarene University (ANU) libraries will&#13;
significantly reduce the cost of maintaining systems; expose library users to multivariant information resources and optimize library services. This research study was&#13;
guided by the following objectives: to assess the technological, organizational and&#13;
environmental factors affecting the full adoption of SaaS at ANU, and; to investigate the&#13;
different types of service users, assess their needs, and to recommend an adoption&#13;
strategy of SaaS model for ANU libraries. The study adopted a descriptive survey&#13;
design through the use of semi-structured questionnaires and interview guides.&#13;
Purposive sampling method was used to select five library users from ANU for&#13;
interview. In addition, library users from the student body were selected through&#13;
stratified random sampling method and issued with questionnaires. A total of 97&#13;
respondents were used as the sample size in this study. The study utilized quantitative&#13;
and qualitative approaches for data analysis, which was presented using tables and&#13;
graphs. Qualitative data was analyzed as per the order of questions in the questionnaires&#13;
and then computed using SPSS software. The research findings indicated that the most&#13;
significant factors was organizational factors (0.216). On this basis, the researcher was&#13;
able to recommend that the organization of the university should be encouraged to&#13;
support the deployed of SaaS in the university.
</summary>
<dc:date>2021-02-01T00:00:00Z</dc:date>
</entry>
<entry>
<title>Assessment of technological risks facing mobile banking: a case of commercial banks in Kenya</title>
<link href="http://repository.anu.ac.ke/handle/123456789/597" rel="alternate"/>
<author>
<name>Monda, Nebaba Lubayo</name>
</author>
<id>http://repository.anu.ac.ke/handle/123456789/597</id>
<updated>2021-03-11T13:50:52Z</updated>
<published>2020-06-01T00:00:00Z</published>
<summary type="text">Assessment of technological risks facing mobile banking: a case of commercial banks in Kenya
Monda, Nebaba Lubayo
Mobile banking technology has been widely adopted amongst all the commercial banks in Kenya. Currently Kenyan banks lose millions of shillings by means of online theft through mobile banking and other platforms. This study therefore intended to address the issues associated with mobile banking and was directed by the following objectives: to understand the mobile banking architecture, to establish the technological risks arising for commercial banks in Kenya as a result of mobile banking, to establish strategies which commercial banks use to mitigate against mobile banking risks, and to propose an integrated risk mitigation framework for use in mitigating against mobile banking risks. The target population was employees within the banking industry from different departments. Purposive sampling was used, which saw 52 staff from 3 commercial banks being sampled. A questionnaire was used as the main research instrument. The collected data was coded into Statistical Package for the Social Sciences (SPSS) version 26 in order to obtain descriptive statistics and correlation analysis. Qualitative data was analysed with the help of NVIVO Version 12 software. The analysed data was presented using charts, figures and tables. The study found that Current Mobile Banking applications leaked protected information while in transit or during communications from mobile phone to the server doing the transaction due to a weakness in the Secure Socket Layer Certificate (SSL). The study also found that banks did not have advanced detection mechanism such as intelligent behaviour monitoring and use of big data analytics technology for fraud detection and behaviour analysis. Lastly the study also found lack of mobile banking risk analysis and mitigation model amongst the 3 selected banks and developed a mobile banking risk mitigation model. The study therefore recommends adoption of the proposed framework which takes into account various best practices from different researchers and practitioners on information security in the context of mobile banking. The study further recommends that banks and other financial institutions should carry out an own assessment and customize the elements of the framework to fit their own organizational contexts.
Thesis
</summary>
<dc:date>2020-06-01T00:00:00Z</dc:date>
</entry>
<entry>
<title>Designing an IOT traffic management framework in Kenya: a case Of Nairobi city county</title>
<link href="http://repository.anu.ac.ke/handle/123456789/595" rel="alternate"/>
<author>
<name>Mukundi, Naftali</name>
</author>
<id>http://repository.anu.ac.ke/handle/123456789/595</id>
<updated>2021-03-11T13:47:18Z</updated>
<published>2020-06-01T00:00:00Z</published>
<summary type="text">Designing an IOT traffic management framework in Kenya: a case Of Nairobi city county
Mukundi, Naftali
Internet of Things (IoT) is a system of interrelated computing devices, mechanical and digital&#13;
machines, objects, animals or people that are provided with unique identifiers (UIDs) and the&#13;
ability to transfer data over a network without requiring human-to-human or human-to-computer&#13;
interaction. Nairobi city residents encounter a myriad of problems on the roads every day, thanks&#13;
to the increasing population in the city and also due to the influx of motor vehicles in the city&#13;
using a constrained road network. Some of these problems include failure to find parking spaces&#13;
in the central business district and the lack of enough drop off and pick up points. Traffic index&#13;
report released by Ynumbeo (2017) revealed that on average, residents of Nairobi spend 62.44&#13;
minutes in traffic every day. This research aims to advance an endurable traffic management&#13;
design framework based on IoT and to help resolve some of the traffic issues of Nairobi City.&#13;
The specific objectives of the study were: To assess and review current generic design&#13;
frameworks of IoT sensors available in the market today with regard to traffic management, To&#13;
analyse the benefits therein associated with the IoT implementation on traffic management as&#13;
opposed to the Manual traffic management and to develop an endurable IoT traffic management&#13;
design framework for Nairobi city. The research was cross sectional with analytical component&#13;
and through simple random sampling, comprising of 21 officers from the city inspectorate and&#13;
enforcement, 9 from the traffic police department and 162 private drivers. A sample of the&#13;
respondents was drawn using stratified sampling. Each respondent filled and submitted a&#13;
structured self-administered questionnaire. The processed data was analyzed using descriptive&#13;
statistics. Statistical Package for Social Sciences (SPSS) Version 25 and Excel spreadsheet were&#13;
used to analyse the findings. Private cars spent an average of 1.6 hours in the morning while in&#13;
the evening they spent an average of 2.0 hours stuck in the traffic jam. This was aggravated by&#13;
the fact that drivers sometimes fail to identify existing parking slots in town with drivers&#13;
spending an average of 30 minutes looking for parking slots in the morning. This research&#13;
provides an analysis of how different sensors can communicate and help improve the current&#13;
traffic congestion in the city and how other different facets like, smart parking sensors, smart&#13;
streetlights, smart highways and smart accident assistance can be integrated in the same study.&#13;
For the full scale adoption of IoT in parking management, the system requires data sensors&#13;
(RFID tags) to give the location of the cars in the parking lots, WIFI with IPv4 or IPv6 for&#13;
receiving and transmitting information regarding the cars parked, cloud computing technologitechnologies&#13;
to process the information as well as back-end management for the entire system.
Thesis
</summary>
<dc:date>2020-06-01T00:00:00Z</dc:date>
</entry>
<entry>
<title>Factors affecting the implementation of an enterprise data warehouse for the Kenyan health care industry: a case study of Narok county hospital</title>
<link href="http://repository.anu.ac.ke/handle/123456789/594" rel="alternate"/>
<author>
<name>Sankale, Memusi Dennis</name>
</author>
<id>http://repository.anu.ac.ke/handle/123456789/594</id>
<updated>2021-03-11T13:42:40Z</updated>
<published>2020-09-01T00:00:00Z</published>
<summary type="text">Factors affecting the implementation of an enterprise data warehouse for the Kenyan health care industry: a case study of Narok county hospital
Sankale, Memusi Dennis
Most health organizations face a common problem that is, having a huge volume of unstructured and unorganized data, in separate systems. Synthesizing this information to support decision-making processes becomes a tedious process, hence, these organizations cannot leverage the knowledge stored such repositories. Data Warehousing has been deployed in other industries to provide this, where it has been successful. Despite the advantages that data warehousing brings on board, there is no major application for it in the Kenyan Health Care industry. The purpose of the study was to identify obstacles to Data Warehousing in the Kenyan Health Care System. The objectives of this research were to identify the main obstacles in the data warehousing within Kenya’s health sector, to establish how data warehousing can be used to improve healthcare efficiency, to establish an evaluation framework that can be used by Kenyan Health-based organizations in conducting data warehousing needs, and to identify a suitable data warehousing model for the Kenyan Health Care Industry. The scope of the study was the Ministry of Health, Narok County Hospital. The proposed theoretical framework for use is the late-binding architecture. This architecture proposed the delaying of business rules such as data cleansing, data normalization and data aggregations for as long as possible. The preferred conceptual framework for use, in the model to be identified, was Unified Modelling Language. This study has identified that the Kenyan Health Care sector is not yet mature enough for Data Warehousing and there are organizational, technological and implementation issues that negatively affect the deployment of Data Warehousing. The study found that 63.3% of the outlined organizational factors, 34.1% of the examined technological factors and 46.9% of the examined implementation factors can be attributed to the understanding of Data Warehousing.
Thesis
</summary>
<dc:date>2020-09-01T00:00:00Z</dc:date>
</entry>
<entry>
<title>Factors influencing an ICT framework for a circular e-waste economy by households in Nairobi, Kenya</title>
<link href="http://repository.anu.ac.ke/handle/123456789/592" rel="alternate"/>
<author>
<name>Deche, Charles Shabaya</name>
</author>
<id>http://repository.anu.ac.ke/handle/123456789/592</id>
<updated>2021-03-11T13:35:33Z</updated>
<published>2020-09-01T00:00:00Z</published>
<summary type="text">Factors influencing an ICT framework for a circular e-waste economy by households in Nairobi, Kenya
Deche, Charles Shabaya
This study sought to assess the existing state of Waste Electrical and Electronic Equipment in Kenya, to improve on the methods of disposal, recycling, and facilitation of a circular economy by households through the use of ICT. The study was driven by the following objectives on how they influence a circular e-waste economy; socio-demographic factors, consumer behaviour, level of access to information and ICT infrastructure. The target population for the study was households within Nairobi County who had the ease of access to small ICT equipment (mobile phones, tablets, iPods, and computers). A descriptive survey study method was employed. A sample size of three hundred and eighty-four (384) households was determined, probability sampling was used in the study; utilizing the stratified sampling technique. An electronic questionnaire was used as the main research instrument. The data was analysed by the use of descriptive statistics (mean, frequency distribution) and inferential statistics (regression analysis). SPSS version 25 tool was used to analyse the data. The study determined that the selected factors had a positive influence on the ICT framework for a circular e-waste economy. The consumer behaviour of respondents (β = .159, p = .001), access to information influence (β = .174, p = .001), ICT infrastructure (β = .604, p = .001) were found to have the most influence on the ICT framework for a circular e-waste economy. Socio-demographic factors influence (β = .036, p = .280) were found to have the least influence on the ICT framework for a circular e-waste economy. The study concluded that the consumers’ financial and emotional attachment to their electronic devices influenced how they disposed off their e-waste, affecting the residual value. The study also confirmed that effective and efficient e-waste management needs households to have ease of access to information. Lastly, it also concluded that integration and usage of ICT increase the rate at which the framework will be adopted by the circular e-waste economy. The study recommended that any policy to be formulated should target the tech adverse youth who are the majority. Electronic manufacturers should create and spearhead consumer responsibility to mitigate e-waste menace. Nairobi County Government should create awareness and sensitization programs for households. Technology should be integrated into the e-waste management process. Lastly, the collection of e-waste shouldn’t be pegged to the geographic and socio-economic status of the households.
Thesis
</summary>
<dc:date>2020-09-01T00:00:00Z</dc:date>
</entry>
<entry>
<title>Developing and assessing a cyber-resilience framework for Kenyan banks</title>
<link href="http://repository.anu.ac.ke/handle/123456789/527" rel="alternate"/>
<author>
<name>Mayunga, Maricus Otieno</name>
</author>
<id>http://repository.anu.ac.ke/handle/123456789/527</id>
<updated>2020-08-26T14:59:08Z</updated>
<published>2019-06-01T00:00:00Z</published>
<summary type="text">Developing and assessing a cyber-resilience framework for Kenyan banks
Mayunga, Maricus Otieno
Rampant cyber incidences in Kenya targeting banks call for mediations beyond existing&#13;
cybersecurity principles. This quantitative study sought to collate multi-domain&#13;
variables from previous works to develop a framework for measuring cyber-resilience&#13;
in Kenyan banks known as the Cyber-resilience Framework for Banks (CRF4Banks).&#13;
The framework consists of eight key cyber-resilience constructs and their constituent&#13;
variables, identified from empirical research and literature. Cyber-resilience has not&#13;
received the attention it requires in Kenyan banks. Often conflated and confused with&#13;
cybersecurity, cyber-resilience has not received as much attention as cybersecurity&#13;
principles. Many reports on financial institutions in Kenya focus mainly on&#13;
organisational and financial stability, done as part of annual financial audit, and ignore&#13;
the role played by cyber-resilience. Compounding this, are the fragmented and&#13;
competing cybersecurity assessments from a multitude of cybersecurity providers that&#13;
lack coherence. The financial sector in Kenya needs its own unified framework and&#13;
common measurement indicators, built from best practices, and curated for cyberresilience. The research, through CRF4Banks, roots for an integrated approach towards&#13;
measuring cyber-resilience. Three factors motivate this: first, because banks share a&#13;
cyberspace with everyone else who are facing unlimited and borderless vulnerabilities,&#13;
second, because these vulnerabilities have interlinked causative factors such as&#13;
financial performance, organisation structure, ICT infrastructure, human; and lastly,&#13;
because there is a public perception driven by media that banks in Kenya have been&#13;
hiding cyber-attacks, fearing reputation damage. Kenyan banks were used as the target&#13;
population. The research used descriptive research approaches augmented by&#13;
quantitative techniques to measure the variables. The framework was first validated by&#13;
cybersecurity subject-matter experts and then through a pilot study. A sample of forty&#13;
out of the possible forty-four banks in Kenya was selected using simple random&#13;
sampling. One cyber-security accountable respondent was provided by each bank to&#13;
participate in an online and self-administered questionnaire, delivered to the&#13;
respondents through Survey Monkey. Survey questions were close-ended Likert-scale&#13;
types. Data was processed and analysed further using SPSS and Excel. The expected&#13;
outcomes were, first, a comprehensive cyber-resilience framework instrument, second,&#13;
a cyber-resilience status report of all banks. The expected outcome from the study was&#13;
threefold: first, a comprehensive cyber-resilience instrument with localized variables&#13;
for banks, second, a framework for measuring cyber-resilience, and lastly, a survey&#13;
report showing cyber-resilience status of Kenyan banks. The cyber-resilience report&#13;
seeks to confirm or disapprove the main null hypothesis that most Kenyan banks are&#13;
not cyber-resilient. Finally, the tool was deployed in a survey and the outcome of the&#13;
survey showed strong performances in all the eight constructs of cyber-resilience,&#13;
contrary to adverse media reports. Besides providing a tool for assessing cyberresilience, the research helped to foster cyber-resilience principles among banks. It also&#13;
provides new dimensions for banks, offering insights into areas that remain unexploited&#13;
such as cyber-crime risk transfer. Besides, the research also identified some areas of&#13;
improvement such as the use of advance technologies, development of cyber law&#13;
frameworks and the need for training law enforces on digital forensics.
</summary>
<dc:date>2019-06-01T00:00:00Z</dc:date>
</entry>
<entry>
<title>Development of radio frequency identification architecture for the adoption by utility companies: a case study of Nairobi City Water and Sewerage Company</title>
<link href="http://repository.anu.ac.ke/handle/123456789/526" rel="alternate"/>
<author>
<name>Njuhi, Dorcas Kuria</name>
</author>
<id>http://repository.anu.ac.ke/handle/123456789/526</id>
<updated>2020-08-26T15:00:13Z</updated>
<published>2019-08-01T00:00:00Z</published>
<summary type="text">Development of radio frequency identification architecture for the adoption by utility companies: a case study of Nairobi City Water and Sewerage Company
Njuhi, Dorcas Kuria
Accurate meter readings, timely and correct bills have become an important aspect of water metering systems. Additionally, anomalies such as leakage and bursts in water pipelines have significant consequences to the environment and lead to financial constraints to the water companies. Since monitoring leakages and bursts in the water distribution networks, capturing accurate and dependable measurements for billing, troubleshooting and analysis is a challenging task, the need to develop a reliable and effective water metering system is essential for water loss reduction in the distribution networks and for accurate and timely bills and accurate measurements. Radio Frequency IDentification technology (RFID) has emerged as an effective technology for monitoring critical infrastructure such as water pipelines, and for meter reading. However, RFID is not monolithic, it is used in conjunction with other applications. In this study, an Automatic Meter Reading (AMR) system using RFID is presented. RFID based AMR, is the remote collection of consumption data from customers’ utility meters using Radio Frequency (RF) technologies. It aims to eliminate the traditional method of recording meter readings manually whereby a meter reader visits every meter location usually at predetermined intervals or time and records the current meter values manually. The main objectives of this study were; to identify a viable RFID technology to enhance billing accuracy with streamlined meter reading and for leak detection; to establish and assess the effects of RFID technologies to the consumers and Water Service Provider (WSP) and to develop an RFID technology architecture for water based utility companies.The target population was all the 1,810 employees from the six different regions in Nairobi City Water and Sewerage Company (NCWSC). A sample size of 328 employees from the six different regions in NCWSC was used and Stratified sampling technique was adopted to determine the appropriate representation using Dempsey and Dempsey formula. Questionnaires were used as data collection tools, which focused on the company staff and descriptive analysis method was used for data analysis where Statistical Package for Social Sciences (SPSS) tool was used. Qualitative data from the open ended questions was analyzed using content analysis technique. The average score for effects of RFID technology on consumers was found to be 3.95, meaning respondents agreed that the adoption of RFID technology has great benefits to the consumers. The average score for effects of RFID technology on WSP was found to be 3.99, implying that the respondents agreed that RFID technology offers numerous solutions to the challenges faced by WSP’s. The findings of this study are expected to be beneficial to utility companies more specifically a water-based industry. The study recommends the adoption and implementation of RFID based AMR technology in a water- based industry to enhance and improve efficiency and effectiveness in their operations.
</summary>
<dc:date>2019-08-01T00:00:00Z</dc:date>
</entry>
<entry>
<title>Investigating factors that hinder adoption of M-Learning (SAAS Model) in higher learning institutions: a case of Africa Nazarene University, Nairobi</title>
<link href="http://repository.anu.ac.ke/handle/123456789/490" rel="alternate"/>
<author>
<name>Patient, Zihisire Muke</name>
</author>
<id>http://repository.anu.ac.ke/handle/123456789/490</id>
<updated>2020-08-26T14:59:29Z</updated>
<published>2017-09-01T00:00:00Z</published>
<summary type="text">Investigating factors that hinder adoption of M-Learning (SAAS Model) in higher learning institutions: a case of Africa Nazarene University, Nairobi
Patient, Zihisire Muke
Due to the technological progress and diminution cost of mobile services and devices, currently there is a remarkable change in learning context that demand mobility. The deployment and implementation of mobile learning in universities is still facing a good number of challenges because of educational institutions infrastructure, users` acceptance and readiness to adopt Mobile learning as well due to technical limitations. In addition, there are no adequate guidelines in place to facilitate the decision-making process and the development of strategic plans in order to achieve a viable deployment and implementation of M-learning in higher educational institutions. Using the extended Unified Theory of Acceptance and Use of Technology (UTAUT) as a theoretical foundation, this study sort to establish in a concise and in a systematic way the fundamental factors hindering student’s acceptance and adoption of mobile learning (SaaS model) in higher educational institutions. Specifically, the study sought to analyze the relationship linking performance expectancy, effort expectancy, social influence, perceived playfulness, self-management of learning and M-learning adoption and use in Africa Nazarene University. This research study used and mixed design method. It consist of both the descriptive and quantitative element. In this study, the target population comprise of 609 distance learning student from Africa Nazarene University, Nairobi, Kenya. The researcher used both the primary and secondary data collection. Questionnaires were utilized as the main instruments for collecting data .With the aid of the Statistical Package for Social Services (SPSS), Pearson relationship analysis and multiple regression analysis were used in the inferential analysis. T-test statistic was used to test the significance of moderating effect of gender and age of behavior intentions to use M-learning. The result of the study established that all the studied factors (performance expectancy, social influence and perceived playfulness) have a positive impact on students’ behavioral intention to adopt and use M-learning in Africa Nazarene University except effort expectancy and self-management. Further, the findings of the study revealed that gender and age had a significant effect on students` behavioral intention to use M-learning. The study recommends that, universities should integrate mobile learning (SAAS model) into their strategic plan in order to improve mobility in the learning activity, improve the institutional leadership as well as school and institutional wide strategies for mobile learning.
</summary>
<dc:date>2017-09-01T00:00:00Z</dc:date>
</entry>
</feed>
