School of Informatics & Innovative Systemshttp://ir.jooust.ac.ke/handle/123456789/2722024-03-28T20:04:43Z2024-03-28T20:04:43ZIntegrating Engagement Theory in Usability Evaluation Framework for the Design and Development of Health Information Systems.Omoro, Gonza Otienohttp://ir.jooust.ac.ke/handle/123456789/121272023-07-10T09:02:48Z2022-01-01T00:00:00ZIntegrating Engagement Theory in Usability Evaluation Framework for the Design and Development of Health Information Systems.
Omoro, Gonza Otieno
Usability is often ignored; many software developers focus on the functionalities and give little thought to the usability. This hinders the users and also damages the reputation of developers and the softwares. Such systems fail in use, scale up, and at times score very low when evaluated for usability. Users are not satisfied, systems are created ad hoc, and often abandoned, thus resulting in a waste of human and economic resources. Users many times describe the systems as complex, not intuitive and requiring a lot of training for successful use. There are a number of existing usability evaluation frameworks; however, they are suboptimal in providing health information systems (HIS) usability evaluation explicitly at the design and development stage. They each evaluate different aspects of HIS pertinent to human, organizational and technological factors. The frameworks differ in terms of generality and specificity, timing based on the system development phases, thus there exists a gap of an integrated evaluation framework that can merge critical usability
constructs together and also be utilized at the design and development of HIS products. The objectives of the study were first to develop an integrated usability evaluation framework for the design and development of HIS, secondly to investigate the existing usability evaluation frameworks in HIS, thirdly to analyse the user
involvement and satisfaction levels in HIS during the design and development phase using integrated software usability measurement tools and finally, to validate the developed integrated usability evaluation framework for the design of HIS. The study was conducted in selected public health facilities in western Kenya. The research study applied mixed methods research to gain detailed understanding of the entire HIS design and development processes. Simple random, and purposive sampling were used to select the health care workers i.e medical officers, clinicians, nurses, records staffs and patients who interact with the systems on a day today basis. Both survey questionnaires and focus group discussions tools were used to collect data. Data analysis was done using ordinal logistic regression and thematic analysis for qualitative data. Results showed that users were never involved in the process of development of the current HIS that they are using thus were never satisfied with the processes. User involvement and participation during the design and development
positively influences user satisfaction levels therefore ease of use, efficiency, safety/errors of HIS has the potential to reduce the number of mortalities and readmissions in the health facilities. HIS developers need to consider utilizing the components, dimensions in the developed integrated usability evaluation framework
as they provide a perfect opportunity to promote engagement and consider key constructs throughout the development life cycle. Health care providers need to provide real time feedback to the development team of any mis-alignment and emerging usability issues during the design and development process. There is need to capture the dynamics, processes, and interrelationships involved in technological change during the user engagement during the development of the health information systems.
2022-01-01T00:00:00ZIntegrated e-marketing adoption model for small businesses: An institutional theory perspective.Omoga, Charles Owuor.http://ir.jooust.ac.ke/handle/123456789/119602023-03-22T06:14:27Z2019-01-01T00:00:00ZIntegrated e-marketing adoption model for small businesses: An institutional theory perspective.
Omoga, Charles Owuor.
Small sized businesses play an important role in the growth of economies all over the world, yet they appear to be slow in adopting E-marketing technology to market their products and services despite the benefits E-marketing has on their businesses and this often leads to business failure. Existing literature examining E-marketing adoption have mainly focused on large businesses and Small and Medium Enterprises in general, yet small businesses are different from large and medium enterprises in terms of human and financial resources. The main objective was to develop an Integrated E-marketing adoption model for assessing E-marketing adoption among small businesses in the hospitality industry in Kenya. Specific objectives included: To assess the extent of adoption of E-marketing among small businesses in the hospitality industry in Kenya; To determine the influence of owner-managers Information Technology knowledge on£• marketing adoption among small businesses in the hospitality industry in Kenya; To determine the influence of owner-managers security concerns on £-marketing adoption among small businesses in the hospitality industry in Kenya; To determine the influence of owner-managers perception of cost on £-marketing adoption among small businesses hospitality industry in Kenya; To determine the influence of Institutional
pressures on E-marketing adoption among small businesses hospitality industry in Kenya; To assess the mediating effect of management support on the relationship between owner-managers Information Technology knowledge, Security concerns, Cost, Institutional pressures and E-marketing adoption and to validate the fitness of the developed model against the data collected from small businesses in the hospitality industry in Kenya. This study was based on the Diffusion of Innovation theory, Technology, Organization, Environmental framework and the Institutional theory. A cross sectional survey design was employed on a target population of 150 small businesses in the hospitality industry in Kisumu County-Kenya. Stratified random • sampling method was used to generate the sample of 115 small businesses. Primary and secondary data were collected using questionnaire and already existing literature respectively. The results show that Owner-manager's Information Technology
knowledge has a positive relationship with E-marketing adoption (�= 0.269, p<0.001).
The results also indicate a negative relationship between Security concerns and E• marketing adoption (P= -0.158, p= 0.047). The results for perceived costs of E-marketing indicate a negative relationship with £-marketing adoption jji= -0.260, p= 0.002) and the results for Mimetic pressure indicate a positive relationship with E-marketing adoption
. (P=0.176, p=O.O 19). Normative pressure had a positive relationship with E-marketing adoption (P= 0.354, p<0.001). Top management support revealed a positive relationship with adoption of E-marketing (P= 0.277, p<0.001).The results further indicate that the independent variables explained 3 7% of the variance in the adoption of E-marketing. Policy makers may find these results useful for future policy formulations regarding adoption of e-marketing among small businesses.An Integrated Model for E-marketing adoption was realized in the study that could enhance innovations on small business adoption
2019-01-01T00:00:00ZInfluence of Accounting Security Threats on the Relationship between Computerized Financial Systems and Audit Risk Management in Public InstitutionsPolo, Julius O.http://ir.jooust.ac.ke/handle/123456789/119342023-03-15T08:18:07Z2019-01-01T00:00:00ZInfluence of Accounting Security Threats on the Relationship between Computerized Financial Systems and Audit Risk Management in Public Institutions
Polo, Julius O.
The rapid change in information technology, the wide spread of user-friendly systems and
the great desire of organizations to acquire and implement up-to-date computerized financial systems and software's. However, this advanced technology has created significant risks related to the security and integrity of computerized financial and audit risk management in organizations. The efforts made by accountants to reduce the vulnerability of computerized financial systems vary. Further, previous studies have posted mixed results on the relationship between accounting security threats and the accounting security controls. Therefore the purpose of this study was to assess the influence of accounting security threats on the relationship between computerized financial systems and audit risk management in public institutions. Specific objectives of the study were to: assess the influence of accidental destruction of data on the relationship between computerized financial systems and audit risk management; analyze the influence of accidental entry of erroneous data on the relationship between computerized financial systems and audit risk management ; and establish the influence of intentional destruction of data on the relationship between computerized financial systems and audit risk management in the public sector institutions. The study is anchored on the following theories: Resource Mobilization Theory, Positive Accounting Theory (PAT), and System Theory. This study was guided by quantitative positivism paradigm, since it is an inquiry based on testing of a theory, is composed of variables measured with numbers, and to be analyzed with statistical procedures, in order to determine whether the predictive generalizations of the theory held are true. The study adopted a correlational survey research design. The target of the study population constituted all state owned enterprise in all the ministries and agencies out of which were fifty six (56) accounting officers in the 56 public institutions operating in Kisumu County formed the basis of unit of analysis. The sample size was 50 accounting officers out of which the response rate; was 47 respondents. Both Primary and secondary data was used in the study. Primary data was collected using a questionnaire. A pilot study of six (6) respondents was conducted while the remaining fifty (50) was retained for the main study. The data collected was analyzed using descriptive and inferential statistics. Hierarchical multiple regression analyses were used to assess the relationship between the variables in this study. The findings of objective one were that the change in coefficient of determination of accidental destruction of data was significant and positive (R2 change= 0.078, p< 0.01); findings of objective two were that coefficient of determination of accidental entry of erroneous data was significant and positive (R2 change= 0.079, p< 0.01) and the change in coefficient of determination of intentional destruction of data was significant and positive (R2 change= 0.058, p< 0.01) implying that accidental destruction of data accidental entry of erroneous data and intentional destruction of data indeed moderate the relationship between computerized financial systems and audit risk management. The study concludes that accidental destruction of data, accidental entry of erroneous data and intentional destruction of data moderate the relationship between computerized financial systems and audit risk management. The study recommends that accidental destruction of 6 a should be controlled by the public firms as it predicts computerized financial systems on the audit risk management. Moreover, computerized financial systems and accidental destruction of data play a role in audit risk management of the public firms. The study findings will be of significance to public institutions policymakers and other stakeholders in designing the computerized systems, minimizing accounting security threats and maximizing the audit risk management performance. In addition, provide new evidence end form a basis for future research in the area of accounting security threats, computerized financial systems and audit risk management.
2019-01-01T00:00:00ZA Stratified Cyber Security Vigilance Model for Corporate Information Technology InfrastructureAnyango, Paul Abuonjihttp://ir.jooust.ac.ke/handle/123456789/116322022-11-25T15:29:22Z2019-06-01T00:00:00ZA Stratified Cyber Security Vigilance Model for Corporate Information Technology Infrastructure
Anyango, Paul Abuonji
Cyberspace is a relatively new unavoidable battlefield for most organizations- businesses governments, security agencies, learning and research institutions, political parties, terrorist groups and many others. As a result of mass exodus to online systems, concepts like e-
commerce, e-government, e-learning, e-health, e-procurement, e-mail, mobile money have become part of our day to day lives. So almost everybody is enthusiastically going on line, most of whom are lured or tantalized by real or imagined strategic advantage that comes with strong online presence but oblivious of the grave dangers that lurk in the cyberspace. Most of these players go online with limited security controls in place, largely devoid of vigilance mechanisms, making it difficult for them to detect, and control risks to their Information Systems in good time. Moreover, in order to implement Information Systems security in an organization, there is need for a well-designed and executed security program based on a sound cyber security model. Consequently, this study proposed a Stratified Cyber Security Vigilance (SCSV) model designed to secure an organizations network infrastructure. The model was developed after considering the strengths and weaknesses of existing computer security models, using information elicited from relevant theories and frameworks. The specific objectives of the study were to assess the existing Information System Security models and identify their strengths and weaknesses; to develop a SCSV model for corporate Information Technology infrastructure; to conduct test experiments by implementing the SCSV model in a corporate Information Technolog infrastructure and collect data for analysis; and finally, to validate the SCSV model by analyzing the data collected in the network fashioned after the model. The study adopted experimental research approach guided by descriptive and diagnostic research design. The model developed from theory was implemented in a computer network infrastructure in terms of security controls. Different levels of vigilance were achieved by deploying various layers of security controls at different times during the research- representing different phases of the experiment. During this experiment period, in-situ data was collected from the network of Cyber-Class International University. Quantitative data was collected using Cyberoam CR300iNG UTM appliance and Nmap scanning tool. The study considered a population of 12,386 comprising of teaching staff, non-teaching staff and students. Sampling technique applied was census. Data was analyzed using Cyberoam UTM reporting tools, MS Excel 2010 to get descriptive statistics and graphs were used to present data since vigilance is a function of observation and detection of stimulus events over time. The results showed that adoption of SCSV model in a computer network and ERP system improved its security in terms of timely and accurate detection and control of threats and vulnerabilities, increased level of availability of Internet bandwidth, optimized utilization of Internet bandwidth and improved the process of design and re-engineering of information systems. The study recommends adoption of SCSV model in security administration of corporate Information Technology infrastructures in order to enhance security. Future research can be done on application of vigilance in security of the software development process and other aspects of Information Technology not considered in this study.
2019-06-01T00:00:00ZMobile Phone Usage and Economic Growth Model in the Context of vision 2030Omamo, Amos Odhiambohttp://ir.jooust.ac.ke/handle/123456789/116282022-11-25T14:21:24Z2018-01-01T00:00:00ZMobile Phone Usage and Economic Growth Model in the Context of vision 2030
Omamo, Amos Odhiambo
Kenya has emerged in recent times as one of the fastest growing telecom markets in the world. The Kenyan mobile industry's impact on economic growth is experiencing inconsistency, which requires an integrated model to study the various variables and factors causing this phenomenon. This thesis argues that the issue of mobile phone usage and economic growth is a complex technical and social phenomenon that needs to be understood from both [CT and social science perspectives.This research used the concept of governance-socio-techo-economic systems as the theoretical framework. We use system dynamics as both the methodology and tool to model the mobile industry. The outcomes are in the form of mobile user's projection, GDP growth, corruption indicators and policy projections. The tool produced is an intuitive one with the capability of replicating reality as evidenced from validation done. Sensitivity analysis of different policy levers (occupants' behaviour, insulation level, etc.) is carried out with the tool. We concluded that the outcome of this study provides a framework which if adopted across the region could guide regional plans, identify actors, as well as provide guidelines to implement strategic plans in developing economies by contributing to the various policy implementation scenarios in the ICT sector.
2018-01-01T00:00:00ZAddition-composition Fully Homomorphic Encryption sheme and its Enhancement of Data Security in Cloud ComputingOmollo, Richard Otienohttp://ir.jooust.ac.ke/handle/123456789/116212022-11-25T12:34:36Z2019-01-01T00:00:00ZAddition-composition Fully Homomorphic Encryption sheme and its Enhancement of Data Security in Cloud Computing
Omollo, Richard Otieno
Cloud computing is a technological paradigm that enables computer users to access computing applications and services on a pay-as-you-use model. Over the years, the adoption of cloud computing by cloud service providers and users has been increasing despite known security challenges experienced. One of the challenges is the security of data that is resident in computing storage devices mounted on a client/server connectivity environment from unauthorized users. The benefits vis-a-vis security challenges leave both cloud providers and users in a utilization dilemma since there is less guarantee that data entrusted with these storage devices is secure and tamper proof from unauthorized entities. Approaches have been deployed that safeguard data in a network by use of cryptographic techniques to ascertain some privacy and confidentiality guarantees. In a cloud computing environment, more advanced security measures are needed since the data offloaded into cloud servers may be subjected to some computational requirements to be carried out by the cloud service providers. A scheme developed by Ron Rivest, Adi Shamir and Leonard Adleman in 1978 is based on privacy homomorphism, and suppo1ted multiplicative operations over encrypted data. Other homomorphic cryptosystems were developed later like Pascal Paillier in 1999 that supported additive operations over encrypted data. Even though these partial homomorphic encryption schemes were posting good results for the speed of encryption and ciphertext size, they were insecure. In 2009, Craig Gentry improved on partial homomorphic encryption schemes by constmcting a somewhat homomorphic encryption based on ideal lattices using both additive and multiplicative homomorphism. This construction proved versatile and opened a new class of fully homomorphic encryption schemes but was impractical in deployment, e.g. it could take more than two hours to generate encryption keys. To improve on Gentry's constrnction, Marten van Dijk together with Craig Gentry, Halevi Shai and Vinod Vaikuntanathan applied the same bootstrapping concept but instead used integers whereas Braskerski together with Craig Gentry and Vinod Vaikuntanathan on their work based their approach on Leaming with Errors and Ring with Errors problems. All these fully homomorphic encryption schemes proved versatile but had efficiency limitations due to noise over large ciphertext length and encryption keys i.e. the ciphertext (c = pq+2r+m) with 2r as the noise term increases with bigger p and this is even worse with multiplication operation. This has negative impact on the computing resources: storage and processing. This study aimed at developing, testing and benchmarking an efficient fully homomorphic encryption scheme that lessen the computational strain on the storage and processing. The study found the remedy in the use of both addition and composition techniques in realizing a fully homomorphic encryption scheme (ri(ljJEB<p) = ri(ljJ)ori(<p). The developed scheme was coded and tested on a single hardware with minimum specifications. The results compared with existing empirical data from other Fully Homomorphic Encryption schemes showed that the developed scheme was much effective with 54% positive variation in encryption and Key Generation whereas the encryption ratio was less than 10. In benchmarking the scheme with other existing fully homomorphic encryption schemes, its COMPO ranked 1 against the MULT. This is a significant improvement on the part of this developed scheme and thus makes it suitable candidate for enhancing data security in cloud computing as it is boosts
consumer confidence in the cloud services and applications.
2019-01-01T00:00:00ZThe Contextualization of Structuration Theory in Electronic Government in Enhancing Governance in Two County Governments in KenyaMengich, Esau Mneriahttp://ir.jooust.ac.ke/handle/123456789/116152022-11-24T16:09:30Z2018-01-01T00:00:00ZThe Contextualization of Structuration Theory in Electronic Government in Enhancing Governance in Two County Governments in Kenya
Mengich, Esau Mneria
Today, the Kenyan government is investing and has endeavored to embrace electronic government (e-government) in almost all ministries to pave way for speedy service delivery, enhance transparency and accountability. However, some county governments in Kenya seem not to have embraced e-government and there has been little information, if any, about contextualization of structuration theory. The general objective of this study sought to contextualize structuration theory in e-government in Trans Nzoia and Kisumu county governments of Kenya. To achieve this objective, the following research questions framed this study: What Information Communication Technology (ICT) adoption levels have been achieved in County Governments? What are the ICT Training needs in County Governments? What ICT challenges do the County Governments face? How have emerging innovative applications ofICT been adopted in county governments? What are the new dimensions contributing to the contextualized Structuration theory in County governments? Contextualizing structuration theory may yield the exercise of power and domination in governance to the case county governments in the study. The study was underpinned by Structuration theory, which was contextualized by highlighting three new modalities: Knowledge Management (KM), Information Systems (IS) and ICT normative pressures. The theory was used to elucidate meanings, norms and power issues experienced during ICT adoption in county governments of Kenya. The theory's elements of structure and interaction were expounded in context to ICT. A Constructivist paradigm approach and Qualitative case study was employed in the study. Methods of data collection were; face-to¬face Interviews and Observations, which were employed to collect primary data; and Documentary reviews, were used to collect secondary data. Purposive sampling technique was used in the study. The study targeted fourteen participants in the two county governments. The study picked participants who were categorized as Top management and Middle level management staffs from the population. To ensure Validity and 'Trustworthiness', piloting was done in Uasin Gishu County and was not part of the data collected for the study. Thematic Analysis's procedures and processes were adopted during data analysis, while employing Miles and Huberman (1994) model. The findings of this study were that despite the infancy age of the county governments, there is evidence of progress in adoption and diffusion of ICT in government agencies. There was considerable evidence that ICT has enabled fast and convenient service delivery to the citizens. However, lack of awareness of these services by the citizens was revealed and the government needs to propagate established and upcoming services to them. Infrastructure, training and capacity building issues also came into the fore during this study and recommendations clearly stated. The findings also showed that in Kenyan County governments, the ICT normative pressures (as a modality) under contextualized Structuration theory was effective than the other modalities of KM and ISs in efforts to apply e-government. This implied that professionals, citizens and other stakeholders interacting with government consider ICT services as a norm/tradition. The findings also showed evidence of KM and IS modalities in county governments of Kenya. The study recommended that quick interventions on ICT infrastructure, ICT training and capacity building must be emphasized by both county and national governments. The citizens of Kenya are urged to embrace ICT as the government makes strides to embrace e-government. This study is significant to the functioning between the government, citizens, private sector and various institutions who are stakeholders of good governance in Kenya.
2018-01-01T00:00:00ZExtended Acceptance and Use of Information Technology Model: Assessing Integrated Financial Management Information Systems in the Public SectorSanja, Michael Mutongwahttp://ir.jooust.ac.ke/handle/123456789/116132022-11-24T15:09:27Z2017-01-01T00:00:00ZExtended Acceptance and Use of Information Technology Model: Assessing Integrated Financial Management Information Systems in the Public Sector
Sanja, Michael Mutongwa
Integrated Financial Management informtion Systems as a system is globally considered as a con¬tributing factor significantly towards the improvement of financial management in the broader government sectors, it has such an important role in the world and particularly in Kenya as a coun¬try. The expectation is that the usage of IFMIS makes public finances comprehensive and effec¬tive. All the same, the system has not been addressed in full, its operations and performance is strongly wanting. This study sought to establish ; Extended Acceptance and Use of Information Technology Model: Assessing Integrated Financial Management information Systems in the Pub¬lic Sector. This study utilized: UTAUT theory; DeLone and McLean model as tools to test IFMIS. Objectives were to: establish the Capacity of IT Infrastructure, examine the effect of technical op¬eration skills, assess management skills and develope a model. Data was collected by question¬naires. The research design was descriptive survey; a Sample size of 300, with a target of 1200 employees in the public sector. Validity, reliability and pilot study was done, Where (p < = 0.05, alpha <0.7; KMO <0.5) were levels used. Second generation techniques (SEM) were employed with methods: Nested comparison, Bootstrapping, Impulsive Decision Scale, Multiple group model comparison, Latent growth curve and Split path model comparison. Model fit > 0.90, RMR <O. 02,RMSEA = < 0.05. Finding indicates :COITI had a higher error difference. Delone & Mclean model split path diagrams had lower error difference. D & M model yielded results ratio (1.5906) less than 2 hence good fit. External Model posted (CFI = 0.91 hence> 0.9: MgtS posted NF!= 0.98, GFI = 0.99 > 0.9 signifying a good fit (rule of thumb) for the use ofIFMIS. Overall model results indicated (RMR = 0.010 and RMSEA = 0.027) all above the threshold respectively. Effects of TOS and MgtS models were satisfactory. Results confirm that D & Mand External Model indi¬cated Good fit , both contributed to the use of IFMIS more than UTA UT model. Finding also indi¬cates that counties had slightly lower effective management skills and Technical operation skills. On overall, COITI registered a low significance, weak effect (Factor loading-low) and high error difference (10% ). Conclusion: Counties, Ministry-C , and Public universities ; indicated a low achievement on COITI-low contribution to the use of IFMIS ; TOS performed well at Public uni¬versities , Ministry-C and Parastatals as opposed to counties. Study Contributions were : employed six unique techniques , contributed five new constructs and developed SMAUIT model. Recom¬mends to the public sector were : Re-equipment of IT Infrastructure, setting up security compo¬nents per each sector ( DMZs) to curb system Hacking in all Government sectors.
2017-01-01T00:00:00ZTowards Modeling and Building E-Agriculture Framework in KenyaAwour, Fredrick Mzeehttp://ir.jooust.ac.ke/handle/123456789/116122022-11-24T14:27:57Z2015-01-01T00:00:00ZTowards Modeling and Building E-Agriculture Framework in Kenya
Awour, Fredrick Mzee
Sustainable poverty reduction in developing nations, such as Kenya, is only achievable through economic growth and development strategies where agriculture is considered as a key driver. This is because agriculture contributes to about 45% of the GDP of developing countries, with more than 75% of their population relying on agriculture for employment. It is only important that these countries focus on how to improve agriculture by making it knowledge intensive as oppose to our intensive as it is currently. This implies that factors such as policy and legal framework, technology and knowledge management, markets, research among others must be comprehensively explored. In all these. ICT can act as a catalyst to facilitate their incorporation into agriculture. Arguably, hunger and poverty is concentrated in developing countries due to poor capacity to develop, to access and to manage agricultural information and knowledge. This is owed to disconnect that exist between the eAgricultural products available in the market and the information needs of the farmers. To address this challenge, there is need to integrate information required by the farmers from the diverse sources such as agricultural stakeholders into a single information access point. Such an access point need to be pervasive enough to provide anywhere anytime and any device information access while meeting the need to avail timely, relevant, accurate and consumable information to farmers. Developing such a single information access point for farmers to support their decision making in attempt to improve agricultural productivity as the goal of this research. Specific objective were to: establish the information needs of the farmers and how to meet them; develop an optimal strategy, so called consortium that leverages the contributions from agricultural stakeholders to support farmers' needs; illustrate practical operation of the formulated stakeholders' consortium using tools such as mathematical analysis and simulations; and to develop an integrated eAgriculture framework to support farmers' needs. Owing to potential conflicting and competing interests when desiring that various stakeholders cooperate and collaborate, game theoretic approach was employed to formulate this model so as be able to tame selfish interests from the stakeholders. It was shown that there is always a point: value where all stakeholders are satisfied and hence contribute optimally to the consortium. For instance, considering 20 million farmers and about 950 stakeholders in some hypothetical case, consortium was easily formulated with just 337 stakeholders including the farmers. This was the ground on which the proposed eAgriculture framework was built with objective of promoting innovative use of ICT. The framework incorporates an agricultural data center that filters information from both local and global content producers using machine learning algorithms and other tools such as human computing. Information retrieval system is incorporated in the framework such that farmers can access more relevant contents in a simple format that is easy to consume. For sake of exhaustiveness, the framework has also taken advantage of big data available on the internet and social network to enrich the agricultural data center. This study established that improving agricultural productivity and making Kenya food secure requires a multidisciplinary research approach. The proposed framework eAgriculture framework is an information manager ma: gives ideal interaction of stakeholders for optimal exploitation of available JCT tools. To this end, there in need to formulate policies in regard to managing data center proposed in the framework, that is issues relating to trusted cloud provider, data security and building user reputation levels.
2015-01-01T00:00:00ZE-Commerce Adoption in Publishing IndustryAkello, Charles Ookohttp://ir.jooust.ac.ke/handle/123456789/116092022-11-24T12:38:43Z2018-03-01T00:00:00ZE-Commerce Adoption in Publishing Industry
Akello, Charles Ooko
E-Commerce (electronic commerce or EC) is the buying and selling of goods and services, or the transmitting of funds or data, over an electronic network, primarily the Internet through which transactions or terms of sale are performed electronically. Ecommerce is fast replacing traditional methods of doing business in various business sectors worldwide including Book Publishing industry. Transaction over the internet is not popular for clients in book publishing industry in Kenya. This study was therefore to focus on E-Commerce adoption by book publishing industry in Kenya. The objective of the study was to; establish the level of ecommerce adoption by book publishing industry, find out factors that influence adoption, identify the challenges facing ecommerce adoption and to establish ways of enhancing ecommerce adoption by book publishing industry. The study adopted a mixed methods paradigm with both quantitative and qualitative approaches. Within the quantitative approach, the descriptive survey design was used, while within the qualitative approach, the exploratory design was used. Questionnaires, in-depth interviews and Document Analysis Guides were used for data collection. Piloting of questionnaires was done in two of the Publishing Companies that did not participate in the actual study to determine reliability of the instruments. Quantitative data was analyzed using basic descriptive statistics and inferential statistics such as independent - sample test and Analysis of Variance. Qualitative data from interviews was analyzed by using the thematic analysis. Significance of the study is that it highlighted on; new techniques of adopting ecommerce, efficient service delivery, improvement of sales and faster dissemination of information. It was established that most bookshops served by publishers are not E-commerce ready due to lack of infrastructure and digital literacy. Developments of websites, emails, universal access to internet are some of the factors causing slow development and adoption of ecommerce in book publishing• industry. E-commerce requires both sellers and buyers to be e-ready. The study enumerated a host of contextual factors in the Kenya market that have impeded the uptake of E-Commerce. Research findings can help government policymakers and industry leaders in the field to identify appropriate strategies to promote the use of E¬Commerce in book printing firms. Study finding would further benefit those in publishing industry, booksellers and other business sectors.
2018-03-01T00:00:00Z