School of Informatics & Innovative Systems
http://ir.jooust.ac.ke/handle/123456789/45
2024-03-29T06:22:09ZA Fraud Management Framework for Mobile Financial Services within Kenya
http://ir.jooust.ac.ke/handle/123456789/13016
A Fraud Management Framework for Mobile Financial Services within Kenya
Owiti, Shadrack Ochieng; Ogara, Solomon; Rodrigues, Anthony
Mobile banking offers several benefits to financial sectors, including convenience in terms of time, money and effective customer relationship management. However, illegal actions in the digital age have altered the mode banks operate. It has sparked interest in mobile banking. The expansion of mobile banking fraud especially SIM swapping, hacking identity theft, social engineering, denial of service attack and account take over have created various challenges to financial sectors. The perceived criminal actions are due to continuous growth of mobile banking and computer networks. The identified challenges of rise in mobile financial fraud are due to lack of a proper framework to manage the fraud comprehensively among stakeholders. This study investigated fraud management in the Kenyan financial sector. The study used mixed research methodologies using descriptive and inferential analysis. The developed framework was informed by Fraud Triangle Theory (FTT), Routine Activity Theory (RAT), Fraud Management Lifecycle Theory (FMLT) and Deterrence Theory (DT). The findings confirmed that the fraud triangle and deterrence theories are very instrumental when applied to mobile fraud management. Finally, the result of findings will have significant implications not only to academic researchers but likewise for financial institution policymakers and anti-fraud organizations in both the commercial and governmental sectors.
2022-12-01T00:00:00ZDigital Community Currency Usability from the User’s Eyes: Cases of Sarafu and Maendeleo Trading Credit (Mtcr.)
http://ir.jooust.ac.ke/handle/123456789/12692
Digital Community Currency Usability from the User’s Eyes: Cases of Sarafu and Maendeleo Trading Credit (Mtcr.)
Alago, Sabina; Ogara, Solomon; Oloko, Michael; Kiak, Richard
Day by day, users demand systems that fulfill their expectations. Often, users of a system are dissatisfied because systems do not meet their expectations. Indeed, user expectations vary, including unrealistic expectations –those that are without regard for constraints such as budget, time, manpower and so on. Even so, place of users’ involvement in system development and implementation need to be recognized. Usability is an important aspect in system development and implementation. It is necessary to have an elaborate understanding of usability from the ‘eyes’ of a user. This study adopted the qualitative research design that employed triangulation. Two contemporary DCC cases of interest in this research study are: MTCr. in Kisumu; and the Sarafu in Nairobi. This paper espouses usability definitions and associated attributes. Specifically, this study established the meaning of digital community currency from the lens of the users.
2023-03-01T00:00:00ZContributing Factors to Mobile Financial Fraud within Kenya
http://ir.jooust.ac.ke/handle/123456789/11867
Contributing Factors to Mobile Financial Fraud within Kenya
Owiti, Shadrack Ochieng; Ogara, Solomon; Rodrigues, Anthony
The expansion of mobile banking services has created various challenges to financial sectors i.e. SIM swapping, hacking identity theft, social engineering, denial of service attack and account take over. The perceived criminal actions are due to continuous growth of mobile
banking and computer networks. The identified challenges of rise in mobile financial fraud are due to lack of proper strategies to curb mobile fraud. This study investigated factors contributing to mobile financial fraud within Kenya. The study used both qualitative and
quantitative method of data collection. The developed framework was informed by Fraud Triangle Theory (FTT). The findings confirmed that the fraud triangle is very helpful when applied to factors contributing to mobile financial fraud. Finally, the result of
findings will have significant implications to financial institution policymakers, academic researchers, anti-fraud organizations and Central Bank of Kenya.
2023-01-01T00:00:00ZMachine Learning Protocol for Secure 5G Handovers
http://ir.jooust.ac.ke/handle/123456789/10980
Machine Learning Protocol for Secure 5G Handovers
Nyangaresi, Vincent Omollo; Rodrigues, Anthony Joachim; Abeka, Silvance Onyango
The fifth generation (5G) networks are characterized with ultra-dense deployment of base stations with limited footprint. Consequently, user equipment’s handover frequently as they move within 5G networks. In addition, 5G requirements of ultra-low latencies imply that handovers should be executed swiftly to minimize service disruptions. To preserve security and privacy while at the same time maintaining optimal performance during handovers, numerous schemes have been developed. However, majority of these techniques are either limited to security and privacy or address only performance aspect of the handover mechanism. As such, there is need for a novel handover authentication protocol that addresses security, privacy and performance simultaneously. This paper presents a machine learning protocol that not only facilitates optimal selection of target cell but also upholds both security and privacy during handovers. Formal security analysis using the widely adopted Burrows–Abadi–Needham (BAN) logic shows that the proposed protocol achieves all the six formulated under this proof. As such, the proposed protocol facilitates strong and secure mutual authentication among the communicating entities before generating the shares session key. The derived session key protected the exchanged packets to avert attacks such as forgery. In addition, informal security evaluation of the proposed protocol shows that it offers perfect forward key secrecy, mutual authentication any user anonymity. It is also demonstrated to be robust against attacks such as denial of service (DoS), man-in-the-middle (MitM), masquerade, packet replays and forgery. In terms of performance, simulation results shows that it has lower packets drop rate and ping–pong rate, with higher ratio of packets received compared with improved 5G authentication and key agreement (5G AKA’) protocol. Specifically, using 5G AKA’ as the basis, the proposed protocol reduces the handover rate by 94.4%, hence the resulting handover signaling is greatly minimized.
2022-01-27T00:00:00ZInfluence of Cognitive Agility of Cyber Operators on Situational Aware Cyberspace Protection
http://ir.jooust.ac.ke/handle/123456789/10977
Influence of Cognitive Agility of Cyber Operators on Situational Aware Cyberspace Protection
Njoga, David A.O.; Liyala, Samuel; Abeka, Silvance
The effectiveness of the cyberspace protection for the national critical information infrastructure (CII) depends on a dynamically and reliably established cyberspace situational awareness framework. The current attribution based cyberspace protection models and frameworks are characterised by over dominance of government agencies and laws, overreliance on technology and lack of trust, transparency and goodwill leading to weak protection of critical information infrastructure. The study adopted a descriptive survey research design, in which conveniently sampled participants answered questions administered through Self-Regulation Questionnaires through three stage Delphi-Technique evaluation. Data was then analyzed using mean, standard deviation, frequency distributions, Pearson’s correlations and Linear Regression Analysis. The study revealed that there was a statistically significant moderate and positive association /relationship between cognitive agility and situational-awareness. This implies that the cyberspace protection is as strong or as weak as the cyberspace protection operators. The study concluded that a human-factored security endeavour is required that can improve the capabilities of the operational technology human constituents, so that they can appropriately recognise and respond to cyber intrusion events within the CII environment. Amidst evolving security trends that places human industrial actors as prime vectors of CII cyber-attacks, human-factored security efforts are required to manage and control the menace of prevailing attacks. It’s invaluable considering that cyber security knowledge and skills capabilities of the CII workforce (people) is crucial and strategic towards building a more effective and cyber security-compliant workforce. Cognitive agility is a major contribution to cyberspace’s protection since cyberspace is a fluid, technically changing environment, continuously increasing in scale and sophistication that must be constantly supervised and redefined by actors’ stable presence. These findings provide a human centred security capability and resilience building model which can be used to strengthen the security aptitude of human agents within CII. Noting the ‘standardization’ and ‘accountability’ common to traditional education models, this study recommends new and likened pedagogical interventions which provide the context for new literacies that include metacognitive strategies such as critical thinking, complex problem solving, expert communication and applied knowledge in real world settings. Inspired by constructivism, and the slow education approach to learning, specific pedagogical interventions designed to improve higher-order thinking and understanding, such as self-directed workshops, flipped classroom, reflection logs, and cognitive task analysis. An outcome of this method is students gaining situational self-efficacy and empowerment as they engage in critical thinking. This is valuable for cyber education as it leads learners to exhibit and contextualize richer relationships and meanings beyond the prescribed lesson content.
2022-03-01T00:00:00ZEnhanced Information Systems Success Model for Patient Information Assurance
http://ir.jooust.ac.ke/handle/123456789/10939
Enhanced Information Systems Success Model for Patient Information Assurance
Agunga, Lilian Adhiambo; Agola, Joshua; Abuonji, Paul
The current health information systems have many challenges such as lack of standard user interfaces, data security and privacy issues, inability to uniquely identify patients across multiple hospital information systems, probable misuse of patient data, high technological costs, resistance to technology deployments in hospital management, lack of data gathering, processing and analysis standardization. All these challenges, among others hamper either the acceptance of the health information systems, operational efficiency or expose patient information to cyber-attacks. In this paper, an enhanced information systems success model for patient information assurance is developed using an amalgamation of Technology Acceptance Model (TAM) and Information Systems Success Model (ISS). This involved the usage of Linear Structured Relationship (LISREL) software to model a combination of ISS and Intention to Use (ITU), TAM and ITU,
ISS and user satisfaction (US), and finally TAM and US. The sample size of 110 respondents was obtained based on the total population of 221 using the Conhrans formula. Thereafter, simple random sampling was employed to select members within each category of employees to take part in the study. The questionnaire as a research tool was checked for reliability via Cronbach’s Alpha. The results obtained showed that for ISS and ITU modeling, only perceived ease of use, system features, response time, flexibility, timeliness, accuracy, responsiveness and user training positively influenced the intention to use. However, for the TAM and ITU modeling, only TAM’s measures such as timely information, efficiency, increased transparency, and proper patient identification had a positive effect on intension to use. The ISS and US modeling revealed that perceived ease of use had the greatest impact on user satisfaction while response time had the least effect on user satisfaction. On its part, the TAM and US modeling showed that timely information, effectiveness, consistency, enhanced communication, and proper patients identification had a positive influence on user satisfaction.
2021-10-13T00:00:00ZAn Integrated Mobile Identity Authentication Model
http://ir.jooust.ac.ke/handle/123456789/10899
An Integrated Mobile Identity Authentication Model
Abwao, Donatus; Abeka, Silvance; Agola, Joshua
Theft of personal identity is an unlawful act; a criminal in this case possesses or attempts to be in possession of an identity of a victim without their knowledge or consent. Mobile identity theft the problem that inspires this study is just one of the types of identity theft and refers to having control of mobile subscriber identification through SIM card registration and replacement services again without the authority of the sole owner. This study provides a solution to solve a gap that is addressed by empirical studies from both academia and the industry for a problem that researchers feel should be a note issue in the twenty first century. The study besides interprets the course of mobile identity theft problem going by the literature reviewed to be orchestrated by criminals who leverage vulnerabilities at Subscriber Identity Module registration and replacement processes. The study then proposes, develops and tests an integrated authentication scheme based on existing models and inspired by theory of human identification to hypothesize that addition of Integrated population registration records would mitigate the problem. The simulation process of the proposed model is guided by an algorithm that employs a formula which determines strength of authentication score; using data generated by constructs of the scheme various results provide clarification on the safety of the model when various parameters are changed. The study observer’s a maximum authentication score at 96.43% when level of security is highest for all parameters in the new authentication model against that of 95.37% when security levels of the current authentication model are highest. The study hereby confirms that highest level of authentication can be achieved by introducing an integrated population records to the already existing authentication model while their levels of security are maximum.
2022-01-01T00:00:00ZAffordances Theory in Information and Communication Technology for Development (Ict4d) Research
http://ir.jooust.ac.ke/handle/123456789/10450
Affordances Theory in Information and Communication Technology for Development (Ict4d) Research
Egessa, Mathew; Liyala, Samuel; Ogara, Solomon
Information and Communication Technology for Development (ICT4D) is argued to have high potential value across all sectors, both public and private; and at multiple levels, be it fighting poverty; improving healthcare; providing better education; fostering gender equality or extending global partnerships for development. Despite this significance and huge potential, it is still not clear, to what extent ICTs are contributing to development, especially that of the relatively poor members of the society. Affordances Theory which has roots in ecological psychology has in the recent past been used in Information Systems (IS) research. This paper explores how affordances theory has been used in ICT4D research. A review of literature was conducted and recommendations made
2021-01-01T00:00:00ZSocio-demographic Determinants of Soil Erosion Levels among the Farming Households in Nyakach Sub-county, Kenya
http://ir.jooust.ac.ke/handle/123456789/9533
Socio-demographic Determinants of Soil Erosion Levels among the Farming Households in Nyakach Sub-county, Kenya
Kodiwo, Maurice Odhiambo; Otieno, Charles Alphonse; Okere, Francis Ang’awa
Soil degradation is a world-wide problem facing humanity today. In Nyakach Sub-county the
problem has persisted over the years. This study set out to assess the influence of socio-demographic
characteristics of farmers on soil erosion levels. Data from 384 respondents,collected using questionnaire and
interview, were analyzed by descriptive statistics and multinomial logistic regression.Resultsrevealed that
household headship was male-dominated (64.6%), 45.8% of the respondents had primary level of education,
65.6% were married, 52.3% treated farming as their main occupation and 26% lived below poverty line. Some
52.1% of the respondents were aged 36 to 64 years, 47.4% of the households had 6 to 10 persons, and 85.4%
had 0 to 4 dependents. About 78.6% owned less than 4 hectares of land, 99.5% had freehold tenure, 52.1% had
lived on the same land for 1 to 20 years, and 48.7% cropped between 60 and 79% of their land. Sex (��
2
=
18.445), marital status (��
2
= 22.389), main occupation (��
2
= 21.591), income of the household head (��
2
=
30.085), age (��
2
= 24.136), household population (��
2
= 13.038) and number of dependents (��
2
= 13.321)
significantly influenced erosion levels in the Plateau but not in the Plain and Scarp. Land ownership (��
2
=
368.63) significantly influenced erosion levels in the Plain but not in the Plateau and Scarp. The study
concluded that socio-demographic characteristics influenced soil degradation but the magnitude depended on
the physiographic unit. It was recommended that physiography should be considered when planning soil
conservation measures.
2019-01-01T00:00:00ZThe Role of ICT in Appreciating Tri-Axis Efforts of Research, Publications and Library Services in Higher Education
http://ir.jooust.ac.ke/handle/123456789/9532
The Role of ICT in Appreciating Tri-Axis Efforts of Research, Publications and Library Services in Higher Education
Omollo, Richard; Ondulo, Jasper; Kemei, Peter
Information and Communication Technology (ICT) is a principal enabler
to nearly all functional efforts including quality assurance sustenance in higher
education. Studies have revealed that research has a feeder effect on the quality of
knowledge that fulcrums higher education principles thence it attracts significant
investments. These research efforts are captured and documented in publishable
context for availability to knowledge consumers under a more structured system, the
library. Our study focused on unearthing the phenomenal role of ICT on the three
principal foci; Research, Publications and Library services in relation to Higher
Education. However, despite higher education traditional definitive texture, its
universal agenda is to discover, avail and preserve consumable knowledge, which in
principle rhythms with our study focus, ICT being the facilitation operand. This
paper approached the significant role played by ICT’s functional support to the three
focal areas. We appreciated the collaborative existence of research, publications and
library services towards actualizing Higher Education fundamental goals. This was
achieved through critical review of existing literature. We were able to establish ICT
role in activating the tri-axis connection between research, publications and library
services within higher education. We eventually proposed a functional framework
that appreciated the role of ICT in promoting Higher Education as underpinned with
ICT at its bedrock.
2013-01-01T00:00:00Z