• Login
  • Help Guide
View Item 
  •   JOOUST IR Home
  • Theses & Dissertations
  • Doctor of Philosophy Theses and Dissertations
  • School of Informatics & Innovative Systems
  • View Item
  •   JOOUST IR Home
  • Theses & Dissertations
  • Doctor of Philosophy Theses and Dissertations
  • School of Informatics & Innovative Systems
  • View Item
JavaScript is disabled for your browser. Some features of this site may not work without it.

Enhanced Information Security Model Using Integrated Approach for Saccos in Kenya

Thumbnail
Publication Date
2020
Author
Sirma, Jerotich
Type
Thesis
Metadata
Show full item record
Abstract/Overview

Information systems security is a very important aspect for the performance and sustainability of SACCOS. A secure information systems security plays a significant role of keeping all the SACCOS information from being accessed by unauthorized persons. Unauthorized access to SACCOS' information could result in a data breach or system downtime, costing the organization in terms of rnoney and productivity. In an effort to have more secured information systems SACCOS have adopted various information security models however, they have proven to be ineffective and inefficient due to the increased cases of security breach therefore the study sought to establish an enhanced information security model using integrated approach for SACCOS in Kenya. The objectives of the study were to: assess the current status of information security models among SACCOS in Kenya, to investigate the strength of existing information security models among SACCOS in Kenya, to develop an enhanced information security model using an integrated approach and to test and validate the enhanced information security model. The study used descriptive research. The total population of the study comprised of 135 SACCOS. Nassiuma (2000) scientific formula was used to determine the sample size of 85 SACCOS registered with SA SRA. The quantitative data was analyzed by using Statistical Package for Social Sciences (SPSS) version 22. The study adopted both descriptive and inferential statistics. Descriptive data was presented by use of frequency tables. The findings revealed that security technologies utilized by SACCOS according to the study findings reduced computer viruses, hacking incidents and unauthorized access to use data, thereby decreasing security incidents and breaches. The results also indicated that human error, unauthorized access to use data (internal), theft of hardware and software and computer-based fraud results was highly significant. The study sought to propose an enhanced information security model using integrated approach that could be adopted by SACCOS. Various factors were considered in the proposed model which was based on models that were developed earlier. The framework and model that the study sought to enhance were OODA Loop Model and Doherty and Fulford Conceptual Framework. The proposed model was modified accordingly in order for it to suit SACCOS requirements as dictated by respondents who provided feedback in a survey. The proposed model was validated with test data. The validation of the model was considered as a success by the study. This study has been able to explore many previous works on the Information Security, and from those works. the study was able to help in developing an enhanced information security model that can be used in any SACCOS around the World. From the validations, it can be stated that the study was a success. Further study on the field is highly encouraged to explore other possibilities in this field of Information Security awareness.

Publisher
JOOUST
Permalink
http://ir.jooust.ac.ke:8080/xmlui/handle/123456789/10909
Collections
  • School of Informatics & Innovative Systems [21]

Browse

All of JOOUST IRCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects

My Account

LoginRegister

Statistics

View Usage Statistics

Contact Us

Copyright © 2023-4 Jaramogi Oginga Odinga University of Science and Technology (JOOUST)
P.O. Box 210 - 40601
Bondo – Kenya

Useful Links

  • Report a problem with the content
  • Accessibility Policy
  • Deaccession/Takedown Policy

TwitterFacebookYouTubeInstagram

  • University Policies
  • Access to Information
  • JOOUST Quality Statement