Show simple item record

dc.contributor.authorSirma, Jerotich
dc.date.accessioned2022-05-06T10:49:20Z
dc.date.available2022-05-06T10:49:20Z
dc.date.issued2020
dc.identifier.urihttp://ir.jooust.ac.ke:8080/xmlui/handle/123456789/10909
dc.description.abstractInformation systems security is a very important aspect for the performance and sustainability of SACCOS. A secure information systems security plays a significant role of keeping all the SACCOS information from being accessed by unauthorized persons. Unauthorized access to SACCOS' information could result in a data breach or system downtime, costing the organization in terms of rnoney and productivity. In an effort to have more secured information systems SACCOS have adopted various information security models however, they have proven to be ineffective and inefficient due to the increased cases of security breach therefore the study sought to establish an enhanced information security model using integrated approach for SACCOS in Kenya. The objectives of the study were to: assess the current status of information security models among SACCOS in Kenya, to investigate the strength of existing information security models among SACCOS in Kenya, to develop an enhanced information security model using an integrated approach and to test and validate the enhanced information security model. The study used descriptive research. The total population of the study comprised of 135 SACCOS. Nassiuma (2000) scientific formula was used to determine the sample size of 85 SACCOS registered with SA SRA. The quantitative data was analyzed by using Statistical Package for Social Sciences (SPSS) version 22. The study adopted both descriptive and inferential statistics. Descriptive data was presented by use of frequency tables. The findings revealed that security technologies utilized by SACCOS according to the study findings reduced computer viruses, hacking incidents and unauthorized access to use data, thereby decreasing security incidents and breaches. The results also indicated that human error, unauthorized access to use data (internal), theft of hardware and software and computer-based fraud results was highly significant. The study sought to propose an enhanced information security model using integrated approach that could be adopted by SACCOS. Various factors were considered in the proposed model which was based on models that were developed earlier. The framework and model that the study sought to enhance were OODA Loop Model and Doherty and Fulford Conceptual Framework. The proposed model was modified accordingly in order for it to suit SACCOS requirements as dictated by respondents who provided feedback in a survey. The proposed model was validated with test data. The validation of the model was considered as a success by the study. This study has been able to explore many previous works on the Information Security, and from those works. the study was able to help in developing an enhanced information security model that can be used in any SACCOS around the World. From the validations, it can be stated that the study was a success. Further study on the field is highly encouraged to explore other possibilities in this field of Information Security awareness.en_US
dc.language.isoenen_US
dc.publisherJOOUSTen_US
dc.titleEnhanced Information Security Model Using Integrated Approach for Saccos in Kenyaen_US
dc.typeThesisen_US


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record