<?xml version="1.0" encoding="UTF-8"?>
<rdf:RDF xmlns="http://purl.org/rss/1.0/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/">
<channel rdf:about="http://repository.kemu.ac.ke/handle/123456789/317">
<title>Master of Management Information Systems</title>
<link>http://repository.kemu.ac.ke/handle/123456789/317</link>
<description/>
<items>
<rdf:Seq>
<rdf:li rdf:resource="http://repository.kemu.ac.ke/handle/123456789/1563"/>
<rdf:li rdf:resource="http://repository.kemu.ac.ke/handle/123456789/318"/>
</rdf:Seq>
</items>
<dc:date>2026-04-15T02:30:01Z</dc:date>
</channel>
<item rdf:about="http://repository.kemu.ac.ke/handle/123456789/1563">
<title>A Framework for User Involvement in Enterprise Resource Planning System Implementation</title>
<link>http://repository.kemu.ac.ke/handle/123456789/1563</link>
<description>A Framework for User Involvement in Enterprise Resource Planning System Implementation
Ngala, Derrick
The vast majority of firms adopt a complete collection of enterprise resource planning tools&#13;
and tailor them to their specific operations practices. Despite all of this and ongoing evaluation&#13;
of the embraced ERP suite, realizing an effective ERP deployment is challenging due to the&#13;
system's size and complexity. Additionally, failures when it comes to the implementation of&#13;
ERP have usually been attributed to lack of or inadequate user involvement in the entire&#13;
process. Using a descriptive research design, the study took place at currently the United&#13;
Nations Human Settlements Programme in Nairobi, and a sample size of 70 participants was&#13;
chosen using stratified proportionate sampling. Primary sources with a focus on the drop and&#13;
pick process provided the data for the study, which was ultimately given to participants via&#13;
standardized questionnaires. Inferential analysis was used to approximate the predictive model&#13;
after quantitative analysis provided descriptive statistics. Figures and tables were used to&#13;
present the results, and narrative analysis from data analysed using SPSS tools. In accordance&#13;
with the study's findings, it was concluded that there exists a positive and significant&#13;
relationship between users' functional requirements activities and ERP implementation, as well&#13;
as positive and significant relationships between users' presentation requirement activities and&#13;
ERP implementation, significant moderate relationships between users' quality assurance&#13;
activities and ERP implementation, and significant moderate relationships between users'&#13;
project management activities and ERP implementation. The study suggests that these entities&#13;
adopt an ERP framework through establishing users' functional requirements operations policy&#13;
pronunciation of the role of top management involvement, looking over its business process&#13;
regulations to take into account different system implementation procedures and related&#13;
documents, evaluating its current quality assurance operations by Customers in order to meet&#13;
the planned ERP system demand of the provider, and acquiring and retaining the ERP systems.
</description>
<dc:date>2023-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="http://repository.kemu.ac.ke/handle/123456789/318">
<title>Factors Contributing to Cyber Security Framework in Kenya: A Case Study of Kenyan Telecommunications Companies.</title>
<link>http://repository.kemu.ac.ke/handle/123456789/318</link>
<description>Factors Contributing to Cyber Security Framework in Kenya: A Case Study of Kenyan Telecommunications Companies.
Ngare, Benson Muriuki
Modern days have seen an uncontrolled increase in cybercrime, targeting both developing and developed countries and more so the telecommunications sectors. Unfortunately, Cybersecurity frameworks, used by organizations to counter cybercrime, have failed in one way or another to ensure responsive and substantive security in developing countries. There is, therefore, a need for cost-effective and responsive cybercrime framework in the telecommunication sector in developing country. It based on this premise that the present study was carried out. This research sough to assess a cybercrime framework applicable to Kenyan telecommunications sector. The objectives of the research was to examine the cybercrime in telecommunications industry in Kenya; to establish the cybercrime frameworks currently used by telecommunications companies in Kenya and to propose a cybercrime framework applicable to Kenyan situation. The study used descriptive research design in soliciting information in the research of to assess the factors contributing to Cybersecurity Framework in Kenya. The target population was the 121 Information Technology experts in the telecommunications industry in Kenya. The study obtained a sample size of 92 respondents using the Slovin‟s formula The study adopted proportionate stratified random sampling to select the respondents form each company. Data was collected using a structured questionnaire administered using the drop and pick method. The research tool (questionnaire) was first tested for reliability and validity before administration. The study analyzed the data using descriptive analysis to produce descriptive statistics. Thereafter inferential analysis was carried out to establish a study model. The study concludes that personal data protection demands very highly contributes to development of the Cybersecurity framework in Kenyan telecommunications companies; computer use control highly influences the development and adoption of Cybersecurity framework in Kenyan telecommunications companies; content exposure control highly contributes to Cybersecurity framework development in Kenyan telecommunications companies; and data copyright structures highly influences the Cybersecurity framework in Kenyan telecommunications companies. The study reveals that at 0.05 (5%) level of significance, personal data protection demands, computer use control, content exposure control, and data copyright structures are predictors of the Cybersecurity framework in Kenyan telecommunications companies. Each of computer use control and content exposure control has a significant positive relationship with Cybersecurity framework in Kenyan telecommunications companies while personal data protection demands has a moderate significant relationship and data copyright structures has negative insignificant relationship. It was established that 60.000% of change in Cybersecurity framework in Kenyan telecommunications companies is explained by personal data protection demands, computer use control, content exposure control, and data copyright structures. The study recommends that the Kenyan telecommunications companies should; enhance their personal data protection structures to fully protect their clients‟ data; unilaterally review the computer use controls for the adoption of Cybersecurity framework; come together to creation and development of content exposure control based Cybersecurity framework and advocate for strict law as on copyright related offences.
A Research Thesis submitted to School of Science and Technology in partial fulfillment of the requirements for the degree of Master of Management Information Systems of Kenya Methodist University
</description>
<dc:date>2018-09-01T00:00:00Z</dc:date>
</item>
</rdf:RDF>
