East African Journal of Information Technology https://journals.eanso.org/index.php/eajit <p>Information Technology is the trend for the modern world. Most systems are becoming digitalized and new inventions, innovations and improvements are being achieved on a daily basis.&nbsp; With all these at hand, there also emerges the challenge of information security, privacy infringement, illiteracy and more that pose an imminent threat to the application of information technology. This EANSO Journal aims at advancing information technology through the dissemination publications in this field. Some of the topics publishable in this journal include programming, information security, penetration testing, algorithm, languages, systems development, malware, cryptography and web development.</p> en-US editor@eanso.org (Prof. Jack Simons) Fri, 05 Jan 2024 09:45:07 +0000 OJS 3.1.1.4 http://blogs.law.harvard.edu/tech/rss 60 A Framework for Guiding the Design of Interactive Systems for Communication through Activities in Higher Learning Institutions https://journals.eanso.org/index.php/eajit/article/view/1671 <p>Human-computer interaction is paramount in the process of designing interactive-computer systems with high capabilities of guaranteeing users’ satisfaction. However, lack of suitable frameworks complicates their effective design. This study investigated suitable frameworks capable of guiding appropriate design of interactive systems for communication through activities (ISCA) in higher learning institutions in Tanzania. These systems are necessary for augmenting communication thereby overcoming persistent challenges related to their reliance on face-to-face, phone-based, and social networking websites communications. This study used a thorough user centred design approach where a framework for human activity design-centred (HADC) was employed. Authors qualitatively analysed data on communication and interaction issues from participants involved. Design science research was then combined with activity theory to develop a four-phased methodology which was used to design an intended human activity interactive communication (HAIC) framework. The findings confirmed that interactions design techniques based on human-activities undertaken are fundamental in designing communication frameworks capable of guiding suitable design of interactive systems in a particular setting. In the context of this study, and with ISCA need, the obtained HAIC framework was found to be appropriate. This study found out that the current user-centred design approach does not explain precisely how designers can employ activity-based interaction design techniques into the design process. Thus, the study contributes to the literature on users’ involvement in interactive systems’ design through the HADC framework provided</p> Anthony Mwombeki, Nima Shidende, Leornard Mselle ##submission.copyrightStatement## http://creativecommons.org/licenses/by/4.0 https://journals.eanso.org/index.php/eajit/article/view/1671 Fri, 05 Jan 2024 10:24:22 +0000 Improving Network Security: An Intrusion Detection System (IDS) Dataset from Higher Learning Institutions, Mbeya University of Science and Technology (MUST), Tanzania https://journals.eanso.org/index.php/eajit/article/view/1679 <p>Nowadays, Internet-driven culture securing computer networks in Higher Learning Institutions (HLIs) has become a major responsibility. Intrusion Detection Systems (IDS) are crucial for protecting networks from unauthorized activity and cyber threats. This paper examines the process of improving network security by creating a comprehensive IDS dataset using real traffic from HLIs, highlighting the importance of accurate and representative data in improving the system's ability to identify and mitigate future cyber-attacks. The IDS model was created using a variety of machine learning (ML) techniques. Metrics like accuracy, precision, recall, and F1-score were used to assess the performance of each model. The dataset used for training and testing was real-world network traffic data obtained from the institution's computer network. The results showed that the developed IDS obtained exceptional accuracy rates, with Random Forest, Gradient Boosting, and XGBoost models all achieving an accuracy of around 93%. Precision and recall values were likewise quite high across all algorithms. Furthermore, the study discovered that data quality has a substantial impact on IDS performance. Proper data preparation, feature engineering, and noise removal were found to be helpful in improving model accuracy and reducing false positives. While the IDS models performed well throughout validation and testing, implementing such systems in a production setting necessitates careful thought. As a result, the essay also examined the procedures for testing and deploying the IDS models in a real-world scenario. It underlined the significance of ongoing monitoring and maintenance in order to keep the model effective in identifying intrusions. The research aids in the progress of network security in HLI. Educational institutions can better protect their precious assets and sensitive information from cyberattacks by understanding the impact of data quality on IDS performance and implementing effective deployment techniques</p> Daud M. Sindika, Mrindoko R. Nicholaus, PhD, Nabahani B. Hamadi, PhD ##submission.copyrightStatement## http://creativecommons.org/licenses/by/4.0 https://journals.eanso.org/index.php/eajit/article/view/1679 Sun, 07 Jan 2024 10:54:56 +0000 Usability and Acceptability of a SWASH Mobile Intervention for Behaviour Change in WASH Practices https://journals.eanso.org/index.php/eajit/article/view/1687 <p>Adequate access to Water, Sanitation, and Hygiene (WASH) is the principal determinant of human health and well-being. However, many African countries are facing challenges in implementing proper WASH practices. The School WASH (SWASH) Mobile App was developed using the Human Centred Design (HCD) approach, which leverages behavioural theories to track school students' sanitation and hygiene behaviours and encourage positive behaviour change. This study examined the usability and acceptability of the SWASH Mobile App. A qualitative research methodology was employed to assess in depth (i) whether the App achieves its intended objective of influencing WASH behaviour change in schools and (ii) challenges that affect its success. A total of 62 people from 20 schools' students, teachers, and community members in Tanzania participated in the study. The results demonstrated that the SWASH Mobile App was widely accepted and highly usable. The study further revealed that the main challenges were costly and unstable internet, difficulties in fetching pictures, and voting and lack of SWASH Mobile App awareness. The study recommends collaboration between schools and telecommunication companies for cost-effective internet access, the use of image compression techniques for faster access to pictures, and a marketing strategy to increase app awareness</p> Hellen Maziku, Ruthbetha Kateule, Emmanuel Tlemu ##submission.copyrightStatement## http://creativecommons.org/licenses/by/4.0 https://journals.eanso.org/index.php/eajit/article/view/1687 Fri, 12 Jan 2024 08:55:13 +0000 A Review of Current Research Trends in Green Computing https://journals.eanso.org/index.php/eajit/article/view/1707 <p>Green computing also called green ICT refers to any computing process or practice aimed at reducing any negative effect that computing technology has on the environment. Technology is ever-advancing hence new technological devices are being developed that could have varied effects on the environment. This study aims at assessing different fields of green computing. The most recent studies were considered from the world's most revered scientific journal IEEE. Countries where the research was carried out were also compared as well as the year when the studies were published. Analysis was done in the different thematic areas where current and future research trends in those areas were discussed. Insightful information from the study was used to do a projection of future research in this area. This study pointed out areas where adjustments or improvements need to be made to ensure green computing is achieved</p> Geofrey Mwamba Nyabuto ##submission.copyrightStatement## http://creativecommons.org/licenses/by/4.0 https://journals.eanso.org/index.php/eajit/article/view/1707 Mon, 22 Jan 2024 11:33:34 +0000 Challenges Facing the Use of Electronic Fiscal Devices for Tax Reporting in Zanzibar https://journals.eanso.org/index.php/eajit/article/view/1708 <p>The study aims to identify the challenges facing the use of Electronic Fiscal Devices (EFDs) for tax reporting. The study applied a descriptive research design where primary data was used with a quantitative research approach. The sample size of the study was 98 taxpayers obtained using Yamane’s formula. SPSS v.26 was used to analyse the data. Results revealed that the challenges facing the use of EFDs for tax reporting include network problems, lack of trust in the use of EFDs for tax reporting, training were not enough, customers do not have a culture of requesting receipts, high cost of EFDs and EFDs often breakdown and not working. This study recommends that the government should provide more training to taxpayers and educate the public about the importance of tax and claiming receipts, and reduce the price of EFDs to encourage more taxpayers to afford to buy the machine or, if possible, to be given to taxpayers free of charge. Also, the government should provide good infrastructure to solve a slow or no network and provide strong punishment for those taxpayers who do not issue a receipt and for those customers who do not request a receipt</p> Haitham Abdulla Ramsa, Yahya Hamad Sheikh, PhD, Abubakar Diwani Bakari, PhD ##submission.copyrightStatement## http://creativecommons.org/licenses/by/4.0 https://journals.eanso.org/index.php/eajit/article/view/1708 Wed, 24 Jan 2024 11:34:50 +0000 Ethical Implications of Advanced Surveillance Technologies on Law Enforcement: A Case Study of National Police Service in County of Nairobi, Kenya https://journals.eanso.org/index.php/eajit/article/view/1722 <p>The study's research objectives included examining the effects of advanced surveillance technologies on law enforcement by NPS in Nairobi County and evaluating the ethical implications of using these technologies by the NPS. The social contract theory was used to understand the ethical implications of using advanced surveillance technologies in law enforcement. The research population includes the 4.7 residents of Nairobi County affected by the implementation of advanced surveillance technologies both overtly and covertly. The data was collected from a sample of 50 randomly sampled participants. The respondents were engaged using a qualitative questionnaire. Therefore, both qualitative and quantitative data were collected in the study. The study was analyzed using Statistical Package for Social Science (SPSS) and the thematic analysis method. The study concluded that the use of advanced surveillance technologies such as CCTV systems, facial recognition, license plate recognition, drones, forensic tools, and biometric systems in law enforcement and public safety are widely acknowledged. The ethical considerations regarding these technologies include data security, privacy, freedom of expression, transparency, and accountability. These, however, do not negate the fact that the technologies are necessary for enhancing public safety and emergency response. It is, therefore, imperative to establish clear guidelines and regulations for using advanced surveillance technologies in law enforcement</p> Benjamin Kisio, Ndikaru wa Teresia, PhD ##submission.copyrightStatement## http://creativecommons.org/licenses/by/4.0 https://journals.eanso.org/index.php/eajit/article/view/1722 Fri, 26 Jan 2024 16:20:20 +0000 Leveraging Technology for Government Service Delivery: Suggestions for Securing the e-Citizen Service in Kenya https://journals.eanso.org/index.php/eajit/article/view/1757 <p>Governments across the world have increasingly embraced e-governance in the provision of public services. This development has significantly reduced bureaucracy, enhanced efficiency, reduced corruption and fundamentally transformed public service delivery. However, the adoption of these copyright technology solutions, owned by international corporations and non-state actors, mostly multinational corporations (MNCs), have equally exposed user governments, such as Kenya, to significant cyberspace security threats, service disruptions and exposed national security leading to interferences in national autonomy and at times threatened national sovereignty. The threats arise from the activities of offensive states, malicious non-state actors and individuals taking advantage of the integrated and dependent internet connectivity networks. This paper is an extract from a study conducted on Information Security Threats to e-Citizen services in Kenya. The research presents findings on the effectiveness of information security measures initiated to secure the e-Citizen services in Kenya.&nbsp; The case study adopted a mixed method design combining cross-sectional and descriptive research design that targeted 12,000 respondents (users) from 51 <em>Huduma</em> Centres countrywide. Purposive sampling was applied to select 10 <em>Huduma</em> centres and 10% of respondents from each of the selected centres.&nbsp; About 1,200 questionnaires were issued with a return rate of 80% which translates to 966 responses. The study applied both quantitative and qualitative techniques in analysis. The study identified 10 categories of security measures which are discussed in this paper categorized under legislation and policy; infrastructure and capacity development; protective action; monitoring and oversight. &nbsp;From the findings, Kenya has implemented the measures of information security to a satisfactory level even though more is needed in terms of engaging the populace to enhance safe data use, handling and storage. In order to bolster a safe service delivery e-Citizen system, the study recommends locally modelled technological solutions, mutually beneficial cyber security collaborations, frequent infrastructure security audits, user capacity training and restructuring national security organs to create cyberspace manning capabilities. These sectoral changes will enhance preventive, defensive and offensive capabilities against arising cyberspace threats from geopolitical, technological, economic and security competition and rivalries among global nations, non-state actors and malicious individuals</p> Lucy W. Maina, PhD, Godfred Ohndyl Otieno ##submission.copyrightStatement## http://creativecommons.org/licenses/by/4.0 https://journals.eanso.org/index.php/eajit/article/view/1757 Wed, 14 Feb 2024 19:28:13 +0000 Towards Digital Forensic Readiness: A Framework for Financial Service Providers https://journals.eanso.org/index.php/eajit/article/view/1897 <p>Digital Forensic Readiness has widely been referred to as an organization’s ability to proactively capture digital evidence and as a result, incur minimum costs of investigation in the event of incidents.&nbsp; However, several organizations still underestimate the usefulness of setting up their environments to be forensically ready until an incident occurs, and this often results in huge losses and costly investigations. Global trends show that financial institutions are amongst the worst-hit companies by cybercriminals, and this is attributed to one of the key motivations for cybercrime, which is financial gain. Kenya’s cybercrime statistics over the past five years also show that financial services remain amongst the top hit sectors by cybercriminals. The aim of this study was to develop a Digital Forensic Readiness framework for Financial Services Providers. To achieve this, the study assessed the relevant existing frameworks to explore their strengths and gaps. Additionally, the study explored the current state of forensic readiness in Kenyan financial institutions by reviewing secondary data and analysing primary data collected from respondents in the financial services sector. The study adopted a descriptive research design with the main data collection tool being questionnaires, which were administered to respondents through an online survey. The collected data was analysed using the SPSS software 28.0.1 and a multiple regression analysis was performed to determine the influence of organizational factors, legal factors, technology, and policies on Digital Forensic Readiness. The outcome of the analysis indicated that these factors indeed had a significant effect on forensic readiness, with organizational factors and policies having more impact on the framework. The study recommended that organizations not only focus on complying with laws and implementing technological controls, but also prioritize improving forensic readiness awareness and culture, supporting forensic readiness activities, setting up training, and enforcing policies to ensure personnel compliance</p> Georgina Odhiambo, Richard Omollo, Paul Abuonji ##submission.copyrightStatement## http://creativecommons.org/licenses/by/4.0 https://journals.eanso.org/index.php/eajit/article/view/1897 Tue, 30 Apr 2024 13:22:36 +0000 A Prostate Boundary Localization and Edge Denoising Algorithm https://journals.eanso.org/index.php/eajit/article/view/1900 <p>This research aimed at presenting a two-step method for prostate segmentation in TRUS images. The research used a prostate boundary localization and prostate edge denoising approach. The proposed method contribution is the use of the optimized Hodge’s method as the boundary operator and the use of the Bidirectional Exponential moving average to perform edge denoising. The results showed that the proposed method is effective in completing the prostate segmentation task. (1) The prostate region is effectively initialized and localized. (2) The recovery of noise points is accomplished and the segmentation result being consistent with the general shape of the prostate. The experimental results showed that this method can improve the overall segmentation accuracy. The process uses a combination of traditional and unsupervised methods, eliminating the need to rely on large data sets compared to current deep learning methods. The proposed method achieved excellent segmentation accuracy, with the Dice similarity coefficient (DICE) value of 0.9679, an average Intersection over Union (IoU) value of 0.9377, and an average False Positive Rate (FPR) of 0.0399. The results obtained from this study have significant implications for clinical practice. Accurate prostate segmentation is crucial for various applications, including radiation therapy planning, image-guided interventions, and computer-aided diagnosis. The proposed method has the potential to improve these applications by providing more precise and reliable prostate segmentations. However, it is important to acknowledge some limitations of this study. First, the proposed method was evaluated on a limited dataset, which may not fully represent the diversity of prostate images encountered in clinical practice. Further validation on larger datasets is necessary to assess its generalizability. Additionally, the proposed method relied on manual annotations for training, which can introduce inter-observer variability. Incorporating automated or semi-automated annotation techniques could enhance the robustness of the method</p> Daisy Thembelihle Mukondiwa, YongTao Shi, PhD, Chao Gao ##submission.copyrightStatement## http://creativecommons.org/licenses/by/4.0 https://journals.eanso.org/index.php/eajit/article/view/1900 Tue, 30 Apr 2024 14:47:42 +0000 Impact of CCTV on Police Operations Outcomes in Nairobi City County, Kenya https://journals.eanso.org/index.php/eajit/article/view/1995 <p>The widespread adoption of Closed-Circuit Television (CCTV) systems in major cities globally aims to improve policing outcomes. However, despite Nairobi’s CCTV system being operational since mid-2015, its specific impact remained unclear. This study investigated how CCTV influenced five key police operation outcomes: crime reduction, response times, road safety, officer safety, and cost reduction. Drawing from Rational Choice Theory and Routine Activity Theory, the study employed a convergent mixed-method design combining a cross-sectional survey with a phenomenological design. Participants included 403 police officers from the CCTV command centre and various police stations across the county, selected via cluster and purposive sampling. Data collection utilised questionnaires, key informant interviews and focus group discussions. Quantitative analysis employed binary logistic regression, while qualitative data underwent thematic analysis. The findings revealed that CCTV has significantly reduced crime, enhanced road safety and officer safety, and lowered operational costs. However, response times saw minimal improvement due to limited CCTV coverage and coordination challenges between officers. The study recommends expanding coverage, strengthening collaboration among officers, and publicising the system's successes to maximise CCTV's potential</p> Gideon Kirui, PhD, Benard Muiya, PhD, Duncan Ochieng, PhD, Stephen Waithaka, PhD ##submission.copyrightStatement## http://creativecommons.org/licenses/by/4.0 https://journals.eanso.org/index.php/eajit/article/view/1995 Wed, 19 Jun 2024 07:37:57 +0000 Organizational Support on Integration of Communication Technology in Classroom Learning in Kisumu National Polytechnic, Kenya https://journals.eanso.org/index.php/eajit/article/view/2016 <p>This study investigates the impact of organizational support on integrating communication technology into classroom learning at Kisumu National Polytechnic.&nbsp; In particular, the study aimed at determining the influence of training of trainers, stakeholder involvement, and resource availability on the integration of communication technology in classroom learning. The study employed a quantitative approach and correlational design and sampled 169 of the 301 trainers from KNP for the study. The study utilized a simple random sampling technique to obtain a sample size. A self-administered questionnaire was used to collect data. Descriptive statistics and Pearson correlational analysis were utilized to analyze the collected data. The study found that training of trainers, stakeholders’ involvement, and availability of resources influenced the integration of communication technology in classroom learning with training of trainers and stakeholders’ involvement registering an average mean of above 3.0 and availability of resources registering an average mean of 2.8. At the 5% significant level, the results revealed a strong positive correlation between teacher training (r = .423, p-value = 0.05). stakeholders involvement (r = 0.461*, p-value = 0.02); resource availability and integration of Technology communication in classroom learning (r = 0.347*, p-value = 0.03). The study therefore rejected the null hypothesis as there was an existing strong positive relationship between factors of organizational support and integration of technology communication in classroom learning KNP. The study findings provide vivid insights and recommendations to the management regarding the need to involve stakeholders, train trainers, and avail resources in integrating communication technology in the classroom</p> Henry Nyamogosa, Michael Murimi ##submission.copyrightStatement## http://creativecommons.org/licenses/by/4.0 https://journals.eanso.org/index.php/eajit/article/view/2016 Tue, 02 Jul 2024 10:33:41 +0000