East African Journal of Information Technology https://journals.eanso.org/index.php/eajit <p>Information Technology is the trend for the modern world. Most systems are becoming digitalized and new inventions, innovations and improvements are being achieved on a daily basis.&nbsp; With all these at hand, there also emerges the challenge of information security, privacy infringement, illiteracy and more that pose an imminent threat to the application of information technology. This EANSO Journal aims at advancing information technology through the dissemination publications in this field. Some of the topics publishable in this journal include programming, information security, penetration testing, algorithm, languages, systems development, malware, cryptography and web development.</p> en-US editor@eanso.org (Prof. Jack Simons) Fri, 05 Jan 2024 09:45:07 +0000 OJS 3.1.1.4 http://blogs.law.harvard.edu/tech/rss 60 A Framework for Guiding the Design of Interactive Systems for Communication through Activities in Higher Learning Institutions https://journals.eanso.org/index.php/eajit/article/view/1671 <p>Human-computer interaction is paramount in the process of designing interactive-computer systems with high capabilities of guaranteeing users’ satisfaction. However, lack of suitable frameworks complicates their effective design. This study investigated suitable frameworks capable of guiding appropriate design of interactive systems for communication through activities (ISCA) in higher learning institutions in Tanzania. These systems are necessary for augmenting communication thereby overcoming persistent challenges related to their reliance on face-to-face, phone-based, and social networking websites communications. This study used a thorough user centred design approach where a framework for human activity design-centred (HADC) was employed. Authors qualitatively analysed data on communication and interaction issues from participants involved. Design science research was then combined with activity theory to develop a four-phased methodology which was used to design an intended human activity interactive communication (HAIC) framework. The findings confirmed that interactions design techniques based on human-activities undertaken are fundamental in designing communication frameworks capable of guiding suitable design of interactive systems in a particular setting. In the context of this study, and with ISCA need, the obtained HAIC framework was found to be appropriate. This study found out that the current user-centred design approach does not explain precisely how designers can employ activity-based interaction design techniques into the design process. Thus, the study contributes to the literature on users’ involvement in interactive systems’ design through the HADC framework provided</p> Anthony Mwombeki, Nima Shidende, Leornard Mselle ##submission.copyrightStatement## http://creativecommons.org/licenses/by/4.0 https://journals.eanso.org/index.php/eajit/article/view/1671 Fri, 05 Jan 2024 10:24:22 +0000 Improving Network Security: An Intrusion Detection System (IDS) Dataset from Higher Learning Institutions, Mbeya University of Science and Technology (MUST), Tanzania https://journals.eanso.org/index.php/eajit/article/view/1679 <p>Nowadays, Internet-driven culture securing computer networks in Higher Learning Institutions (HLIs) has become a major responsibility. Intrusion Detection Systems (IDS) are crucial for protecting networks from unauthorized activity and cyber threats. This paper examines the process of improving network security by creating a comprehensive IDS dataset using real traffic from HLIs, highlighting the importance of accurate and representative data in improving the system's ability to identify and mitigate future cyber-attacks. The IDS model was created using a variety of machine learning (ML) techniques. Metrics like accuracy, precision, recall, and F1-score were used to assess the performance of each model. The dataset used for training and testing was real-world network traffic data obtained from the institution's computer network. The results showed that the developed IDS obtained exceptional accuracy rates, with Random Forest, Gradient Boosting, and XGBoost models all achieving an accuracy of around 93%. Precision and recall values were likewise quite high across all algorithms. Furthermore, the study discovered that data quality has a substantial impact on IDS performance. Proper data preparation, feature engineering, and noise removal were found to be helpful in improving model accuracy and reducing false positives. While the IDS models performed well throughout validation and testing, implementing such systems in a production setting necessitates careful thought. As a result, the essay also examined the procedures for testing and deploying the IDS models in a real-world scenario. It underlined the significance of ongoing monitoring and maintenance in order to keep the model effective in identifying intrusions. The research aids in the progress of network security in HLI. Educational institutions can better protect their precious assets and sensitive information from cyberattacks by understanding the impact of data quality on IDS performance and implementing effective deployment techniques</p> Daud M. Sindika, Mrindoko R. Nicholaus, PhD, Nabahani B. Hamadi, PhD ##submission.copyrightStatement## http://creativecommons.org/licenses/by/4.0 https://journals.eanso.org/index.php/eajit/article/view/1679 Sun, 07 Jan 2024 10:54:56 +0000 Usability and Acceptability of a SWASH Mobile Intervention for Behaviour Change in WASH Practices https://journals.eanso.org/index.php/eajit/article/view/1687 <p>Adequate access to Water, Sanitation, and Hygiene (WASH) is the principal determinant of human health and well-being. However, many African countries are facing challenges in implementing proper WASH practices. The School WASH (SWASH) Mobile App was developed using the Human Centred Design (HCD) approach, which leverages behavioural theories to track school students' sanitation and hygiene behaviours and encourage positive behaviour change. This study examined the usability and acceptability of the SWASH Mobile App. A qualitative research methodology was employed to assess in depth (i) whether the App achieves its intended objective of influencing WASH behaviour change in schools and (ii) challenges that affect its success. A total of 62 people from 20 schools' students, teachers, and community members in Tanzania participated in the study. The results demonstrated that the SWASH Mobile App was widely accepted and highly usable. The study further revealed that the main challenges were costly and unstable internet, difficulties in fetching pictures, and voting and lack of SWASH Mobile App awareness. The study recommends collaboration between schools and telecommunication companies for cost-effective internet access, the use of image compression techniques for faster access to pictures, and a marketing strategy to increase app awareness</p> Hellen Maziku, Ruthbetha Kateule, Emmanuel Tlemu ##submission.copyrightStatement## http://creativecommons.org/licenses/by/4.0 https://journals.eanso.org/index.php/eajit/article/view/1687 Fri, 12 Jan 2024 08:55:13 +0000 A Review of Current Research Trends in Green Computing https://journals.eanso.org/index.php/eajit/article/view/1707 <p>Green computing also called green ICT refers to any computing process or practice aimed at reducing any negative effect that computing technology has on the environment. Technology is ever-advancing hence new technological devices are being developed that could have varied effects on the environment. This study aims at assessing different fields of green computing. The most recent studies were considered from the world's most revered scientific journal IEEE. Countries where the research was carried out were also compared as well as the year when the studies were published. Analysis was done in the different thematic areas where current and future research trends in those areas were discussed. Insightful information from the study was used to do a projection of future research in this area. This study pointed out areas where adjustments or improvements need to be made to ensure green computing is achieved</p> Geofrey Mwamba Nyabuto ##submission.copyrightStatement## http://creativecommons.org/licenses/by/4.0 https://journals.eanso.org/index.php/eajit/article/view/1707 Mon, 22 Jan 2024 11:33:34 +0000 Challenges Facing the Use of Electronic Fiscal Devices for Tax Reporting in Zanzibar https://journals.eanso.org/index.php/eajit/article/view/1708 <p>The study aims to identify the challenges facing the use of Electronic Fiscal Devices (EFDs) for tax reporting. The study applied a descriptive research design where primary data was used with a quantitative research approach. The sample size of the study was 98 taxpayers obtained using Yamane’s formula. SPSS v.26 was used to analyse the data. Results revealed that the challenges facing the use of EFDs for tax reporting include network problems, lack of trust in the use of EFDs for tax reporting, training were not enough, customers do not have a culture of requesting receipts, high cost of EFDs and EFDs often breakdown and not working. This study recommends that the government should provide more training to taxpayers and educate the public about the importance of tax and claiming receipts, and reduce the price of EFDs to encourage more taxpayers to afford to buy the machine or, if possible, to be given to taxpayers free of charge. Also, the government should provide good infrastructure to solve a slow or no network and provide strong punishment for those taxpayers who do not issue a receipt and for those customers who do not request a receipt</p> Haitham Abdulla Ramsa, Yahya Hamad Sheikh, PhD, Abubakar Diwani Bakari, PhD ##submission.copyrightStatement## http://creativecommons.org/licenses/by/4.0 https://journals.eanso.org/index.php/eajit/article/view/1708 Wed, 24 Jan 2024 11:34:50 +0000 Ethical Implications of Advanced Surveillance Technologies on Law Enforcement: A Case Study of National Police Service in County of Nairobi, Kenya https://journals.eanso.org/index.php/eajit/article/view/1722 <p>The study's research objectives included examining the effects of advanced surveillance technologies on law enforcement by NPS in Nairobi County and evaluating the ethical implications of using these technologies by the NPS. The social contract theory was used to understand the ethical implications of using advanced surveillance technologies in law enforcement. The research population includes the 4.7 residents of Nairobi County affected by the implementation of advanced surveillance technologies both overtly and covertly. The data was collected from a sample of 50 randomly sampled participants. The respondents were engaged using a qualitative questionnaire. Therefore, both qualitative and quantitative data were collected in the study. The study was analyzed using Statistical Package for Social Science (SPSS) and the thematic analysis method. The study concluded that the use of advanced surveillance technologies such as CCTV systems, facial recognition, license plate recognition, drones, forensic tools, and biometric systems in law enforcement and public safety are widely acknowledged. The ethical considerations regarding these technologies include data security, privacy, freedom of expression, transparency, and accountability. These, however, do not negate the fact that the technologies are necessary for enhancing public safety and emergency response. It is, therefore, imperative to establish clear guidelines and regulations for using advanced surveillance technologies in law enforcement</p> Benjamin Kisio, Ndikaru wa Teresia, PhD ##submission.copyrightStatement## http://creativecommons.org/licenses/by/4.0 https://journals.eanso.org/index.php/eajit/article/view/1722 Fri, 26 Jan 2024 16:20:20 +0000 Leveraging Technology for Government Service Delivery: Suggestions for Securing the eCitizen Services in Kenya https://journals.eanso.org/index.php/eajit/article/view/1757 <p>Governments across the world have increasingly embraced e-governance in the provision of public services. This development has significantly reduced bureaucracy, enhanced efficiency, reduced corruption and fundamentally transformed public service delivery. However, the adoption of these copyright technology solutions, owned by international corporations, non-state actors, mostly multinational corporations (MNCs), have equally exposed user governments, such as Kenya, to significant cyberspace security threats, service disruptions, exposed national security, interferences to national independence and loss of national sovereignty. These threats arise from the activities of offensive states, non-states and individuals taking advantage of the integrated and dependent internet connectivity networks. This paper is an extract from a study conducted on Information Security Threats to eCitizen Services in Kenya. The research presents findings on information security measures to secure eCitizen services in Kenya.&nbsp; The case study adopted a descriptive research design that targeted 12,000 respondents (users) from 51 Huduma Centres countrywide. Purposive sampling was applied to select Huduma Centres and 10% of respondents from each centre.&nbsp; About 1,200 questionnaires were issued with a return rate of 966 responses at 80%. The study applied both quantitative and qualitative techniques in analysis. The hypothesis was tested at a 5% significance level. The study identified 10 categories of security measures, six of which are discussed in this paper i.e., National capabilities, institutional policies, capacity development, backups, physical access, professional certification, frequent ICT audits, firewalls and management security reviews. The study recommends locally modelled technological solutions, mutually beneficial cyber security collaboration, frequent infrastructure security audits, user capacity training and restructuring national security organs to create cyberspace manning capabilities. These sectoral changes will enhance preventive, defensive and offensive capabilities against arising cyberspace threats from geopolitical, technological, economic and security competition and rivalries among global nations, non-state actors and malicious individuals</p> Lucy W. Maina, PhD, Godfred Ohndyl Otieno ##submission.copyrightStatement## http://creativecommons.org/licenses/by/4.0 https://journals.eanso.org/index.php/eajit/article/view/1757 Wed, 14 Feb 2024 19:28:13 +0000