International Journal of Technology and Systems最新文献

筛选
英文 中文
Exploratory Data Analytics of Air Pollutant Data for Air Quality Management Application 空气质量管理应用中的空气污染物数据探索性数据分析
International Journal of Technology and Systems Pub Date : 2024-07-22 DOI: 10.47604/ijts.2790
Oluwatomisin Ajayi
{"title":"Exploratory Data Analytics of Air Pollutant Data for Air Quality Management Application","authors":"Oluwatomisin Ajayi","doi":"10.47604/ijts.2790","DOIUrl":"https://doi.org/10.47604/ijts.2790","url":null,"abstract":"Purpose: With escalating concerns over the detrimental impacts of air pollution on public health and the environment, this study embarks on a comprehensive exploration of air quality dynamics, focusing on Ogun state metropolis of Nigeria. The primary objective is to contribute to the burgeoning field of air quality management by harnessing the power of data analytics, exploratory data analysis, and advanced python programming libraries. The study seeks to address critical questions regarding the current state of air quality, major sources of pollution, government interventions, and individual contributions to better air quality. \u0000Methodology: The research employs Exploratory Data Analysis to unveil intrinsic patterns and trends within historical air quality datasets extracted from IoT devices located across Ogun state. This initial phase aims to discern key statistical parameters, including mean concentrations, variations, and correlations among various pollutants. Subsequently, the study employs Topic Modeling to extract latent themes and sentiments from qualitative data, specifically focusing on public opinions gathered through digital surveys. Resulting topics provide insights into public perceptions regarding air quality, pollution sources, and the efficacy of governmental interventions. \u0000Findings: Experimental result is revealing of the diversity of the dataset. The EDA returned a mean Particulate Matter concentration of approximately 12.65 µg/m³, while the mean Nitric Oxide concentration is approximately 13.56 µg/m³. Notable correlations include a strong positive correlation between PM2.5 and PM10 (0.69), indicating a substantial association between fine and coarse particulate matter. Additionally, there is a noteworthy positive correlation between NO and Nox (0.97), suggesting a high degree of correlation between nitric oxide and nitrogen oxide levels. However, negative correlations are observed, such as the substantial negative correlation between RH (relative humidity) and PM2.5 (-0.46), implying an inverse relationship between humidity and fine particulate matter levels. The study develops an innovative air quality management application. \u0000Unique Contribution to Theory, Practice and Policy: The application aims to empower both the public and policymakers with actionable insights, fostering informed decision-making and collaborative efforts towards improving air quality. It is highly recommended that industry experts should continue to imbibe ethical standards in data acquisition and deployment practices. ","PeriodicalId":519062,"journal":{"name":"International Journal of Technology and Systems","volume":"52 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141814950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Strengthening Fintech Security in Uganda: An Analysis of Insider Threats and Effective Risk Management Strategies 加强乌干达的金融科技安全:分析内部威胁和有效的风险管理战略
International Journal of Technology and Systems Pub Date : 2024-07-16 DOI: 10.47604/ijts.2783
Deborah Mackenzie, Sam Njunwamukama
{"title":"Strengthening Fintech Security in Uganda: An Analysis of Insider Threats and Effective Risk Management Strategies","authors":"Deborah Mackenzie, Sam Njunwamukama","doi":"10.47604/ijts.2783","DOIUrl":"https://doi.org/10.47604/ijts.2783","url":null,"abstract":"Purpose: The purpose of this study is to analyze security policies and risk management practices for reducing insider threats in the Fintech industry in Uganda. The study aims to classify and identify insider threats, examine how they relate to risk management procedures, and offer practical recommendations for improving Fintech companies’ security measures. \u0000Methodology: The study adopted a descriptive research design, focusing on diverse respondents across various sectors. Data was collected through surveys from 25 respondents, including IT security specialists, accountants, finance officers, and other relevant roles. The sectors represented included Banking and Finance (52%), Security (12%), Information Technology and Telecommunications (8% each), and others such as Agriculture, Civil Society, and Public Service (each 4%). The study employed both qualitative and quantitative data collection methods, with secondary data reviewed from existing literature and case studies. Statistical analysis was conducted using SPSS to interpret the data and identify trends in insider threat occurrences and risk management practices. \u0000Findings: The study revealed that insider threats in Uganda's Fintech sector can manifest in both physical and cyber forms. The predominant risk management practices identified include proactive measures such as robust security policies, access controls utilized by 88% of respondents, security awareness training by 80%, and continuous monitoring by 68%. Incident response and reporting procedures were also critical, ensuring that breaches are swiftly addressed to minimize impact. There was a significant positive correlation (r = .65; p < 0.05) between the frequency of past insider attacks and the regularity of risk assessments, underscoring the importance of regular evaluations in mitigating risks. \u0000Unique Contribution to Theory, Practice and Policy: The study contributes to the theoretical understanding of how local cultural attitudes and regulatory frameworks impact effectiveness of risk management strategies, providing insights that can inform RMF adaptations in similar contexts. For practitioners, it recommends development and implementation of robust security policies, employee training programs, and advanced monitoring systems. Policy-makers are advised to support regulatory frameworks that mandate regular risk assessments and the adoption of best Fintech practices.","PeriodicalId":519062,"journal":{"name":"International Journal of Technology and Systems","volume":"7 9","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141640642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Framework for Mitigating Phishing E-mail in the Kenyan Banking Industry Using Artificial Intelligence (AI) 利用人工智能(AI)减少肯尼亚银行业网络钓鱼电子邮件的框架
International Journal of Technology and Systems Pub Date : 2024-07-15 DOI: 10.47604/ijts.2781
Asiema Mwavali
{"title":"Framework for Mitigating Phishing E-mail in the Kenyan Banking Industry Using Artificial Intelligence (AI)","authors":"Asiema Mwavali","doi":"10.47604/ijts.2781","DOIUrl":"https://doi.org/10.47604/ijts.2781","url":null,"abstract":"Purpose: Phishing is a significant cybercrime threat that affects individuals and organizations globally, including the banking industry in Kenya. The sophistication of phishing attacks continues to increase, and it is increasingly challenging traditional security measures to mitigate these threats. The purpose of this thesis is to build a framework for mitigating phishing e-mail attacks in the banking industry in Kenya using artificial intelligence. Phishing emails are among the most common techniques of cyber-attacks utilized by assailants to gain unauthorized access to sensitive information such as financial details, personal information, and login credentials. These attacks can have devastating effects on the victims, leading to financial loss, reputation damage, and even identity theft. \u0000Methodology: The framework development consists of four main stages: data collection, data preprocessing, model training, and deployment. In the data collection stage, a dataset of phishing and non-phishing emails is gathered from various sources such as public databases, dark web forums, and bank employees mail. In the data preprocessing stage, the collected data is cleaned, preprocessed, and labeled. In the model training stage, machine learning algorithms and NLP techniques is used to develop a robust phishing and non-phishing emails detection model. In the deployment stage, the model is integrated into the bank's email system to detect and block phishing emails in real-time. The framework is then evaluated using a dataset of phishing and non-phishing e-mails collected from the banking industry in Kenya. Various metrics such as accuracy, precision, recall, and F1-score are used to evaluate the framework. The framework is able to detect new phishing e-mails that were not previously included in the dataset, demonstrating its ability to adapt to new threats. \u0000Findings: The framework is based on a hybrid approach that combines machine learning algorithms, natural language processing (NLP) techniques, and human expertise that identify and prevent phishing emails from reaching their targets. The four main components of this framework include e-mail filtering, feature extraction, classification, and response. The e-mail filtering component uses several algorithms to identify and filter suspicious e-mails. The feature extraction component analyzes the content of the e-mail and extracts relevant features to help classify the e-mail as either legitimate or phishing. The classification component uses machine-learning algorithms to classify the e-mail as either legitimate or phishing. Finally, the response component takes appropriate action based on the classification results. \u0000Unique Contribution to Theory, Practice and Policy: The framework provides an effective way to identify and mitigate phishing e-mail attacks, reducing the risk of data breaches and financial losses.","PeriodicalId":519062,"journal":{"name":"International Journal of Technology and Systems","volume":"23 10","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141646516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing Institutional Elections: A Case for Electronic Voting Systems at Kenya Institute of Mass Communication (KIMC) 加强机构选举:肯尼亚大众传媒学院(KIMC)电子投票系统案例
International Journal of Technology and Systems Pub Date : 2024-07-08 DOI: 10.47604/ijts.2774
Asiema Mwavali
{"title":"Enhancing Institutional Elections: A Case for Electronic Voting Systems at Kenya Institute of Mass Communication (KIMC)","authors":"Asiema Mwavali","doi":"10.47604/ijts.2774","DOIUrl":"https://doi.org/10.47604/ijts.2774","url":null,"abstract":"Purpose: The purpose of this study is to examine the possible advantages of establishing an EVS at the Kenya Institute of Mass Communication (KIMC).  With an emphasis on increased voter trust, lower expenses, and increased efficiency, the research seeks to assess the viability and benefits of implementing an EVS for KIMC elections. \u0000Methodology: Using a case study methodology, this study will examine the material that has already been written about EVSs and interview important KIMC stakeholders to learn about their present voting procedures and difficulties. \u0000Findings: The system of voting ought to be fast in terms of casting votes as well as tallying to eliminate long queues and anxiety of voters waiting for result. System voting is more preferred choice as opposed to the use of papers and boxes. Ballots are more expensive since they are bought every time election is conducted. System voting is more comfortable and done at ease with fewer resources in terms of money and time. On other hand manual system is inefficient, insecure, incorrect and expensive. A need therefore arises to develop System voting to manage voting process efficiently and effectively.  Electronic voting systems, or EVSs, present a strong substitute for conventional paper-based ballots, guaranteeing improved electoral efficiency, security, and transparency. \u0000Unique Contribution to Theory, Practice and Policy: This research will contribute to the ongoing discussion on the role of EVSs in promoting democratic processes within institutions. The findings will provide valuable insights for KIMC administrators in making informed decisions regarding the adoption and implementation of an EVS. This study can inform policy discussions on the broader application of EVSs in Kenyan institutions.","PeriodicalId":519062,"journal":{"name":"International Journal of Technology and Systems","volume":"114 41","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141666593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information Systems and Performance of Insurance Firms in Nairobi County, Kenya 肯尼亚内罗毕县保险公司的信息系统与绩效
International Journal of Technology and Systems Pub Date : 2024-06-11 DOI: 10.47604/ijts.2658
Ngari Wanjohi, Stephen Waithaka
{"title":"Information Systems and Performance of Insurance Firms in Nairobi County, Kenya","authors":"Ngari Wanjohi, Stephen Waithaka","doi":"10.47604/ijts.2658","DOIUrl":"https://doi.org/10.47604/ijts.2658","url":null,"abstract":"Purpose: The goal of the study was to ascertain how information systems influenced the insurance industry's performance in Nairobi County, Kenya. \u0000Methodology: This study employed a descriptive research design. The respondents were drawn from all 58 insurance firms in Kenya as listed by Insurance Regulatory Authority (2023). The study sample comprised of five senior management officer from each of the target population of 58 insurance companies in Kenya. Stratified sampling procedure was applied to select the subjects of study based on geographical location in Nairobi County. Data collection was done using structured questionnaires. The questionnaire had both open-ended and closed-ended questions. Descriptive and inferential statistics were employed in the study to analyze the data. The coding and analysis were performed using SPSS version 21, and the results were shown as tables. \u0000Findings: The study concludes that technical factors have a positive and significant impact on Nairobi County insurance businesses' performance. The study discovered that the performance of insurance companies in Nairobi County is influenced by information system compatibility, confidentiality, ease of use, and reliability. the study comes to the conclusion that Nairobi County's environmental features significantly and favorably affect the performance of insurance companies. The study found that the performance of insurance companies in Nairobi County is influenced by competition, industry size, and pressure from suppliers and customers. Additionally, the study concludes that organizational factors have a positive and significant impact on Nairobi County insurance companies' performance. The study discovered that supplier and consumer pressure, industry size, and competition all had an impact on Nairobi County's insurance companies' performance. Resources factors encompassing availability of financial, human, and technological resources were established as the most influential component of the information systems with regard to performance of the insurance firms. \u0000Unique Contribution to Theory, Practice and Policy: The study was ancored on Technology Acceptance Model (TAM). The study also recommends that management should allocate financial resources strategically, focusing on areas that directly contribute to business growth, such as marketing, technology upgrades, and talent acquisition. In addition, management should ensure efficient use of financial, human and technology resources by closely monitoring expenses, avoiding unnecessary costs, and seeking opportunities for cost-saving measures.","PeriodicalId":519062,"journal":{"name":"International Journal of Technology and Systems","volume":"123 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141360610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Factors Influencing Utilization of Biometrics in Private Banks in Mombasa County 影响蒙巴萨县私营银行使用生物识别技术的因素
International Journal of Technology and Systems Pub Date : 2024-05-14 DOI: 10.47604/ijts.2556
Hussein Hussein, Godfrey Makau
{"title":"Factors Influencing Utilization of Biometrics in Private Banks in Mombasa County","authors":"Hussein Hussein, Godfrey Makau","doi":"10.47604/ijts.2556","DOIUrl":"https://doi.org/10.47604/ijts.2556","url":null,"abstract":"Purpose: The overall goal of the research was to analyze factors influencing utilization of biometrics in the private banks in Mombasa County. \u0000Methodology: The study adopted a descriptive research design because it provided a clear outcome and the characteristics associated with it at a specific point in time. The target population for the study was 120 respondents from 20 private registered banks in Mombasa County. The study adopted stratified sampling method to select the respondents from the population. The study obtained primary data through a structured questionnaire. Responses in the questionnaires were tabulated, coded and processed using a computer Statistical Package for Social Science program. The relationship between the dependent variable and the independent variables were tested using multiple linear regression models. The data was analyzed and conclusions drawn. Descriptive and inferential statistics were used whereby the data was presented through tables \u0000Findings: The findings of the study showed that legal systems holds a positive linear relationship (r=0.412; p<0.01) and significant association with utilization of biometrics in private banks. Moreover, the results indicates a p-value of 0.003 which is less than 0.01 implying that the association is highly significant. Based on the research and analysis, the study concludes that legal systems, technology maturity, demographic factors, and staff competency have a significant effect on utilization of biometrics in private banks within Mombasa County. \u0000Unique Contribution to Theory, Practice and Policy: The research was anchored on technology acceptance model. To ensure efficient utilization of biometrics within private banks in Mombasa County, it is recommended that organizations follow established legislation. Subsequently, banks should update their staff on legislation surrounding biometrics use and security.","PeriodicalId":519062,"journal":{"name":"International Journal of Technology and Systems","volume":"2 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140981578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing Software Quality through Early-Phase of Software Verification and Validation Techniques 通过早期阶段的软件验证和确认技术提高软件质量
International Journal of Technology and Systems Pub Date : 2024-01-19 DOI: 10.47604/ijts.2268
Dr Magori Alphonce
{"title":"Enhancing Software Quality through Early-Phase of Software Verification and Validation Techniques","authors":"Dr Magori Alphonce","doi":"10.47604/ijts.2268","DOIUrl":"https://doi.org/10.47604/ijts.2268","url":null,"abstract":"Purpose: The core objectives of this conducted research were threefold: first, to assess whether early-phase verification and validation (V&V)techniques, encompassing software design review, code review, and inspection, significantly contribute to defect prevention throughout the software development process; second, to evaluate the impact of these techniques on the efficiency of software development in terms of time, cost, and resource allocation; and third, to conduct a comprehensive comparative analysis between early-phase verification and validation (V&V)techniques and traditional post-development testing regarding their effectiveness in defect prevention and software quality improvement. \u0000Methodology: Employing an experimental approach, this study conducted case studies within Tanzanian software development organizations. Data were meticulously gathered through surveys and interviews involving software professionals. Both quantitative and qualitative data were systematically analyzed to ensure data reliability and ethical considerations. \u0000Findings: The research findings indicate that early-phase verification and validation (V&V) techniques shine as powerful tools for defect prevention, leading to a substantial reduction in defect counts and elevating software quality metrics, such as reliability and user satisfaction. Notably, these techniques demonstrated a favorable impact on software development efficiency by shortening development cycles and curtailing costs. When compared to traditional post-development testing, early-phase verification and validation (V&V) techniques consistently outperformed in the realm of defect prevention and software quality enhancement. \u0000Unique Contribution to Theory, Practice and Policy: The study's outcomes underscore the transformative potential of early-phase verification &validation techniques, urging the software development industry to pivot from defect detection to defect prevention. The insights garnered here offer practical guidance for organizations aiming to streamline their software development processes, economize costs, and deliver top-notch software products that closely align with user expectations. While conducted in a Tanzanian context, these findings reverberate across the global software development landscape, underscoring the universal relevance of early-phase verification and validation (V&V) techniques as pivotal enablers of software quality assurance and operational efficiency.","PeriodicalId":519062,"journal":{"name":"International Journal of Technology and Systems","volume":"449 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140531236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信