Samuel Mbuguah

Samuel Mbuguah
Kibabii University ,Kenya, Bungoma · Information Technology

Doctor of Philosophy
I currently the Director Planning and organization Performance at Kibabii University and Associate Professor of IT

About

23
Publications
5,012
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
6
Citations
Introduction
Interested in software architectures and associated metrics
Additional affiliations
August 2013 - present
Kibabii University College
Position
  • Professor (Associate)
Description
  • As an associate proffessor i supervise and teach both postgraduate and undergraduate students. I am also involved in the learning of of Directorate of ICT. Whose mandate is automate services in the University.
Education
September 2010 - December 2013
Masinde Muliro University of Science and Technology
Field of study
  • Information Technology

Publications

Publications (23)
Article
The beginning of information technology has led to a burst of data in every sector of operation. Handling huge volume of data to mine useful information to support decision making is one of the current sources of competitive advantage for organizations. However, preceding research literature on predictive analytics has attributed a lack of direct c...
Article
Full-text available
Computer based systems are socio-technical systems in nature. The security of the system depends both on technical aspect and also social aspect. The social aspect refers to people in contact with system commonly referred to as wetware. To attack the system you may consider to target the technical or wetware. Social engineering is based on exploiti...
Article
Full-text available
The webometrics user ranking analysis model was developed and validated. The need for the model arose as directorates of ICT in Kenyan Universities were assigned the challenge of improving their university's webo ranking. Webo ranking is the preferred method of the universities to showcase their niche and what they do to the global community. There...
Article
Full-text available
The evolution of object-oriented, scripting and high-level languages has seen the size and complexity of computer programs today. The software industry has, in response, developed software architectures that have stood out as an overarching for designing complicated and enormous software systems. This paper examines how modularity applies to softwa...
Article
Full-text available
21st century-learning approach is characterized by self-directedness and the ability to learn anytime, anywhere. Self-directed learning heavily depends on Technology to be effective. Most universities were used to conventional face-to-face learning, but uncertainties like the covid-19 pandemic have challenged this teaching and learning mode, thus p...
Article
Full-text available
One the mitigating measures adopted against the spread of COVID-19 was closure of business, suspension of face to face learning in institution of learning in Kenya and cancellation of international flights worldwide. There was also enforced locked down within highly infected areas. To survive educational institutions adopted mainly online/digital l...
Article
Full-text available
The emergence of digital computers at the tail end of the last century allowed for the evolution of computer languages from low-level languages of the 1940s to the object-oriented, scripting high-level languages of today. This evolution has, in effect, seen the size and complexity of computer programs increase by a large factor. The software indust...
Article
Full-text available
The onset of COVID-19 Pandemic forced the closure of institutions of higher learning to curb the spread of the virus. This led to new scenarios that required education institutions to rapidly adopt. The Solution was mainly online/digital learning. This study sought to investigate the status of ICT infrastructure a key enabler of online/ digital lea...
Article
Full-text available
This article explores the Model-Driven Architecture (MDA) approach concerning software modelling during systems development. The evolution of MDA is changing software development into a simpler process with less turnaround time, faster deliverability and greater innovation. MDA facilitates building pervasive software systems from high-level models...
Article
Full-text available
Covid 19 pandemic has disrupted education worldwide, affecting over 94% of the student population. One strategy to ensure seamless learning is the adoption of self-directed learning and personal computing devices. A survey was carried out in four public Universities in Kenya to assess the computing devices used by learners for self-directed learnin...
Article
Full-text available
Computerization of county government daily activities enables faster and better services to their clients. The integration of Information and Communications Technology by the CG into their systems has led to new advancements in technology. The adoption of ICT into the Kenya's County Governments has contributed to faster growth and output in better...
Book
Full-text available
He has co-authored four University level text books, three book chapters and two teaching modules. He has published over fifty-six papers in peer reviewed journals. He is an external examiner in four Kenyan Universities and an assessor peer reviewer for both Commission of University Education (Kenya) and the Inter-University Council for East Africa...
Article
The paper sets posits that Universities are ranked globally based on their web presence. The web crawler accesses the universities websites to collect data on presence, visibility, openness, and excellence. These data is then used to rank the Universities based on set criteria. The paper identifies design issues that may affect website ranking. The...
Chapter
Full-text available
Most institution of higher learning are implementing enterprise resource planning (ERP) in automating various activities. The architecture of most of the ERP is based on the service-oriented architecture (SOA) where each module can be called as service. In most of the contracts signed between the vendor and the university, payment is tied to the le...
Article
Full-text available
Globalization, mobile computing and changes in consumer behaviour are aspects brought about by the new developments in IT that are changing the way business organizations conduct their business. Branding in travel and tourism industry is no exception and the practitioners must consider social media in their online branding strategies. This paper ex...
Article
Full-text available
Most institution of higher learning are implementing and Enterprise Resource planning (ERP) in automating various activities. The architecture of most of the ERP is based on the Service Oriented Architecture (SOA) where each module can be called as service. In most of the contract signed between the vendor and the university, payment is tied to the...
Article
Full-text available
Globally, ICT is regarded as a driver and enabler; thus, organisations which have integrated ICT in their systems have had immense growth and output. The adoption of ICT into the Kenyan County Governments, therefore, promises equal growth and output. These benefits notwithstanding, integration of ICT systems into County Governments is faced with a...
Article
Full-text available
Globally, ICT is regarded as a driver and enabler; thus, organisations which have integrated ICT in their systems have had immense growth and output. The adoption of ICT into the Kenyan County Governments, therefore, promises equal growth and output. These benefits notwithstanding, integration of ICT systems into County Governments is faced with a...
Article
Full-text available
Lifecycle Management approaches promise more systematic and efficient ways to support the development and management of complex products. The concept of Application Lifecycle Management (ALM) indicates the coordination of activities and the management of artifacts during the software product"s lifecycle. Most of the currently available unified ALM...
Article
Full-text available
For more than two decades children’s use of multimedia was restricted to watching television and listening to music. Although some parents complained about children being addicted to listening to music the idea that children could be addicted to television was a real concern to most parents. Nowadays parents not only need to be concerned about how...
Article
Full-text available
Kenya has over six million active mobile subscribers who may at some point want to replace or get rid of old mobile phones. A big number of the mobile phones were recently switched off for not being genuine without a prober mechanism being put in place for the disposal. If every affected individual or otherwise disposed off phones by throwing it aw...
Article
Full-text available
Though ICT is contributing to the economy associated with innovations, inventions and rapid development in almost all aspects of human life, is responsible for climatic degradation. The rapid increase of ICT usage means more costs of doing business, energy consumption, and more environmental challenges. The rapid changing technology reaching Kenya...

Network

Cited By

Projects

Projects (3)
Archived project
Over the past several years, experts and policymakers have expressed increasing concerns about protecting ICT systems from cyberattacks, deliberate attempts by unauthorized persons to access ICT systems, usually with the goal of theft, disruption, damage, or other unlawful actions. Many experts expect the number and severity of cyberattacks to increase over the next several years. The act of protecting ICT systems and their contents has come to be known as cybersecurity. The advancement of internet connectivity has brought about opportunities which have transformed and increased business activities, this has increased the speed and lowered the cost of transacting. The main aim of this research will be to develop an assessment framework for cyber security in county government ministries in Kenya , establish the state of cybersecurity in county government ministries in Kenya , identify the Effects of cybercrime in county government ministries in Kenya , determine the Major causes of cyber security attacks in county government ministries in Kenya , develop a cybersecurity assessment framework for county government ministries , and finally to validate the developed cybersecurity assessment framework . The research will adopt a multi-case study within the county government of Kakamega this will be used as the main case study. Convenient and purposive sampling will be used where questioners, interviews schedule and document analysis will also be reviewed. Data analysis will be done using SPSS where descriptive statistics will be used to present the state of cybersecurity and major causes of the threats .Pearson’s correlation will be used to present the state of cyber security this will be considered the development of the assessment framework.