Information Management Technology Project Topics and Materials (Page 2)

Showing 26 - 50 of 179

26) UTILISATION OF INTERNET BY STUDENTS OF THE FACULTY OF TECHNICAL EDUCATION AT THE UNIVERSITY OF EDUCATION, WINNEBA, KUMASI CAMPUS

ABSTRACT In this research, majority of the students use mobile phones (smart phones)/laptops thus  55(40.44%) with 53(38.97%) using their smart phones as the main device for accessing the  internet. The respondents also confirmed the internet has helped significantly improved their  academic work or studies generally with all 136(100%) saying... Continue Reading

27) CLASSIFICATION AND CHALLENGES OF CLOUD COMPUTING

Cloud Computing trend is rapidly increasing that has a technology link with Grid Computing, Utility Computing, Distributed Computing. Cloud service providers such as Amazon IBM, Google’s Application, Microsoft Azure etc., provide the users to developing applications in cloud environment and to access them from anywhere. Cloud sever provider’s... Continue Reading

28) THE IMPACT OF COMPUTER INSTITUTES IN BUILDING INFORMATION TECHNOLOGY SKILLS FOR STATE DEVELOPMENT: A CASE STUDY OF JOS NORTH LOCAL GOVERNMENT AREA OF PLATEAU STATE

ABSTRACT This study focused on the impact of computer institutes in building information technology skills for state development in Nigeria with reference to Jos North Local Government Area. The importance of computer institutes and information technology to nation building cannot be over emphasized giving by the fact that no nation can have any... Continue Reading
  • Type:Project
  • ID:IMT0150
  • Pages:116

29) CONDUENT PENSION ADMINISTRATION SYSTEM USER SATISFACTION; A CASE STUDY OF SIGMA PENSIONS LIMITED,ABUJA

ABSTRACT User satisfaction is one of the key research area of Information Technology (IT) particularly, Information System (IS). It is recognized by many researchers as a significant factor in determining IS success. In view of it competitive advantage, most business organizations nowadays focus on IS as a means of minimizing cost and maximizing... Continue Reading

30) DEVELOPMENT OF RADIO FREQUENCY IDENTIFICATION ARCHITECTURE FOR THE ADOPTION BY UTILITY COMPANIES: A CASE STUDY OF NAIROBI CITY WATER AND SEWERAGE COMPANY

ABSTRACT Accurate meter readings, timely and correct bills have become an important aspect of water metering systems. Additionally, anomalies such as leakage and bursts in water pipelines have significant consequences to the environment and lead to financial constraints to the water companies. Since monitoring leakages and bursts in the water... Continue Reading

31) ASSISTIVE TECHNOLOGY FOR STUDENTS WITH DYSLEXIA AT EROS GIRLS SCHOOL

ABSTRACT Assistive Technology for Children with Learning Disabilities (ATCLD) was developed in response to the language and arithmetic challenges faced by learners with dyslexia of Eros Girls School (EGS). This development followed from requirement elicitation and is intended for grades 5 - 7. Having discussed the above, Assistive Technology (AT)... Continue Reading

32) ENHANCED FORENSIC FRAMEWORK FOR ROOTED MOBILE PHONES AND THE IMPACT ON USER DATA INTEGRITY – A CASE OF ANDROID SMARTPHONES

The proliferation of Android smartphones has propagated negative societal issues that  resulted in successful arrests of the culprits, forensic examination and prosecution. Other  such cases have collapsed due to alteration of forensic evidence as a result of inadequate  forensic sound frameworks. The purpose of this study was to develop and... Continue Reading
  • Type:Project
  • ID:IMT0146
  • Pages:125

33) MONITORING LEARNER INTERACTION WITH MULTIMEDIA CONTENT USING NATURAL LANGUAGE PROCESSING

E-learning has enhanced the way students think and learn over time. Different studies show that  students appreciate facilities offered through the e-learning process. It has also proven to be a  very useful tool by bringing education closer to the learner, hence, learner-centred. A point to  note about e-learning is the ability to offer a wide... Continue Reading
  • Type:Project
  • ID:IMT0145
  • Pages:130

34) A STUDY OF DIGITAL SIGNATURE INFLUENCE ON THE SECURITY OF WORD PROCESSORS

Word processors are one of the most widely used software applications in our time and  have greatly contributed to the shift of paperless office. It has brought drastic changes in  the way business documents are created, edited and stored. However word processors  have over the years proven to be susceptible and have been successfully exploited... Continue Reading
  • Type:Project
  • ID:IMT0144
  • Pages:169

35) AN APPROACH FOR SUCCESSFUL INFORMATION SYSTEM IMPLEMENTATION: A CASE OF CORE BANKING SYSTEMS IN KENYA

The objective of this study was to establish the factors influencing successful  implementation of core banking system. The specific objectives for the study were:  To find out the processes involved in implementation of a Core Banking Systems (CBS),  to identify the factors influencing the successful implementation of CBS and to design a ... Continue Reading
  • Type:Project
  • ID:IMT0143
  • Pages:101

36) THE ADOPTION OF DATA VISUALIZATION TECHNIQUES IN HUMANITARIAN ORGANIZATIONS

The aim of the study was to investigate the influence of data visualization techniques  on the overall adoption of data visualizations in humanitarian organizations with  reference to Danish Refugee Council, UNOCHA, IOM, IFRC, and DDG. The study  established the influence of data visualization techniques, user’s requirements as well  as the... Continue Reading

37) DEVELOPING AN IPV6 ADOPTION MEASUREMENT MODEL: A CASE OF SELECTED INTERNET SERVICE PROVIDERS IN KENYA

With the growth of the Internet and the increase in number of online devices, IPv4 address  space approaches exhaustion. This has led to the deployment of IPv6. However, IPv6 has not  been widely adopted, particularly in Kenya. According to Akamai (2016) IPv6 has an  adoption rate of 0.02% in Kenya despite recent studies showing that adoption... Continue Reading

38) MULTI-TIERED SECURITY ARCHITECTURE FOR INFORMATION INFRASTRUCTURE PROTECTION IN SELECTED COMMERCIAL BANKS IN KENYA.

Information technology evolution and the spread of internet connectivity have enabled  globalization which allows communication and transaction of businesses across different  countries. To ensure information infrastructure protection, understanding how the organizational,  individual and technical aspects all together affect the outcome in... Continue Reading

39) A LOW COST SYSTEM FOR LOGON ANOMALY DETECTION BASED ON TIME AND LOCATION OF USERS

The purpose of this research was to develop a low cost system for identifying logon anomalies  based on the time a user provides login credentials and also the physical location of the  workstation on the LAN. The specific objectives of the project were (i) to evaluate how logon  anomalies based on physical locations have been addressed in the... Continue Reading
  • Type:Project
  • ID:IMT0139
  • Pages:103

40) AN INVESTIGATION OF THE FACTORS THAT INFLUENCE THE ADOPTION OF SECURE CRYPTOGRAPHIC QR IN COUNTERFEIT GOODS AUTHENTICATION: A CASE OF NAIROBI

The purpose of this study was to investigate the factors influencing adoption of secure  cryptographic QR application by focusing on alcohol vendors who engage in the business  of selling alcoholic beverages in Nairobi and its environs. This research was based on  four specific objectives which were: to study the influence of cryptographic... Continue Reading
  • Type:Project
  • ID:IMT0138
  • Pages:131

41) ACQUISITION OF CLOUD DATA REMNANTS IN ANDROID SMART PHONES

Smart phones are powerful minicomputers characterized by high performance, large memory  capacity and enhanced applications that enable various ways of communication. They are  widely used for other purposes besides making phone calls, for instance browsing the  internet, reading and responding to emails, road navigation, editing documents,... Continue Reading

42) CRIME REPORTING AND INTELLIGENCE SYSTEM: CASE OF BURUBURU POLICE DIVISION-NAIROBI

Security problems have become a major concern in most urban settlements across the globe.  The use of technology can be incorporated into the security systems to enhance operational  measures that have been deployed. The aim of this study was to examine the challenges  stakeholders face in crime reporting and develop a mobile-based system that... Continue Reading
  • Type:Project
  • ID:IMT0136
  • Pages:130

43) AN INVESTIGATION ON THE TECHNO-HUMAN INFLUENCE ON EXAMINATION INFORMATION SECURITY MANAGEMENT A CASE OF THREE KENYAN UNIVERSITIES

The use of and reliance on information systems for business has been on the rise  especially in recent years. This has had a serious impact on the security of business  information. Previous studies have identified two areas that must be considered when  creating a secure information system: technology and human compliance to policies.  Many... Continue Reading

44) A WEB-BASED MODEL TO DETERMINE CYBERSECURITY READINESS INDEX FOR HOSPITALS TOWARDS ADOPTION OF E-HEALTH

The main goal of healthcare sector worldwide is to provide quality and efficient  health services to citizens. As the threat landscape on healthcare continues to escalate,  many hospitals still lag behind in terms of protecting its critical infrastructure and  electronic protected health information (ePHI).This research provided solution by ... Continue Reading
  • Type:Project
  • ID:IMT0134
  • Pages:126

45) SMARTBIN: EFFICIENT WASTE HANDLING BASED ON THE INTERNET OF THINGS (IOT)

ABSTRACT In our present society today, it is clearly seen that garbage cans are being placed in open environments because it needs to be accessed by the public. It can be observed that those garbage cans usually get filled up and overflow and litter the environment. Patil (2015) claims that this uncontrolled littering can lead to a gradual... Continue Reading

46) A SYSTEM DYNAMICS STUDY OF MTN CUSTOMER SERVICE QUEUING SYSTEM

ABSTRACT Customer service is the most important aspect of every business that builds its processes on the basis of customers going through the queue before receiving any service from the organization. These businesses become ineffective and inefficient if the queues are not moving well or the queues are not fluid. This research was inspired by the... Continue Reading

47) ADOPTION OF MOBILE TECHNOLOGY FOR KNOWLEDGE MANAGEMENT IN MANUFACTURING FIRMS: A CASE STUDY OF MAHASHAKTI KENYA LIMITED, ATHI RIVER

Knowledge management is a field with a lot of potential that can benefit individuals as well  as different types of organizations. Despite this fact, most organizations in Kenya have  focused on knowledge storage, but have not adopted sharing of the stored knowledge. This  study examined the adoption of mobile technology for knowledge... Continue Reading
  • Type:Project
  • ID:IMT0131
  • Pages:104

48) DESIGNING AN IOT TRAFFIC MANAGEMENT FRAMEWORK IN KENYA: A CASE OF NAIROBI CITY COUNTY

Internet of Things (IoT) is a system of interrelated computing devices, mechanical and digital  machines, objects, animals or people that are provided with unique identifiers (UIDs) and the  ability to transfer data over a network without requiring human-to-human or human-to-computer  interaction. Nairobi city residents encounter a myriad of... Continue Reading

49) ASSESSMENT OF TECHNOLOGICAL RISKS FACING MOBILE BANKING: A CASE OF COMMERCIAL BANKS IN KENYA

Mobile banking technology has been widely adopted amongst all the commercial banks in Kenya. Currently Kenyan banks lose millions of shillings by means of online theft through mobile banking and other platforms. This study therefore intended to address the issues associated with mobile banking and was directed by the following objectives: to... Continue Reading
  • Type:Project
  • ID:IMT0129
  • Pages:111

50) COURSE CATALOGUE HANDLING SYSTEM (CCHS)

ABSTRACT In an academic setting, it is important for students to be well informed about their academic status and progress regularly. All first year students are provided with school catalogs which hold information about their majors and the courses required by them to pass for them to obtain their particular degrees. Students are given these... Continue Reading
Need help with your Information Management Technology Project Topic? Click here to request assistnce or reach us on + 234 813 0686 6500
whatsappWhatsApp Us