Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
joyce gikandi

    joyce gikandi

    Purpose: The purpose of the study was to find out the effect of equality rule on women empowerment in political parties in Nairobi, Kenya.Methodology: The study used a descriptive survey research design. The study used primary data which... more
    Purpose: The purpose of the study was to find out the effect of equality rule on women empowerment in political parties in Nairobi, Kenya.Methodology: The study used a descriptive survey research design. The study used primary data which was largely be quantitative and qualitative in nature. The data was analyzed using content analysis. Qualitative data was presented in continuous prose form. On the other hand after quantitative data is obtained, it was prepared in readiness for analysis by editing, handling blank responses, coding, categorizing and keyed into statistical package for social sciences (SPSS) computer software for analysis. The statistics generated included descriptive statistics. The particular descriptive statistics included frequencies and percentages while the particular inferential statistics included correlation analysis and regression. Correlation analysis was used to establish the association between the variables. A multiple linear regression model was used to...
    The drive of this study was to assess the influence of performance contracting on teachers’ professional productivity in primary schools in Kilifi North Sub-County. The study was guided by four theories, goal setting, management,... more
    The drive of this study was to assess the influence of performance contracting on teachers’ professional productivity in primary schools in Kilifi North Sub-County. The study was guided by four theories, goal setting, management, expectancy and Two- factor. The goal-setting theory was proposed by John Locke [1]. The study used a mixed-methods approach to research in order to produce both quantitative and qualitative data while also reducing bias. A triangulation design was used to permit the complementarity of both descriptive and numerical data. Using the Krejcie and Morgan Table, a sample size of 181 was achieved out of the intended population of 346. After descriptive and inferential statistics were used to analyse the data, frequency tables, percentages, charts, and graphs were used to illustrate the results. The study adhered rigorously to research ethics. The findings showed that PC settings had a substantial impact on instructors' professional output. The study suggested ...
    Researchers and educators continue to seek a better understanding on how rapidly evolving mobile technologies can be productively integrated into today's classroom. This chapter examines how social media technologies can be used by... more
    Researchers and educators continue to seek a better understanding on how rapidly evolving mobile technologies can be productively integrated into today's classroom. This chapter examines how social media technologies can be used by both students and faculty to enhance interactivity in blended and online settings. The chapter advances the viewpoint that grounding the use of social media on congruent theoretical perspectives will harness the power of social media as a productive e-learning tool. The chapter offers insights on effective use of social media as a strategy for promoting interactivity and collaborative engagement in blended and online environments.
    This study sought to assess the extent to which social media has been misused in the context of electoral processes to escalate violence and how social injustices among vulnerable youth in urban communities have further aggravated the... more
    This study sought to assess the extent to which social media has been misused in the context of electoral processes to escalate violence and how social injustices among vulnerable youth in urban communities have further aggravated the violence. The study attempts to conceptualize and contextualize the phenomenon of electoral violence within emerging democracies in the digital era. This research is based on transformative social protection theoretical framework. Descriptive correlational design was adopted to assess the phenomena of electoral violence and its consequences in Kenya, among poor urban youth living in informal settlements in Nairobi County. The findings reveal a strong positive relationship between perpetual electoral violence, poverty and social injustices among the vulnerable communities. The strategies for mitigating misuse of social media among youth to escalate social unrest and electoral violence are elucidated including redesigning civic education and participator...
    Volume 4, Issue 6, November – December 2015 Page 17 Abstract In the current digital society, it is increasingly becoming important for any aspect of human endeavor to integrate Information communication technologies(ICT) for... more
    Volume 4, Issue 6, November – December 2015 Page 17 Abstract In the current digital society, it is increasingly becoming important for any aspect of human endeavor to integrate Information communication technologies(ICT) for enhancedproductivity. ICT adoption and integration in education is one of the key human endeavors globally. Emphasis on teacher centered teaching could be changed to student centered with the advent of adopting ICT in schoolscreating an interactive and interesting environment for learning. Change of teaching methodologies has been facilitated by adoption of ICT hence an interaction between learners and Teachers in education. Despite the various studies conducted on ICT adoption,integration and implementation, Kenya is still far away from realizing it. This calls into the question as to how ICTtechnological factors influences the adoption of ICTin schools. To fill this gap this study analyzesICTtechnological factors as the key factor influencing adoption of ICTin...
    As Information Communication Technology (ICT) has evolved, the overall physical size of computing devices has gradually decreased due to advances in the microchip technology; computing processing power doubles every few months and at the... more
    As Information Communication Technology (ICT) has evolved, the overall physical size of computing devices has gradually decreased due to advances in the microchip technology; computing processing power doubles every few months and at the same time the cost of the computing devices has continuously been going down. What this means is that today, the general citizenly in every economy have every powerful devices within their hands for personal use. With the growth in internet and interconnectivity between devices, all these devices already have access to the internet where they can be able access vast amounts of information resources and organizational systems (school included). With the global shift to internet based systems, this combines to add immense power to a knowledge/information based societies. Schools and other learning institutions are at the verge of being transformed by the growth of this digital content/transformation. Students from their early years of learning have access to these powerful devices and most of them now how to operate them. Learning institutions on the other hand face the challenge of acquiring computing devices especially with the drive towards one device a student, driven by the rising financial needs to sustain education hence limited budgets to acquire and maintain computing devices. Bring your own device (BYOD) offers an opportunity for learning institutions to exploit the power of the devices that students and staff have to drive the delivery of digital content. However, this is not easy as it may sound even thou beneficial. Several issues have arisen as regards BYOD adoption in schools and addressing them would be critical for its success. This paper looks at these issues, and provides an approach on how each of these issues can be handled to provide an inherent framework for BYOD adoption.
    E-learning is Learning that is supported by use of electronic technology aided by computers. Emphasis on teacher centred teaching could be changed to student centred with the emergence of using E-learning technologies in schools thus... more
    E-learning is Learning that is supported by use of electronic technology aided by computers. Emphasis on teacher centred teaching could be changed to student centred with the emergence of using E-learning technologies in schools thus creating an environment that is interactive and interesting for learning. A pedagogical shift has been facilitated by E-learning entailing an interaction between learners and Teachers in education. Despite the various studies conducted on E-learning, adoption of E-learning technologies in public secondary schools in Kenya is far from being realized. This begs into the question as to how ICT infrastructural factors influences the adoption of E-learning in secondary schools. This study filled this gap by analyzing ICT infrastructure as the key factor influencing E-learning adoption in public secondary schools in Kenya. A broad understanding of this factor is important to the policy makers who can embrace it to enhance the adoption of E-learning and suppre...
    There is a rise in unprecedented political infractions, disturbances and electoral violence in Africa with the youth playing a significant role. Thus, the study broadly investigated social media use and electoral violence among the youth... more
    There is a rise in unprecedented political infractions, disturbances and electoral violence in Africa with the youth playing a significant role. Thus, the study broadly investigated social media use and electoral violence among the youth in Kenya using two objectives that were to assess the use of social media platforms among the youth and to investigate the relationship between social media use and electoral violence among the youth. Guided by the Dependency Theory and the Social Responsibility Theory, the study was carried out in Mathare Constituency, Nairobi County, Kenya. Data collection involved questionnaires, key informant interviews and focus group discussions. Analysis of quantitative data was by descriptive statistics and regression while qualitative data was analyzed through transcription. The study findings showed that the use of social media platforms in communication has been growing with WhatsApp becoming the most ‘preferred’ platform in Kenya. The study outcome expos...
    With increasing need to achieve appropriate balance between learning support and self-regulation within the context of online learning, formative feedback has been identified as a viable means to achieve meaningful engagement.... more
    With increasing need to achieve appropriate balance between learning support and self-regulation within the context of online learning, formative feedback has been identified as a viable means to achieve meaningful engagement. Specifically, this study sought to establish how peer–peer formative feedback was facilitated in an online course and to what extent this engaged students in meaningful learning experiences. This case study entailed an in-depth investigation into the design and implementation of an online course in a New Zealand university. The studied course was part of a postgraduate programme in continuing (in-service) teacher education. The study adopted a case study methodology with a bias on qualitative techniques. Online observations, analysis of the archived course discourse and interviews were utilised as sources of data. The data from multiple sources were subsequently triangulated to corroborate the evidence. The findings indicate that peer formative feedback promoted active learners’ participation and meaningful engagement. The findings further showed that opportunities for dialogic peer formative feedback promoted learning support and self-regulation.
    In response to the increased demand for more effective authentication methods, the usage of biometric authentication to secure systems against unwanted access has grown. Because of the recent COVID-19 pandemic outbreak, any direct... more
    In response to the increased demand for more effective authentication methods, the usage of biometric authentication to secure systems against unwanted access has grown. Because of the recent COVID-19 pandemic outbreak, any direct physical contact with the system should be avoided. Furthermore, current authentication systems lack the necessary security features, making them vulnerable to cyber risks such as forgery by unethical employees and unauthorized users. The goal of this paper is to investigate the existing biometric authentication systems and propose the best security models to overcome the weaknesses of existing technologies. The study employed mixed methodology, which was qualitative and quantitative in nature and relied on primary and secondary sources of data. The researcher collected the data from a population of 300 staff of Mount Kenya University with a sample size of 169 respondents. The R2 value on the relationship between the studied dependent and independent varia...