Reading PAGE

Peer Evaluation activity

Reviews 1
Downloads 4667
Views 5
Full text requests 2
Followed by 1
Following... 20

Total impact ?

    Send a

    Ronald has...

    Trusted 0
    Reviewed 0
    Emailed 0
    Shared/re-used 0
    Discussed 0
    Invited 0
    Collected 0

     

    This was brought to you by:

    block this user Ronald Ojino

    Student, Master Level

    Masinde Muliro University of Science and Technology

    INFORMATION AND COMMUNICATION TECHNOLOGY IN CONTROLLING SOCIETY FRAUD TOWARDS REALIZING KENYA’S VISION 2030

    Export to Mendeley

    With the ongoing implementation of the new development blueprint (Vision 2030) that aims to transform Kenya into a newly industrializing, “middle-income country providing a high quality life to all its citizens by the year 2030, there are concerns that fraud in society is bound to detriment the achievement of this vision. The anchors of Kenya’s Vision 2030 include: Infrastructure, Macroeconomic Stability for long-term development, Energy and the public sector. In all these anchors of the vision, fraud is a major threat. This paper begins with a brief review of different forms of fraud that occur in Kenya. It then looks at the various ways in which Information and Communication Technology can be used to control fraud in the Kenyan society with a discussion of both merits and demerits of each control measure listed. Moreover, the paper’s goal is to demonstrate that ICT is a powerful tool that can be used to effectively fight fraud in society. Finally, the article discusses some recommendations that the Kenyan government can look into as it fights fraud with an aim of achieving its Vision 2030.

    Oh la laClose

    Your session has expired but don’t worry, your message
    has been saved.Please log in and we’ll bring you back
    to this page. You’ll just need to click “Send”.

    Your evaluation is of great value to our authors and readers. Many thanks for your time.

    Review Close

    Short review
    Select a comment
    Select a grade
    You and the author
    Anonymity My review is anonymous( Log in  or  Register )
    publish
    Close

    When you're done, click "publish"

    Only blue fields are mandatory.

    Relation to the author*
    Overall Comment*
    Anonymity* My review is anonymous( Log in  or  Register )
     

    Focus & Objectives*

    Have the objectives and the central topic been clearly introduced?

    Novelty & Originality*

    Do you consider this work to be an interesting contribution to knowledge?

    Arrangement, Transition and Logic

    Are the different sections of this work well arranged and distributed?

    Methodology & Results

    Is the author's methodology relevant to both the objectives and the results?

    Data Settings & Figures

    Were tables and figures appropriate and well conceived?

    References and bibliography

    Is this work well documented and has the bibliography been properly established?

    Writing

    Is this work well written, checked and edited?

    Write Your Review (you can paste text as well)
    Please be civil and constructive. Thank you.


    Grade (optional, N/A by default)

    N/A 1 1.5 2 2.5 3 3.5 4 4.5 5 5.5 6 6.5 7 7.5 8 8.5 9 9.5 10
    Close

    Your mailing list is currently empty.
    It will build up as you send messages
    and links to your peers.

     No one besides you has access to this list.
    Close
    Enter the e-mail addresses of your recipients in the box below.  Note: Peer Evaluation will NOT store these email addresses   log in
    Your recipients

    Your message:

    Your email : Your email address will not be stored or shared with others.

    Your message has been sent.

    Description

    Title : INFORMATION AND COMMUNICATION TECHNOLOGY IN CONTROLLING SOCIETY FRAUD TOWARDS REALIZING KENYA’S VISION 2030
    Author(s) : Ronald Ojino
    Abstract : With the ongoing implementation of the new development blueprint (Vision 2030) that aims to transform Kenya into a newly industrializing, “middle-income country providing a high quality life to all its citizens by the year 2030, there are concerns that fraud in society is bound to detriment the achievement of this vision. The anchors of Kenya’s Vision 2030 include: Infrastructure, Macroeconomic Stability for long-term development, Energy and the public sector. In all these anchors of the vision, fraud is a major threat. This paper begins with a brief review of different forms of fraud that occur in Kenya. It then looks at the various ways in which Information and Communication Technology can be used to control fraud in the Kenyan society with a discussion of both merits and demerits of each control measure listed. Moreover, the paper’s goal is to demonstrate that ICT is a powerful tool that can be used to effectively fight fraud in society. Finally, the article discusses some recommendations that the Kenyan government can look into as it fights fraud with an aim of achieving its Vision 2030.
    Keywords : fraud, Kenya's vision 2030

    Subject : ICT
    Area : Computer Science
    Language : English
    Year : 2011

    Affiliations Masinde Muliro University of Science and Technology

    Leave a comment

    This contribution has been reviewed by 1 peer.

    You may receive the Trusted member label after :

    • Reviewing 10 uploads, whatever the media type.
    • Being trusted by 10 peers.
    • If you are blocked by 10 peers the "Trust label" will be suspended from your page. We encourage you to contact the administrator to contest the suspension.

    Does this seem fair to you? Please make your suggestions.

    Please select an affiliation to sign your evaluation:

    Cancel Evaluation Save

    Please select an affiliation:

    Cancel   Save

    Ronald's Peer Evaluation activity

    Reviews 1
    Downloads 4667
    Views 5
    Full text requests 2
    Followed by 1
    Following... 20
    • Gaurav Vaidya, Independent researcher, None.
    • Gloria Origgi, Research Fellow, CNRS, Institut Nicod, Ecole Normale Supérieure, Ecole des Hautes Etudes, Paris.
    • Jacek Gwizdka, Other, Rutgers University.
    • Antoine Blanchard, Junior professional, Deuxième labo, Groupe Traces, C@fé des sciences.
    • Kim De Vries, Independent researcher, Instructional Technology Center, American River College.
    • Marc Guastavino, Editor, Projet d'édition Peirce, Université du Qiuébec à Montréal, Canada, uqam (université du Québec à Montréal.
    • Gabriel Gallezot, Lecturer, Urfist - Université de Nice Sophia Antipolis.
    • yann faurie, Self educated, omnireso.
    • Mary Joyce, Student, Master Level, Meta-Activism Project.
    • Nazha Selmaoui-Folcher, Associate Professor, University of New Caledonia - PPME.
    • Matteo Sereno, Professor, University of Torino, Dipartimento di Informatica, Torino, Italy.
    • ShengYu Shen, Associate Professor, School of Computer, National University of Defense Technology.
    • rob barnett, Visual Artist, creative director, melbourne.
    • Fleur Stigter, Multi-disciplinary, Company, Clear Insite, Rotterdam, the Netherlands.
    • Pavol Navrat, Professor, Slovak University of Technology, Bratislava.
    • Brian Kelly, Senior professional, UKOLN, University of Bath.
    • Cristian Vasquez, Student, Ph.D. Level, VUB STARLabs.
    • marcell mars, Independent researcher, jan van eyck academie.
    • Giulio Lizzi, Student, Ph.D. Level, University of Perugia / University of Lugano, University of Perugia (PhD candidate), University of Lugano (visiting researcher).
    • Clement Levallois, Post Doctorate, Rotterdam School of Management, E-humanities group of the KNAW, Erasmus Studio, Erasmus University Rotterdam, Gephi Consortium.

    Ronald has...

    Trusted 0
    Reviewed 0
    Emailed 0
    Shared/re-used 0
    Discussed 0
    Invited 0
    Collected 0
    Invite this peer to...
    Title
    Start date (dd/mm/aaaa)
    Location
    URL
    Message
    send
    Close

    Full Text request

    Your request will be sent.

    Please enter your email address to be notified
    when this article becomes available

    Your email


     
    Your email address will not be shared or spammed.