Uploaded by Gabriel Emmanuel

Dissertation MBA-IT-2013 Gabriel Emmanuel

advertisement
IMPLEMENTATION OF THIN CLIENT AND OPEN SOURCE INFORMATION
SYSTEMS IN TANZANIAN ACADEMIC INSTITUTIONS
Case Study: University of Dar es Salaam; School of Journalism and Mass
Communication (UDSM-SJMC)
By
Gabriel Emmanuel
September, 2013
The work contained within this document has been submitted by the student in partial
fulfillment for the requirements of the degree and the award of Masters of Business
Administration in Information Technology (MBA-IT) of Coventry University
IMPLEMENTATION OF THIN CLIENT AND OPEN SOURCE INFORMATION
SYSTEMS IN TANZANIAN ACADEMIC INSTITUTIONS
Author:Gabriel Emmanuel
Student ID:Coventry ID: 4868239
Course Tittle: Dissertation
Module:
Research
Date:
September 27th, 2013
The work contained within this document has been submitted by the student in partial
fulfillment of the requirements for the degree and the award of Masters of Business
Administration in Information Technology (MBA-IT) of Coventry University
ii
CERTIFICATION
I, the undersigned certify that I have read and hereby recommend for acceptance by Coventry
University the dissertation entitled: “Implementation of thin client and open source information systems
in Tanzanian academic institutions” in fulfillment of the requirements for the degree of Masters of
Business Administration in Information Technology offered in collaboration between Institute of
Accountancy Arusha and Coventry University.
Ms. Joy Joseph
Supervisor Name
(Supervisor)
Date ………………………………
iii
DECLARATION
I, Gabriel Emmanuel, declare that this dissertation is my own original work and that it has not been
presented and will not be presented to any university for similar or any other degree award.
Signature…………………………………………
Date…………………………………..
iv
COPYRIGHT
© Copyright
This paper should not be reproduced by any means, in full or in part, except for short extract in a fair
dealing, for research or private study, critical scholarly review or discourse with an acknowledgement.
No part of this dissertation may be reproduced, stored in any retrieval system, or transmitted in any
form or by any means without prior written permission of the author or Coventry University
v
ABSTRACT
This research describes the study carried out to explore key factors hindering implementation of Thin
Client and Open Source Information Systems in Tanzanian academic institutions. Essentially, various
research studies have proven Thin Client and Open Source Information Systems to be very economic,
stable, and reliable suited for various sectors especially education arena.
University of Dar-es-Salaam School of Journalism and Mass Communication was selected as a case
study for this research. Data analysis revealed a number of key factors hindering the implementation of
Thin Client and Open Source Information Systems in Tanzanian academic institutions: absence of
IS/IT strategy, lack technical knowledge on the subject area, too much donor dependency as attributed
to financial constraints, management’s lack of passion and motivation to invest in IT, failure to act
against pirated software licenses, and ineffective bureaucratic structure.
In literature review effort has been made to study and provide well documented and validated benefits
offered by thin client and open source information systems. In doing so, the literature review gives the
highlights of how successful such systems have been, as well as their reputation in various adapting
sectors. Discussion on implementation of thin client and open source information systems in academic
institutions has been provided at the end of each part (Thin Clients & Open Source) of the literature
review; success and limitation factors have been discussed. Despite the literature revealing significant
success of thin client and open source information systems, Tanzanian academic institutions have
been left behind in adaption to such systems. This motivated the researcher to explore main factors
hindering implementation of such systems in Tanzanian academic institutions.
vi
ACKNOWLEDGEMENTS
I owe a lot of thanks to the almighty God for keeping me health throughout time of my study, and who
helped me achieve my dream to study Masters of Business Administration in Information Technology
(MBA-IT) from Coventry University.
I wish to express my sincere gratitude to my employers (TECHNOSERVE) for allowing me to leave
work one hour earlier throughout time of my studies by which the accumulation was then compensated
in my annual leave. I would like to extend my thanks to the University of Dar-es-Salaam School of
Journalism and Mass Communication (UDSM-SJMC) management for accepting my request to
conduct this study over there; special thanks go UDSM-SJMC staffs: The Dean Associate, Ms. Jenitha
Rugaika, Ms. Diana, and Mr. Fanuel Hume.
I acknowledge with thanks the special moral, emotional, and spiritual support I have been receiving
from my parents, Mr. and Mrs. Emmanuel Mwailenge. Further thanks go to all my family and friends for
all the time we share.
Special thanks to my supervisor Ms. Joy Joseph for keeping good communication, and giving some
advices throughout my study period. In the same way I would like to give a lot of thanks to my lecturers
for delivering me a necessary knowledge which helped to free myself from the fears I had with
business challenges of this age.
vii
CONTENTS
CERTIFICATION ......................................................................................................................................iii
DECLARATION ........................................................................................................................................iv
COPYRIGHT ............................................................................................................................................ v
CHAPTER 1 ............................................................................................................................................. 1
1.1.
Introduction ........................................................................................................................... 1
1.1.
Research Context: Implementation of TCOSIS ...................................................................... 2
1.1.1.
TC systems ..................................................................................................................... 2
1.1.2.
Open source systems ..................................................................................................... 3
1.2.
Background to the study ....................................................................................................... 4
1.3.
Statement of the problem ..................................................................................................... 6
1.3.1.
Aim of the research ....................................................................................................... 7
1.3.2.
Research questions ........................................................................................................ 7
1.3.3.
Research objectives ....................................................................................................... 8
1.3.4.
Scope of the research .................................................................................................... 8
1.3.5.
Significance of the study................................................................................................ 9
1.4.
Thesis structure ..................................................................................................................... 9
CHAPTER 2 ........................................................................................................................................... 10
LITERATURE REVIEW ON IMPLEMENTATION OF THIN CLIENT AND OPEN SOURCE INFORMATION
SYSTEMS .............................................................................................................................................. 10
2.1. Motivation towards implementation of TCOSIS....................................................................... 10
2.1.1. Motivation for TC systems implementation ...................................................................... 10
2.1.2. TC Systems in Education /Academic Institutions .............................................................. 13
2.1.3. Reported Challenges with TC Implementation ................................................................. 14
2.2.1 Motivation for Open Source Software ............................................................................... 15
2.2.2. Open Source Software in Education /Academic Institutions ............................................ 17
2.2.3. Challenges facing Open Source Software .......................................................................... 18
CHAPTER 3 ........................................................................................................................................... 20
3.0. RESEARCH METHODOLOGY ...................................................................................................... 20
3.1. Research design ........................................................................................................................ 20
3.2 Research techniques.................................................................................................................. 20
viii
3.3 Population ................................................................................................................................. 20
3.4 Sampling Technique .................................................................................................................. 20
3.5 Sample size ................................................................................................................................ 21
3.6 Data Collection Methods ......................................................................................................... 21
3.6.1 Interview ............................................................................................................................. 21
3.6.2 Observation ........................................................................................................................ 21
3.6.3 Questionnaires ................................................................................................................... 22
3.6.4 Documentation ................................................................................................................... 22
3.7 Types of data collected .......................................................................................................... 22
3.7.1 Primary data ....................................................................................................................... 22
3.7.2 Secondary Data................................................................................................................... 22
3.8 Analytical methods .................................................................................................................... 22
CHAPTER 4 ........................................................................................................................................... 24
4.0. FINDINGS AND DATA ANALYSIS ................................................................................................ 24
4.1 Existence of available business policies or IS/IT strategies with their rationale which
hinder implementation of TCOSISs ................................................................................................. 24
4.2. IT Personnel’s level of knowledge to implement and manage TCOSISs................................... 26
4.3. List of available alternatives open source software to the currently deployed proprietary
software which can operate in TC environment ............................................................................. 28
4.3. Summary of the key findings .................................................................................................... 31
CHAPTER 5 ........................................................................................................................................... 33
RECOMENDATIONS, CONCLUSION AND NEED FOR FUTURE RESEARCH ............................................ 33
5.1. Recommendations.................................................................................................................... 33
5.2. Conclusion ................................................................................................................................ 35
5.3. Need for Future Research......................................................................................................... 36
CHAPTER 6 ........................................................................................................................................... 37
REFERENCES AND APPENDICES ........................................................................................................... 37
6.1. References ................................................................................................................................ 37
6.2. Appendices ............................................................................................................................... 43
6.2.1. Schedule of activities ......................................................................................................... 43
ix
LIST OF FIGURES
Figure 1.1: Thin Client Computer................................................................................................................ 3
Figure 1.2: Fat Client Computer ................................................................................................................. 3
Figure 4.2.1-[3]: TCOSISs Technical Knowledge among IT personnel ......................................................... 28
Figure 4.3.1: Amount of Alternative OSS................................................................................................... 31
LIST OF TABLES
Table 2.1: Environments conducive & not conducive for TCs deployment ........................................... 12
Table 4.1.2: Strata * Existence of IS/IT Strategy Cross-tabulation ....................................................... 25
Table 4.1.3: Existence of IS/IT Strategy ............................................................................................... 25
Table 4.2.1[4]: TCOSISs awareness and competency among IT personnel ........................................ 27
Table 5.2.9: TCOSISs competency rating among IT personnel ........................................................... 27
Table 4.3.1[6]: Amount of alternative OSS for each proprietary software............................................. 29
Table 4.3.2-[7]: List of alternative OSS to currently deployed and prospective proprietary software .... 30
x
LIST OF ABBREVIATIONS AND ACRONYMS
•
ICT
Information and Communication Technologies
•
IT
Information Technology
•
Fat clients
Personal Computers with moving parts inside and holds all software in
local hard drive
•
Thin clients
Network devices like computers which takes all the software from the
server computer
•
TCOSISs
Thin Client and Open Source Information Systems
•
OSS
Open Source Software
•
TCs
Thin Clients
•
SJMC
School of Journalism and Mass Communication
•
UDSM
University of Dar es Salaam
•
LTSP
Linux Terminal Server Project
•
LADAP
Lightweight Active Directory Access Protocol
•
Wins
Windows
•
TFTP
Protocol used to boot thin clients from the server
•
Source Code
Software instructions in their original form
xi
CHAPTER 1
1.1. Introduction
This thesis reports on the field of academic information systems. The report focuses on the
topic of implementation of Thin Client and Open Source Information Systems (TCOSIS) in
Tanzanian academic institutions which may include but not limited to: universities, colleges,
training centers, and primary and secondary schools.
So far many academic institutions have been implementing a variety of information systems
based on fat client technologies and proprietary software. Information systems which are built
on fat clients and proprietary software have a lot of drawbacks as compared to Thin Client
(TC) and Open Source Software (OSS) information systems; some of the draw backs are
outlined as follows:
•
2X (2010), reports a research sustained by Gartner that fat clients are not as reliable
as TCs: TCs are 7 times reliable compared to fat clients with a Mean Time before
Failure of 175,000 hours compared to 25,000 hours for fat clients.
•
CanyonSnow Consulting (2009), fat clients have half the lifespan of TCs, and
consumes power more than 10 times compared to TCs. Greenberg, Anderson, and
Mitchell-Jackson (2011), TCs consumes power 30% - 60% less compared to fat
clients.
•
High cost of systems maintenance: CSS-Inc. (2009), ongoing costs such as IT and
system maintenance are lower on TCs compared to fat clients because most of the
services are performed by the centralized servers. CSS-Inc further mentions, fat
clients are not as secure as compared to TCs: TCs are more secure both physically
and electronically, also they simplify compliance with regulatory standards.
•
High cost of software licenses: Manolescu (2002), the higher the number of
computers the higher the cost of software licenses as each license is charged per
computer.
1
•
High purchase cost: IGEL Technology (2011), fat clients are more expensive
recording a price of 100% higher than that of TCs.
•
Fat clients are characterized by extensive labor support. Mohapatra, K. T. (2003),
differently from TCs which during break down they can just be replaced by plugging in
another device, fat clients requires a lot of work to be ready for user. Also TCs offer
onetime software upgrades and maintenance for all users centrally.
This research has been undertaken to understand key factors hindering implementation of
complete TCOSISs to facilitate various academic activities such as teaching, research,
management, administration, communication and information sharing, social networking, etc.;
and then recommend best way forward to offset the challenges.
This chapter describes the background and foundations of this reported research. The chapter
proceeds further to establish and formalize a research problem after detailing the research
background. The later part of this section states research aim, objectives, questions, scope,
and significance of the research.
1.2. Research Context: Implementation of TCOSIS
1.2.1. TC systems
According to Tuller and Oblinger (1998) cited in Elbaz and Stewart (1999, p.3), TCs are
Personal Computer (PC) like machines which embody the idea of the network appliances. On
the functionality side of view, TCs appear to end users just like personal computers but in
reality TCs are more of the network devices. The main differences between TCs and personal
computers are:
•
This clients doesn’t hold internal moving parts such as fans and hard drives
2
•
TCs doesn’t hold in operating system
•
Almost all the work is done in the server and TCs act just as an input/ output devices
•
Also in appearance a TC occupies a very little space as compared to personal
computer
Below figures from Google images show the appearance of TC and personal computer (fat
client)
Figure 1.1: Thin Client - from Su (2011)
Figure 1.2: Fat Client - Comendador (2010)
1.2.2. Open source systems
According to Leinonen, Pietarila, and Kligyte (2002), the term open source systems can
simply be referred to as the computer programs whose source code are available to users for
modification and distribution. Open Source Organization states: for software to qualify as an
open source, licenses must allow the software to be freely used, distributed, and shared.
Implementation of TC and open source information systems will therefore be understood in
this research as
Deploying Open source software to run in thin client network environment
3
1.3. Background to the study
Implementation of academic information systems is not a new phenomenon at this age of
information technology especially in the developed countries. In recognition of a significant
role played by ICT in education, Tanzanian government has come up with various policies
aiming to integrate ICT to various stages and areas of education. Tanzania-ICT-Policy-forBasic-Education (2007), the integration of ICT in education will empower learners, educators,
managers, and teachers to expand learning opportunities and ensure quality of education and
relevancy.
Academic institutions have been facing real financial challenges related to adopting expensive
technologies to run their academic information systems. Ghosh (2004) cited in Nordin et al
(2012, p. 215), developing countries spend as substantial amount of their GDP to obtain legal
licenses and original software. The massive outflow of capital is not only noticed in the
software category but also in the whole network infrastructure main notably the trend of using
and purchasing fat clients.
Research done across east African countries reveals uninformed ICT decisions impacts
negatively development plans. Bruggink (2003),
In terms of being well equipped to make well informed decisions on ICT architecture
and choice of platform, countries from the south are lagging behind, and are therefore
still unable to harness the full potential of [open source] in the eradication of poverty.
This … contributes to incompatible information systems, expensive and ineffective
maintenance …, and resource-draining software licenses.
While the National ICT policy (2007), admits to scarcity of resources in terms of financial
resources, and power in rural areas; it fails to demonstrate the appropriate model which can
survive those resistances. This presents the right moment to come up with this research
4
project which aims to seek an understanding of the key factors hindering implementation of
TCOSISs in Tanzanian academic institutions.
Various researchers recommend TCOSISs to offset financial constraints; also TCOSISs are
recommended as a way to sustainable knowledge development. Nordin et al (2012), open
source base on a social principal which is knowledge sharing, learning, and developing new
skills. Lakhan and Jhunjhunwala (2008), as administrators strive to balance between
resources and requirements, open source emerge as the viable solution.
Furthermore UNDP Asia-Pacific-Development-Information-Program (2004) mentions the
following benefits of using open source software: low costs, reliable, good performance, more
security, encourage innovations, and alternative to illegal copying, etc. Therefore the use of
open source will not only offset financial challenges, but will create the capacity for
Tanzanians to create their own information systems rather than being sole recipients.
On the network platform point of view, TCs have a very low total cost of ownership as
compared to that of fat clients used in academic institutions at the moment. CWDTC white
paper says: TCs are far away cheaper than personal computers with twice a life span of a
personal computer. TCs have low cost of support as everything is done from the server; there
is no need to run regularly to each individual user for application support.
Furthermore CWD white paper mentions, TCs consumes far less energy as compared to that
of personal computers: TCs consumes energy by 24% less compared to fat clients, they as
well emit 23% less carbon emissions as compared to their counter parts.
5
1.4. Statement of the problem
Despite the massive financial and energy challenges facing Tanzanian education sector, most
academic institutions still keep on purchasing and using ultra expensive academic information
systems which adds up a lot to their burden to meet their principal task of delivering quality
education.
The careful study on analyzing University of Dar es Salaam School of Journalism and Mass
Communication (UDSM-SJMC) information system marks a significant mile stone to defining a
statement of the problem. Some of the real problems captured during the study are high
financial cost of running fat client information system, extensive IT support, and unsustainable
development of IT capacity.
With respect to literature on fat clients, the university has been observed to incur unnecessary
costs in the following areas: purchase and repair of fat client systems, expenses related to
high amount of power consumed by fat clients, and purchase of proprietary software licenses.
Furthermore, due to decentralized nature of fat client information systems, the university IT
support team has been applying extreme labor to support end users. The support team is
forced to run to multiple users because fat clients hold everything by themselves to perform
computing tasks. This consumes much time by which personnel could focus on other
development stuffs.
In addition, the use of fat clients and proprietary software as the backbone of the university
information system real doesn’t promise a sustainable development of IT capacity in terms
innovation. Since proprietary software companies protect their source code, IT personnel
develop to be pure technical users rather than innovative developers.
6
The rule of TCOSISs as recommended by many studies can serve the university from all
those huddles, but it is unimaginable to see the university still leaning on the use of fat clients
and proprietary software.
1.4.1. Aim of the research
On the basis of the defined research problem at University of Dares Salaam School of
Journalism and Mass Communication, the research aim was established:
Understanding key factors hindering the implementation of thin client & open
source information systems in Tanzanian academic institutions; and
recommend way forward.
In order to meet such an aim, the following research questions and objectives were
established:
1.4.2. Research questions
The guiding research question for this research is:
What are the key factors hindering implementation of thin client and open
source Information Systems in Tanzanian academic institutions?
To find an answer for the main question needed more research on a number of areas which
motivated the researcher to define more specific research questions derived from the main
research question.
Additional research question
i.
Are there any available business policies or IS/IT strategies with their rationale which
hinder the university’s implementation of TC & open source Information System?
ii.
What level of knowledge do system administrators have in implementing and
managing TCOSISs?
7
iii.
What available alternative open source software to the currently deployed proprietary
software exists which can operate in TC environment?
iv.
What path the university needs to follow as a way forward to the implementation of
TCOSISs?
1.4.3. Research objectives
To investigate available business policies or IS/IT strategies with their rationale which
i.
hinder the implementation of TC & open source information systems in Tanzanian
academic institutions.
ii.
To assess systems administrators’ knowledge in implementing and managing TCs and
open source information systems.
iii.
To shortlist available alternative open source software to currently deployed proprietary
software which can operate in TC environment.
iv.
To give recommendations on a way forward for the implementation of TCOSISs in
Tanzanian academic institutions.
1.4.4. Scope of the research
The study has been conducted at the University of Dar es Salaam, School of Journalism and
Mass Communication (UDSM-SJMC). The study involved information technology department,
management, and staff who are computer users.
The study specifically concentrated on understanding key barriers hindering implementation of
TCOSISs in Tanzanian academic institutions. Moreover the study went further to identify
alternative open source software which can perform similar functions as the currently
deployed proprietary software.
8
1.4.5. Significance of the study
This study has been conducted at the right moment where academic institutions have been
experiencing financial hardships to run and maintain their IT systems due to high cost
attributed to the using of fat clients and proprietary software. Furthermore, innovation has
been declining among IT experts thanks to the source code protection done by proprietary
software companies. The findings of this research are very essential especially at this time
where the government recognizes the significant role played by Information Technology (IT) in
education sector, and is embarking with various policies to smoothen IT systems rollout. It is
high time now to advise the government and all other stakeholders so that they can make
informed decisions on the systems to be implemented. The main significances of this research
are outlined as below:
a) The findings of this study have identified key problems hindering implementation of
TCOSISs in Tanzanian academic institutions.
b) The findings of this study have proposed on what should be done to improve
implementation of TCOSISs in Tanzanian academic institutions
c) The findings have outlined alternative open source software which performs similar
functions as the currently deployed proprietary software.
d) The findings of this study may be used as a baseline to other future researchers.
e) The study has added some more highly knowledge to the researcher.
1.5. Thesis structure
This report has been structured in five parts. The first part of this thesis has given an
introduction to the study, and background to the problem, the second part goes through the
literature review. Research methodology is presented in chapter three followed by data
presentation and discussion of the findings in chapter four. Chapter five offers conclusion and
recommendations while chapter six holds references and appendices.
9
CHAPTER 2
LITERATURE REVIEW ON IMPLEMENTATION OF THIN CLIENT AND OPEN SOURCE
INFORMATION SYSTEMS
2.1. Motivation towards implementation of TCOSISs
2.1.1. Motivation for TC systems implementation
Since its inception implementation of TC systems have recorded a tremendous growth in
public sector, especially in education institutions due to a number of reasons. IGEL
Technology (2009), education institutions are looking for solutions that meet their goals of
providing quality education while offsetting their budget constraints; TC systems offer
solutions to these challenges. INNOV (2010), some schools don’t even have a computer lab
due to unaffordable costs of hardware, software, and support; TC solution can overcome
some of these problems.
Recently TC systems have gained huge acceptance from various sectors such as education,
manufacturing, health, and financial institutions. Various authors have recommended TCs for
the following reasons:
•
IGEL (2009), by implementing TC systems, administrative costs alone can be cut by
up to 70%.
•
Newburn Consulting (2002), a TC consumes 14% of the power used by a fat client.
Furthermore, TCs offers ease of maintenance and administration, and increased
reliability, Brinkley (2006).
•
Williams (2005), cited in Brinkley (2006, p.384) says TC costs of acquisition are
normally 50% to 60% of fat clients.
•
National Semiconductor Corporation (2000); The Gartner Group (1999) cited in
Brinkley (2006, p.384), TCs have low total cost of ownership (TCO) and can cut
support costs for up to 80%.
•
William (2005) and Romm (2006) cited in Brinkley (2006, p.384), TCs have longer
service life which can last up to 10 years, consumes less energy, have less weight
10
and takes little space, do not produce noise, and offer easy management and
increase security.
•
IGEL Technology (2009), device rollout and replacement is purely logistical matter.
No special skills are required for connection.
•
Loannidis et al (2000) cited in INNOV (2010, p.120), TC systems provide high security
to the network environment by offering a centralized firewall being configured on the
server.
•
CanyonSnow Consulting (2009) mentions environmental benefits of using TC
systems as: far less carbon emissions, TCs are 90%recyclableand easy transport due
to its small size and weight.
Doyle, Deegan, O’Driscoll (2009), after Reed Managed Services replaced 4500 fat clients with
TCs the annual reported savings were: reduction of 5.4 million KWH, reduction of 2800 tons of
CO2, Servers were reduces by a factor of 20, IT budget was cut by fifth.
Despite the overwhelming advantages of TCs over fat clients, other authors pin point some
drawbacks. BECTA (2004) and Arbulu and Vosberg (2007) mention similar disadvantages of
using TCs:
•
Reduced network compatibility which is a result of some applications being not
network compatible.
•
End users are totally dependent on system administrators for software installations
•
Since all the processing is done in the server, TCs demand a lot of bandwidth for
good performance.
•
Real time full motion videos with sound hurt TC performance.
The drawbacks cited above are as a result of client-server network architecture which is the
backbone for TC systems. However, many authors are backing the client server architecture
as the way to this modern age. National Semiconductor Corporation (2000), server based
11
solutions allow companies to quickly deploy multi-channel selling, improve productivity, control
costs, and improve work flow. She further says, TC computing arose to solve complexities of
enterprise networks, and a more direct information flow results a more streamlined work flow.
Furthermore, from a general point of view it is easy to directly accept BECTA (2004) claim that
TCs consumes much more bandwidth than fat clients. NCTE (2008) and Newburn Consulting
(2002) argue that: in TC environment bandwidth usage is significant lower compared to fat
client environment, wireless LAN (11 mbps) is ideal for TCs. They further mention similar
results have been found from a study by Microsoft: a way far less network bandwidth is
consumed by TC systems as compared to fat clients; 11mps is enough for TCs.
Newburn Consulting (2002) and BECTA (2007) mention top necessary pre and post TC
implementation requirements as: LAN/WAN resilience, user acceptance, and limited bespoke
applications. They further outline environments conducive for whether or not to deploy TC
systems:
Table 2.1: Environments conducive & not conducive for TCs deployment
Conducive Environment to Deploy
•
Not Conducive Environment to Deploy
•
Your LAN requires upgrading
Your workforce consists of mainly
mobile or high performance users
•
You are currently running standard
•
applications
•
You have many legacy or bespoke
applications
•
You have many WAN links
You are currently running a full
managed environment
•
Your
fat
clients
are
nearing
replacement date
•
You have well skilled IT personnel for
technical support
12
2.1.2. TC Systems in Education /Academic Institutions
Although there is low rate of TC systems deployment in Tanzanian academic institutions; the
situation is completely the opposite in other countries. BECTA (2004), many schools in Britain
have full or partial TC solution. She further says TC systems have been widely adopted in
organizations with multiple sites citing banks and estate agents as examples.
BECTA (2007), reports some appealing findings as a result of deploying TC systems in Britain
schools: schools were able to provide more ICT related tools with their limited budgets,
teachers can now prepare their lessons and do their management tasks using TC computers,
increased pupils and teachers accessibility to ICT, and achieved greater flexibility of working.
The trend of TC market may suggest TC systems are becoming the default computing devices
in education institutions. IDC (2010), shipment of TC devices is expected to double between
2010 – 2014 form 4 to 8 million shipments. IDC (2012) shortlists leading sectors with high rate
of adoption to TC technologies, education sector being the second: manufacturing, education,
healthcare, government, financial services, etc.
Further studies have revealed that most of the software applications currently deployed with
fat clients in education sector can as well work perfectly in TC environment. Brinkley (2006),
most of the tested applications in fat client environment were found to be compatible in TC
environment. Andria et al (2007) and Callaghan et al (2007) cited in INNOV (2010, p.122),
some educational solutions like e-learning that uses web based applications have proposed
the use of TC technology in classroom. Callaghan further says even complex web based
services with complex requirements are good scenarios for use of TCs.
13
Also there is a call for academic institutions to invest their money on technology in a
sustainable way due to increasing financial pressure and technological push. INNOV (2010),
TC technology could further the use of computer labs in developing countries in a sustainable
way. Krikke (2004), TCs will never have as big impact in developed world as it will on
developing countries.
2.1.3. Reported Challenges with TC Implementation
Regardless of the compelling benefits of using TCs, various researchers points out some
related challenges which needs to be worked out. BECTA (2007), IDC (2010), INNOV (2010)
mentions the following challenges:
•
TC solutions pose a real challenge to high mobile workforce.
•
Video streaming is hurt when many end users try to access the video content.
•
Applications requiring high graphics processing and animations such as games are
not recommended in TC environment
•
Companies need to work on technical structure in order to support TC environment.
While TCs can be deployed to a company’s entire user base, IDC (2012) recommends a mix
of TCs and fat clients based on justifications. However Doyle, Deegan, O’Driscoll (2009)
argue that, when fat client and TC systems are running in parallel, users will opt the old
technology (fat clients). This calls for critical informed decisions if there are to be a mix of TC
and fat client systems. Doyle et al (2009), says that if the following factors will be met, then
users will have same level of preference to choose between TCs and fat clients: locate TC
systems among existing fat clients, ensure both use same authentication credentials, storage
service are identical, and same services are provided by both.
Furthermore, some researchers worn that the change from fat client to TC systems is always
prone user resistances. Doyle, Deegan, O’Driscoll (2009), no matter how well documented the
benefits of TC systems may be, there is always resistance when the process is presented as
14
revolution. Arbulu and Vosberg (2007) attribute the skepticism and unwillingness to change is
a result of users’ loss of control to play their CDs, mp3, and use of external storage devices.
BECTA (2007), reports underestimation of servers’ capacity and local politics as one of the
reasons for failed TCs projects in some Britain schools. If this literature has anything to teach
us is to let experts do their job and not intervene with politics.
Despite the mentioned above challenges related with TCs, there is much hope for technical
related factors as the rate of technology growth promises to offset the challenges sooner than
later. Simoens et al (2008) cited in INNOV (2010, p. 121), it could be an optimal solution in the
near future due to technical developments attempting to solve some of the above
weaknesses.
2.2.1 Motivation for Open Source Software
To complement the essence of implementing TCOSIS in academic institutions which is: to
create economic sustainable information systems, offering room for innovation among IT
personnel, and increase students and staff access ICT; it is worthwhile to explore more
knowledge, trend and opportunities offered by open source software.
Many studies show open source software has gained respect in majority of IT experts as a
way to prosperity. Stoltz (1999), open source supporters consider it as a solution to various
social problems: a counter agent to monopoly in software industry, an aid to education, agent
of access to technology for all, and an economical sustainable model for software.
15
Despite early skepticism Open Source Software is currently enjoying huge and fastest rate of
acceptance in Information Technology community. Canonical (2011), data sustained by
Gartner (2010) shows Linux (an open source operating system) was expected to reach 30.5%
share of all operating system shipments with TCs by 2011. Sharma and Koshy (2011),
apache, an open source software powers 70% of websites globally, also Nginx has reported
the fastest growth rate of 1.1 million increase of nginx sites per month matching apache for
growth.
Krikke (2004), According to IDC research Linux powered 20% TCs in 2003 with rate of 60%
increase per year, making it the fastest growing TC operating system in the market. The study
further mentions TC systems running open source can reduce computing costs by 70%.
A number of governments have created various policies in order to take advantage of the
potential offered by open source software. Government of South Australia (2004) reports,
USA, UK, and a number of European Union governments have prepared policies concerning
the use of open source software in education and government agencies.
Studies have proved opting for open source software offers marvelous benefits to small,
medium, and large organizations. Optaros (2005) mentions, government and companies use
open source for the main three advantages: Companies are saving substantial amount of
money; the surveys shows medium sized and small companies saved an average of $1 and
$520,000 million respectively. Apart from reasons related to reducing costs some other
benefits were found to be:
•
High quality and more secure systems.
•
Reduce dependence on commercial package software
•
Build customs systems faster
•
Create software standards in departments, functions or business units
•
Availability of functions not available in proprietary software.
16
•
IT personnel gain new knowledge and skills
2.2.2. Open Source Software in Education /Academic Institutions
Lin and Zini (2006), Keynes High School in Bologna Italy has successfully implemented
school information system based on TCs and open source software. Despite encountering
some social political resistance at early stages of implementation, the Information System has
proved to be a huge success by saving a substantial amount in IT budget, an increased
students and teachers’ literacy to computers, and upsurge in intra and inter schools
collaboration among students.
Meanwhile as reported by Kumar (2011), Fiji National University (FNU) proposed the
construction of TC web based Information System built on open source products and tools to
carter various areas such as MIS, students and course management, teaching, and other
administrative tasks. Michler (2005), in 2003 Australian government passed a bill which
enforces government to consider use of open source software in its procurement processes
and to avoid software that does not comply with open standards. Furthermore, this study
mentions over 500 German government agencies use open source software.
Sharma and Koshy (2011), explains a stunning virtue of open source in education: open
source may help educators to find a better way teach; the motto of educators would be to
teach concept based education rather than vendor centric. They further mentions the current
way of teaching just does much good to the proprietary software vendor by promoting it.
BECTA (2005), open source can provide a suitable technical infrastructure for classroom use.
This study shows 20-30 open source applications were relevant to the curriculum in Britain
schools; in addition, the survey further reveals high level of satisfaction with performance and
reliability among staffs, especially in primary schools.
17
In support for open source software in education Mellon and Hewlett Foundation (2005) adds
that, academic institutions have unique needs that are not well served by proprietary software
vendors. They highlight this as a result of the sector being too small to attract attention of a
robust competitive market.
2.2.3. Challenges facing Open Source Software
Some researchers expose the reluctance and skepticism cases towards adopting open source
software. Optaros (2005), high profile reasons contributing in the fear to move to open source
software are legal risks and technical risks. Legal risks in such that many open source
vendors don’t provide warranties which falls foul of trade practices. Technical risks are
attributed to lack of technical support or support framework necessary for migration.
In the same research Optaros (2005) argue, the beliefs mentioned above are largely a myth
rather than truth. Organizations which are still reluctant on a move to open source software
due to legal issues needs to change as the license agreements for opens source are very
clear and easy. Michler (2005), GPL, the most common license by which most open source
software are distributed only puts responsibility to the user who want to redistribute a modified
software by insisting to inherit all the license requirements of the parent software.
Bruggink (2003) also reports the issue of limited technical support in a study conducted across
sub-Saharan Africa. According to Bruggink, other major reported challenges are: a myth which
some people believe open source software is not user friendly, also some people just don’t
have any idea or knowledge about open source software; in terms of technical support,
Tanzania case reports differently by saying there is a sufficient technical support, especially
through the web.
18
Mellon and Hewlett Foundation (2005) shows some concerns on a high number of open
source projects undertaken in various academic institutions are prone to overlapping: key
issue as a result of improper coordination is multiple projects would be similar in functionalities
and therefore duplications of costs; hence calls for more active approach to support future
projects.
19
CHAPTER 3
3.0. RESEARCH METHODOLOGY
3.1. Research design
This study was designed as single case study, and exploratory research design. This enabled
the researcher to obtain required data within the study period specified by the university.
3.2 Research techniques
The study used both qualitative and quantitative research techniques in order to give a valid
and reliable report. The study was more of qualitative in nature, this technique helped to dig
much dip in exploring the facts behind the research problem. Quantitative techniques have
assisted to present data in numerical form and thus enhance quality of data presentation.
3.3 Population
A case study for this thesis is University of Dar es Salaam School of Journalism and Mass
Communication (UDSM-SJMC) located in the city of Dar es Salaam. The study involved IT
personnel, management team, and other staffs who are computer users.
3.4 Sampling Technique
This study used both judgmental and stratified sampling techniques. The population was
divided into three strata: IT personnel, management team, and other computer user staffs.
Judgmental sampling technique was used for selecting a sample that incorporates high skilled
employees in Information Technology field and those in management positions; also random
sampling was used for generating a sample of other computer user staffs.
20
Judgmental sampling helped to obtain appropriate people who can answer IT related
questions, it also helped to pinpoint correct management personnel who make IT related
decisions especial investment related decisions. Furthermore, random sampling helped to get
good public opinion related to open source and thin clients deployment. These techniques
helped to obtain the appropriate information.
3.5 Sample size
A reasonable sample was selected to include 100% of IT personnel, 60% of university staffs
who use computers, and two management personnel.
3.6 Data Collection Methods
Data were carefully collected through inquiry using various methods for the purpose of
obtaining relevant data concerning the study; in data collection the study used the following
methods:
3.6.1 Interview
The interviews were carried out to the staffs in Information technology department and
management personnel. The author chose interview method for these personnel because it
offers a wide area to play around in eliciting research data. The semi structured interview type
was used.
3.6.2 Observation
This involved the author observing the quality of network infrastructure, computer systems in
use, and the number and capacity of university servers in the server room. This technique
helped to collect necessary information concerning the current situation in the problem area.
During observation process the role of the researcher was known to other staff.
21
3.6.3 Questionnaires
The questionnaires were prepared by the researcher and distributed to the university’s
computer user staffs. The questionnaires were distributed with accordance to sample
designed and were collected after being filled by the correspondents. The questionnaires
comprised both open and closed questions.
3.6.4 Documentation
This involved going through the university’s files and learn how business and IS/IT strategies
influence the implementation of technologies and information systems. This helped to give
suggestions on the way forward for TCOSIS implementation.
3.7 Types of data collected
The study was designed to use both primary and secondary data. These types of data
enabled the researcher to get the necessary needed information.
3.7.1 Primary data
These were collected through questionnaires, observation and personal interviews. The
questions were set with relevance to the research objectives so as to obtain required
information.
3.7.2 Secondary Data
These were extracted through revision of various documents for instance university policies,
website, and university’s business strategy document.
3.8 Analytical methods
Gathered data were processed by summarizing and analyzing them using both qualitative and
quantitative methods. The data were analyzed using descriptive statistics focusing reporting
22
data in standard deviation, means, percentile, and frequency; also Likert scale was used to
analyze data obtained from observations. In this method the researcher assigned weights
based on a certain criteria. Presentations are in the form of tables and graphs. Finally the
conclusion and recommendations were presented based on the research findings and
interpretations. The next section presents research findings and interpretations with respect to
research questions, objectives, and purpose of the study as detailed in chapter one.
23
CHAPTER 4
4.0. FINDINGS AND DATA ANALYSIS
This part presents research findings as per research questions, objectives, and purpose of the
study as outlined in chapter one sections1.4.2, 1.4.3, and 1.4.5 respectively. The data
gathered are presented, analyzed, and interpreted using descriptive analysis approach.
4.1 Existence of available business policies or IS/IT strategies with their rationale which
hinder implementation of TCOSISs
Analysis of interview data from management and IT personnel reveal that, the university
doesn’t have any IS/IT strategy or any business policy which guides investments in
Information Technology. Tables 4.1 and 4.2 below shows all interviewed personnel in IT
department and in management admitted: there is no any business policy or IS/IT strategy
which guides university’s IT investments.
Following the conclusion that the university lacks IS/IT strategy the researcher queried for
more information on how the IT investments are implemented in order to establish a
perspective for the implementation of TCOSIS at the university. It was found that most of IT
investments especially computers and software are donor funded; also fat clients used are
shared among staffs because the university faces financial stress. It is seen that the university
can’t dictate on what the donors should give, the donors give what they want to give.
In addition, analysis of interview data from management and IT personnel shows, neither the
management nor the IT personnel know the clear cut of what ICT help they can expect from
the main UDSM as SJMC is one of its schools and a bit operating in semi-autonomous;
surprisingly, pirated software licenses are used at the university environment as
acknowledged by IT personnel!
24
The only document which is consulted during investments/ procurement of IT related stuffs is
Public Procurement Act (PPRA) 2011 item 60.2 which says:
The ministry responsible to matters related to computers and other related information
services shall prepare detailed and acceptable schedule of requirements and
specifications which shall be made available to the authority for the use by the
procuring entities when procuring for such items.
Table 4.1.2: Strata * Existence of IS/IT Strategy
Cross-tabulation
IS/IT-Strategy-
Total
Doc
No
Management
1
1
IT Personnel
2
2
3
3
Strata
Total
Table 4.1.3: Existence of IS/IT Strategy (Statistics)
Valid
3
Missing
0
N
Mean
.00
Median
.00
Mode
0
Std. Deviation
.000
25
4.2. IT Personnel’s level of knowledge to implement and manage TCOSISs
To investigate the level of knowledge IT personnel have in implementing and managing
TCOSISs; interview questions were asked targeting the following competency and awareness
areas necessary for implementation and management of TCOSISs: Thin Client awareness,
Thin Client technical Knowledge, LTSP, Wins Terminal Server, Open-Thin-client, LDAP, TFTP
protocol, and Linux competency.
Data in the table 4.2.1 shows there is a big gap of TCOSISs technical knowledge and
awareness between Senior Systems Administrator and his counterpart (Assistant Systems
Administrator) with former mentioned holding a quiet bigger advantage. Analysis shows IT
personnel are completely not knowledgeable on technologies necessary to implement and
manage TCOSISs such as: LTSP, OpenThinClient, and TFTP protocol.
Further analysis reveals Senior Systems Administrator is somehow knowledgeable on other
supporting technologies which may make it easy to train him on TCOSIS key technologies or
components. Table 4.2.1 shows IT personnel having some knowledge on TCs, Win Terminal
Server, LDAP, and Linux operating systems. Figure 4.2.1 summarizes with graphical
representation of data in table 4.2.2 when each competency was scored against the highest
score of 10.
26
Table 4.2.1[4]: TCOSISs awareness and competency among IT personnel
Note: 0s show lack of knowledge and awareness, 1s show awareness and knowledge.
AWARENESS & COMPETENCY IN TCOSISs TECHNOLOGIES
Wins
Open
Awarene
l
Termina
-Thin-
ss
How
l Server
Client
0
0
0
0
0
0
0
0
1
1
0
1
0
1
0
1
TFTP
Know
LINUX
Technica
LDAP
OCCUPATION
TCs
LTSP
TCs
Assistant
Systems
Administrator
Senior
Systems
Administrator
Table 4.2.2: TCOSISs competency rating among IT personnel
Senior Systems Assistant Systems Total
Investigated Item
Administrator
Administrator
Given
Thin Client Awareness
10
0
10
LTSP
0
0
10
Wins Terminal Server
5
0
10
Server
0
0
10
LDAP
4
0
10
Linux OS
7
0
10
TFTP Protocol
0
0
10
Open
Thin
Score
Client
27
Figure 4.2.1:
IT Personnel Technical Knowledge on
TCOSISs
C
o
m
p
e
n
c
y
10
9
8
7
6
5
4
3
2
1
0
Senior Systems Administrator
Assistant Systems
Administrator
S
c
o
r
e
Investgated Items
Figure 4.2.1-[3]: TCOSISs Technical Knowledge among IT personnel
4.3. List of available alternative OSS to the currently deployed proprietary software
which can operate in TC environment
To establish a list of alternative Open Source Software to the currently deployed and
prospective proprietary software; questionnaires were filled by computer user staffs to list their
desired software /IT services, and the ones they use to accomplish their day to day tasks.
Also IT personnel were asked to mention the software which they manage and the ones under
pipeline. Unfortunately IT personnel couldn’t mention any software under pipeline because the
university lacks a main guideline like IS/IT Strategy.
28
Table 4.3.1 below shows every one of the currently deployed and prospective (desired)
proprietary software has OSS alternative, in other words proprietary software can be covered
100% by OSS which can work in TCs environment. Furthermore, data in this table and
graphical representation in figure 4.3.1 show almost all the proprietary software have at least
three alternatives OSS which can be considered as a replacement.
Table 4.3.2 lists
researched alternative OSS to the desired and currently deployed software at the university.
Table 4.3.1[5]: Amount of alternative OSS for each proprietary software
Deployed
&
Prospective Amount of Alternative Open
Proprietary Software
Source Software
Adobe Audition
4
Adobe Photoshop
10
Adobe Premier
5
Famous
Director
Programs Management)
(TV
4
Microsoft Office
2
SPSS
7
Tally
3
Virtual DJ
6
Wins 7
3
Total
43
29
Table 4.3.2-[6]: List of alternative OSS to currently deployed and prospective
proprietary software
Used & Prospective Proprietary
Software
Alternative Open Source Software
SPSS
R, AdaMSoft, DAP, OpenEPI, PSPP,
Salstat, SOFA Statistics
Fedora
Wins 7
Ubuntu
Open Solaris
Open Office
Ms Office
LibreOffice
GIMP, Krita, Paint.NET, ChocoFlop
Adobe Photoshop
Cinepain, Pixia, Adobe Photoshop
Expr, Splashup, Picnik, Pixen
Audacity
Ardour
Adobe Audition
Traversour DAW
Open Octave
Mixmeister,
Virtual DJ
Mixxx,
Traktor
Pro,
PartyCloud, DeckaDance,Torq
OpenShot, Kdenlive, VideoLAN, Movie
Adobe Premier
Creator, PiTiVi, Cinelerra
Freevo
Famous
Director
(TV
Management software)
Programs
GeeXBoX
KatchTV
Kdetv
PostBooks
Tally
GnuCash
BS1 Accounting
30
FFrecquency of alternative OSS
Amount of Alternative Open Source
Software
10
9
8
7
6
5
4
3
2
1
0
Amount of Alternative Open
Source Software
Open Source Software
Figure 4.3.1: Amount of Alternative OSS
4.3. Summary of the key findings
Analysis reveals the university lacks IS/IT strategy which allows for IT investments to be
unplanned and based on uninformed decisions. Also, while suffering financial stress, the
ineffective bureaucratic structure makes it hard to understand what IT plans can SJMC set
and invest by itself and what it can expect from the main UDSM. Furthermore, findings show
IT personnel don’t have good knowledge to implement and manage TCOSIS, with the
university not supporting IT professional trainings, it makes the situation even worse. On the
other hand findings reveal that 100% of the currently deployed proprietary software in addition
to desired software by staffs can be covered by open source alternatives with almost each
one pointing to at least three alternatives.
31
Observation shows server room contains one rack with a mounted cisco router and no any
server computer; staffs’ data are served locally on fat clients’ hard drives. Observation and
acknowledgement from IT personnel concludes that management sees IT in the perspective
of internet services and Microsoft applications only. Below list summarizes key factors
hindering the implementation of TCOSISs at the UDSM-SJMC.
•
Lack of IS/IT Strategy
•
Poor technical knowledge among IT personnel on TCOSISs
•
Too much donor dependent and financial constraints
•
Management doesn’t fully recognize potential role of IT to its business (No motivation
& passion to invest in IT)
•
Failure to act against pirated software license
•
Ineffective university bureaucratic structure which confuses roles to played by main
UDSM and SJMC
This chapter presented interpretation of the key findings of this research study which play a
potential role in hindering implementation of TCOSIS at UDSM-SJMC. Based on these
findings next section gives recommendation and highlights other areas which need further
research; the final part is the conclusion for the whole research.
32
CHAPTER 5
RECOMENDATIONS, CONCLUSION AND NEED FOR FUTURE RESEARCH
5.1. Recommendations
In the light of the key findings and analysis from this study, below recommendations are
crucial for UDSM-SJMC in order to implement TCOSIS. The most important issues to be
addressed are as follows: lack of university IS/IT strategy, too much donor dependency as
attributed to financial constraints, ineffective bureaucratic structure between SJMC and its
parent UDSM confuses IT responsibilities, lack of technical knowledge among IT personnel to
implement and manage TCOSISs, lack of passion and motivation from management to invest
in IT, and failure of management to act against pirated software license.
Creation of university IS/IT strategy
In order to make highly informed IT decisions, the university is highly advised to consider
creating IS/IT strategy document which covers long-term and short-term IT investment plans.
At the moment it is even harder for the university to convince donors on TCOSIs or any other
IT investments as they haven’t been documented anywhere to give a clear picture of their
essence. Furthermore, the status quo makes it very difficult to justify financial constraints
without a well-documented IS/IT strategy.
Concern over too much donor dependency and financial constraints
Too much reliance on donors for IT investments with a reason that the university suffers
financial constraints is a big concern if the university would consider implementing any IT
investments to serve business goals. It is high time now for the university to think on
implementing TCOSISs; researches have proven TCOSISs as way far too economic option
than fat client solutions which are currently running at the university. The university should
also review its budget allocations in order to increase its IT portion.
33
Confusion on IT responsibilities as a result of Ineffective bureaucratic structure between
SJMC and its parent UDSM
Both SJMC and the main UDSM should together sit to review the responsibilities of each on
implementing IT investments. The roles of each person concerned should be clarified and
follow up procedures should be set. At the moment IT personnel feels there is no any link
between them and main UDSM other than receiving internet service while the management
believe there is more than that, but just that they are not sure. Under this kind of environment
there is no promise for TCOSIS implementation.
Technical knowledge among IT personnel to implement and manage TCOSIS
The university is advised to support professional IT training programs so as to give necessary
knowledge for IT personnel to implement and manage TCOSISs. Procedures for professional
annual IT trainings should be set to ensure trainings add value to the university. On the other
hand the university may consider entering in some special kind of leasing agreements which
may see the SJMC having its own TCOSIS after some specific time of leasing period.
In addition to above, SJMC is advised to talk to other academic institutions to seek a
possibility of forming a funded ICT center institution with a main purpose to research, develop,
and lease state of art IT solutions to each participating entity. This is even more important
because the current model allows for duplication of resources and effort since each institution
is pursuing own IT project which in totality are based to serve similar needs. Note: This
recommendation should be taken with care as further described in final part of section 5.3.
Management’s passion and motivation to invest in IT
SJMC should seek to arrange IT visits to other universities in order to gain a useful knowledge
on how far others have gone regarding their information systems. It is recommended that IT
visiting delegation to include management and IT personnel. Arrangements like this will help
34
the university gain the insight of the gap between IT and information needs which can be a
motivational factor for future IT investments and plans. At the moment in IT perspective,
SJMC is in a state of rest which needs some external stimulants to start moving.
Strictly rules to fight against pirated software licenses
SJMC management should enforce strictly rules against the use of pirated software licenses
at the university environment. The use of pirated software is illegal, as long as they are being
regarded as a free option of software acquisition they will be reducing the insight on how big
the problem is with university IT infrastructure. SJMC should take serious consideration on the
use of OSS to offset the gap created by ruling out pirated software.
5.2. Conclusion
This study has found that the university is open to the idea of implementing TCOSIS. Major
contributing factors which hinder implementation of TCOSIS in Tanzanian academic
institutions have been found to be: absence of IS/IT strategy, IT personnel lack technical
knowledge on TCOSISs, too much donor dependency as attributed to financial constraints,
management’s lack of passion and motivation to invest in IT, failure to act against pirated
software licenses, and ineffective bureaucratic structure. On the other hand, observation
reveals SJMC has a very stable internet connection with good speed; this provides a very nice
environment for TCOSIS implementation as software and huge support is available through
the internet.
This study has found that 100% of the currently deployed proprietary software can be offered
by OSS. The above mentioned handicaps need to be resolved in order to create conducive
environment for university to implement TCOSIS.
35
5.3. Need for Future Research
This study serves as a good starting point to explore key factors hindering implementation of
TCOSISs in Tanzanian academic institutions; however the motivation is still to do further
research on some areas which couldn’t be covered by this study because of three month time
limitation and the scope of this research. This study should act as a pilot study for further
studies to be done in private academic institutions so as to gain insight if they exhibit the same
factors as government institutions. Another issue worth pursuing is a study on how effective
are academic institutions’ organizational structures (bureaucratic structures) support IT
implementation plans.
Furthermore, there is a need to conduct a study on how well the ministry responsible for IT is
keeping up with technological advancements; this is important because public universities
consult PPRA policy as quoted final part of section 4.1 in their IT procurement processes.
Finally, since literature shows academic institutions exhibit similar basic information needs;
there should be done a study to explore the possibilities of establishing a funded institution
with main responsibility to research and lease state of art IT solutions to academic institutions.
By forming such an institution care should be taken to ensure each participating entity
maintains its competitive advantage.
36
CHAPTER 6
REFERENCES AND APPENDICES
6.1. References
2X Software Ltd. 2010. THIN CLIENTS: Benefits and savings of using thin clients [Online].
Available at: http://www.2x.com/docs/en/whitepapers/pdf/WPthinclient.pdf [Accessed on 19
September 2013].
Arbulu, D.T. and Vosberg, J.B. 2007.Feasibility Study and Cost Benefit Analysis of Thin-Client
Computer System Implementation Onboard United States Navy Ships [Online].MBA project,
Naval Postgraduate School. Available at: http://www.dtic.mil/dtic/tr/fulltext/u2/a473257.pdf
[Accessed on: 30th July 2013].
BECTA.
2004.
Thin
client
networking
[Online].
Available
at:
http://webarchive.nationalarchives.gov.uk/20101102103654/foi.becta.org.uk/content_files/corp
orate/resources/technology_and_education_research/thin_client.pdf [Accessed on: 21st July
2013].
BECTA.
2005.
Open
Source
Software
in
Schools
[Online].
Available
at:
http://www.openskm.com/doc/oss_study_spectrum.pdf [Accessed on: 22nd July 2013].
BECTA.
2007.
Thin
Client
technology
in
schools
[Online].
Available
at:
http://www.vxl.net/fckeditor/editor/filemanager/connectors/aspx/fckeditor/userfiles/file/Thin%20
Client%20-%20Schools(3).pdf [Accessed on: 1st July 2013].
Brinkley, E.D. 2006. Thin-Clients in the Classroom; Software Compatibility and Survey of
Systems.In T. Reeves and S. Yamashita (Eds.), Proceedings of world conference on ELearning in Corporate, Government, Healthcare, and Higher Education.Chesapeake, 22nd
August,
2013.
VA:
AACE.
pp.
380-390.
Available
at:
http://lancore.sourceforge.net/doc/thin_clients_classroom.pdf [Accessed on 22nd August
2013].
Bruggink, M. 2003. Open Source Software: Take It or Leave It [Online]. Netherlands:
International Institute for Communication and Development (IICD). Available at:
37
http://www.iicd.org/about/publications/open-source-software-take-it-or-leave-it [Accessed on
30th July 2013].
CanyonSnow Consulting. 2009. Environmental Benefits of Thin Computing: A comparison of
the environmental impacts of conventional desktops and thin computing [Online]. Available at:
http://www.wyse.com/sites/default/files/documents/whitepapers/Wyse_Environmental_Benefit
s_WhitePaper.pdf [Accessed on 22nd August 2013].
CDW.
Thin
Clients
Are
in
(Again)
[Online].
Available
at:
http://www.fedtechmagazine.com/sites/default/files/legacy/resources/pdf/0630-Federal-ThinClient-Whitepaper.pdf [Accessed on 1st July 2012].
Commendador, M. 2010. Introduction of Information Technology [Online]. Available at:
http://mergz02.blogspot.com/ [Accessed on 19th September 2013].
CONONICAL. 2011. Ubuntu Thin Clients [Online].Confidential Ubuntu Hardware Summit.8th
December
2011.
Available
at:http://odm.ubuntu.com/uhs/2011/Ubuntu%20Thin%20Client%20Solution.pdf [Accessed on
19th July 2013].
CSS-Inc. 2009. Comparing Desktop and Thin Client Computing in Industrial Applications
[Online].
Available
at:
http://www.ccs-
inc.com/images/uploads/Thin_Client_Computing11.pdf [Accessed on 19th September 2013]
Doyle, P. and Deegan, M. and O’Driscoll, C. 2009. Evolution versus Revolution as a Strategy
for Thin Client Acceptance: Case Study [Online]. ICIT’09 The 4th International Conference on
Information Technology. AL-Zaytoonah University of Jordan, 01st July 2009. Available
at:http://arrow.dit.ie/scschcomcon/83/ [Accessed on: 22nd August 2013].
Elbaz, W.S. and Stewart C. 1999.Breaking though with thin client technology: a cost effective
approach for academic libraries [Online].Proceedings of 20th International Conference. Crete,
17th
–May
21st
,
1999.Available
at:
http://docs.lib.purdue.edu/cgi/viewcontent.cgi?article=1463&context=iatul&seiredir=1&referer=http%3A%2F%2Fscholar.google.com%2Fscholar%3Fq%3Dthin%2Bclients%
2Bin%2Bacademic%2Binstitutions%2Bpdf%26btnG%3D%26hl%3Den%26as_sdt%3D0%252
38
C5#search=%22thin%20clients%20academic%20institutions%20pdf%22 [Accessed on 1st
July 2013].
Government of South Austalia. 2004. Open Source Software Suitable for use in Australia and
New Zeland: A review of technical documentation [Online]. Department of Education and
Children’s
Services
South
Australia.
Available
at:
http://www.mceecdya.edu.au/verve/_resources/open_source_aust_nz.pdf [Accessed on 2nd
August 2013].
Greenberg, S. and Anderson, C. and Mitchell-Jackson, J. 2011. Power to the people:
Comparing Power Usage for PCs and Thin Clients in an Office Network Environment [Online].
Available at: http://www.lamarheller.com/technology/thinclient/powerstudy.pdf [Accessed
on 19th September 2013].
IDC. 2010. Reducing IT Costs with Client Virtualization [Online]. Available at:
http://www.ncomputing.com/docs/whitepapers/en/whitepaper_idc.pdf?mkt_tok=3RkMMJWWf
F9wsRonva7OZKXonjHpfsX56%2BooW6KxlMI%2F0ER3fOvrPUfGjI4DTcNqI%2FqLAzICFpZ
o2FF2Oe%2BYbJVU8%2Fta [Accessed on: 18th August 2013].
IDC. 2012.Myths and Realities of Centralized Virtual Desktops Adoption [Online]. Available at:
https://www.google.co.tz/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rja&ved=0CCs
QFjAA&url=http%3A%2F%2Fdownload.microsoft.com%2Fdownload%2F6%2F9%2FF%2F69
F5C45F-C268-46BE-A828B4141733E98A%2FMyths_Realities_CVDs.pdf&ei=MCUXUsy9NYnmswa_6oEg&usg=AFQjC
NEo0Dy69jhRg5rOJMhRXL9tsrSY5g [Accessed on: 20th July 2013].
IGEL Technology. 2009.
Thin Clients in the Financial Sector [Online]. Available at:
https://www.igel.com/fileadmin/user/upload/documents/PDF_files/White_Paper_EN/WP_Finan
ce_98-EN-10-1.pdf [Accessed on: 2nd July 2013].
IGEL Technology. 2011. Buyers’ Guide: Future-Proof Investment with Thin Clients [Online].
Available at: [Accessed on 19th September 2013].
INNOV. 2010. A Discussion of Thin Client Technology for Computer Labs [Online]. Available
at: http://tedeco.fi.upm.es/docs/ICTEL_2010_7_CR.pdf [Accessed on 5th July 2013].
39
Krikke, J. 2004. Thin Client Get Second Chance in Emerging Markets [Online]. Available at:
http://lancore.sourceforge.net/doc/thin_client_emerging_markets.pdf [Accessed on 3rd August
2013].
Kumar, A.B. 2011. Thin Client Web-Based Campus Information System for Fiji National
University: International Journal of Software Engineering and Applications 2(1) [Online].
Available at: http://arxiv.org/ftp/arxiv/papers/1102/1102.0583.pdf [Accessed on: 5th August
2013].
Lakhan, S. and Jhunjhunwala, K. 2008. Open Source Software in Education: Academia has
adopted open source software for some online learning initiatives because it addresses
persistent
technical
challenges
[Online].
Available
at:
http://net.educause.edu/ir/library/pdf/eqm0824.pdf [Accessed on 01st July 2013]
Leinonen, T. and Pietarila, J. and Kligyte, G. 2002. Developing Open Source Software for
Educational Sector Case: - Future Learning Environment 3 [Online]. Proceedings of
1stEuroAsia conference on Information and Communication Technology.Shiraz, 29th – October
31st,
2002.
Available
at:
http://s3.amazonaws.com/academia.edu.documents/30837083/teemu_leinonen_os_edu_fle3.
pdf?AWSAccessKeyId=AKIAIR6FSIMDFXPEERSA&Expires=1372242601&Signature=lmcxh
ePrCfsBB%2FUP%2FIuxNtj1L%2FM%3D [Accessed on 01stJuly 13]
Lin, Y. and Zini, E. 2006.Free/Libre Open Source software implementation in schools:
Evidence from the field and implications for the future [Online]. Available at:
http://www.ylin.org/CAE1033.pdf [Accessed on: 9th August 2013].
Mellon and Hewlett Foundations. 2005. The Development of Open Source Software and its
Potential
Implications
for
Higher
Education
[Online].
Available
at:
http://www.immagic.com/eLibrary/ARCHIVES/GENERAL/ITHAKAUS/I051006B.pdf [Accessed
on 26th August 2013].
Michler, C. 2005. The Procurment Decision - “Open” or “Closed” Source Software?10(1)
[Online]. Available at: http://www.deakin.edu.au/buslaw/law/dlr/docs/vol10-iss1/vol10-1-12.pdf
[Accessed on 29th July 2013].
40
Mohapatra, K.T. 2003. Thin Clients and PCs – A comparative study to find suitability for
different
computing
environment
[Online].
Available
at:
http://tanmaykm.tripod.com/work/articles/ThinClientAndPC_ComparativeStudy.pdf
[Accessed on 19th September 2013].
Molescu, A.D. 2002. An alternative to Thick Clients for Personal Wireless Devices [Online].
Available at: http://www.laputan.org/pub/sag/ThinClient.pdf [Accessed on 19th September
2013].
NCTE.
2008.
Thin
Client
Networks
[Online].
Available
at:
http://www.ncte.ie/documents/advicesheets/19ThinClient(June07).pdf [Accessed on: 21st July
2013].
Newburn
Consulting.
2002.
Thin
Client
Benefits
[Online].
Available
at:
http://www.thinclient.net/pdf/Thin_Client_Benefits_Paper.pdf [Accessed on 10th August 2013].
National Semiconductor. 2000. Thin-Client Computing: Competitive Edge for Retail and
Banking
Sectors
[Online].
Available
at:
http://www.vxl.net/fckeditor/editor/filemanager/connectors/aspx/fckeditor/userfiles/file/ThinClie
ntinRetail(1).pdf [Accessed on: 25th July 2013].
Optaros. 2005. The Growth of Open Source Software in Organizations [Online]. Available at:
http://dirkriehle.com/wpcontent/uploads/2008/03/wp_optaros_oss_usage_in_organizations.pdf [Accessed on 7th July
2013].
PPRA. 2011. The Public Procurement (Goods, Works, Non consultant Services, and Disposal
of
Public
Assets
by
Tender)
Regulations,
2005
[Online].
Available
at:
http://ppra.go.tz/index.php/95-legislation/140-public-procurement-act-2011 [Accessed on 5th
September 2013]
Sharma, R. and Koshy, S. 2011. Open Source Software in Education 1(2), pp. 25 [Online].
Available at: http://www.cosmicjournals.com/ijmbs/12/rakesh.pdf [Accessed on 23rd August
2013].
41
Stoltz, L.M. 1999. The Open Source Revolution: Transforming the Software Industry with Help
from
the
Government
[Online].Senior
Thesis,
Pomona
College.
Available
at:
http://scholarship.claremont.edu/cgi/viewcontent.cgi?article=1006&context=pomona_theses
[Accessed on: 20th July 2013]
Tanzanian
Government.
2003.
Available
at:
ICT for Basic Education [online]. Available
at:
National
ICT
Policy
[online].
http://www.tanzania.go.tz/pdf/ictpolicy.pdf. [Accessed on 1st July 2013].
Tanzania
Government. 2007.
http://www.moe.go.tz/index.php?searchword=ict+policy&ordering=&searchphrase=all&Itemid=
564&option=com_search. [Accessed on: 1st July 2013].
UNDP-APDIP. 2004. Free/ Open Source Software Education [Online]. Available at:
http://www.apdip.net/publications/fosseprimers/LocalizationPrimer.pdf. [Accessed on 1st July
2013].
Su,
H.
2011.
Setup
SunRay
at
home
[Online].
Available
at:
https://blogs.oracle.com/hlsu/entry/setup_sunray_at_home [Accessed on 19th September
2013].
42
6.2. Appendices
6.2.1. Schedule of activities
WEEKS
1
ACTIVITIES
2
3
4
5
6
7
8
9
10
11
12 13
14
Case study
selection & official
request for data
collection
Preparing
questionnaires,
literature
&
review
Supervisor
Consultation
Distribution of
Questionnaire&
finalizing
literature review
Conducting
Interviews.
Collection
of
Questionnaire.
Data Analysis
Report
writing,
Submission
&
Supervisor
consultation
43
15
16
44
Download