Repository logo
  • English
  • Català
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Italiano
  • Latviešu
  • Magyar
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Suomi
  • Svenska
  • Türkçe
  • Tiếng Việt
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Yкраї́нська
  • Log In
    New user? Click here to register.Have you forgotten your password?
Repository logo
  • Communities & Collections
  • All of DSpace
  • English
  • Català
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Italiano
  • Latviešu
  • Magyar
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Suomi
  • Svenska
  • Türkçe
  • Tiếng Việt
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Yкраї́нська
  • Log In
    New user? Click here to register.Have you forgotten your password?
  1. Home
  2. Browse by Author

Browsing by Author "Masika, Innocent Wanyonyi"

Now showing 1 - 1 of 1
Results Per Page
Sort Options
  • Loading...
    Thumbnail Image
    Item
    Management Information System Capabilities and Performance of Hospitals in Mombasa County, Kenya
    (Kenyatta University, 2025-07) Masika, Innocent Wanyonyi
    Uneven progress in the adoption and usage of management information systems in the Kenyan health sector has substantially affected the performance of hospitals. Time lag has been observed in reports submission to the Ministry of Health, contributed by improper documentation. Cyclic medical products’ stock-out is now common, and hospitals in Mombasa County are experiencing slow patient turnaround for patients seeking healthcare services. This study, therefore, aimed to examine the influence of MIS capabilities on the performance of level 4 and 5, public and private hospitals in Mombasa County, Kenya. Specifically, the study sought to establish the influence of service delivery automation, system management, data security, and information quality on the performance of hospitals in Mombasa County. The study was anchored on Systems Theory, Technology Acceptance Model, Unified Theory of Acceptance and Use of Technology, and Resource Based View Theory. A descriptive research design was adopted, targeting 318 technical ICT specialists working in 31 level 4 and 5, private and public hospitals in Mombasa County. A sample size of 96 respondents participated in the study, representing 30 percent of the target population and selected using stratified random sampling technique. Primary data was collected using a semi-structured questionnaire. A pilot study was conducted to test the instrument’s reliability, measured using Cronbach’s Alpha, while expert view was utilized to achieve content validity. Questionnaire distribution was through drop and pick method and using Kobo Toolbox Data Collection link where necessary. Data collected was subjected to descriptive, relational, and inferential analysis. The study revealed that service delivery automation, system management, data security and information quality had a positive significant influence on the performance of hospitals in Mombasa County. The study concludes that service delivery automation enhances the patient flow because automated appointment scheduling as a sub-system can reduce the time patients spend waiting for consultations and treatments. Effective system management ensures optimal resource allocation within hospitals and can help hospitals prioritize the use of medical supplies, equipment, and human resources. Patients are more likely to seek medical care and share sensitive information when they trust that their data is secure. High-quality information ensures that patient records are accurate and up-to-date, which is crucial for effective diagnosis and treatment. The study recommends that the hospitals should transition from paper-based records to comprehensive electronic health records systems. Transitioning to comprehensive EHR systems can streamline patient data management, improve communication among healthcare providers, and enhance patient care coordination. The hospitals should perform thorough assessments of existing data security measures to identify vulnerabilities and areas for improvement.

DSpace software copyright © 2002-2025 LYRASIS

  • Cookie settings
  • Privacy policy
  • End User Agreement
  • Send Feedback