School of Informatics & Innovative Systems
Browse by
Recent Submissions
-
Network Architecture Defense: Holistic Security Pattern-Based Model
(JOOUST, 2024)Network security experts face numerous challenges in protecting networks despite implementing defense strategies. The complexity of networks, coupled with a scattered approach to security implementation, adds to the ... -
Integrating Engagement Theory in Usability Evaluation Framework for the Design and Development of Health Information Systems.
(JOOUST, 2022)Usability is often ignored; many software developers focus on the functionalities and give little thought to the usability. This hinders the users and also damages the reputation of developers and the softwares. Such systems ... -
Integrated e-marketing adoption model for small businesses: An institutional theory perspective.
(JOOUST, 2019)Small sized businesses play an important role in the growth of economies all over the world, yet they appear to be slow in adopting E-marketing technology to market their products and services despite the benefits ... -
Influence of Accounting Security Threats on the Relationship between Computerized Financial Systems and Audit Risk Management in Public Institutions
(JOOUST, 2019)The rapid change in information technology, the wide spread of user-friendly systems and the great desire of organizations to acquire and implement up-to-date computerized financial systems and software's. ... -
A Stratified Cyber Security Vigilance Model for Corporate Information Technology Infrastructure
(JOOUST, 2019-06)Cyberspace is a relatively new unavoidable battlefield for most organizations- businesses governments, security agencies, learning and research institutions, political parties, terrorist groups and many others. As a result ... -
Mobile Phone Usage and Economic Growth Model in the Context of vision 2030
(JOOUST, 2018)Kenya has emerged in recent times as one of the fastest growing telecom markets in the world. The Kenyan mobile industry's impact on economic growth is experiencing inconsistency, which requires an integrated model to study ... -
Addition-composition Fully Homomorphic Encryption sheme and its Enhancement of Data Security in Cloud Computing
(JOOUST, 2019)Cloud computing is a technological paradigm that enables computer users to access computing applications and services on a pay-as-you-use model. Over the years, the adoption of cloud computing by cloud service providers ... -
The Contextualization of Structuration Theory in Electronic Government in Enhancing Governance in Two County Governments in Kenya
(JOOUST, 2018)Today, the Kenyan government is investing and has endeavored to embrace electronic government (e-government) in almost all ministries to pave way for speedy service delivery, enhance transparency and accountability. However, ... -
Extended Acceptance and Use of Information Technology Model: Assessing Integrated Financial Management Information Systems in the Public Sector
(JOOUST, 2017)Integrated Financial Management informtion Systems as a system is globally considered as a con¬tributing factor significantly towards the improvement of financial management in the broader government sectors, it has such ... -
Towards Modeling and Building E-Agriculture Framework in Kenya
(JOOUST, 2015)Sustainable poverty reduction in developing nations, such as Kenya, is only achievable through economic growth and development strategies where agriculture is considered as a key driver. This is because agriculture contributes ... -
E-Commerce Adoption in Publishing Industry
(JOOUST, 2018-03)E-Commerce (electronic commerce or EC) is the buying and selling of goods and services, or the transmitting of funds or data, over an electronic network, primarily the Internet through which transactions or terms of sale ... -
An Optimized Artificial Intelligence Model for Emergency Case Response in Healthcare
(JOOUST, 2022)Artificial intelligence (AI), which is already being used in healthcare, has brought a paradigm shift to the field. Owing to the growing availability of healthcare data, there has been rapid advancement in the use of ... -
Factors That Influence Cybersecurity Compliance Behaviours by Bank Employees: A Case of Banks Operating in Kenya
(JOOUST, 2022)Digitization of transanctions in Banks has developed exponentially since the advent of the internet technology. This has brought about efficiency and high quality service delivery at all times. However, cyber threats also ... -
A Participatory Model for an Enhanced Adoption of ICT Innovations by Smallholder Farmers
(JOOUST, 2022)Agriculture has been identified as the main source of livelihood for a large population in Africa, with over 80% of farmers being smallholder farmers. However, despite a large group of smallholder farmers being involved ... -
Pseudo-Stochastic Mobility Tracking Protocol for Secure and High Performance Handovers in 5g and Beyond Networks
(JOOUST, 2022-03)The goal of this thesis was to develop a pseudo-stochastic mobility tracking protocol for secure and high performance handovers in 5G and beyond networks. The research specifically assessed current user equipment mobility ... -
Enhanced Information Security Model Using Integrated Approach for Saccos in Kenya
(JOOUST, 2020)Information systems security is a very important aspect for the performance and sustainability of SACCOS. A secure information systems security plays a significant role of keeping all the SACCOS information from being ... -
Towards modeling and building e-Agriculture framework in Kenya
(JOOUST, 2015-05) -
Challenges faced by the judiciary in the implementation of its strategic plans in Kenya
(UoN, 2011-10)Strategic Planning is a pro-active result based management strategy adopted by institutions with a view to achieving their desired future (Judiciary Strategic Plan 2005- 2008). Strategic Management Process is a new concept ...