School of Informatics & Innovative Systems
Browse by
Recent Submissions
-
Secure virtualized Client Server Instant Messaging Through Port-Based Algorithm
(JOOUST, 2018-01) -
Cloud-Based Virtualization as an Enabling Technology for theTransformation of Healthcare in Kenya
(JOOUST, 2015)Cloud-based virtualization is a technology that has had a global entrance over the past few years. Volumes of data are handled in healthcare hence a need to embrace this technology. The primary concern has always ... -
Network Security Model for University Networks in Kenya
(JOOUST, 2024)University networks contain a variety of information that varies from highly lucrative patents to personal information. The purpose of this study was to develop a secure network model that will enhance network security ... -
An Integrated Mobile Identity Authentication Model
(JOOUST, 2023)Personal identity theft is an illegal act that involves a perpetrator possessing an identity of a victim without their knowledge nor consent and in most cases for monetary gain or criminal fraudulent activities that the ... -
Network Security Model for University Networks in Kenya
(JOOUST, 2023)University networks contain a variety of information that varies from highly lucrative patents to personal information. The purpose of this study was to develop a secure network model that will enhance network security for ... -
An Enhanced Framework for Assessing Health Information Systems Security Risks
(JOOUST, 2023)The increasing digitization of health information enhanced accessibility, efficiency and quality of healthcare services. However, it has escalated cyber security threat, data breaches, unauthorized ... -
A Human Firewall Simulator for Enhancing Security Awareness against Business Email Compromise
(JOOUST, 2023)Cybercriminals exploit the weakest link in an organization's security, targeting CEOs or CFOs through business email compromise, or CEO fraud. These attacks primarily involve social engineering, tricking employees into ... -
Information Systems Security and Implementation of Security Controls Based on Iso Standards:A Case of Small and Medium Enterprises in the Financial Sector in Kisumu City
(JOOUST, 2015)Most organizations rely significantly upon information and communication technology and the internet in their day to day operations. Irrespective of size and type, they need a suitable set of information security controls ... -
Towards Securing Information Systems in Public Universities: A Study of Kenya Public Universities Western Kenya Region
(JOOUST, 2018)Universities in the world today consider information to be their most important asset. They therefore ensure information security by taking appropriate measures to ensure no information is leaked or passed to unauthorized ... -
Microfinance Management Information Systems Integrated With Mobile Money and Unstructured Supplementary Data Service (USSD) for Microfinance Service.
(JOOUST, 2015)The three major challenges facing microfinance institutions in achieving their goals include; Difficulty in exchange of information with remote clients, management and processing of data at the institution level and ... -
Effects of ''On Job'' Information Technology Security Training on Network Security Management.
(JOOUST, 2015)Although SACCOs are established to help their members access financial services, they have not been able to meet their demands satisfactorily because of their low financial performance. Poor financial performance is ... -
Effects of "on Job" Information Technology Security Training on Networks Security Management.
(JOOUST, 2015)This study has been conducted to determine the effects of (on job) IT security training on the management of computer network's security within Kenyan Public Universities. Computer networks in Kenyan institutions have ... -
Evaluation of ICT Disaster Recovery and Preparedness : a Survey of Health Research Organization in Kisumu County.
(JOOUST, 2020)Research organizations utilize information technology to generate process and transmit both sensitive and vital data that is critical in development of drugs, vaccines and health policy. Despite the role ICT plays in these ... -
Deployment of Honeypots as Proactive Detection Tools for Monitoring Cyber Related Incidences
(JOOUST, 2015)The Kenya government is rolling the Vision 2030 programme where ICT plays a major role in achieving the components of the Pillars associated with it. It has encouraged the rapid deployment of the high speed fiber optic ... -
Web Based Data Collection, Transmission and Reporting System
(JOOUST, 2015)Web based data collection, transmission and reporting s stem is a project that was aimed at providing a robust mobile application environment that can be used for any study data collection, specifically improving the data ...