School of Informatics & Innovative Systems
Browse by
Recent Submissions
-
Information Systems Security and Implementation of Security Controls Based on Iso Standards:A Case of Small and Medium Enterprises in the Financial Sector in Kisumu City
(JOOUST, 2015)Most organizations rely significantly upon information and communication technology and the internet in their day to day operations. Irrespective of size and type, they need a suitable set of information security controls ... -
Towards Securing Information Systems in Public Universities: A Study of Kenya Public Universities Western Kenya Region
(JOOUST, 2018)Universities in the world today consider information to be their most important asset. They therefore ensure information security by taking appropriate measures to ensure no information is leaked or passed to unauthorized ... -
Microfinance Management Information System Integrated With Mobile Money and Unstructured Supplement Data Service (USSD) for Microfinance Service.
(JOOUST, 2015)The three major challenges facing microfinance institutions in achieving their goals include; Difficulty in exchange of information with remote clients, management and processing of data at the institution level and ... -
Effects of ''On Job'' Information Technology Security Training on Network Security Management.
(JOOUST, 2015)Although SACCOs are established to help their members access financial services, they have not been able to meet their demands satisfactorily because of their low financial performance. Poor financial performance is ... -
Effects of "on Job" Information Technology Security Training on Networks Security Management.
(JOOUST, 2015)This study has been conducted to determine the effects of (on job) IT security training on the management of computer network's security within Kenyan Public Universities. Computer networks in Kenyan institutions have ... -
Evaluation of ICT Disaster Recovery and Preparedness : a Survey of Health Research Organization in Kisumu County.
(JOOUST, 2020)Research organizations utilize information technology to generate process and transmit both sensitive and vital data that is critical in development of drugs, vaccines and health policy. Despite the role ICT plays in these ... -
Deployment of Honeypots as Proactive Detection Tools for Monitoring Cyber Related Incidences
(JOOUST, 2015)The Kenya government is rolling the Vision 2030 programme where ICT plays a major role in achieving the components of the Pillars associated with it. It has encouraged the rapid deployment of the high speed fiber optic ... -
Web Based Data Collection, Transmission and Reporting System
(JOOUST, 2015)Web based data collection, transmission and reporting s stem is a project that was aimed at providing a robust mobile application environment that can be used for any study data collection, specifically improving the data ... -
Secure Virtualized Client Server Insant Messging Through Port-Based Algorithm
(JOOUST, 2018)Instant messaging has grown to become a very important means of communication among organization staff and among individuals outside an organization. The problem with this form of communication is that some of the instant ... -
Effective Use of Abacus in the Teaching and Learning of Mathematics among Class Three Teachers in Public Primary Schools in Kasipul Division Rachuonyo South Sub-County, Kenya
(JOOUST, 2015)ABSTRACT Abacus has been considered as one of the most significant tools used for teaching and learning of mathematics among primary school mathematics teachers since it helps in spurring better performance in mathematics. ... -
Determination of Effective Information systems Security in Secondary Schools in Kenya: A Case of Kisumu County
(JOOUST, 2018)Adoption of information systems has become a core issue in many sectors of the economy including secondary schools in education sector. These information systems have enabled the secondary schools to achieve efficiency in ... -
Influence of Selected Motivational Factors on Job Satisfaction among Support Staff in Secondary Schools in Rarieda Sub-County
(JOOUST, 2015)Despite, the fact that support staff play a significant role in school activities, their contribution has not been given serious recognition. The recent report by an Education Task Force was an indication that they were ... -
Development and Implementation of E-Leave Management System in Banking Sector (KCB)
(JOOUST, 2015)The research investigated the state of leave management system used by different organizations i.e. brief comparison of manual le-ave management system and E-leave management system. A leave management system had been ... -
A Framework Based on Institutional Theory for Cyber Resiliency in County Government
(JOOUST, 2020)Cyber resiliency is the ability of a system to anticipate, withstand, recover and evolve when a cyber-attack has occuned in an organization or institution. Poor IT habits still persist in institutions exposing them to ... -
Inter-Schools Collaboration and Information Management System: A Case of Kisii County Secondary Schools
(JOOUST, 2020)Inter-Schools Collaboration and Information Management System are technologies that support Knowledge Management (KM) in organizations, specifically - knowledge generation, codification, and transfer. The use of KM in ... -
Information Technology Governance and Value creation in the Kenyan Public Sector: A Study of Homabay County
(JOOUST, 2015-05)Information Technology (IT) governance has proven to be a necessary tool for organizations that need to manage and control their IT investments for purposes of enhancing their benefits and value. A larger percentage of ... -
SMS Based Health Appointment Management Application for Clientele Follow-up: A Case study of Nuvaring Project, KEMRI/CGHR
(JOOUST, 2018)Patient follow-up in research settings is important for overall wellbeing of the particular patient. The mainstratcgies of managing clientele follow-up appointments are based on home visitations and phone calls, but cases ... -
A Security Model for Electronic Health Records System
(JOOUST, 2017)In order to enhance efficiency and effectiveness in the healthcare sector an Electronic Health Record (EHR) system, is being used for patients' information management. The EHR system contains sensitive patient information ... -
Implementing a Risk Management Strategy for Funsoft in Three Public Hospitals in Kisumu County
(JOOUST, 2015)As the adoption rate of electronic health record continues to accelerate, the need to enhance information risk management has become more critical to create, compliant health care environment. Healthcare providers and ... -
Assessment of the Level of Compliance by the Universities to their ICT Security Policies: A Survey of Kisumu and Siaya Counties
(JOOUST, 2015-03)Today, almost all organizations around the world are using Information Communication Technology (]CT) in their daily business. An ICT policy safeguards Confidentiality, Integrity and Availability (CIA) oflnformation Systems ...