Search
Now showing items 1-10 of 22
Evaluation of School Management Information Systems(Smis) in Secondary Schools in Siaya County
(JOOUST, 2021)
The study analyzed the qualitative assessment of the School Management Information Systems in secondary schools within the framework of program theory by (Chen, 2012) and Technology Mediated Learning Evaluation Framework ...
Implementing a Secure Messaging Solution Using Enhanced Zimbra Collaboration Suite
(JOOUST, 2014)
A mail server is an application that receives incoming e-mail from local users and remote senders and forwards outgoing e-mail for delivery. It is also known as a mail transfer agent or MTA, a mail transport agent, a mail ...
Effects of Biometrics on the Security of Enterprise Data and Information Assurance
(JOOUST, 2015)
The increasing problem of user verification and identification has compelled institutions to adopt biometric based information security solutions, which rely on the uniqueness of the human physiological and behavioral ...
Adaptive Congestion Control Algorithm for Virtualized Cloud Data Communication
(JOOUST, 2017-11)
The purpose of this research thesis was to design and implement an adaptive congestion control algorithm for virtualized cloud data communication. A congested network leads to packet losses and delays, which in extreme ...
Implementing a Risk Management Strategy for Funsoft in Three Public Hospitals in Kisumu County
(JOOUST, 2015)
As the adoption rate of electronic health record continues to accelerate, the need to enhance information risk management has become more critical to create, compliant health care environment. Healthcare providers and ...
Analysis of Cyber crime Preventation Measures and Practises in Public Cybercafes in Kisumu City
(JOOUST, 2015)
The dependency of government, industry and society on Information Communication Technology (ICT) has attracted criminals, who use these systems to defraud or cause harm to users of these systems, leading to increase in ...
Effectiveness of Cloud Computing Security on Mobile Learning
(JOOUST, 2018)
In the last few years, most Kenyan universities have adopted E-Learning as a new approach to teaching and learning. However, the explosive growth and usage of mobile applications and the emergence of mobile cloud computing ...
Assessment of the Level of Compliance by the Universities to their ICT Security Policies: A Survey of Kisumu and Siaya Counties
(JOOUST, 2015-03)
Today, almost all organizations around the world are using Information Communication Technology (]CT) in their daily business. An ICT policy safeguards Confidentiality, Integrity and Availability (CIA) oflnformation Systems ...
Effective Bandwith Management in a Campus
(JOOUST, 2013)
Small campus networks usually do not have a set of rules for users to access the network in order to protect network resources and enforce institutional policies (for instance, no sharing of music files or no gaming). This ...
SMS Based Health Appointment Management Application for Clientele Follow-up: A Case study of Nuvaring Project, KEMRI/CGHR
(JOOUST, 2018)
Patient follow-up in research settings is important for overall wellbeing of the particular patient. The mainstratcgies of managing clientele follow-up appointments are based on home visitations and phone calls, but cases ...