Search
Now showing items 1-5 of 5
Effectiveness of Cloud Computing Security on Mobile Learning
(JOOUST, 2018)
In the last few years, most Kenyan universities have adopted E-Learning as a new approach to teaching and learning. However, the explosive growth and usage of mobile applications and the emergence of mobile cloud computing ...
SMS Based Health Appointment Management Application for Clientele Follow-up: A Case study of Nuvaring Project, KEMRI/CGHR
(JOOUST, 2018)
Patient follow-up in research settings is important for overall wellbeing of the particular patient. The mainstratcgies of managing clientele follow-up appointments are based on home visitations and phone calls, but cases ...
Determination of Effective Information systems Security in Secondary Schools in Kenya: A Case of Kisumu County
(JOOUST, 2018)
Adoption of information systems has become a core issue in many sectors of the economy including secondary schools in education sector. These information systems have enabled the secondary schools to achieve efficiency in ...
Secure Virtualized Client Server Insant Messging Through Port-Based Algorithm
(JOOUST, 2018)
Instant messaging has grown to become a very important means of communication among organization staff and among individuals outside an organization. The problem with this form of communication is that some of the instant ...
Towards Securing Information Systems in Public Universities: A Study of Kenya Public Universities Western Kenya Region
(JOOUST, 2018)
Universities in the world today consider information to be their most important asset. They therefore ensure information security by taking appropriate measures to ensure no information is leaked or passed to unauthorized ...