Search
Now showing items 1-10 of 23
Applying data mining principles in the extraction of digital evidence
(International Journal of Computer Science and Mobile Computing, 2018-03)
Data mining in databases is part of the interdisciplinary field of knowledge discovery used for extracting patterns and relationships amongst the data sets from a data source. This paper focuses on mining data from a ...
Validation of extended theory of reasoned action to predict mobile phone money usage
(Horizon Research, 2018)
Theory of Reasoned Action (TRA), postulated by social psychologist, has been established to be relevant in guiding Information Systems studies. The theory resulted from attitude research using the Expectancy Value Models. ...
A Framework for secure mobile cloud computing in effective electronic learning
(International Journal of Innovative Research and Advanced Studies, 2018-01)
Abstract: In the last few years, most universities have adopted E-Learning as a new approach to teaching and learning. However, the explosive growth and usage of mobile applications and the emergence of mobile cloud computing ...
Model for information security governance prediction in public Universities in Kenya
(2018)
Information is one of the most important assets in Organizations worldwide. To enable secure business operations, an organization must have an effective security governance strategy. The study focused on Information security ...
Validation of extended theory of reasoned action to predict mobile phone money usage
(World Journal of Computer Application and Technology, 2018)
Theory of Reasoned Action (TRA), postulated by social psychologist, has been established to be relevant in guiding Information Systems studies. The theory resulted from attitude research using the Expectancy Value Models. ...
Analysis of scheduling models applicable in referral health systems
(2018)
Scheduling patient referrals is one of the most important administrative responsibilities performed in the medical office. A referral scheduling algorithm can be a useful tool in the hands of a primary provider. Primary ...
Low latency automatic repeat request protocol for time sensitive GSM-enabled smart phone video streaming services
(IJSRCSEIT, 2018)
Automatic repeat request protocols (ARQ) are fundamental error control techniques employed in wired as well as wireless networks. These protocols facilitate error recovery based on feedback messages and retransmissions. ...
Citation analysis on the emerging technologies in the fields of information systems
(international journal of research publication, 2018)
En though information technology is an acceptable innovation for improvement of performance in all sectors, citation studies on associated literature seem to be missing. Furthermore, analysis of citations related to emerging ...
What Theory of Change Can Contribute to Capability Approach: Towards Evaluating ICT-Enabled Interventions
(IEEE, 2018)
Sen's Capability Approach (CA) has emerged as holistic lenses for theorising development within Information and Communication Technology for Development (ICT4D) discourses. There is ongoing research on operationalising CA ...
Security evaluation of cellular networks handover techniques
(MECS (http://www.mecs-press.org/), 2018-05)
This paper examined the handovers in cellular networks from both functional and informational security point of view. The aim was to find out if the security goals of confidentiality, integrity and availability (CIA) are ...