Search
Now showing items 1-5 of 5
A Framework for secure mobile cloud computing in effective electronic learning
(International Journal of Innovative Research and Advanced Studies, 2018-01)
Abstract: In the last few years, most universities have adopted E-Learning as a new approach to teaching and learning. However, the explosive growth and usage of mobile applications and the emergence of mobile cloud computing ...
Data and voice signal intelligence interception over the GSM Um Interface
(International Journal of Research and Innovations in Science and Technology, 2016)
The Enhanced Data rates for GSM Evolution (EDGE) is a digital mobile phone technology that permits enhanced data communication rates as a backward-compatible annex of the Global System for Mobile communications (GSM). It ...
Security and acceptance of web based marketing information system among microfinance banks in Nairobi region, Kenya
(HR mars, 2012)
Information system (IS) acceptance has been the subject of much research in the past two decades. Researchers have concentrated their efforts on identifying the conditions or factors that could facilitate the acceptance ...
Empirical investigation of instant messaging security in a virtual environment
(International Journal of Computer Applications Technology and Research, 2016)
Use of instant messaging services is becoming increasingly popular with Internet based systems like America Online’s Instant Messaging (AIM), Microsoft’s MSN Messenger, Yahoo! Messenger, WhatsApp, Viber, Kakaotalk, Skype ...
A Stratified Cyber Security Vigilance Model: An Augmentation of Risk -Based Information System Security
(Transactions on Networks and Communications, 2018-09-14)
Information system security in the current interconnected environment called the cyber-space is continually getting more sophisticated. All the players involved- governments, corporates, IS security experts and users, both ...