Search
Now showing items 11-20 of 24
Data Modeling Techniques Used for Big Data in Enterprise Networks
(International Journal of Advanced Technology and Engineering Exploration, 2020-04-20)
The deployment and maintenance of enterprise networks form the bedrock of any organization, be it government, commercial, academic, and/or non-profit making. These networks host vast amounts of information, databases, in ...
Key Issues in Internet Governance
(World Journal of Innovative Research (WJIR), 2020-09)
Internet is network of remotely or physically connected computers or computer devices that are able to interact. Numerous activities take place on the internet. The processes of decision making on what activities are to ...
Tracking Area Boundary-aware Protocol for Pseudo Stochastic Mobility Prediction in LTE Networks
(MECS, 2020-10-08)
Accurate mobility prediction enables efficient and faster paging services in these networks. This in turn facilitates the attainment of higher bandwidths and execution of activities such as handovers at low latencies. The ...
An Investigation of Existing Strategies Used to Counter Prevailing Cyber Threats and Vulnerabilities in Banks
(International Journal of Innovative Research and Advanced Studies (IJIRAS) Volume 7, 2020-06-06)
Financial institutions and banks world-wide re grappling with a myriad of challenges in relation to regulations, disruptive models and technologies, new competitors, a restrictive customer base that has unlimited number ...
An Understanding of the Cyber Security Threats and Vulnerabilities Landscape: A Case of Banks in Kenya
(International Journal of Innovative Research and Advanced Studies (IJIRAS) Volume 7, 2020-06-06)
Cyber security threats in Kenya has been increasing steadily; particularly in banks. A Cyber security vulnerability is a software, hardware or procedural weakness that may provide an attacker entry to a computer or network. ...
Critical Review of Capability Approach-Based Frameworks in Information and Communication Technology for Development (ICT4D)
(International Journal of Advances in Engineering and Management (IJAEM), 2020-12-12)
Sen‘s Capability Approach (CA) has emerged as holistic lenses for theorising development within Information and Communication Technology for Development (ICT4D) discourses. There is ongoing research on operationalising CA ...
Affordances Theory in Information and Communication Technology for Development (Ict4d) Research
(International Research Journal of Modernization in Engineering Technology and Science, 2021-01)
Information and Communication Technology for Development (ICT4D) is argued to have high potential value across all sectors, both public and private; and at multiple levels, be it fighting poverty; improving healthcare; ...
An Integrated Mobile Identity Authentication Model
(International Research Journal of Innovations in Engineering and Technology (IRJIET), 2022-01)
Theft of personal identity is an unlawful act; a criminal in this case possesses or attempts to be in possession of an identity of a victim without their knowledge or consent. Mobile identity theft the problem that inspires ...
Enhanced Information Systems Success Model for Patient Information Assurance
(Journal of Computer Science Research, 2021-10-13)
The current health information systems have many challenges such as lack of standard user interfaces, data security and privacy issues, inability to uniquely identify patients across multiple hospital information systems, ...
Influence of Cognitive Agility of Cyber Operators on Situational Aware Cyberspace Protection
(International Journal of Innovative Research and Advanced Studies (IJIRAS), 2022-03)
The effectiveness of the cyberspace protection for the national critical information infrastructure (CII) depends on a dynamically and reliably established cyberspace situational awareness framework. The current attribution ...