Search
Now showing items 51-60 of 95
A Stratified Cyber Security Vigilance Model: An Augmentation of Risk -Based Information System Security
(Transactions on Networks and Communications, 2018-09-14)
Information system security in the current interconnected environment called the cyber-space is continually getting more sophisticated. All the players involved- governments, corporates, IS security experts and users, both ...
Determinants of Computerized System for Execution of Martime Security Systems
(Journal of Scientific and Engineering Research, 2020)
This paper investigates the determinants of Computerized System for Execution of Martime Security systems at Mombasa port, Kenya:-In particular to establish the effect of Under Water Detection System-Band Radar and Vessel ...
Mobile Phone Penetration and Economic Growth in Kenya: A System Dynamic Approach in the Context of the Kenyan Vision 2030
(Global Scientific Journals, 2018-12-12)
System dynamics modelling is a scientific method for modelling complex, nonlinear natural, economic and technical systems. This research assesses the Kenyan mobile industry thus, identifying success factors and challenges ...
Socio-economic Factors Influencing the Spread of Drinking Water Diseases in Rural Africa: Case Study of Bondo-Sub-county, Kenya
(Journal of Water and Health, 2015)
Socio-economic and medical information on Bondo sub-county community was studied to help establish the relationship between the water quality challenges, community health and water rights conditions. Health challenges have ...
Efficient Resource Utilization in Information Security Risk Management Investment
(International Journal of Computer Applications Technology and Research, 2018)
Efficient Resource Utilization in Information Security Risk Management Investment can improve organization resiliency to information security threats through identifying key information assets and security risks so that ...
Information Communication Technology Training as A Prerequisite for E-Government In County Governments Of Kenya
(International Journal of Computer Applications Technology and Research, 2017)
Today, the Kenyan government has invested and endeavored to embrace electronic government (e-government) in almost all ministries to enable speedy service delivery and enhance transparency and accountability by eliminating ...
Assessment Of Ict Disaster Recovery And Preparedness Among Health Research Institutions In Kisumu County, Kenya
(International Journal of Scientific & Engineering Research (IJSER), 2020-05)
Research organizations utilize information technology to generate process and transmit both sensitive and vital data that is critical in development of drugs, vaccines and health policy. Despite the role ICT plays in this ...
Assessing the Current Status of Information Security Policies Among Saccos in Kenya
(IISTE, 2019-09-30)
In 2013, Communication Authority of Kenya (CAK) recorded cyber-attacks amounting to Sh5.4 million loses. In April 2016, Bandari Savings and Credit Cooperative Society lost Sh5 million through fraudulent ATM withdrawals ...
Security Evaluation of the Adaptive Congestion Control Algorithms for Virtual Data Center Communication
(European Academic Research, 2016-11)
Virtualization has been vastly implemented in many organizations, facilitating the installation of more than one operating system in one physical machine. This helps save on costs associated with the physical hardware. ...
Delay Sensitive Protocol for High Availability LTE Handovers
(Science Publishing Group, 2020-04-01)
Long delays during the handover process lead to dropped calls which deteriorate the network quality of service. In addition, these delays impede the incorporation of authentication during the handover process which exposes ...