Search
Now showing items 71-80 of 95
Application of Technology in Strengthening Collaboration in Research, Teaching and Learning for African Universities in the post COVID-19 Era
(World Journal of Innovative Research, 2020-09-03)
The collaboration and sharing of teaching and technology among universities is increasingly perceived as a vehicle to improve quality in education and innovation through knowledge exchange. The discussion explores how ...
Legal Issues in Computer Forensics and Digital Evidence Admissibility
(ResearchGate, 2020-07-07)
Computer forensics integrates the fields of computer science and law to investigate crime. For digital evidence to be legally admissible in court, investigators should follow proper legal procedures when recovering and ...
Data Modeling Techniques Used for Big Data in Enterprise Networks
(International Journal of Advanced Technology and Engineering Exploration, 2020-04-20)
The deployment and maintenance of enterprise networks form the bedrock of any organization, be it government, commercial, academic, and/or non-profit making. These networks host vast amounts of information, databases, in ...
Validation of Extended Theory of Reasoned Action to Predict Mobile Phone Money Usage
(World Journal of Computer Application and Technology, 2018-01-13)
Theory of Reasoned Action (TRA), postulated by social psychologist, has been established to be relevant in guiding Information Systems studies. The theory resulted from attitude research using the Expectancy Value Models. ...
Emerging Security Challenges due to Bring Your Own Device Adoption
(International Journal of Science and Research (IJSR), 2018-01-01)
Although a number of researches have been carried out by various organizations across the globe to establish security challenges facing education institutions due to BYOD adoption there is no evidence that a similar study ...
Key Issues in Internet Governance
(World Journal of Innovative Research (WJIR), 2020-09)
Internet is network of remotely or physically connected computers or computer devices that are able to interact. Numerous activities take place on the internet. The processes of decision making on what activities are to ...
Tracking Area Boundary-aware Protocol for Pseudo Stochastic Mobility Prediction in LTE Networks
(MECS, 2020-10-08)
Accurate mobility prediction enables efficient and faster paging services in these networks. This in turn facilitates the attainment of higher bandwidths and execution of activities such as handovers at low latencies. The ...
An Investigation of Existing Strategies Used to Counter Prevailing Cyber Threats and Vulnerabilities in Banks
(International Journal of Innovative Research and Advanced Studies (IJIRAS) Volume 7, 2020-06-06)
Financial institutions and banks world-wide re grappling with a myriad of challenges in relation to regulations, disruptive models and technologies, new competitors, a restrictive customer base that has unlimited number ...
An Understanding of the Cyber Security Threats and Vulnerabilities Landscape: A Case of Banks in Kenya
(International Journal of Innovative Research and Advanced Studies (IJIRAS) Volume 7, 2020-06-06)
Cyber security threats in Kenya has been increasing steadily; particularly in banks. A Cyber security vulnerability is a software, hardware or procedural weakness that may provide an attacker entry to a computer or network. ...
Assessment of Security Measures in Universities for Enforcement of Integrity of Information Systems in Kisumu and Siaya Counties, Kenya
(IJRDO - Journal of Computer Science and Engineering, 2015-06)
An ICT policy safeguards Integrity of Information Systems and ensures business continuity. This study sought to assess the level of compliance by Universities to their ICT security policies by assessing the integrity pillar. ...