Search
Now showing items 81-90 of 95
Confidentiality and Availability of Security Measures for Information Systems in Universities in Kisumu and Siaya Counties, Kenya
(IJRDO-Journal Of Mathematics, 2016-08)
Many organizations continue to grow in numbers by the day in adopting use and adoption of ICT in day to day business processes and so are the rising trends in cyber insecurity. Securing information systems against myriad ...
Effects of Information System Controls on Enhancing Security of Information Systems within Universities
(IOSR Journal of Engineering (IOSRJEN), 2017-11-11)
Universities in the world today consider information to be their most important asset. They therefore ensure information security by taking appropriate measures to ensure no information is leaked or passed to unauthorized ...
Critical Review of Capability Approach-Based Frameworks in Information and Communication Technology for Development (ICT4D)
(International Journal of Advances in Engineering and Management (IJAEM), 2020-12-12)
Sen‘s Capability Approach (CA) has emerged as holistic lenses for theorising development within Information and Communication Technology for Development (ICT4D) discourses. There is ongoing research on operationalising CA ...
A Review of Factors Influencing e-Health Adoption in Kenya: Barriers And Facilitators
(2014)
Over the past few decades, there has been a great leap in the development
of Information and Communication Technology (ICT); both in hardware and
software capabilities. This has provided a sound platform for their ...
Socio-demographic Determinants of Soil Erosion Levels among the Farming Households in Nyakach Sub-county, Kenya
(Journal of Humanities and Social Science, 2019)
Soil degradation is a world-wide problem facing humanity today. In Nyakach Sub-county the
problem has persisted over the years. This study set out to assess the influence of socio-demographic
characteristics of farmers ...
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully Homomorphic Encryption Scheme
(ResearchGate, 2017)
This paper focusses on the use of homomorphic encryption schemes in solving data security in cloud computation. We started by acknowledging Gentry’s contribution on partial homomorphic encryption schemes where he constructed ...
The Role of ICT in Appreciating Tri-Axis Efforts of Research, Publications and Library Services in Higher Education
(2013)
Information and Communication Technology (ICT) is a principal enabler
to nearly all functional efforts including quality assurance sustenance in higher
education. Studies have revealed that research has a feeder effect ...
Affordances Theory in Information and Communication Technology for Development (Ict4d) Research
(International Research Journal of Modernization in Engineering Technology and Science, 2021-01)
Information and Communication Technology for Development (ICT4D) is argued to have high potential value across all sectors, both public and private; and at multiple levels, be it fighting poverty; improving healthcare; ...
An Integrated Mobile Identity Authentication Model
(International Research Journal of Innovations in Engineering and Technology (IRJIET), 2022-01)
Theft of personal identity is an unlawful act; a criminal in this case possesses or attempts to be in possession of an identity of a victim without their knowledge or consent. Mobile identity theft the problem that inspires ...
Enhanced Information Systems Success Model for Patient Information Assurance
(Journal of Computer Science Research, 2021-10-13)
The current health information systems have many challenges such as lack of standard user interfaces, data security and privacy issues, inability to uniquely identify patients across multiple hospital information systems, ...