School of Informatics & Innovative Systems: Recent submissions
Now showing items 101-120 of 123
-
A Framework for secure mobile cloud computing in effective electronic learning
(International Journal of Innovative Research and Advanced Studies, 2018-01)Abstract: In the last few years, most universities have adopted E-Learning as a new approach to teaching and learning. However, the explosive growth and usage of mobile applications and the emergence of mobile cloud computing ... -
Evaluation of TCP congestion control modus operandi in mesh networks
(International Journal of Computer Networks and Applications, 2017-01)Abstract – In mesh networks, the sender machine is connected to the receiver machine via multiple paths. Efficient transmissions along these paths require proper link choice so as to quickly deliver the packets the ... -
Investigating design issues in mobile computer-mediated communication technologies
(Taylor&Francis, 2015-12)Mobility is the new reality of business and stands to have a significant impact on the implementation of mobile computer-mediated communication (mCMC), such as mobile texting, mobile video, and mobile presence. Information ... -
Applying data mining principles in the extraction of digital evidence
(International Journal of Computer Science and Mobile Computing, 2018-03)Data mining in databases is part of the interdisciplinary field of knowledge discovery used for extracting patterns and relationships amongst the data sets from a data source. This paper focuses on mining data from a ... -
Assessing emerging innovative applications used in county governments of Kenya
(International Journal of Advanced Research in Computer and Communication Engineering, 2017-08)In this modern age, the world has witnessed rapid growth and ever-increasing importance of e-government and governments are under pressure from citizens to quick and efficient services. Despite the Kenyan government efforts ... -
Effect of integrated financial management information system use in Kenya : case of government treasury
(ijaemr, 2017)The IFMIS has not been a success in Africa and Kenya in Particular .Why it was unsuccessful in the continent is unknown .This study therefore, aims at examining to assess the effect of IFMIS use : case of Government Treasury. ... -
Enterprise resource planning systems and integrated financial management information system in Kenyan public sector: an assessment
(ijaemr, 2017-02)Enterprise Resource Planning Systems and Integrated Financial Management Information System have such an important role in global success and become more complex overtime. ERP and IFMIS have not been addressed in full, ... -
TCP IP header attack vectors and countermeasures
(Science publishing group, 2017-02)The TCP IP header has security vulnerabilities that make it prone to numerous kinds of attacks such as TCP SYN flooding, TCP RST, source quench, TCP session hijacking, TCP sequence number prediction, port scanning, CHARGEN ... -
Secure end point data security using java application programming interface
(IJSRSET, 2017-02)Most of the current instant messaging applications such as Telegram Secret Chat transmit packets in plain text. This means that an intruder equipped with appropriate remote monitoring tools can sniff the packets being ... -
Validation of extended theory of reasoned action to predict mobile phone money usage
(World Journal of Computer Application and Technology, 2018)Theory of Reasoned Action (TRA), postulated by social psychologist, has been established to be relevant in guiding Information Systems studies. The theory resulted from attitude research using the Expectancy Value Models. ... -
Factors affecting integrated financial management information system application in Kenyan public sector
(Journal of Scientific and Engineering Research, 2017)The research aimed at assessing the factors affecting Integrated Financial Management Information system application in Kenyan public sector. There has been a very little improvement in financial management in Kenyan public ... -
Analysis of partial least squares on split path models: underpinning delone & maclean theory
(Journal of Scientific and Engineering Research, 2017)The analysis of partial least squares utilizing Structural Equation Modeling is well known as a second generation technique .Its true that , this technique has not been fully utilized in the field of research to handle ... -
Challenges facing the use and adoption of mobile phone money services
(World Journal of Computer Application and Technology, 2016)The Mobile phone banking idea was initially born out of the intention to reach the unbanked rural poor. However, there still existed mobile phone money service divide, highly skewed against the rural poor population. This ... -
Elements enhancing the use of mobile phone money services: A case of Homa Bay region, Kenya
(World Journal of Computer Application and Technology, 2016)The history of mobile payments is more than 10 years old and mobile money services in various countries such as Finland are still relatively unpopular, even though consumers have shown clear interest towards mobile money. ... -
Theory of reasoned action as an underpinning to technological innovation adoption studies
(World Journal of Computer Application and Technology, 2016)There are a number of theories and models that have been employed over the years in understanding and studying users’ technology adoption behaviors. These theories and models focus on people’s intention to engage in a ... -
Building e-Agriculture framework in Kenya
(HAAI, 2016)Arguably, poverty is concentrated in developing countries due to poor capacity to develop, to access and to manage agricultural information and knowledge. This is owed to disconnect that exist between the e-Agricultural ... -
Adoption model of mobile‐enabled systems in supply chain
(Emerald Group Publishing Limited, 2013)The purpose of this paper is to develop an adoption model to identify the critical factors that affect firms' intention to adopt mobile enabled supply chain systems (mSCM) in retail industry. This study focuses on ... -
Investigating factors affecting social presence and user satisfaction with mobile instant messaging
(Elsevier Ltd., 2014-05-04)The purpose of this study is to examine the factors that influence social presence and user satisfaction with Mobile Instant Messaging (mIM). The proposed research model integrates channel expansion, social influence, ... -
Perceived importance and perfomance of information systems in Azam company- Dar es Salaam
(International Journal of Learning & Development, 2012)It is increasingly more interesting to the Companies to understand the relationship existing between perceived importance and performance of information systems within their companies. The purpose of this paper is to explore ... -
Domestic violence in relation to children rights in Dar es Salaam, Tanzania
(2011-09)This paper discusses domestic violence in relation to children rights in Temeke District Dar es salaam Tanzania. The main objective is to investigate rights of domestic violence affected children in households in so as to ...