School of Informatics & Innovative Systems: Recent submissions
Now showing items 21-40 of 123
-
Kenya's Vision 2030: Modelling Technology Usage and the Economy
(Pergamon, 2019-11-01)Kenya has emerged in recent times as one of the fastest growing telecom markets in the world. Assessing the impact of existing and emerging mobile technologies on individuals and societies is a complex task. Various models ... -
Critical Review of Capability Approach-Based Frameworks in Information and Communication Technology for Development (ICT4D)
(International Journal of Advances in Engineering and Management (IJAEM), 2020-12-12)Sen‘s Capability Approach (CA) has emerged as holistic lenses for theorising development within Information and Communication Technology for Development (ICT4D) discourses. There is ongoing research on operationalising CA ... -
Effects of Information System Controls on Enhancing Security of Information Systems within Universities
(IOSR Journal of Engineering (IOSRJEN), 2017-11-11)Universities in the world today consider information to be their most important asset. They therefore ensure information security by taking appropriate measures to ensure no information is leaked or passed to unauthorized ... -
Confidentiality and Availability of Security Measures for Information Systems in Universities in Kisumu and Siaya Counties, Kenya
(IJRDO-Journal Of Mathematics, 2016-08)Many organizations continue to grow in numbers by the day in adopting use and adoption of ICT in day to day business processes and so are the rising trends in cyber insecurity. Securing information systems against myriad ... -
Assessment of Security Measures in Universities for Enforcement of Integrity of Information Systems in Kisumu and Siaya Counties, Kenya
(IJRDO - Journal of Computer Science and Engineering, 2015-06)An ICT policy safeguards Integrity of Information Systems and ensures business continuity. This study sought to assess the level of compliance by Universities to their ICT security policies by assessing the integrity pillar. ... -
International Journal of Academic Studies on Theory and Applications of Mathematics to Security in Cloud Computing: A Case of Addition-Composition Fully Homomorphic Encryption Scheme
(ResearchGate, 2016-04-12)Addition-Composition Fully Homomorphic Encryption is given in this paper to solve data security equation in cloud computation. An earlier attempt to solve security problem has been proposed by Craig Gentry, who combined ... -
Data Modeling Techniques Used for Big Data in Enterprise Networks
(International Journal of Advanced Technology and Engineering Exploration, 2020-04-20)The deployment and maintenance of enterprise networks form the bedrock of any organization, be it government, commercial, academic, and/or non-profit making. These networks host vast amounts of information, databases, in ... -
Server Virtualization Technology: A proposed Implementation Model
(IISTE, 2019-04-30)The study sought to fill the existing gap on issues surrounding the implementation of Server virtualization technology, which have received relatively little attention. The study investigated the implementation ... -
Application of Technology in Strengthening Collaboration in Research, Teaching and Learning for African Universities in the post COVID-19 Era
(World Journal of Innovative Research, 2020-09-03)The collaboration and sharing of teaching and technology among universities is increasingly perceived as a vehicle to improve quality in education and innovation through knowledge exchange. The discussion explores how ... -
Legal Issues in Computer Forensics and Digital Evidence Admissibility
(ResearchGate, 2020-07-07)Computer forensics integrates the fields of computer science and law to investigate crime. For digital evidence to be legally admissible in court, investigators should follow proper legal procedures when recovering and ... -
Validation of Extended Theory of Reasoned Action to Predict Mobile Phone Money Usage
(World Journal of Computer Application and Technology, 2018-01-13)Theory of Reasoned Action (TRA), postulated by social psychologist, has been established to be relevant in guiding Information Systems studies. The theory resulted from attitude research using the Expectancy Value Models. ... -
Emerging Security Challenges due to Bring Your Own Device Adoption
(International Journal of Science and Research (IJSR), 2018-01-01)Although a number of researches have been carried out by various organizations across the globe to establish security challenges facing education institutions due to BYOD adoption there is no evidence that a similar study ... -
Governance, Complexity, and Resilience of the Kenyan Mobile Industry in the Context of Its Strategic Vision
(IGI Global, 2021)Assessing the impact of existing and emerging mobile technologies on individuals and societies is a complex task. Various models of the telecommunication industry have been developed and differ from country to country. The ... -
Efficient Group Authentication Protocol for Secure 5G Enabled Vehicular Communications
(IEEE, 2020-12-30)The fifth generation (5G) networks exhibit extremely low latency, extremely high bandwidth, and high density connections that are salient features for the support of vehicle to everything (V2X) services. Although a lot of ... -
An Understanding of the Cyber Security Threats and Vulnerabilities Landscape: A Case of Banks in Kenya
(International Journal of Innovative Research and Advanced Studies (IJIRAS) Volume 7, 2020-06-06)Cyber security threats in Kenya has been increasing steadily; particularly in banks. A Cyber security vulnerability is a software, hardware or procedural weakness that may provide an attacker entry to a computer or network. ... -
An Investigation of Existing Strategies Used to Counter Prevailing Cyber Threats and Vulnerabilities in Banks
(International Journal of Innovative Research and Advanced Studies (IJIRAS) Volume 7, 2020-06-06)Financial institutions and banks world-wide re grappling with a myriad of challenges in relation to regulations, disruptive models and technologies, new competitors, a restrictive customer base that has unlimited number ... -
Deployment and Use of Mobile Technology to Control Malaria
(Journal of Information Technology & Software Engineering, 2019-05-10)Malaria is a significant public health problem and impediment to socioeconomic development in the developing countries. According to World Health Organization (WHO) report, the number of malaria cases increased to 219 ... -
Tracking Area Boundary-aware Protocol for Pseudo Stochastic Mobility Prediction in LTE Networks
(MECS, 2020-10-08)Accurate mobility prediction enables efficient and faster paging services in these networks. This in turn facilitates the attainment of higher bandwidths and execution of activities such as handovers at low latencies. The ... -
Key Issues in Internet Governance
(World Journal of Innovative Research (WJIR), 2020-09)Internet is network of remotely or physically connected computers or computer devices that are able to interact. Numerous activities take place on the internet. The processes of decision making on what activities are to ... -
Empirical Analysis of Clustered Network Traffic over Digital Communication Channels
(EverScience Publications, 2016-11)The concept of clustering traffic is a noble idea from a number of perspectives. In digital communication channels, signals from different sources are multiplexed at the source and carried on a single communication channel. ...