School of Informatics & Innovative Systems: Recent submissions
Now showing items 41-60 of 119
-
Cyber Physical System Security Model For Remote Sensing Device Protection: A Technical Review
(International Journal of Computer Trends and Technology (IJCTT), 2019-09)Remote sensing devices have emerged as a significant technology that enables the monitoring of processes and physical environment from far away locations. These remote sensing systems include physiological sensors installed ... -
Improving Learner Engagements through Implementing Technology-Enabled Learning
(Commonwealth Of Learning, 2020)Introduction The emergence of information and communication technologies (ICT) has changed the nature of the learning environments experienced by students. Educators have always created, selected and provided environments ... -
Assessment Of Ict Disaster Recovery And Preparedness Among Health Research Institutions In Kisumu County, Kenya
(International Journal of Scientific & Engineering Research (IJSER), 2020-05)Research organizations utilize information technology to generate process and transmit both sensitive and vital data that is critical in development of drugs, vaccines and health policy. Despite the role ICT plays in this ... -
Security Evaluation of the Adaptive Congestion Control Algorithms for Virtual Data Center Communication
(European Academic Research, 2016-11)Virtualization has been vastly implemented in many organizations, facilitating the installation of more than one operating system in one physical machine. This helps save on costs associated with the physical hardware. ... -
Exploring a Social Learning Perspective on Computer Forensics Barriers and Factors Affecting Cybercrime Investigation in Kenya
(International Research Journal of Innovations in Engineering and Technology (IRJIET), 2020-07)As Kenya matures into an information society, she is exposed to various cyber threats and challenges resulting from the ubiquity of the internet and advancement of technology. Social engineering tricks have been applied ... -
Assessing the Current Status of Information Security Policies Among Saccos in Kenya
(IISTE, 2019-09-30)In 2013, Communication Authority of Kenya (CAK) recorded cyber-attacks amounting to Sh5.4 million loses. In April 2016, Bandari Savings and Credit Cooperative Society lost Sh5 million through fraudulent ATM withdrawals ... -
Greening Decent Employment Opportunities For Kenya’s Youth
(International Journal of Education and Research, 2019-08)Unemployment of youth in any nation thwarts social fabrics and identity of young potential labor force globally. This results in less effective and inefficient economic support from the most vibrant members of the ... -
Delay Sensitive Protocol for High Availability LTE Handovers
(Science Publishing Group, 2020-04-01)Long delays during the handover process lead to dropped calls which deteriorate the network quality of service. In addition, these delays impede the incorporation of authentication during the handover process which exposes ... -
A Conceptual Model for ICT for Economic Development Using Complex Adaptive System Approach: Case of a Micro and Small Enterprise (MSE) Association
(International Journal of Computing and ICT Research, 2013)The purpose of the paper is to contribute towards providing a methodology which researchers in Information and Communication Technology (ICT) for development can use to design result-oriented programs. In this paper CAS ... -
An Adaptive ICT-Enabled Model for Knowledge Identification and Management for Enterprise Development
(International Journal of System Dynamics Applications, 2014)Knowledge is vital in achieving enterprise growth and development. This paper argues that treating knowledge management as a Complex Adaptive System (CAS) presents an alternative lens within which processes within knowledge ... -
Converting Water Hyacinth to Briquettes: A Beach Community Based Approach
(International Journal of Sciences: Basic and Applied Research (IJSBAR), 2014)Attempts by the government of Kenya to control the noxious water hyacinth via various intervention efforts have had limited success only for the weed to resurge. The proliferation of water hyacinth in Lake Victoria – Kenya ... -
Model for HIV infection and database
(Research Gate, 2015-08)In this paper the development of HIV infection and its different stages are described first by medical stages. By making use of the differential equations, model for various stages and the growth of HIV infection has been ... -
Information Communication Technology Training as A Prerequisite for E-Government In County Governments Of Kenya
(International Journal of Computer Applications Technology and Research, 2017)Today, the Kenyan government has invested and endeavored to embrace electronic government (e-government) in almost all ministries to enable speedy service delivery and enhance transparency and accountability by eliminating ... -
Socio-economic Factors Influencing the Spread of Drinking Water Diseases in Rural Africa: Case Study of Bondo-Sub-county, Kenya
(Journal of Water and Health, 2015)Socio-economic and medical information on Bondo sub-county community was studied to help establish the relationship between the water quality challenges, community health and water rights conditions. Health challenges have ... -
Efficient Resource Utilization in Information Security Risk Management Investment
(International Journal of Computer Applications Technology and Research, 2018)Efficient Resource Utilization in Information Security Risk Management Investment can improve organization resiliency to information security threats through identifying key information assets and security risks so that ... -
Secure Timing Advance Based Context-Aware Handover Protocol for Vehicular Ad-Hoc Heterogeneous Networks
(International Journal of Cyber-Security and Digital Forensics, 2018)Heterogeneous networks and their applications introduce new shortcomings in terms of access control and confidentiality during handover process. Unfortunately, implementing stronger security mechanisms during the handover ... -
A Systems Dynamics Model for Mobile Industry Governance in the Context of the Kenyan Vision 2030
(International Journal of System Dynamics Applications, 2018)This article describes how Kenya has emerged in recent times as one of the fastest-growing telecom markets in the world. This article presents a system dynamics-integrated model of the Kenyan telecommunication sector—mobile ... -
A Stratified Cyber Security Vigilance Model: An Augmentation of Risk -Based Information System Security
(Transactions on Networks and Communications, 2018-09-14)Information system security in the current interconnected environment called the cyber-space is continually getting more sophisticated. All the players involved- governments, corporates, IS security experts and users, both ... -
Mobile Phone Penetration and Economic Growth in Kenya: A System Dynamic Approach in the Context of the Kenyan Vision 2030
(Global Scientific Journals, 2018-12-12)System dynamics modelling is a scientific method for modelling complex, nonlinear natural, economic and technical systems. This research assesses the Kenyan mobile industry thus, identifying success factors and challenges ... -
Kenya's vision 2030: Modelling technology usage and the economy
(Technology in Science, 2019-11)