School of Informatics & Innovative Systems: Recent submissions
Now showing items 81-100 of 123
-
Multivariate probabilistic synthesis of cellular networks teletraffic blocking with poissonian distribution arrival rates
(MECS(http://www.mecs-press.net), 2018-07-08)Cellular networks are characterized by mobility in which subscribers move freely within the coverage area. Since the radio spectrum is a scarce resource, the available bandwidth is divided by using a combination of Time- ... -
Security evaluation of cellular networks handover techniques
(MECS (http://www.mecs-press.org/), 2018-05)This paper examined the handovers in cellular networks from both functional and informational security point of view. The aim was to find out if the security goals of confidentiality, integrity and availability (CIA) are ... -
Low latency automatic repeat request protocol for time sensitive GSM-enabled smart phone video streaming services
(IJSRCSEIT, 2018)Automatic repeat request protocols (ARQ) are fundamental error control techniques employed in wired as well as wireless networks. These protocols facilitate error recovery based on feedback messages and retransmissions. ... -
Security and acceptance of web based marketing information system among microfinance banks in Nairobi region, Kenya
(HR mars, 2012)Information system (IS) acceptance has been the subject of much research in the past two decades. Researchers have concentrated their efforts on identifying the conditions or factors that could facilitate the acceptance ... -
Determinants of adoption of internet banking by trade finance customers in East Africa
(HR mars, 2012)It is increasingly more interesting to the bank managers to understand what is important to customers when it comes to Internet banking, and especially banking conducted by the customers themselves. The purpose of this ... -
Empirical investigation of instant messaging security in a virtual environment
(International Journal of Computer Applications Technology and Research, 2016)Use of instant messaging services is becoming increasingly popular with Internet based systems like America Online’s Instant Messaging (AIM), Microsoft’s MSN Messenger, Yahoo! Messenger, WhatsApp, Viber, Kakaotalk, Skype ... -
Citation analysis on the emerging technologies in the fields of information systems
(international journal of research publication, 2018)En though information technology is an acceptable innovation for improvement of performance in all sectors, citation studies on associated literature seem to be missing. Furthermore, analysis of citations related to emerging ... -
What Theory of Change Can Contribute to Capability Approach: Towards Evaluating ICT-Enabled Interventions
(IEEE, 2018)Sen's Capability Approach (CA) has emerged as holistic lenses for theorising development within Information and Communication Technology for Development (ICT4D) discourses. There is ongoing research on operationalising CA ... -
Towards an integrated framework for rural development in Kenya
(IEEE, 2016)Information Communication Technology (ICT) is a powerful tool which can accelerate socio-economic development in developing nations. The growth of information is the main compelling reason for new cutting edge technologies ... -
Evaluation of TCP congestion control modus operandi in mesh networks
(Ever Science Publications, 2017)In mesh networks, the sender machine is connected to the receiver machine via multiple paths. Efficient transmissions along these paths require proper link choice so as to quickly deliver the packets the destination. Poor ... -
Investigating design issues in mobile computer-mediated communication technologies
(Taylor & Francis, 2015)Mobility is the new reality of business and stands to have a significant impact on the implementation of mobile computermediated communication (mCMC), such as mobile texting, mobile video, and mobile presence. Information ... -
Investigating factors affecting social presence and user satisfaction with Mobile Instant messaging
(Elsevier, 2014)The purpose of this study is to examine the factors that influence social presence and user satisfaction with Mobile Instant Messaging (mIM). The proposed research model integrates channel expansion, social influence, ... -
Usability maturity indicators for virtual learning systems
(CIS, 2014)Todays’ institutions of higher learning faced with a problem of facilitating learning with a changing profile of students, in bigger and bigger classes. The environment in these institutions is undergoing major changes as ... -
Analysis of scheduling models applicable in referral health systems
(2018)Scheduling patient referrals is one of the most important administrative responsibilities performed in the medical office. A referral scheduling algorithm can be a useful tool in the hands of a primary provider. Primary ... -
Organizational Factors Influencing Corporates Implementing Server Virtualization Technology: A Survey of Companies Listed on the Nairobi Securities Exchange, Kenya
(CIS, 2014)Although it is widely acknowledged that server virtualization technology has the potential to transform a large part of the IT industry, issues surrounding the adoption of virtualization technology have received relatively ... -
Data and voice signal intelligence interception over the GSM Um Interface
(International Journal of Research and Innovations in Science and Technology, 2016)The Enhanced Data rates for GSM Evolution (EDGE) is a digital mobile phone technology that permits enhanced data communication rates as a backward-compatible annex of the Global System for Mobile communications (GSM). It ... -
congestion aware packet routing for delay sensitive cloud communications
(International Journal of Computer Networks and Applications, 2017-07)In the recent years, many organizations have turned to cloud technology to support their information technology services. The cloud servers are therefore increasingly holding huge and sensitive information belonging to ... -
Model for information security governance prediction in public Universities in Kenya
(2018)Information is one of the most important assets in Organizations worldwide. To enable secure business operations, an organization must have an effective security governance strategy. The study focused on Information security ... -
Validation of extended theory of reasoned action to predict mobile phone money usage
(Horizon Research, 2018)Theory of Reasoned Action (TRA), postulated by social psychologist, has been established to be relevant in guiding Information Systems studies. The theory resulted from attitude research using the Expectancy Value Models. ... -
Investigating factors affecting social presence and user satisfaction with Mobile Instant Messaging
(Elsevier, 2014-07)The purpose of this study is to examine the factors that influence social presence and user satisfaction with Mobile Instant Messaging (mIM). The proposed research model integrates channel expansion, social influence, ...