Browsing School of Informatics & Innovative Systems by Title
Now showing items 1-20 of 48
-
Adaptive Congestion Control Algorithm for Virtualized Cloud Data Communication
(JOOUST, 2017-11)The purpose of this research thesis was to design and implement an adaptive congestion control algorithm for virtualized cloud data communication. A congested network leads to packet losses and delays, which in extreme ... -
Analysis of Cyber crime Preventation Measures and Practises in Public Cybercafes in Kisumu City
(JOOUST, 2015)The dependency of government, industry and society on Information Communication Technology (ICT) has attracted criminals, who use these systems to defraud or cause harm to users of these systems, leading to increase in ... -
Assessment of the Level of Compliance by the Universities to their ICT Security Policies: A Survey of Kisumu and Siaya Counties
(JOOUST, 2015-03)Today, almost all organizations around the world are using Information Communication Technology (]CT) in their daily business. An ICT policy safeguards Confidentiality, Integrity and Availability (CIA) oflnformation Systems ... -
Building and deploying secure web based e-learning system
(JOOUST, 2014-05) -
Cloud-Based Virtualization as an Enabling Technology for theTransformation of Healthcare in Kenya
(JOOUST, 2015)Cloud-based virtualization is a technology that has had a global entrance over the past few years. Volumes of data are handled in healthcare hence a need to embrace this technology. The primary concern has always ... -
Deployment of Honeypots as Proactive Detection Tools for Monitoring Cyber Related Incidences
(JOOUST, 2015)The Kenya government is rolling the Vision 2030 programme where ICT plays a major role in achieving the components of the Pillars associated with it. It has encouraged the rapid deployment of the high speed fiber optic ... -
Determination of Effective Information systems Security in Secondary Schools in Kenya: A Case of Kisumu County
(JOOUST, 2018)Adoption of information systems has become a core issue in many sectors of the economy including secondary schools in education sector. These information systems have enabled the secondary schools to achieve efficiency in ... -
Development and Implementation of E-Leave Management System in Banking Sector (KCB)
(JOOUST, 2015)The research investigated the state of leave management system used by different organizations i.e. brief comparison of manual le-ave management system and E-leave management system. A leave management system had been ... -
Effective Bandwith Management in a Campus
(JOOUST, 2013)Small campus networks usually do not have a set of rules for users to access the network in order to protect network resources and enforce institutional policies (for instance, no sharing of music files or no gaming). This ... -
Effective Use of Abacus in the Teaching and Learning of Mathematics among Class Three Teachers in Public Primary Schools in Kasipul Division Rachuonyo South Sub-County, Kenya
(JOOUST, 2015)ABSTRACT Abacus has been considered as one of the most significant tools used for teaching and learning of mathematics among primary school mathematics teachers since it helps in spurring better performance in mathematics. ... -
Effectiveness of Cloud Computing Security on Mobile Learning
(JOOUST, 2018)In the last few years, most Kenyan universities have adopted E-Learning as a new approach to teaching and learning. However, the explosive growth and usage of mobile applications and the emergence of mobile cloud computing ... -
Effects of "on Job" Information Technology Security Training on Networks Security Management.
(JOOUST, 2015)This study has been conducted to determine the effects of (on job) IT security training on the management of computer network's security within Kenyan Public Universities. Computer networks in Kenyan institutions have ... -
Effects of ''On Job'' Information Technology Security Training on Network Security Management.
(JOOUST, 2015)Although SACCOs are established to help their members access financial services, they have not been able to meet their demands satisfactorily because of their low financial performance. Poor financial performance is ... -
Effects of Biometrics on the Security of Enterprise Data and Information Assurance
(JOOUST, 2015)The increasing problem of user verification and identification has compelled institutions to adopt biometric based information security solutions, which rely on the uniqueness of the human physiological and behavioral ... -
An Enhanced Framework for Assessing Health Information Systems Security Risks
(JOOUST, 2023)The increasing digitization of health information enhanced accessibility, efficiency and quality of healthcare services. However, it has escalated cyber security threat, data breaches, unauthorized ... -
Evaluation of ICT Disaster Recovery and Preparedness : a Survey of Health Research Organization in Kisumu County.
(JOOUST, 2020)Research organizations utilize information technology to generate process and transmit both sensitive and vital data that is critical in development of drugs, vaccines and health policy. Despite the role ICT plays in these ...