School of Informatics & Innovative Systems: Recent submissions
Now showing items 21-40 of 48
-
Secure Virtualized Client Server Insant Messging Through Port-Based Algorithm
(JOOUST, 2018)Instant messaging has grown to become a very important means of communication among organization staff and among individuals outside an organization. The problem with this form of communication is that some of the instant ... -
Effective Use of Abacus in the Teaching and Learning of Mathematics among Class Three Teachers in Public Primary Schools in Kasipul Division Rachuonyo South Sub-County, Kenya
(JOOUST, 2015)ABSTRACT Abacus has been considered as one of the most significant tools used for teaching and learning of mathematics among primary school mathematics teachers since it helps in spurring better performance in mathematics. ... -
Determination of Effective Information systems Security in Secondary Schools in Kenya: A Case of Kisumu County
(JOOUST, 2018)Adoption of information systems has become a core issue in many sectors of the economy including secondary schools in education sector. These information systems have enabled the secondary schools to achieve efficiency in ... -
Influence of Selected Motivational Factors on Job Satisfaction among Support Staff in Secondary Schools in Rarieda Sub-County
(JOOUST, 2015)Despite, the fact that support staff play a significant role in school activities, their contribution has not been given serious recognition. The recent report by an Education Task Force was an indication that they were ... -
Development and Implementation of E-Leave Management System in Banking Sector (KCB)
(JOOUST, 2015)The research investigated the state of leave management system used by different organizations i.e. brief comparison of manual le-ave management system and E-leave management system. A leave management system had been ... -
A Framework Based on Institutional Theory for Cyber Resiliency in County Government
(JOOUST, 2020)Cyber resiliency is the ability of a system to anticipate, withstand, recover and evolve when a cyber-attack has occuned in an organization or institution. Poor IT habits still persist in institutions exposing them to ... -
Inter-Schools Collaboration and Information Management System: A Case of Kisii County Secondary Schools
(JOOUST, 2020)Inter-Schools Collaboration and Information Management System are technologies that support Knowledge Management (KM) in organizations, specifically - knowledge generation, codification, and transfer. The use of KM in ... -
Information Technology Governance and Value creation in the Kenyan Public Sector: A Study of Homabay County
(JOOUST, 2015-05)Information Technology (IT) governance has proven to be a necessary tool for organizations that need to manage and control their IT investments for purposes of enhancing their benefits and value. A larger percentage of ... -
SMS Based Health Appointment Management Application for Clientele Follow-up: A Case study of Nuvaring Project, KEMRI/CGHR
(JOOUST, 2018)Patient follow-up in research settings is important for overall wellbeing of the particular patient. The mainstratcgies of managing clientele follow-up appointments are based on home visitations and phone calls, but cases ... -
A Security Model for Electronic Health Records System
(JOOUST, 2017)In order to enhance efficiency and effectiveness in the healthcare sector an Electronic Health Record (EHR) system, is being used for patients' information management. The EHR system contains sensitive patient information ... -
Implementing a Risk Management Strategy for Funsoft in Three Public Hospitals in Kisumu County
(JOOUST, 2015)As the adoption rate of electronic health record continues to accelerate, the need to enhance information risk management has become more critical to create, compliant health care environment. Healthcare providers and ... -
Assessment of the Level of Compliance by the Universities to their ICT Security Policies: A Survey of Kisumu and Siaya Counties
(JOOUST, 2015-03)Today, almost all organizations around the world are using Information Communication Technology (]CT) in their daily business. An ICT policy safeguards Confidentiality, Integrity and Availability (CIA) oflnformation Systems ... -
Analysis of Cyber crime Preventation Measures and Practises in Public Cybercafes in Kisumu City
(JOOUST, 2015)The dependency of government, industry and society on Information Communication Technology (ICT) has attracted criminals, who use these systems to defraud or cause harm to users of these systems, leading to increase in ... -
Adaptive Congestion Control Algorithm for Virtualized Cloud Data Communication
(JOOUST, 2017-11)The purpose of this research thesis was to design and implement an adaptive congestion control algorithm for virtualized cloud data communication. A congested network leads to packet losses and delays, which in extreme ... -
Effects of Biometrics on the Security of Enterprise Data and Information Assurance
(JOOUST, 2015)The increasing problem of user verification and identification has compelled institutions to adopt biometric based information security solutions, which rely on the uniqueness of the human physiological and behavioral ... -
Effectiveness of Cloud Computing Security on Mobile Learning
(JOOUST, 2018)In the last few years, most Kenyan universities have adopted E-Learning as a new approach to teaching and learning. However, the explosive growth and usage of mobile applications and the emergence of mobile cloud computing ... -
Implementing a Secure Messaging Solution Using Enhanced Zimbra Collaboration Suite
(JOOUST, 2014)A mail server is an application that receives incoming e-mail from local users and remote senders and forwards outgoing e-mail for delivery. It is also known as a mail transfer agent or MTA, a mail transport agent, a mail ... -
Effective Bandwith Management in a Campus
(JOOUST, 2013)Small campus networks usually do not have a set of rules for users to access the network in order to protect network resources and enforce institutional policies (for instance, no sharing of music files or no gaming). This ... -
Evaluation of School Management Information Systems(Smis) in Secondary Schools in Siaya County
(JOOUST, 2021)The study analyzed the qualitative assessment of the School Management Information Systems in secondary schools within the framework of program theory by (Chen, 2012) and Technology Mediated Learning Evaluation Framework ...