Search
Now showing items 1-10 of 10
Empirical investigation of instant messaging security in a virtual environment
(International Journal of Computer Applications Technology and Research, 2016)
Use of instant messaging services is becoming increasingly popular with Internet based systems like America Online’s Instant Messaging (AIM), Microsoft’s MSN Messenger, Yahoo! Messenger, WhatsApp, Viber, Kakaotalk, Skype ...
Exploring a Social Learning Perspective on Computer Forensics Barriers and Factors Affecting Cybercrime Investigation in Kenya
(International Research Journal of Innovations in Engineering and Technology (IRJIET), 2020-07)
As Kenya matures into an information society, she is exposed to various cyber threats and challenges resulting from the ubiquity of the internet and advancement of technology. Social engineering tricks have been applied ...
Cyber Physical System Security Model For Remote Sensing Device Protection: A Technical Review
(International Journal of Computer Trends and Technology (IJCTT), 2019-09)
Remote sensing devices have emerged as a significant technology that enables the monitoring of processes and physical environment from far away locations. These remote sensing systems include physiological sensors installed ...
Implementation of MKopa Solar Services for Poverty Eradication
(2020)
M-Kopa Solar is the market leader in 'pay-as-you-go' energy services for off-grid customers; the service has proved to be a key component of poverty reduction in East Africa. Despite its market, the product is undergoing ...
An Information Security Awareness Framework For Secondary School Teachers In Kenya
(International Journal of Innovative Research and Advanced Studies (IJIRAS), 2020-05)
Over the last decade, secondary schools have increased ICT usage in teaching and learning. The technological devices mostly belong to students and staff hence advancing the BYOD culture that makes the ability of the school ...
E-Proctored Model: Electronic Solution Architect for Exam Dereliction in Kenya
(International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE), 2007-02)
The paper after reviewing various relevant literature proposes effective and efficient model to curb exam derelictions in pre-university exams in Kenya. Since all irregularities, including fraudulent results, have a ...
A Comparative Study of C, C++, C# and Java Programming Languages: Underpinning Structure Equation Modeling, Data Structures and Algorithm
(Journal of Scientific and Engineering Research,, 2019)
Equation Modeling technique has not been fully utilized in the field of Software analysis in handling complex data analysis and modeling on programming languages by a number of researches globally and specifically by ...
Validation of Extended Theory of Reasoned Action to Predict Mobile Phone Money Usage
(World Journal of Computer Application and Technology, 2018-01-13)
Theory of Reasoned Action (TRA), postulated by social psychologist, has been established to be relevant in guiding Information Systems studies. The theory resulted from attitude research using the Expectancy Value Models. ...
An Integrated Mobile Identity Authentication Model
(International Research Journal of Innovations in Engineering and Technology (IRJIET), 2022-01)
Theft of personal identity is an unlawful act; a criminal in this case possesses or attempts to be in possession of an identity of a victim without their knowledge or consent. Mobile identity theft the problem that inspires ...
Influence of Cognitive Agility of Cyber Operators on Situational Aware Cyberspace Protection
(International Journal of Innovative Research and Advanced Studies (IJIRAS), 2022-03)
The effectiveness of the cyberspace protection for the national critical information infrastructure (CII) depends on a dynamically and reliably established cyberspace situational awareness framework. The current attribution ...