School of Informatics & Innovative Systems: Recent submissions
Now showing items 21-40 of 119
-
Assessment of Security Measures in Universities for Enforcement of Integrity of Information Systems in Kisumu and Siaya Counties, Kenya
(IJRDO - Journal of Computer Science and Engineering, 2015-06)An ICT policy safeguards Integrity of Information Systems and ensures business continuity. This study sought to assess the level of compliance by Universities to their ICT security policies by assessing the integrity pillar. ... -
International Journal of Academic Studies on Theory and Applications of Mathematics to Security in Cloud Computing: A Case of Addition-Composition Fully Homomorphic Encryption Scheme
(ResearchGate, 2016-04-12)Addition-Composition Fully Homomorphic Encryption is given in this paper to solve data security equation in cloud computation. An earlier attempt to solve security problem has been proposed by Craig Gentry, who combined ... -
Data Modeling Techniques Used for Big Data in Enterprise Networks
(International Journal of Advanced Technology and Engineering Exploration, 2020-04-20)The deployment and maintenance of enterprise networks form the bedrock of any organization, be it government, commercial, academic, and/or non-profit making. These networks host vast amounts of information, databases, in ... -
Server Virtualization Technology: A proposed Implementation Model
(IISTE, 2019-04-30)The study sought to fill the existing gap on issues surrounding the implementation of Server virtualization technology, which have received relatively little attention. The study investigated the implementation ... -
Application of Technology in Strengthening Collaboration in Research, Teaching and Learning for African Universities in the post COVID-19 Era
(World Journal of Innovative Research, 2020-09-03)The collaboration and sharing of teaching and technology among universities is increasingly perceived as a vehicle to improve quality in education and innovation through knowledge exchange. The discussion explores how ... -
Legal Issues in Computer Forensics and Digital Evidence Admissibility
(ResearchGate, 2020-07-07)Computer forensics integrates the fields of computer science and law to investigate crime. For digital evidence to be legally admissible in court, investigators should follow proper legal procedures when recovering and ... -
Validation of Extended Theory of Reasoned Action to Predict Mobile Phone Money Usage
(World Journal of Computer Application and Technology, 2018-01-13)Theory of Reasoned Action (TRA), postulated by social psychologist, has been established to be relevant in guiding Information Systems studies. The theory resulted from attitude research using the Expectancy Value Models. ... -
Emerging Security Challenges due to Bring Your Own Device Adoption
(International Journal of Science and Research (IJSR), 2018-01-01)Although a number of researches have been carried out by various organizations across the globe to establish security challenges facing education institutions due to BYOD adoption there is no evidence that a similar study ... -
Governance, Complexity, and Resilience of the Kenyan Mobile Industry in the Context of Its Strategic Vision
(IGI Global, 2021)Assessing the impact of existing and emerging mobile technologies on individuals and societies is a complex task. Various models of the telecommunication industry have been developed and differ from country to country. The ... -
Efficient Group Authentication Protocol for Secure 5G Enabled Vehicular Communications
(IEEE, 2020-12-30)The fifth generation (5G) networks exhibit extremely low latency, extremely high bandwidth, and high density connections that are salient features for the support of vehicle to everything (V2X) services. Although a lot of ... -
An Understanding of the Cyber Security Threats and Vulnerabilities Landscape: A Case of Banks in Kenya
(International Journal of Innovative Research and Advanced Studies (IJIRAS) Volume 7, 2020-06-06)Cyber security threats in Kenya has been increasing steadily; particularly in banks. A Cyber security vulnerability is a software, hardware or procedural weakness that may provide an attacker entry to a computer or network. ... -
An Investigation of Existing Strategies Used to Counter Prevailing Cyber Threats and Vulnerabilities in Banks
(International Journal of Innovative Research and Advanced Studies (IJIRAS) Volume 7, 2020-06-06)Financial institutions and banks world-wide re grappling with a myriad of challenges in relation to regulations, disruptive models and technologies, new competitors, a restrictive customer base that has unlimited number ... -
Deployment and Use of Mobile Technology to Control Malaria
(Journal of Information Technology & Software Engineering, 2019-05-10)Malaria is a significant public health problem and impediment to socioeconomic development in the developing countries. According to World Health Organization (WHO) report, the number of malaria cases increased to 219 ... -
Tracking Area Boundary-aware Protocol for Pseudo Stochastic Mobility Prediction in LTE Networks
(MECS, 2020-10-08)Accurate mobility prediction enables efficient and faster paging services in these networks. This in turn facilitates the attainment of higher bandwidths and execution of activities such as handovers at low latencies. The ... -
Key Issues in Internet Governance
(World Journal of Innovative Research (WJIR), 2020-09)Internet is network of remotely or physically connected computers or computer devices that are able to interact. Numerous activities take place on the internet. The processes of decision making on what activities are to ... -
Empirical Analysis of Clustered Network Traffic over Digital Communication Channels
(EverScience Publications, 2016-11)The concept of clustering traffic is a noble idea from a number of perspectives. In digital communication channels, signals from different sources are multiplexed at the source and carried on a single communication channel. ... -
An Information Security Awareness Framework For Secondary School Teachers In Kenya
(International Journal of Innovative Research and Advanced Studies (IJIRAS), 2020-05)Over the last decade, secondary schools have increased ICT usage in teaching and learning. The technological devices mostly belong to students and staff hence advancing the BYOD culture that makes the ability of the school ... -
E-Proctored Model: Electronic Solution Architect for Exam Dereliction in Kenya
(International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE), 2007-02)The paper after reviewing various relevant literature proposes effective and efficient model to curb exam derelictions in pre-university exams in Kenya. Since all irregularities, including fraudulent results, have a ... -
Implementation of MKopa Solar Services for Poverty Eradication
(2020)M-Kopa Solar is the market leader in 'pay-as-you-go' energy services for off-grid customers; the service has proved to be a key component of poverty reduction in East Africa. Despite its market, the product is undergoing ... -
A Comparative Study of C, C++, C# and Java Programming Languages: Underpinning Structure Equation Modeling, Data Structures and Algorithm
(Journal of Scientific and Engineering Research,, 2019)Equation Modeling technique has not been fully utilized in the field of Software analysis in handling complex data analysis and modeling on programming languages by a number of researches globally and specifically by ...