Search
Now showing items 1-9 of 9
Mobile device security: proposing framework for securing mobile devices Remove selected
(JOOUST, 2015-06-24)
As the number of mobile devices accessing corporate networks increases, there is growing concern regarding the security of corporate data. The rate at which new malware and malicious apps are being introduced into the app ...
A Framework for secure mobile cloud computing in effective electronic learning
(International Journal of Innovative Research and Advanced Studies, 2018-01)
Abstract: In the last few years, most universities have adopted E-Learning as a new approach to teaching and learning. However, the explosive growth and usage of mobile applications and the emergence of mobile cloud computing ...
Data and voice signal intelligence interception over the GSM Um Interface
(International Journal of Research and Innovations in Science and Technology, 2016)
The Enhanced Data rates for GSM Evolution (EDGE) is a digital mobile phone technology that permits enhanced data communication rates as a backward-compatible annex of the Global System for Mobile communications (GSM). It ...
Security and acceptance of web based marketing information system among microfinance banks in Nairobi region, Kenya
(HR mars, 2012)
Information system (IS) acceptance has been the subject of much research in the past two decades. Researchers have concentrated their efforts on identifying the conditions or factors that could facilitate the acceptance ...
Empirical investigation of instant messaging security in a virtual environment
(International Journal of Computer Applications Technology and Research, 2016)
Use of instant messaging services is becoming increasingly popular with Internet based systems like America Online’s Instant Messaging (AIM), Microsoft’s MSN Messenger, Yahoo! Messenger, WhatsApp, Viber, Kakaotalk, Skype ...
Integrated financial management information system and its effect on cash management in Eldoret west district treasury, Kenya
(Center for Promoting Ideas, USA, 2014)
The purpose of this study was to investigate the effect of IFMIS on cash management practices in the public service. This has been necessitated by the fact that the use of IFMIS in the public service is undergoing challenges ...
Secure Handover Protocol for High Speed 5GNetworks
(Int.J. AdvancedNetworkingandApplications, 2020-07-07)
The motivations behind 5G networks include seamless handovers, higher data rates, lower latencies of about one milli second, and enhanced coverage compared to 4G networks. To achieve these goals, network densification has ...
A Stratified Cyber Security Vigilance Model: An Augmentation of Risk -Based Information System Security
(Transactions on Networks and Communications, 2018-09-14)
Information system security in the current interconnected environment called the cyber-space is continually getting more sophisticated. All the players involved- governments, corporates, IS security experts and users, both ...
Enhanced Information Systems Success Model for Patient Information Assurance
(Journal of Computer Science Research, 2021-10-13)
The current health information systems have many challenges such as lack of standard user interfaces, data security and privacy issues, inability to uniquely identify patients across multiple hospital information systems, ...