Search
Now showing items 1-6 of 6
Enhanced Information Security Model Using Integrated Approach for Saccos in Kenya
(JOOUST, 2020)
Information systems security is a very important aspect for the performance and sustainability of SACCOS. A secure information systems security plays a significant role of keeping all the SACCOS information from being ...
Pseudo-Stochastic Mobility Tracking Protocol for Secure and High Performance Handovers in 5g and Beyond Networks
(JOOUST, 2022-03)
The goal of this thesis was to develop a pseudo-stochastic mobility tracking protocol for secure and high performance handovers in 5G and beyond networks. The research specifically assessed current user equipment mobility ...
A Participatory Model for an Enhanced Adoption of ICT Innovations by Smallholder Farmers
(JOOUST, 2022)
Agriculture has been identified as the main source of livelihood for a large population in Africa, with over 80% of farmers being smallholder farmers. However, despite a large group of smallholder farmers being involved ...
Factors That Influence Cybersecurity Compliance Behaviours by Bank Employees: A Case of Banks Operating in Kenya
(JOOUST, 2022)
Digitization of transanctions in Banks has developed exponentially since the advent of the internet technology. This has brought about efficiency and high quality service delivery at all times. However, cyber threats also ...
An Optimized Artificial Intelligence Model for Emergency Case Response in Healthcare
(JOOUST, 2022)
Artificial intelligence (AI), which is already being used in healthcare, has brought a paradigm shift to the field. Owing to the growing availability of healthcare data, there has been rapid advancement in the use of ...
Integrating Engagement Theory in Usability Evaluation Framework for the Design and Development of Health Information Systems.
(JOOUST, 2022)
Usability is often ignored; many software developers focus on the functionalities and give little thought to the usability. This hinders the users and also damages the reputation of developers and the softwares. Such systems ...