Browsing School of Informatics & Innovative Systems by Title
Now showing items 5-24 of 36
-
Deployment of Honeypots as Proactive Detection Tools for Monitoring Cyber Related Incidences
(JOOUST, 2015)The Kenya government is rolling the Vision 2030 programme where ICT plays a major role in achieving the components of the Pillars associated with it. It has encouraged the rapid deployment of the high speed fiber optic ... -
Determination of Effective Information systems Security in Secondary Schools in Kenya: A Case of Kisumu County
(JOOUST, 2018)Adoption of information systems has become a core issue in many sectors of the economy including secondary schools in education sector. These information systems have enabled the secondary schools to achieve efficiency in ... -
Development and Implementation of E-Leave Management System in Banking Sector (KCB)
(JOOUST, 2015)The research investigated the state of leave management system used by different organizations i.e. brief comparison of manual le-ave management system and E-leave management system. A leave management system had been ... -
Effective Bandwith Management in a Campus
(JOOUST, 2013)Small campus networks usually do not have a set of rules for users to access the network in order to protect network resources and enforce institutional policies (for instance, no sharing of music files or no gaming). This ... -
Effective Use of Abacus in the Teaching and Learning of Mathematics among Class Three Teachers in Public Primary Schools in Kasipul Division Rachuonyo South Sub-County, Kenya
(JOOUST, 2015)ABSTRACT Abacus has been considered as one of the most significant tools used for teaching and learning of mathematics among primary school mathematics teachers since it helps in spurring better performance in mathematics. ... -
Effectiveness of Cloud Computing Security on Mobile Learning
(JOOUST, 2018)In the last few years, most Kenyan universities have adopted E-Learning as a new approach to teaching and learning. However, the explosive growth and usage of mobile applications and the emergence of mobile cloud computing ... -
Effects of "on Job" Information Technology Security Training on Networks Security Management.
(JOOUST, 2015)This study has been conducted to determine the effects of (on job) IT security training on the management of computer network's security within Kenyan Public Universities. Computer networks in Kenyan institutions have ... -
Effects of ''On Job'' Information Technology Security Training on Network Security Management.
(JOOUST, 2015)Although SACCOs are established to help their members access financial services, they have not been able to meet their demands satisfactorily because of their low financial performance. Poor financial performance is ... -
Effects of Biometrics on the Security of Enterprise Data and Information Assurance
(JOOUST, 2015)The increasing problem of user verification and identification has compelled institutions to adopt biometric based information security solutions, which rely on the uniqueness of the human physiological and behavioral ... -
Evaluation of ICT Disaster Recovery and Preparedness : a Survey of Health Research Organization in Kisumu County.
(JOOUST, 2020)Research organizations utilize information technology to generate process and transmit both sensitive and vital data that is critical in development of drugs, vaccines and health policy. Despite the role ICT plays in these ... -
Evaluation of School Management Information Systems(Smis) in Secondary Schools in Siaya County
(JOOUST, 2021)The study analyzed the qualitative assessment of the School Management Information Systems in secondary schools within the framework of program theory by (Chen, 2012) and Technology Mediated Learning Evaluation Framework ... -
Exploring performance ethnography to illuminate mobile banking capabilities in western Kenya:capability approach study
(DeMontfront University Leicester, 2012)This study is a qualitative examination on the impact of mobile banking, commonly known as MPESA on the lived experiences of the marginalised poor of Bukhalalire sub-location in western Kenya. Using Capability Approach ... -
A Framework Based on Institutional Theory for Cyber Resiliency in County Government
(JOOUST, 2020)Cyber resiliency is the ability of a system to anticipate, withstand, recover and evolve when a cyber-attack has occuned in an organization or institution. Poor IT habits still persist in institutions exposing them to ... -
Implementing a Risk Management Strategy for Funsoft in Three Public Hospitals in Kisumu County
(JOOUST, 2015)As the adoption rate of electronic health record continues to accelerate, the need to enhance information risk management has become more critical to create, compliant health care environment. Healthcare providers and ... -
Implementing a Secure Messaging Solution Using Enhanced Zimbra Collaboration Suite
(JOOUST, 2014)A mail server is an application that receives incoming e-mail from local users and remote senders and forwards outgoing e-mail for delivery. It is also known as a mail transfer agent or MTA, a mail transport agent, a mail ... -
Influence of Selected Motivational Factors on Job Satisfaction among Support Staff in Secondary Schools in Rarieda Sub-County
(JOOUST, 2015)Despite, the fact that support staff play a significant role in school activities, their contribution has not been given serious recognition. The recent report by an Education Task Force was an indication that they were ...