Browsing School of Informatics & Innovative Systems by Issue Date
Now showing items 1-20 of 48
-
Exploring performance ethnography to illuminate mobile banking capabilities in western Kenya:capability approach study
(DeMontfront University Leicester, 2012)This study is a qualitative examination on the impact of mobile banking, commonly known as MPESA on the lived experiences of the marginalised poor of Bukhalalire sub-location in western Kenya. Using Capability Approach ... -
Effective Bandwith Management in a Campus
(JOOUST, 2013)Small campus networks usually do not have a set of rules for users to access the network in order to protect network resources and enforce institutional policies (for instance, no sharing of music files or no gaming). This ... -
Laptop tracking and recovery system (LAPTRAC)
(JOOUST, 2013-05) -
Implementing a Secure Messaging Solution Using Enhanced Zimbra Collaboration Suite
(JOOUST, 2014)A mail server is an application that receives incoming e-mail from local users and remote senders and forwards outgoing e-mail for delivery. It is also known as a mail transfer agent or MTA, a mail transport agent, a mail ... -
Building and deploying secure web based e-learning system
(JOOUST, 2014-05) -
Effects of Biometrics on the Security of Enterprise Data and Information Assurance
(JOOUST, 2015)The increasing problem of user verification and identification has compelled institutions to adopt biometric based information security solutions, which rely on the uniqueness of the human physiological and behavioral ... -
Implementing a Risk Management Strategy for Funsoft in Three Public Hospitals in Kisumu County
(JOOUST, 2015)As the adoption rate of electronic health record continues to accelerate, the need to enhance information risk management has become more critical to create, compliant health care environment. Healthcare providers and ... -
Analysis of Cyber crime Preventation Measures and Practises in Public Cybercafes in Kisumu City
(JOOUST, 2015)The dependency of government, industry and society on Information Communication Technology (ICT) has attracted criminals, who use these systems to defraud or cause harm to users of these systems, leading to increase in ... -
Development and Implementation of E-Leave Management System in Banking Sector (KCB)
(JOOUST, 2015)The research investigated the state of leave management system used by different organizations i.e. brief comparison of manual le-ave management system and E-leave management system. A leave management system had been ... -
Influence of Selected Motivational Factors on Job Satisfaction among Support Staff in Secondary Schools in Rarieda Sub-County
(JOOUST, 2015)Despite, the fact that support staff play a significant role in school activities, their contribution has not been given serious recognition. The recent report by an Education Task Force was an indication that they were ... -
Effective Use of Abacus in the Teaching and Learning of Mathematics among Class Three Teachers in Public Primary Schools in Kasipul Division Rachuonyo South Sub-County, Kenya
(JOOUST, 2015)ABSTRACT Abacus has been considered as one of the most significant tools used for teaching and learning of mathematics among primary school mathematics teachers since it helps in spurring better performance in mathematics. ... -
Web Based Data Collection, Transmission and Reporting System
(JOOUST, 2015)Web based data collection, transmission and reporting s stem is a project that was aimed at providing a robust mobile application environment that can be used for any study data collection, specifically improving the data ... -
Deployment of Honeypots as Proactive Detection Tools for Monitoring Cyber Related Incidences
(JOOUST, 2015)The Kenya government is rolling the Vision 2030 programme where ICT plays a major role in achieving the components of the Pillars associated with it. It has encouraged the rapid deployment of the high speed fiber optic ... -
Effects of "on Job" Information Technology Security Training on Networks Security Management.
(JOOUST, 2015)This study has been conducted to determine the effects of (on job) IT security training on the management of computer network's security within Kenyan Public Universities. Computer networks in Kenyan institutions have ... -
Effects of ''On Job'' Information Technology Security Training on Network Security Management.
(JOOUST, 2015)Although SACCOs are established to help their members access financial services, they have not been able to meet their demands satisfactorily because of their low financial performance. Poor financial performance is ... -
Information Systems Security and Implementation of Security Controls Based on Iso Standards:A Case of Small and Medium Enterprises in the Financial Sector in Kisumu City
(JOOUST, 2015)Most organizations rely significantly upon information and communication technology and the internet in their day to day operations. Irrespective of size and type, they need a suitable set of information security controls ... -
Microfinance Management Information Systems Integrated With Mobile Money and Unstructured Supplementary Data Service (USSD) for Microfinance Service.
(JOOUST, 2015)The three major challenges facing microfinance institutions in achieving their goals include; Difficulty in exchange of information with remote clients, management and processing of data at the institution level and ... -
Cloud-Based Virtualization as an Enabling Technology for theTransformation of Healthcare in Kenya
(JOOUST, 2015)Cloud-based virtualization is a technology that has had a global entrance over the past few years. Volumes of data are handled in healthcare hence a need to embrace this technology. The primary concern has always ... -
Assessment of the Level of Compliance by the Universities to their ICT Security Policies: A Survey of Kisumu and Siaya Counties
(JOOUST, 2015-03)Today, almost all organizations around the world are using Information Communication Technology (]CT) in their daily business. An ICT policy safeguards Confidentiality, Integrity and Availability (CIA) oflnformation Systems ...