Search
Now showing items 1-10 of 20
Effects of Biometrics on the Security of Enterprise Data and Information Assurance
(JOOUST, 2015)
The increasing problem of user verification and identification has compelled institutions to adopt biometric based information security solutions, which rely on the uniqueness of the human physiological and behavioral ...
Implementing a Risk Management Strategy for Funsoft in Three Public Hospitals in Kisumu County
(JOOUST, 2015)
As the adoption rate of electronic health record continues to accelerate, the need to enhance information risk management has become more critical to create, compliant health care environment. Healthcare providers and ...
Analysis of Cyber crime Preventation Measures and Practises in Public Cybercafes in Kisumu City
(JOOUST, 2015)
The dependency of government, industry and society on Information Communication Technology (ICT) has attracted criminals, who use these systems to defraud or cause harm to users of these systems, leading to increase in ...
Assessment of the Level of Compliance by the Universities to their ICT Security Policies: A Survey of Kisumu and Siaya Counties
(JOOUST, 2015-03)
Today, almost all organizations around the world are using Information Communication Technology (]CT) in their daily business. An ICT policy safeguards Confidentiality, Integrity and Availability (CIA) oflnformation Systems ...