School of Informatics & Innovative Systems
Browse by
Recent Submissions
-
A Fraud Management Framework for Mobile Financial Services within Kenya
(EPRA International Journal of Economics,Businessand Management Studies(EBMS), 2022-12)Mobile banking offers several benefits to financial sectors, including convenience in terms of time, money and effective customer relationship management. However, illegal actions in the digital age have altered the mode ... -
Digital Community Currency Usability from the User’s Eyes: Cases of Sarafu and Maendeleo Trading Credit (Mtcr.)
(International Journal of Software Engineering & Applications (IJSEA), 2023-03)Day by day, users demand systems that fulfill their expectations. Often, users of a system are dissatisfied because systems do not meet their expectations. Indeed, user expectations vary, including unrealistic expectations ... -
Contributing Factors to Mobile Financial Fraud within Kenya
(EPRA International Journalof Research and Development (IJRD), 2023-01)The expansion of mobile banking services has created various challenges to financial sectors i.e. SIM swapping, hacking identity theft, social engineering, denial of service attack and account take over. The perceived ... -
Machine Learning Protocol for Secure 5G Handovers
(JOOUST, 2022-01-27)The fifth generation (5G) networks are characterized with ultra-dense deployment of base stations with limited footprint. Consequently, user equipment’s handover frequently as they move within 5G networks. In addition, 5G ... -
Influence of Cognitive Agility of Cyber Operators on Situational Aware Cyberspace Protection
(International Journal of Innovative Research and Advanced Studies (IJIRAS), 2022-03)The effectiveness of the cyberspace protection for the national critical information infrastructure (CII) depends on a dynamically and reliably established cyberspace situational awareness framework. The current attribution ... -
Enhanced Information Systems Success Model for Patient Information Assurance
(Journal of Computer Science Research, 2021-10-13)The current health information systems have many challenges such as lack of standard user interfaces, data security and privacy issues, inability to uniquely identify patients across multiple hospital information systems, ... -
An Integrated Mobile Identity Authentication Model
(International Research Journal of Innovations in Engineering and Technology (IRJIET), 2022-01)Theft of personal identity is an unlawful act; a criminal in this case possesses or attempts to be in possession of an identity of a victim without their knowledge or consent. Mobile identity theft the problem that inspires ... -
Affordances Theory in Information and Communication Technology for Development (Ict4d) Research
(International Research Journal of Modernization in Engineering Technology and Science, 2021-01)Information and Communication Technology for Development (ICT4D) is argued to have high potential value across all sectors, both public and private; and at multiple levels, be it fighting poverty; improving healthcare; ... -
Socio-demographic Determinants of Soil Erosion Levels among the Farming Households in Nyakach Sub-county, Kenya
(Journal of Humanities and Social Science, 2019)Soil degradation is a world-wide problem facing humanity today. In Nyakach Sub-county the problem has persisted over the years. This study set out to assess the influence of socio-demographic characteristics of farmers ... -
The Role of ICT in Appreciating Tri-Axis Efforts of Research, Publications and Library Services in Higher Education
(2013)Information and Communication Technology (ICT) is a principal enabler to nearly all functional efforts including quality assurance sustenance in higher education. Studies have revealed that research has a feeder effect ... -
A Review of Factors Influencing e-Health Adoption in Kenya: Barriers And Facilitators
(2014)Over the past few decades, there has been a great leap in the development of Information and Communication Technology (ICT); both in hardware and software capabilities. This has provided a sound platform for their ... -
Suitability of Fully Homomorphic Encryption for Securing Cloud Computation
(2014)The place of cloud computing as an emerging technological paradigm enjoys incontestable status in the field of digital resource management. Computational effort in such cloud environment involves processing of data hosted ... -
On Theory and Applications of Mathematics to Security in Cloud Computing: A Case of Addition-Composition Fully Homomorphic Encryption Scheme
(International Journal of Academic Studies, 2016-04-12)Addition-Composition Fully Homomorphic Encryption is given inthis paper to solve data security equation in cloud computation. An earlierattempt to solve security problem has been proposed by Craig Gentry,who combined ... -
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully Homomorphic Encryption Scheme
(ResearchGate, 2017)This paper focusses on the use of homomorphic encryption schemes in solving data security in cloud computation. We started by acknowledging Gentry’s contribution on partial homomorphic encryption schemes where he constructed ... -
Kenya's Vision 2030: Modelling Technology Usage and the Economy
(Pergamon, 2019-11-01)Kenya has emerged in recent times as one of the fastest growing telecom markets in the world. Assessing the impact of existing and emerging mobile technologies on individuals and societies is a complex task. Various models ... -
Critical Review of Capability Approach-Based Frameworks in Information and Communication Technology for Development (ICT4D)
(International Journal of Advances in Engineering and Management (IJAEM), 2020-12-12)Sen‘s Capability Approach (CA) has emerged as holistic lenses for theorising development within Information and Communication Technology for Development (ICT4D) discourses. There is ongoing research on operationalising CA ... -
Effects of Information System Controls on Enhancing Security of Information Systems within Universities
(IOSR Journal of Engineering (IOSRJEN), 2017-11-11)Universities in the world today consider information to be their most important asset. They therefore ensure information security by taking appropriate measures to ensure no information is leaked or passed to unauthorized ... -
Confidentiality and Availability of Security Measures for Information Systems in Universities in Kisumu and Siaya Counties, Kenya
(IJRDO-Journal Of Mathematics, 2016-08)Many organizations continue to grow in numbers by the day in adopting use and adoption of ICT in day to day business processes and so are the rising trends in cyber insecurity. Securing information systems against myriad ... -
Assessment of Security Measures in Universities for Enforcement of Integrity of Information Systems in Kisumu and Siaya Counties, Kenya
(IJRDO - Journal of Computer Science and Engineering, 2015-06)An ICT policy safeguards Integrity of Information Systems and ensures business continuity. This study sought to assess the level of compliance by Universities to their ICT security policies by assessing the integrity pillar. ... -
International Journal of Academic Studies on Theory and Applications of Mathematics to Security in Cloud Computing: A Case of Addition-Composition Fully Homomorphic Encryption Scheme
(ResearchGate, 2016-04-12)Addition-Composition Fully Homomorphic Encryption is given in this paper to solve data security equation in cloud computation. An earlier attempt to solve security problem has been proposed by Craig Gentry, who combined ...