Browsing School of Informatics & Innovative Systems by Title
Now showing items 44-63 of 117
-
Enhanced Information Systems Success Model for Patient Information Assurance
(Journal of Computer Science Research, 2021-10-13)The current health information systems have many challenges such as lack of standard user interfaces, data security and privacy issues, inability to uniquely identify patients across multiple hospital information systems, ... -
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully Homomorphic Encryption Scheme
(ResearchGate, 2017)This paper focusses on the use of homomorphic encryption schemes in solving data security in cloud computation. We started by acknowledging Gentry’s contribution on partial homomorphic encryption schemes where he constructed ... -
Enterprise resource planning systems and integrated financial management information system in Kenyan public sector: an assessment
(ijaemr, 2017-02)Enterprise Resource Planning Systems and Integrated Financial Management Information System have such an important role in global success and become more complex overtime. ERP and IFMIS have not been addressed in full, ... -
ENVIRONMENTAL MICROBIOLOGY
(2019) -
Evaluation of TCP congestion control modus operandi in mesh networks
(International Journal of Computer Networks and Applications, 2017-01)Abstract – In mesh networks, the sender machine is connected to the receiver machine via multiple paths. Efficient transmissions along these paths require proper link choice so as to quickly deliver the packets the ... -
Evaluation of TCP congestion control modus operandi in mesh networks
(Ever Science Publications, 2017)In mesh networks, the sender machine is connected to the receiver machine via multiple paths. Efficient transmissions along these paths require proper link choice so as to quickly deliver the packets the destination. Poor ... -
Exploring a Social Learning Perspective on Computer Forensics Barriers and Factors Affecting Cybercrime Investigation in Kenya
(International Research Journal of Innovations in Engineering and Technology (IRJIET), 2020-07)As Kenya matures into an information society, she is exposed to various cyber threats and challenges resulting from the ubiquity of the internet and advancement of technology. Social engineering tricks have been applied ... -
Factors affecting integrated financial management information system application in Kenyan public sector
(Journal of Scientific and Engineering Research, 2017)The research aimed at assessing the factors affecting Integrated Financial Management Information system application in Kenyan public sector. There has been a very little improvement in financial management in Kenyan public ... -
A Framework for secure mobile cloud computing in effective electronic learning
(International Journal of Innovative Research and Advanced Studies, 2018-01)Abstract: In the last few years, most universities have adopted E-Learning as a new approach to teaching and learning. However, the explosive growth and usage of mobile applications and the emergence of mobile cloud computing ... -
A Fraud Management Framework for Mobile Financial Services within Kenya
(EPRA International Journal of Economics,Businessand Management Studies(EBMS), 2022-12)Mobile banking offers several benefits to financial sectors, including convenience in terms of time, money and effective customer relationship management. However, illegal actions in the digital age have altered the mode ... -
Governance, Complexity, and Resilience of the Kenyan Mobile Industry in the Context of Its Strategic Vision
(IGI Global, 2021)Assessing the impact of existing and emerging mobile technologies on individuals and societies is a complex task. Various models of the telecommunication industry have been developed and differ from country to country. The ... -
Greening Decent Employment Opportunities For Kenya’s Youth
(International Journal of Education and Research, 2019-08)Unemployment of youth in any nation thwarts social fabrics and identity of young potential labor force globally. This results in less effective and inefficient economic support from the most vibrant members of the ... -
Implementation of MKopa Solar Services for Poverty Eradication
(2020)M-Kopa Solar is the market leader in 'pay-as-you-go' energy services for off-grid customers; the service has proved to be a key component of poverty reduction in East Africa. Despite its market, the product is undergoing ... -
Improving Learner Engagements through Implementing Technology-Enabled Learning
(Commonwealth Of Learning, 2020)Introduction The emergence of information and communication technologies (ICT) has changed the nature of the learning environments experienced by students. Educators have always created, selected and provided environments ... -
Influence of Cognitive Agility of Cyber Operators on Situational Aware Cyberspace Protection
(International Journal of Innovative Research and Advanced Studies (IJIRAS), 2022-03)The effectiveness of the cyberspace protection for the national critical information infrastructure (CII) depends on a dynamically and reliably established cyberspace situational awareness framework. The current attribution ... -
Information Communication Technology Training as A Prerequisite for E-Government In County Governments Of Kenya
(International Journal of Computer Applications Technology and Research, 2017)Today, the Kenyan government has invested and endeavored to embrace electronic government (e-government) in almost all ministries to enable speedy service delivery and enhance transparency and accountability by eliminating ... -
An Information Security Awareness Framework For Secondary School Teachers In Kenya
(International Journal of Innovative Research and Advanced Studies (IJIRAS), 2020-05)Over the last decade, secondary schools have increased ICT usage in teaching and learning. The technological devices mostly belong to students and staff hence advancing the BYOD culture that makes the ability of the school ... -
An Integrated Mobile Identity Authentication Model
(International Research Journal of Innovations in Engineering and Technology (IRJIET), 2022-01)Theft of personal identity is an unlawful act; a criminal in this case possesses or attempts to be in possession of an identity of a victim without their knowledge or consent. Mobile identity theft the problem that inspires ... -
International Journal of Academic Studies on Theory and Applications of Mathematics to Security in Cloud Computing: A Case of Addition-Composition Fully Homomorphic Encryption Scheme
(ResearchGate, 2016-04-12)Addition-Composition Fully Homomorphic Encryption is given in this paper to solve data security equation in cloud computation. An earlier attempt to solve security problem has been proposed by Craig Gentry, who combined ... -
Investigating design issues in mobile computer-mediated communication technologies
(Taylor&Francis, 2015-12)Mobility is the new reality of business and stands to have a significant impact on the implementation of mobile computer-mediated communication (mCMC), such as mobile texting, mobile video, and mobile presence. Information ...