Browsing School of Informatics & Innovative Systems by Title
Now showing items 86-105 of 117
-
A Review of Factors Influencing e-Health Adoption in Kenya: Barriers And Facilitators
(2014)Over the past few decades, there has been a great leap in the development of Information and Communication Technology (ICT); both in hardware and software capabilities. This has provided a sound platform for their ... -
The Role of ICT in Appreciating Tri-Axis Efforts of Research, Publications and Library Services in Higher Education
(2013)Information and Communication Technology (ICT) is a principal enabler to nearly all functional efforts including quality assurance sustenance in higher education. Studies have revealed that research has a feeder effect ... -
Secure end point data security using java application programming interface
(IJSRSET, 2017-02)Most of the current instant messaging applications such as Telegram Secret Chat transmit packets in plain text. This means that an intruder equipped with appropriate remote monitoring tools can sniff the packets being ... -
Secure Handover Protocol for High Speed 5GNetworks
(Int.J. AdvancedNetworkingandApplications, 2020-07-07)The motivations behind 5G networks include seamless handovers, higher data rates, lower latencies of about one milli second, and enhanced coverage compared to 4G networks. To achieve these goals, network densification has ... -
Secure Timing Advance Based Context-Aware Handover Protocol for Vehicular Ad-Hoc Heterogeneous Networks
(International Journal of Cyber-Security and Digital Forensics, 2018)Heterogeneous networks and their applications introduce new shortcomings in terms of access control and confidentiality during handover process. Unfortunately, implementing stronger security mechanisms during the handover ... -
Security and acceptance of web based marketing information system among microfinance banks in Nairobi region, Kenya
(HR mars, 2012)Information system (IS) acceptance has been the subject of much research in the past two decades. Researchers have concentrated their efforts on identifying the conditions or factors that could facilitate the acceptance ... -
Security evaluation of cellular networks handover techniques
(MECS (http://www.mecs-press.org/), 2018-05)This paper examined the handovers in cellular networks from both functional and informational security point of view. The aim was to find out if the security goals of confidentiality, integrity and availability (CIA) are ... -
Security Evaluation of the Adaptive Congestion Control Algorithms for Virtual Data Center Communication
(European Academic Research, 2016-11)Virtualization has been vastly implemented in many organizations, facilitating the installation of more than one operating system in one physical machine. This helps save on costs associated with the physical hardware. ... -
Server Virtualization Technology: A proposed Implementation Model
(IISTE, 2019-04-30)The study sought to fill the existing gap on issues surrounding the implementation of Server virtualization technology, which have received relatively little attention. The study investigated the implementation ... -
Small Sized Businesses and E-Marketing Adoption: Towards A Conceptual Model
(International Journal of Scientific Research Engineering & Technology (IJSRET), 2018-04)The purpose of this study was to develop a conceptual framework for studying E-marketing adoption among small businesses in Kenya. The specific objective was to review existing information systems adoption theories and ... -
Socio-demographic Determinants of Soil Erosion Levels among the Farming Households in Nyakach Sub-county, Kenya
(Journal of Humanities and Social Science, 2019)Soil degradation is a world-wide problem facing humanity today. In Nyakach Sub-county the problem has persisted over the years. This study set out to assess the influence of socio-demographic characteristics of farmers ... -
Socio-economic Factors Influencing the Spread of Drinking Water Diseases in Rural Africa: Case Study of Bondo-Sub-county, Kenya
(Journal of Water and Health, 2015)Socio-economic and medical information on Bondo sub-county community was studied to help establish the relationship between the water quality challenges, community health and water rights conditions. Health challenges have ... -
A Stratified Cyber Security Vigilance Model: An Augmentation of Risk -Based Information System Security
(Transactions on Networks and Communications, 2018-09-14)Information system security in the current interconnected environment called the cyber-space is continually getting more sophisticated. All the players involved- governments, corporates, IS security experts and users, both ... -
Suitability of Addition-Composition Fully Homomorphic Encryption Scheme for Securing Data in Cloud Computing
(International Journal of Computer Science and Information Security (IJCSIS), 2018-04)Cloud computing is a technological paradigm that enables the consumer to enjoy the benefits of computing services and applications without necessarily worrying about the investment and maintenance costs. This paper focuses ... -
Suitability of Fully Homomorphic Encryption for Securing Cloud Computation
(2014)The place of cloud computing as an emerging technological paradigm enjoys incontestable status in the field of digital resource management. Computational effort in such cloud environment involves processing of data hosted ... -
A System Dynamics Model of Technology and Society: In the Context of a Developing Nation
(International Journal of System Dynamics Applications, 2020)Kenya has emerged in recent times as one of the fastest growing telecom markets in the world. There is not a single, widely used paradigm which has synthesised the various schools and theories dealing with technology and ... -
A System Dynamics Model of Technology and Society: In the Context of a Developing Nation
(International Journal of System Dynamics Applications, 2020)Kenya has emerged in recent times as one of the fastest growing telecom markets in the world. There is not a single, widely used paradigm which has synthesized the various schools and theories dealing with technology and ... -
A Systems Dynamics Model for Mobile Industry Governance in the Context of the Kenyan Vision 2030
(International Journal of System Dynamics Applications, 2018)This article describes how Kenya has emerged in recent times as one of the fastest-growing telecom markets in the world. This article presents a system dynamics-integrated model of the Kenyan telecommunication sector—mobile ... -
TCP IP header attack vectors and countermeasures
(Science publishing group, 2017-02)The TCP IP header has security vulnerabilities that make it prone to numerous kinds of attacks such as TCP SYN flooding, TCP RST, source quench, TCP session hijacking, TCP sequence number prediction, port scanning, CHARGEN ... -
Theory of reasoned action as an underpinning to technological innovation adoption studies
(World Journal of Computer Application and Technology, 2016)There are a number of theories and models that have been employed over the years in understanding and studying users’ technology adoption behaviors. These theories and models focus on people’s intention to engage in a ...