Browsing School of Informatics & Innovative Systems by Title
Now showing items 27-46 of 117
-
Deployment and Use of Mobile Technology to Control Malaria
(Journal of Information Technology & Software Engineering, 2019-05-10)Malaria is a significant public health problem and impediment to socioeconomic development in the developing countries. According to World Health Organization (WHO) report, the number of malaria cases increased to 219 ... -
Determinants of Computerized System for Execution of Martime Security Systems
(Journal of Scientific and Engineering Research, 2020)This paper investigates the determinants of Computerized System for Execution of Martime Security systems at Mombasa port, Kenya:-In particular to establish the effect of Under Water Detection System-Band Radar and Vessel ... -
Determinants of adoption of internet banking by trade finance customers in East Africa
(HR mars, 2012)It is increasingly more interesting to the bank managers to understand what is important to customers when it comes to Internet banking, and especially banking conducted by the customers themselves. The purpose of this ... -
Digital Community Currency Usability from the User’s Eyes: Cases of Sarafu and Maendeleo Trading Credit (Mtcr.)
(International Journal of Software Engineering & Applications (IJSEA), 2023-03)Day by day, users demand systems that fulfill their expectations. Often, users of a system are dissatisfied because systems do not meet their expectations. Indeed, user expectations vary, including unrealistic expectations ... -
Domestic violence in relation to children rights in Dar es Salaam, Tanzania
(2011-09)This paper discusses domestic violence in relation to children rights in Temeke District Dar es salaam Tanzania. The main objective is to investigate rights of domestic violence affected children in households in so as to ... -
A Dynamic Scheduling Optimization Model (DSOM)
(International Journal of Research in Engineering and Science (IJRES), 2018-05-17)Scheduling in computing is the rearrangement of machine instructions to obtain the optimal level services subject to various constraints. The scheduling activity is controlled by a scheduler (part of the Operating Systems ... -
E-Marketing Adoption among Small Businesses in the Hospitality Industry in Kenya: The Institution Theory Perspective
(International Journal of Advanced Research in Computer and Communication Engineering, 2018-06)Small sized businesses play an important role in the growth of economies all over the world, yet they appear to be slow in adopting E-marketing technology to market their products and services which may lead to business ... -
E-Proctored Model: Electronic Solution Architect for Exam Dereliction in Kenya
(International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE), 2007-02)The paper after reviewing various relevant literature proposes effective and efficient model to curb exam derelictions in pre-university exams in Kenya. Since all irregularities, including fraudulent results, have a ... -
Effect of integrated financial management information system use in Kenya : case of government treasury
(ijaemr, 2017)The IFMIS has not been a success in Africa and Kenya in Particular .Why it was unsuccessful in the continent is unknown .This study therefore, aims at examining to assess the effect of IFMIS use : case of Government Treasury. ... -
Effectiveness of security controls on electronic health records
(IJSTR, 2017-12)Electronic Health Record (EHR) systems enhance efficiency and effectiveness in handling patients ‘information in healthcare. This study focused on the EHR security by initially establishing the nature of threats affecting ... -
Effects of Information System Controls on Enhancing Security of Information Systems within Universities
(IOSR Journal of Engineering (IOSRJEN), 2017-11-11)Universities in the world today consider information to be their most important asset. They therefore ensure information security by taking appropriate measures to ensure no information is leaked or passed to unauthorized ... -
Efficient Group Authentication Protocol for Secure 5G Enabled Vehicular Communications
(IEEE, 2020-12-30)The fifth generation (5G) networks exhibit extremely low latency, extremely high bandwidth, and high density connections that are salient features for the support of vehicle to everything (V2X) services. Although a lot of ... -
Efficient Resource Utilization in Information Security Risk Management Investment
(International Journal of Computer Applications Technology and Research, 2018)Efficient Resource Utilization in Information Security Risk Management Investment can improve organization resiliency to information security threats through identifying key information assets and security risks so that ... -
Elements enhancing the use of mobile phone money services: A case of Homa Bay region, Kenya
(World Journal of Computer Application and Technology, 2016)The history of mobile payments is more than 10 years old and mobile money services in various countries such as Finland are still relatively unpopular, even though consumers have shown clear interest towards mobile money. ... -
Emerging Security Challenges due to Bring Your Own Device Adoption
(International Journal of Science and Research (IJSR), 2018-01-01)Although a number of researches have been carried out by various organizations across the globe to establish security challenges facing education institutions due to BYOD adoption there is no evidence that a similar study ... -
Empirical Analysis of Clustered Network Traffic over Digital Communication Channels
(EverScience Publications, 2016-11)The concept of clustering traffic is a noble idea from a number of perspectives. In digital communication channels, signals from different sources are multiplexed at the source and carried on a single communication channel. ... -
Empirical investigation of instant messaging security in a virtual environment
(International Journal of Computer Applications Technology and Research, 2016)Use of instant messaging services is becoming increasingly popular with Internet based systems like America Online’s Instant Messaging (AIM), Microsoft’s MSN Messenger, Yahoo! Messenger, WhatsApp, Viber, Kakaotalk, Skype ... -
Enhanced Information Systems Success Model for Patient Information Assurance
(Journal of Computer Science Research, 2021-10-13)The current health information systems have many challenges such as lack of standard user interfaces, data security and privacy issues, inability to uniquely identify patients across multiple hospital information systems, ... -
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully Homomorphic Encryption Scheme
(ResearchGate, 2017)This paper focusses on the use of homomorphic encryption schemes in solving data security in cloud computation. We started by acknowledging Gentry’s contribution on partial homomorphic encryption schemes where he constructed ... -
Enterprise resource planning systems and integrated financial management information system in Kenyan public sector: an assessment
(ijaemr, 2017-02)Enterprise Resource Planning Systems and Integrated Financial Management Information System have such an important role in global success and become more complex overtime. ERP and IFMIS have not been addressed in full, ...