Browsing School of Informatics & Innovative Systems by Title
Now showing items 58-77 of 117
-
Influence of Cognitive Agility of Cyber Operators on Situational Aware Cyberspace Protection
(International Journal of Innovative Research and Advanced Studies (IJIRAS), 2022-03)The effectiveness of the cyberspace protection for the national critical information infrastructure (CII) depends on a dynamically and reliably established cyberspace situational awareness framework. The current attribution ... -
Information Communication Technology Training as A Prerequisite for E-Government In County Governments Of Kenya
(International Journal of Computer Applications Technology and Research, 2017)Today, the Kenyan government has invested and endeavored to embrace electronic government (e-government) in almost all ministries to enable speedy service delivery and enhance transparency and accountability by eliminating ... -
An Information Security Awareness Framework For Secondary School Teachers In Kenya
(International Journal of Innovative Research and Advanced Studies (IJIRAS), 2020-05)Over the last decade, secondary schools have increased ICT usage in teaching and learning. The technological devices mostly belong to students and staff hence advancing the BYOD culture that makes the ability of the school ... -
An Integrated Mobile Identity Authentication Model
(International Research Journal of Innovations in Engineering and Technology (IRJIET), 2022-01)Theft of personal identity is an unlawful act; a criminal in this case possesses or attempts to be in possession of an identity of a victim without their knowledge or consent. Mobile identity theft the problem that inspires ... -
International Journal of Academic Studies on Theory and Applications of Mathematics to Security in Cloud Computing: A Case of Addition-Composition Fully Homomorphic Encryption Scheme
(ResearchGate, 2016-04-12)Addition-Composition Fully Homomorphic Encryption is given in this paper to solve data security equation in cloud computation. An earlier attempt to solve security problem has been proposed by Craig Gentry, who combined ... -
Investigating design issues in mobile computer-mediated communication technologies
(Taylor&Francis, 2015-12)Mobility is the new reality of business and stands to have a significant impact on the implementation of mobile computer-mediated communication (mCMC), such as mobile texting, mobile video, and mobile presence. Information ... -
Investigating design issues in mobile computer-mediated communication technologies
(Taylor & Francis, 2015)Mobility is the new reality of business and stands to have a significant impact on the implementation of mobile computermediated communication (mCMC), such as mobile texting, mobile video, and mobile presence. Information ... -
Investigating factors affecting social presence and user satisfaction with mobile instant messaging
(Elsevier Ltd., 2014-05-04)The purpose of this study is to examine the factors that influence social presence and user satisfaction with Mobile Instant Messaging (mIM). The proposed research model integrates channel expansion, social influence, ... -
Investigating factors affecting social presence and user satisfaction with Mobile Instant Messaging
(Elsevier, 2014-07)The purpose of this study is to examine the factors that influence social presence and user satisfaction with Mobile Instant Messaging (mIM). The proposed research model integrates channel expansion, social influence, ... -
Investigating factors affecting social presence and user satisfaction with Mobile Instant messaging
(Elsevier, 2014)The purpose of this study is to examine the factors that influence social presence and user satisfaction with Mobile Instant Messaging (mIM). The proposed research model integrates channel expansion, social influence, ... -
An Investigation of Existing Strategies Used to Counter Prevailing Cyber Threats and Vulnerabilities in Banks
(International Journal of Innovative Research and Advanced Studies (IJIRAS) Volume 7, 2020-06-06)Financial institutions and banks world-wide re grappling with a myriad of challenges in relation to regulations, disruptive models and technologies, new competitors, a restrictive customer base that has unlimited number ... -
Kenya's vision 2030: Modelling technology usage and the economy
(Technology in Science, 2019-11) -
Kenya's Vision 2030: Modelling Technology Usage and the Economy
(Pergamon, 2019-11-01)Kenya has emerged in recent times as one of the fastest growing telecom markets in the world. Assessing the impact of existing and emerging mobile technologies on individuals and societies is a complex task. Various models ... -
Key Issues in Internet Governance
(World Journal of Innovative Research (WJIR), 2020-09)Internet is network of remotely or physically connected computers or computer devices that are able to interact. Numerous activities take place on the internet. The processes of decision making on what activities are to ... -
Legal Issues in Computer Forensics and Digital Evidence Admissibility
(ResearchGate, 2020-07-07)Computer forensics integrates the fields of computer science and law to investigate crime. For digital evidence to be legally admissible in court, investigators should follow proper legal procedures when recovering and ... -
Load Balanced Network: Design, Implementation and Legal Consideration Issues
(Transactionss on Networks and Communication, 201-09-14)Computer networks have become extremely useful in the modern fast paced work and business environments. Every user of a computing device- desktops, laptops, tablets and mobile phones- wants to connect to a network and ... -
Low latency automatic repeat request protocol for time sensitive GSM-enabled smart phone video streaming services
(IJSRCSEIT, 2018)Automatic repeat request protocols (ARQ) are fundamental error control techniques employed in wired as well as wireless networks. These protocols facilitate error recovery based on feedback messages and retransmissions. ... -
Machine Learning Protocol for Secure 5G Handovers
(JOOUST, 2022-01-27)The fifth generation (5G) networks are characterized with ultra-dense deployment of base stations with limited footprint. Consequently, user equipment’s handover frequently as they move within 5G networks. In addition, 5G ... -
Mobile money users' functionings and freedoms: Amartya Sen's capability approach
(World Journal of Computer Application and Technology, 2018)Over the last decade Amartya Sen’s Capability Approach has emerged as the leading alternative to standard economic frameworks for thinking about poverty, inequality and human development generally. Professor Sen has ... -
Mobile Phone Penetration and Economic Growth in Kenya: A System Dynamic Approach in the Context of the Kenyan Vision 2030
(Global Scientific Journals, 2018-12-12)System dynamics modelling is a scientific method for modelling complex, nonlinear natural, economic and technical systems. This research assesses the Kenyan mobile industry thus, identifying success factors and challenges ...