Browsing School of Informatics & Innovative Systems by Title
Now showing items 94-113 of 117
-
Server Virtualization Technology: A proposed Implementation Model
(IISTE, 2019-04-30)The study sought to fill the existing gap on issues surrounding the implementation of Server virtualization technology, which have received relatively little attention. The study investigated the implementation ... -
Small Sized Businesses and E-Marketing Adoption: Towards A Conceptual Model
(International Journal of Scientific Research Engineering & Technology (IJSRET), 2018-04)The purpose of this study was to develop a conceptual framework for studying E-marketing adoption among small businesses in Kenya. The specific objective was to review existing information systems adoption theories and ... -
Socio-demographic Determinants of Soil Erosion Levels among the Farming Households in Nyakach Sub-county, Kenya
(Journal of Humanities and Social Science, 2019)Soil degradation is a world-wide problem facing humanity today. In Nyakach Sub-county the problem has persisted over the years. This study set out to assess the influence of socio-demographic characteristics of farmers ... -
Socio-economic Factors Influencing the Spread of Drinking Water Diseases in Rural Africa: Case Study of Bondo-Sub-county, Kenya
(Journal of Water and Health, 2015)Socio-economic and medical information on Bondo sub-county community was studied to help establish the relationship between the water quality challenges, community health and water rights conditions. Health challenges have ... -
A Stratified Cyber Security Vigilance Model: An Augmentation of Risk -Based Information System Security
(Transactions on Networks and Communications, 2018-09-14)Information system security in the current interconnected environment called the cyber-space is continually getting more sophisticated. All the players involved- governments, corporates, IS security experts and users, both ... -
Suitability of Addition-Composition Fully Homomorphic Encryption Scheme for Securing Data in Cloud Computing
(International Journal of Computer Science and Information Security (IJCSIS), 2018-04)Cloud computing is a technological paradigm that enables the consumer to enjoy the benefits of computing services and applications without necessarily worrying about the investment and maintenance costs. This paper focuses ... -
Suitability of Fully Homomorphic Encryption for Securing Cloud Computation
(2014)The place of cloud computing as an emerging technological paradigm enjoys incontestable status in the field of digital resource management. Computational effort in such cloud environment involves processing of data hosted ... -
A System Dynamics Model of Technology and Society: In the Context of a Developing Nation
(International Journal of System Dynamics Applications, 2020)Kenya has emerged in recent times as one of the fastest growing telecom markets in the world. There is not a single, widely used paradigm which has synthesised the various schools and theories dealing with technology and ... -
A System Dynamics Model of Technology and Society: In the Context of a Developing Nation
(International Journal of System Dynamics Applications, 2020)Kenya has emerged in recent times as one of the fastest growing telecom markets in the world. There is not a single, widely used paradigm which has synthesized the various schools and theories dealing with technology and ... -
A Systems Dynamics Model for Mobile Industry Governance in the Context of the Kenyan Vision 2030
(International Journal of System Dynamics Applications, 2018)This article describes how Kenya has emerged in recent times as one of the fastest-growing telecom markets in the world. This article presents a system dynamics-integrated model of the Kenyan telecommunication sector—mobile ... -
TCP IP header attack vectors and countermeasures
(Science publishing group, 2017-02)The TCP IP header has security vulnerabilities that make it prone to numerous kinds of attacks such as TCP SYN flooding, TCP RST, source quench, TCP session hijacking, TCP sequence number prediction, port scanning, CHARGEN ... -
Theory of reasoned action as an underpinning to technological innovation adoption studies
(World Journal of Computer Application and Technology, 2016)There are a number of theories and models that have been employed over the years in understanding and studying users’ technology adoption behaviors. These theories and models focus on people’s intention to engage in a ... -
Theory of reasoned action as an underpinning to technological innovation adoption studies
(World Journal of Computer Application and Technology, 2016)There are a number of theories and models that have been employed over the years in understanding and studying users’ technology adoption behaviors. These theories and models focus on people’s intention to engage in a ... -
Towards an integrated framework for rural development in Kenya
(IEEE, 2016)Information Communication Technology (ICT) is a powerful tool which can accelerate socio-economic development in developing nations. The growth of information is the main compelling reason for new cutting edge technologies ... -
Towards an integrated framework for rural development in Kenya
(IEEE, 2016)Information Communication Technology (ICT) is a powerful tool which can accelerate socio-economic development in developing nations. The growth of information is the main compelling reason for new cutting edge technologies ... -
Tracking Area Boundary-aware Protocol for Pseudo Stochastic Mobility Prediction in LTE Networks
(MECS, 2020-10-08)Accurate mobility prediction enables efficient and faster paging services in these networks. This in turn facilitates the attainment of higher bandwidths and execution of activities such as handovers at low latencies. The ... -
An Understanding of the Cyber Security Threats and Vulnerabilities Landscape: A Case of Banks in Kenya
(International Journal of Innovative Research and Advanced Studies (IJIRAS) Volume 7, 2020-06-06)Cyber security threats in Kenya has been increasing steadily; particularly in banks. A Cyber security vulnerability is a software, hardware or procedural weakness that may provide an attacker entry to a computer or network. ... -
Up Scaling Invasive Plant Biomass Briquette Production: Case of Kendu Bay, Lake Victoria, Kenya
(Advances in Social Sciences Research Journal, 2017-02-25)Simple, production processes involving local community labour provide useful cottage fuel products. Such conversion of waste or intrusive bio mass to fuel briquettes is more about know-how than large capital infrastructure ... -
Usability maturity indicators for virtual learning systems
(CIS, 2014)Todays’ institutions of higher learning faced with a problem of facilitating learning with a changing profile of students, in bigger and bigger classes. The environment in these institutions is undergoing major changes as ... -
User satisfaction and acceptance of web based marketing information system among microfinance institutions in Nairobi region, Kenya
(International Journal of Academic Research in Business and Social Sciences, 2012-09)Acceptance of web based marketing information system has remained a topic of interest for a last few decades. Several theories, specifically over the conceptualisation of the technology acceptance model (TAM) have emerged ...