Browsing School of Informatics & Innovative Systems by Issue Date
Now showing items 21-40 of 118
-
Investigating design issues in mobile computer-mediated communication technologies
(Taylor & Francis, 2015)Mobility is the new reality of business and stands to have a significant impact on the implementation of mobile computermediated communication (mCMC), such as mobile texting, mobile video, and mobile presence. Information ... -
Socio-economic Factors Influencing the Spread of Drinking Water Diseases in Rural Africa: Case Study of Bondo-Sub-county, Kenya
(Journal of Water and Health, 2015)Socio-economic and medical information on Bondo sub-county community was studied to help establish the relationship between the water quality challenges, community health and water rights conditions. Health challenges have ... -
Assessment of Security Measures in Universities for Enforcement of Integrity of Information Systems in Kisumu and Siaya Counties, Kenya
(IJRDO - Journal of Computer Science and Engineering, 2015-06)An ICT policy safeguards Integrity of Information Systems and ensures business continuity. This study sought to assess the level of compliance by Universities to their ICT security policies by assessing the integrity pillar. ... -
Model for HIV infection and database
(Research Gate, 2015-08)In this paper the development of HIV infection and its different stages are described first by medical stages. By making use of the differential equations, model for various stages and the growth of HIV infection has been ... -
Investigating design issues in mobile computer-mediated communication technologies
(Taylor&Francis, 2015-12)Mobility is the new reality of business and stands to have a significant impact on the implementation of mobile computer-mediated communication (mCMC), such as mobile texting, mobile video, and mobile presence. Information ... -
Theory of reasoned action as an underpinning to technological innovation adoption studies
(World Journal of Computer Application and Technology, 2016)There are a number of theories and models that have been employed over the years in understanding and studying users’ technology adoption behaviors. These theories and models focus on people’s intention to engage in a ... -
Data and voice signal intelligence interception over the GSM Um Interface
(International Journal of Research and Innovations in Science and Technology, 2016)The Enhanced Data rates for GSM Evolution (EDGE) is a digital mobile phone technology that permits enhanced data communication rates as a backward-compatible annex of the Global System for Mobile communications (GSM). It ... -
Elements enhancing the use of mobile phone money services: A case of Homa Bay region, Kenya
(World Journal of Computer Application and Technology, 2016)The history of mobile payments is more than 10 years old and mobile money services in various countries such as Finland are still relatively unpopular, even though consumers have shown clear interest towards mobile money. ... -
Challenges facing the use and adoption of mobile phone money services
(World Journal of Computer Application and Technology, 2016)The Mobile phone banking idea was initially born out of the intention to reach the unbanked rural poor. However, there still existed mobile phone money service divide, highly skewed against the rural poor population. This ... -
Theory of reasoned action as an underpinning to technological innovation adoption studies
(World Journal of Computer Application and Technology, 2016)There are a number of theories and models that have been employed over the years in understanding and studying users’ technology adoption behaviors. These theories and models focus on people’s intention to engage in a ... -
Building e-Agriculture framework in Kenya
(HAAI, 2016)Arguably, poverty is concentrated in developing countries due to poor capacity to develop, to access and to manage agricultural information and knowledge. This is owed to disconnect that exist between the e-Agricultural ... -
Empirical investigation of instant messaging security in a virtual environment
(International Journal of Computer Applications Technology and Research, 2016)Use of instant messaging services is becoming increasingly popular with Internet based systems like America Online’s Instant Messaging (AIM), Microsoft’s MSN Messenger, Yahoo! Messenger, WhatsApp, Viber, Kakaotalk, Skype ... -
Towards an integrated framework for rural development in Kenya
(IEEE, 2016)Information Communication Technology (ICT) is a powerful tool which can accelerate socio-economic development in developing nations. The growth of information is the main compelling reason for new cutting edge technologies ... -
Towards an integrated framework for rural development in Kenya
(IEEE, 2016)Information Communication Technology (ICT) is a powerful tool which can accelerate socio-economic development in developing nations. The growth of information is the main compelling reason for new cutting edge technologies ... -
International Journal of Academic Studies on Theory and Applications of Mathematics to Security in Cloud Computing: A Case of Addition-Composition Fully Homomorphic Encryption Scheme
(ResearchGate, 2016-04-12)Addition-Composition Fully Homomorphic Encryption is given in this paper to solve data security equation in cloud computation. An earlier attempt to solve security problem has been proposed by Craig Gentry, who combined ... -
On Theory and Applications of Mathematics to Security in Cloud Computing: A Case of Addition-Composition Fully Homomorphic Encryption Scheme
(International Journal of Academic Studies, 2016-04-12)Addition-Composition Fully Homomorphic Encryption is given inthis paper to solve data security equation in cloud computation. An earlierattempt to solve security problem has been proposed by Craig Gentry,who combined ... -
Confidentiality and Availability of Security Measures for Information Systems in Universities in Kisumu and Siaya Counties, Kenya
(IJRDO-Journal Of Mathematics, 2016-08)Many organizations continue to grow in numbers by the day in adopting use and adoption of ICT in day to day business processes and so are the rising trends in cyber insecurity. Securing information systems against myriad ... -
Security Evaluation of the Adaptive Congestion Control Algorithms for Virtual Data Center Communication
(European Academic Research, 2016-11)Virtualization has been vastly implemented in many organizations, facilitating the installation of more than one operating system in one physical machine. This helps save on costs associated with the physical hardware. ... -
Empirical Analysis of Clustered Network Traffic over Digital Communication Channels
(EverScience Publications, 2016-11)The concept of clustering traffic is a noble idea from a number of perspectives. In digital communication channels, signals from different sources are multiplexed at the source and carried on a single communication channel. ... -
Analysis of partial least squares on split path models: underpinning delone & maclean theory
(Journal of Scientific and Engineering Research, 2017)The analysis of partial least squares utilizing Structural Equation Modeling is well known as a second generation technique .Its true that , this technique has not been fully utilized in the field of research to handle ...