Browsing School of Informatics & Innovative Systems by Title
Now showing items 1-20 of 117
-
An Adaptive ICT-Enabled Model for Knowledge Identification and Management for Enterprise Development
(International Journal of System Dynamics Applications, 2014)Knowledge is vital in achieving enterprise growth and development. This paper argues that treating knowledge management as a Complex Adaptive System (CAS) presents an alternative lens within which processes within knowledge ... -
Adoption model of mobile‐enabled systems in supply chain
(Emerald Group Publishing Limited, 2013)The purpose of this paper is to develop an adoption model to identify the critical factors that affect firms' intention to adopt mobile enabled supply chain systems (mSCM) in retail industry. This study focuses on ... -
Affordances Theory in Information and Communication Technology for Development (Ict4d) Research
(International Research Journal of Modernization in Engineering Technology and Science, 2021-01)Information and Communication Technology for Development (ICT4D) is argued to have high potential value across all sectors, both public and private; and at multiple levels, be it fighting poverty; improving healthcare; ... -
Analysis of partial least squares on split path models: underpinning delone & maclean theory
(Journal of Scientific and Engineering Research, 2017)The analysis of partial least squares utilizing Structural Equation Modeling is well known as a second generation technique .Its true that , this technique has not been fully utilized in the field of research to handle ... -
Analysis of scheduling models applicable in referral health systems
(2018)Scheduling patient referrals is one of the most important administrative responsibilities performed in the medical office. A referral scheduling algorithm can be a useful tool in the hands of a primary provider. Primary ... -
Application of Technology in Strengthening Collaboration in Research, Teaching and Learning for African Universities in the post COVID-19 Era
(World Journal of Innovative Research, 2020-09-03)The collaboration and sharing of teaching and technology among universities is increasingly perceived as a vehicle to improve quality in education and innovation through knowledge exchange. The discussion explores how ... -
Applying data mining principles in the extraction of digital evidence
(International Journal of Computer Science and Mobile Computing, 2018-03)Data mining in databases is part of the interdisciplinary field of knowledge discovery used for extracting patterns and relationships amongst the data sets from a data source. This paper focuses on mining data from a ... -
Assessing emerging innovative applications used in county governments of Kenya
(International Journal of Advanced Research in Computer and Communication Engineering, 2017-08)In this modern age, the world has witnessed rapid growth and ever-increasing importance of e-government and governments are under pressure from citizens to quick and efficient services. Despite the Kenyan government efforts ... -
Assessing the Current Status of Information Security Policies Among Saccos in Kenya
(IISTE, 2019-09-30)In 2013, Communication Authority of Kenya (CAK) recorded cyber-attacks amounting to Sh5.4 million loses. In April 2016, Bandari Savings and Credit Cooperative Society lost Sh5 million through fraudulent ATM withdrawals ... -
Assessment Of Ict Disaster Recovery And Preparedness Among Health Research Institutions In Kisumu County, Kenya
(International Journal of Scientific & Engineering Research (IJSER), 2020-05)Research organizations utilize information technology to generate process and transmit both sensitive and vital data that is critical in development of drugs, vaccines and health policy. Despite the role ICT plays in this ... -
Assessment of Security Measures in Universities for Enforcement of Integrity of Information Systems in Kisumu and Siaya Counties, Kenya
(IJRDO - Journal of Computer Science and Engineering, 2015-06)An ICT policy safeguards Integrity of Information Systems and ensures business continuity. This study sought to assess the level of compliance by Universities to their ICT security policies by assessing the integrity pillar. ... -
Building e-Agriculture framework in Kenya
(HAAI, 2016)Arguably, poverty is concentrated in developing countries due to poor capacity to develop, to access and to manage agricultural information and knowledge. This is owed to disconnect that exist between the e-Agricultural ... -
Challenges facing the use and adoption of mobile phone money services
(World Journal of Computer Application and Technology, 2016)The Mobile phone banking idea was initially born out of the intention to reach the unbanked rural poor. However, there still existed mobile phone money service divide, highly skewed against the rural poor population. This ... -
Citation analysis on the emerging technologies in the fields of information systems
(international journal of research publication, 2018)En though information technology is an acceptable innovation for improvement of performance in all sectors, citation studies on associated literature seem to be missing. Furthermore, analysis of citations related to emerging ... -
A Comparative Study of C, C++, C# and Java Programming Languages: Underpinning Structure Equation Modeling, Data Structures and Algorithm
(Journal of Scientific and Engineering Research,, 2019)Equation Modeling technique has not been fully utilized in the field of Software analysis in handling complex data analysis and modeling on programming languages by a number of researches globally and specifically by ... -
A Conceptual Model for ICT for Economic Development Using Complex Adaptive System Approach: Case of a Micro and Small Enterprise (MSE) Association
(International Journal of Computing and ICT Research, 2013)The purpose of the paper is to contribute towards providing a methodology which researchers in Information and Communication Technology (ICT) for development can use to design result-oriented programs. In this paper CAS ... -
Confidentiality and Availability of Security Measures for Information Systems in Universities in Kisumu and Siaya Counties, Kenya
(IJRDO-Journal Of Mathematics, 2016-08)Many organizations continue to grow in numbers by the day in adopting use and adoption of ICT in day to day business processes and so are the rising trends in cyber insecurity. Securing information systems against myriad ... -
congestion aware packet routing for delay sensitive cloud communications
(International Journal of Computer Networks and Applications, 2017-07)In the recent years, many organizations have turned to cloud technology to support their information technology services. The cloud servers are therefore increasingly holding huge and sensitive information belonging to ... -
Contributing Factors to Mobile Financial Fraud within Kenya
(EPRA International Journalof Research and Development (IJRD), 2023-01)The expansion of mobile banking services has created various challenges to financial sectors i.e. SIM swapping, hacking identity theft, social engineering, denial of service attack and account take over. The perceived ... -
Converting Water Hyacinth to Briquettes: A Beach Community Based Approach
(International Journal of Sciences: Basic and Applied Research (IJSBAR), 2014)Attempts by the government of Kenya to control the noxious water hyacinth via various intervention efforts have had limited success only for the weed to resurge. The proliferation of water hyacinth in Lake Victoria – Kenya ...