Search
Now showing items 1-10 of 18
Secure end point data security using java application programming interface
(IJSRSET, 2017-02)
Most of the current instant messaging applications such as Telegram Secret Chat transmit packets in plain text. This means that an intruder equipped with appropriate remote monitoring tools can sniff the packets being ...
Evaluation of TCP congestion control modus operandi in mesh networks
(Ever Science Publications, 2017)
In mesh networks, the sender machine is connected to the receiver machine via multiple paths. Efficient transmissions along these paths require proper link choice so as to quickly deliver the packets the destination. Poor ...
Citation analysis on the emerging technologies in the fields of information systems
(international journal of research publication, 2018)
En though information technology is an acceptable innovation for improvement of performance in all sectors, citation studies on associated literature seem to be missing. Furthermore, analysis of citations related to emerging ...
Empirical investigation of instant messaging security in a virtual environment
(International Journal of Computer Applications Technology and Research, 2016)
Use of instant messaging services is becoming increasingly popular with Internet based systems like America Online’s Instant Messaging (AIM), Microsoft’s MSN Messenger, Yahoo! Messenger, WhatsApp, Viber, Kakaotalk, Skype ...
Towards an integrated framework for rural development in Kenya
(IEEE, 2016)
Information Communication Technology (ICT) is a powerful tool which can accelerate socio-economic development in developing nations. The growth of information is the main compelling reason for new cutting edge technologies ...
What Theory of Change Can Contribute to Capability Approach: Towards Evaluating ICT-Enabled Interventions
(IEEE, 2018)
Sen's Capability Approach (CA) has emerged as holistic lenses for theorising development within Information and Communication Technology for Development (ICT4D) discourses. There is ongoing research on operationalising CA ...
Effectiveness of security controls on electronic health records
(IJSTR, 2017-12)
Electronic Health Record (EHR) systems enhance efficiency and effectiveness in handling patients ‘information in healthcare. This study focused on the EHR security by initially establishing the nature of threats affecting ...
Towards an integrated framework for rural development in Kenya
(IEEE, 2016)
Information Communication Technology (ICT) is a powerful tool which can accelerate socio-economic development in developing nations. The growth of information is the main compelling reason for new cutting edge technologies ...
Deployment and Use of Mobile Technology to Control Malaria
(Journal of Information Technology & Software Engineering, 2019-05-10)
Malaria is a significant public health problem and impediment to socioeconomic development in the developing countries. According to World Health Organization (WHO) report, the number of malaria cases increased to 219 ...
Validation of Extended Theory of Reasoned Action to Predict Mobile Phone Money Usage
(World Journal of Computer Application and Technology, 2018-01-13)
Theory of Reasoned Action (TRA), postulated by social psychologist, has been established to be relevant in guiding Information Systems studies. The theory resulted from attitude research using the Expectancy Value Models. ...