Search
Now showing items 11-20 of 24
An Information Security Awareness Framework For Secondary School Teachers In Kenya
(International Journal of Innovative Research and Advanced Studies (IJIRAS), 2020-05)
Over the last decade, secondary schools have increased ICT usage in teaching and learning. The technological devices mostly belong to students and staff hence advancing the BYOD culture that makes the ability of the school ...
Governance, Complexity, and Resilience of the Kenyan Mobile Industry in the Context of Its Strategic Vision
(IGI Global, 2021)
Assessing the impact of existing and emerging mobile technologies on individuals and societies is a complex task. Various models of the telecommunication industry have been developed and differ from country to country. The ...
Efficient Group Authentication Protocol for Secure 5G Enabled Vehicular Communications
(IEEE, 2020-12-30)
The fifth generation (5G) networks exhibit extremely low latency, extremely high bandwidth, and high density connections that are salient features for the support of vehicle to everything (V2X) services. Although a lot of ...
Application of Technology in Strengthening Collaboration in Research, Teaching and Learning for African Universities in the post COVID-19 Era
(World Journal of Innovative Research, 2020-09-03)
The collaboration and sharing of teaching and technology among universities is increasingly perceived as a vehicle to improve quality in education and innovation through knowledge exchange. The discussion explores how ...
Legal Issues in Computer Forensics and Digital Evidence Admissibility
(ResearchGate, 2020-07-07)
Computer forensics integrates the fields of computer science and law to investigate crime. For digital evidence to be legally admissible in court, investigators should follow proper legal procedures when recovering and ...
Data Modeling Techniques Used for Big Data in Enterprise Networks
(International Journal of Advanced Technology and Engineering Exploration, 2020-04-20)
The deployment and maintenance of enterprise networks form the bedrock of any organization, be it government, commercial, academic, and/or non-profit making. These networks host vast amounts of information, databases, in ...
Key Issues in Internet Governance
(World Journal of Innovative Research (WJIR), 2020-09)
Internet is network of remotely or physically connected computers or computer devices that are able to interact. Numerous activities take place on the internet. The processes of decision making on what activities are to ...
Tracking Area Boundary-aware Protocol for Pseudo Stochastic Mobility Prediction in LTE Networks
(MECS, 2020-10-08)
Accurate mobility prediction enables efficient and faster paging services in these networks. This in turn facilitates the attainment of higher bandwidths and execution of activities such as handovers at low latencies. The ...
An Investigation of Existing Strategies Used to Counter Prevailing Cyber Threats and Vulnerabilities in Banks
(International Journal of Innovative Research and Advanced Studies (IJIRAS) Volume 7, 2020-06-06)
Financial institutions and banks world-wide re grappling with a myriad of challenges in relation to regulations, disruptive models and technologies, new competitors, a restrictive customer base that has unlimited number ...
An Understanding of the Cyber Security Threats and Vulnerabilities Landscape: A Case of Banks in Kenya
(International Journal of Innovative Research and Advanced Studies (IJIRAS) Volume 7, 2020-06-06)
Cyber security threats in Kenya has been increasing steadily; particularly in banks. A Cyber security vulnerability is a software, hardware or procedural weakness that may provide an attacker entry to a computer or network. ...