School of Computing and Informatics (SCAI): Recent submissions
Now showing items 61-77 of 77
-
Information security risks posed by the bluetooth security weaknesses to the bluetooth-enabled phones
(Journal of Emerging Trends in Computing and Information Sciences, 2015)As the widespread use and acceptance of Bluetooth technology increases, concerns are being raised related to security vulnerabilities of this technology. Inadequate device resources and lack of user awareness has compounded ... -
Discoverability a new learnability principle for children’s application software
(International Journal of Computer Science & Information Technology, 2016)For more than two decades children’s use of multimedia was restricted to watching television and listening to music. Although some parents complained about children being addicted to listening to music the idea that children ... -
Factors affecting information systems user satisfaction in Kenyan universities
(Journal of Emerging Trends in Computing and Information Sciences, 2016)The role of information systems in providing business a competitive edge has recently been the subject of much debate. However, it has been argued that not the information system solution but their utilization is what ... -
Trends in information system security in universities
(International Journal of Innovative Research and Advanced Studies, 2017)Information system security is designed for critical information protection. Security in Information systems is a complex of organizational technical and legal measures that are used to protect information from unauthorized ... -
Interface features, program complexity and memorability as indicators of learnability of mobile social software
(International Journal of Science and Research, 2017)Social Computing aims to support the tendency of humans to interact with mobile devices. Technology reinforces this interaction by producing appropriate responses that then lead to improved communication between humans ... -
Security issues in virtualized environments for small and medium enterprises
(International Journal of Advanced Research in Computer Engineering & Technology, 2017)Virtualization is an emerging technology in the recent computing worlds and has become a platform for the implementation of utility computing (e.g. cloud computing) and the rising Virtual Private Networks. It helps to ... -
Factors that influence the choice of virtualized environments in small medium enterprises
(International Journal of Advanced Research in Computer Engineering & Technology, 2017)Virtualization is an emerging technology in the recent computing worlds and has become a platform for the implementation of utility computing (e.g. cloud computing) and the rising Virtual Private Networks. It helps to ... -
Application lifecycle management activities for quality assurance in software development
(International Journal of Trend in Research and Development, 2017)Lifecycle Management approaches promise more systematic and efficient ways to support the development and management of complex products. The concept of Application Lifecycle Management (ALM) indicates the coordination of ... -
An optimized model for transition from Ipv4 to Ipv6 networks in a cloud computing environment
(International Journal of Computer Networks and Communications Security, 2018)The paper proposes a novel optimized model for transition from IPv4 to IPv6 networks. The aim of this paper is to design the Original IPv6 Transition Controller Application and compare its performance with 6to4 tunneling ... -
Factors influencing the selection of mobile phone among university students in Kenya
(International Journal of Innovative Research and Advanced Studies, 2018)Mobile phone technology has reached unprecedented level leading to unconstrained selection nightmare. This study investigates the selection priorities of mobile phone among university students in Kenya. A total of 310 ... -
Innovative features driving mobile phone usage by students in Kenya
(International Journal of Modern Trends in Engineering and Research, 2018)Mobile phone adoption and usage enjoyed drastic and exponential success as far as the history of technology adoption goes. However, there are indications that users are becoming overwhelmed by the unconstraint addition of ... -
Evaluation of guidelines for security threats in mobile-phone banking
(International Journal of Engineering and Mathematical Sciences, 2018)Globally, banking institutions are using mobile phones to provide financial services to reach those with or without bank accounts. However mobile phones do suffer from security threats when used for banking purposes these ... -
Facilitating factors for cybersecurity vulnerabilities in Kenyan county governments
(Asian Journal of Research in Computer Science, 2018)Globally, ICT is regarded as a driver and enabler; thus, organisations which have integrated ICT in their systems have had immense growth and output. The adoption of ICT into the Kenyan County Governments, therefore, ... -
Map of the various configuration attributes from IPv4 to IPv6 networks for dual stack, 6to4 tunnelling and NAT: modelling designs in OPNET modeller
(International Journal of Computer Science and Mobile Computing, 2018)This paper presents a performance evaluation study of dual stack, 6to4 tunnelling, and Network Address Translation transition schemes on simulative method in IPv4/IPv6 networks. This research aims to find out what IPv4/IPv6 ... -
Trends in adoption of open source software in Africa
(Journal of Emerging Trends in Computing and Information Sciences, 2012)In the context of limited financial resources and capacities, Africa can examine how to better use the opportunities presented by the emergence of free and open source software (FOSS) to leapfrog into the information age ... -
Implementation evaluation metrics for enterprise resource planning solution – a case of Kibabii University
(Current Journal of Applied Science and Technology, 2019)Most institution of higher learning are implementing and Enterprise Resource planning (ERP) in automating various activities. The architecture of most of the ERP is based on the Service Oriented Architecture (SOA) where ... -
Trends in electronic money transfer in Kenya
(Journal of Emerging Trends in Computing and Information Sciences, 2013)The paper looks at trends in Electronic money transfer in Kenya, based on literature survey of prior research done in this area. The Central Bank of Kenya was a key source of data because of its significance in financial ...