• Login
    Search 
    •   Repository Home
    • Journal Articles
    • School of Computing and Informatics (SCAI)
    • Department of Information Technology
    • Search
    •   Repository Home
    • Journal Articles
    • School of Computing and Informatics (SCAI)
    • Department of Information Technology
    • Search
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Search

    Show Advanced FiltersHide Advanced Filters

    Filters

    Use filters to refine the search results.

    Now showing items 1-3 of 3

    • Sort Options:
    • Relevance
    • Title Asc
    • Title Desc
    • Issue Date Asc
    • Issue Date Desc
    • Results Per Page:
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
    Thumbnail

    Evaluation of guidelines for security threats in mobile-phone banking 

    Ngomeh, Augustine Wafula Prince; Omieno, Kelvin Kabeti; Mbuguah, Samuel Mungai (International Journal of Engineering and Mathematical Sciences, 2018)
    Globally, banking institutions are using mobile phones to provide financial services to reach those with or without bank accounts. However mobile phones do suffer from security threats when used for banking purposes these ...
    Thumbnail

    The user’s skills, capacity on security for mobile computing in universities 

    Otanga, Daniel; Wabwoba, Frankin; Samita, Leonard Wamocho (International Journal of Computer Technology & Applications, 2017)
    Universities are shifting from partially computerized to fully automated environments and technology is equally shifting from point to point to broadcasting options. These trends are resulting in mobile computing for most ...
    Thumbnail

    Trends in information system security in universities 

    Otanga, Daniel; Mbuguah, Samuel Mungai (International Journal of Innovative Research and Advanced Studies, 2017)
    Information system security is designed for critical information protection. Security in Information systems is a complex of organizational technical and legal measures that are used to protect information from unauthorized ...

    KIBU Repository copyright © 2019  KIBUSpace
    Contact Us | Send Feedback
    By University Library
     

     

    Browse

    All of RepositoryCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects

    My Account

    LoginRegister

    Discover

    AuthorMbuguah, Samuel Mungai (2)Otanga, Daniel (2)Ngomeh, Augustine Wafula Prince (1)Omieno, Kelvin Kabeti (1)Samita, Leonard Wamocho (1)Wabwoba, Frankin (1)Subject
    Threats (3)
    Information System Security (2)Information Technology (2)Trends (2)Vulnerability (2)Approaches (1)Banking (1)Guidelines (1)Mobile Phone (1)protection (1)... View MoreDate Issued2017 (2)2018 (1)Has File(s)Yes (3)

    KIBU Repository copyright © 2019  KIBUSpace
    Contact Us | Send Feedback
    By University Library