Repository logo
Communities & Collections
All of DSpace
  • English
  • العربية
  • বাংলা
  • Català
  • Čeština
  • Deutsch
  • Ελληνικά
  • Español
  • Suomi
  • Français
  • Gàidhlig
  • हिंदी
  • Magyar
  • Italiano
  • Қазақ
  • Latviešu
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Srpski (lat)
  • Српски
  • Svenska
  • Türkçe
  • Yкраї́нська
  • Tiếng Việt
Log In
New user? Click here to register. Have you forgotten your password?
  1. Home
  2. Browse by Author

Browsing by Author "Wanjala, Chrispus Kimingichi"

Filter results by typing the first few letters
Now showing 1 - 2 of 2
  • Results Per Page
  • Sort Options
  • Loading...
    Thumbnail Image
    Item
    Implementation evaluation metrics for ERP solution: A case of Kibabii University
    (IGI Global, 2020) Mbuguah, Samwel Mungai; Wabwoba, Franklin; Wanjala, Chrispus Kimingichi
    Most institution of higher learning are implementing enterprise resource planning (ERP) in automating various activities. The architecture of most of the ERP is based on the service-oriented architecture (SOA) where each module can be called as service. In most of the contracts signed between the vendor and the university, payment is tied to the level of implementation. The question is how to then measure the level of implementation. This chapter proposes a metric that could be used. The metric was derived based on an acceptance test on each of functionality of module as per terms of reference. The result of a test was rated as a fail; the result was then coded such that a fail was assigned a zero (0), pass one (1), and query a half (½), from which a metric was derived which measures the level implementation.
  • Loading...
    Thumbnail Image
    Item
    Information security risks posed by the bluetooth security weaknesses to the bluetooth-enabled phones
    (Journal of Emerging Trends in Computing and Information Sciences, 2015) Wanjala, Chrispus Kimingichi; Mbuguah, Samuel Mungai; Kilwake, Juma
    As the widespread use and acceptance of Bluetooth technology increases, concerns are being raised related to security vulnerabilities of this technology. Inadequate device resources and lack of user awareness has compounded this issue where the emphasis on design constraints, functionality and ease of use sometimes outweigh security concerns. The research determines vulnerability of Bluetooth security and the security risks these vulnerabilities poses to the users’ information stored in Bluetooth-enabled phones. The research design was based on multi-case study where two cases were selected. Questionnaires and interview were used in data collection. Both qualitative and quantitative approaches were used in data analysis. Descriptive statistical method was used for data analysis. The key findings from the study were that to improve security of information stored in Bluetooth-enabled phones, application layer security should be employed to provide additional security measures not provided in the current authentication and authorization process. Secondly the E0 encryption algorithm currently used for encryption is too weak and therefore the DES and AES algorithm should be used due to their efficiency and reliability. Lastly it was found out that most users have no knowledge on how to configure these devices thus manufactures of these devices should provide users with user documentation that explains the use and device configurations.

DSpace software copyright © 2002-2025 LYRASIS

  • Privacy policy
  • End User Agreement
  • Send Feedback