Faculty of Computing and Information Management: Recent submissions
Now showing items 81-100 of 112
-
Vishing attack detection model for mobile users.
(2017-11-04)Voice phishing (vishing) is a type of phishing attack where social engineers manipulate individuals during phone conversation into divulging sensitive information. Mobile users are target to most criminals, through mobile ... -
A job matching system to transform casual job market in Kenya
(2018-08-14)This project objective was to come up with job matching application for use by casual workers and employers. The process of identifying challenges, opportunities, desired features and solution was designed to be a rigorous ... -
Data-centric security and governance for data
(2016-11-14)The information security has never been as important as it is today for the business, Health, Banking and education organizations and individuals alike, because Many organizations around the world depend today on reliable ... -
Usability of mobile based participatory sensing application using intelligent agents
(2017-10-10)Citizens can act as sensors in crises management and volunteers for Geographic information and their surroundings. The proliferation of mobile phone in the developing countries sets a stage for the users to become participants ... -
Adoption model for smart learning devices as e-learning tools in TVET institution: a case study of Rift Valley Technical Training Institute (RVTTI)
(2018-08-11)Smart learning is the growth of e-learning from the 19th century to 21st-century generations, which enhances the missing component of an e-learning solution. Smart learning most suits for those smart boards, laptops, and ... -
A model to evaluate the effects of information and communication technology (ICT) on small and medium enterprises (SME’s) performance in African cities: case of Nairobi county
(2017-11-10)The study set out to assess the role of Information and Communication Technology (E- commerce tools, Networking components/Internet, and communication technology) on the growth of Small and Medium Enterprises (SMEs), analyze ... -
Data mining approach for building predictive model for crop yield data
(2017-11-05)The application of computer science has led to advancements in various sectors of economies including agricultural production, manufacturing and marketing. Computer algorithms have been used for prediction. There has been ... -
A framework for knowledge as a service in the support of mobile interface ambient learning.
(2017-11-10)Knowledge as a Service (KaaS) has been a promising computing paradigm in the circles of cloud computing environments. In recent times there has been a growing need for access to knowledge on demand that is fully aligned ... -
Framework for bandwidth sharing and reuse in IPTV deployment via wireless spectrum
(2014-11-21)The current evolution of technology in the recent past, television is geared to take a different turn from its traditional form of distribution which has been labeled ‘analogue’ to digital transmission via wireless ... -
Enhancing current aircraft communications addressing and recording system (ACARS)
(2013-10-10)To many people travelling is a normal routine in life. During every day to day activity the issue of transportation does not linger in our minds as it is a norm. However, this is only realised when a horrific accident ... -
Enhanced mobile forensic process model for hand-held devices – A case of smartphones
(2013-11-09)This research is aimed at developing an operating system independent mobile forensics Process Model for Hand-held devices. The earlier works in digital forensics process model have mainly concentrated on process models for ... -
Framework for securing wireless local area network
(2013-09-10)For several decades security and wireless communication will remain to be interesting research areas. Change in technology enables the need of ease of use and flexibility of communications in the computer world without ... -
Design of user authentication model for bluetooth piconet
(2012-11-11)The main objective of this research was to design a user authentication model for the Bluetooth piconets. Bluetooth is a new and young technology of data communication, since its birth it has been facing a lot of challenges. ... -
Data security in government network infrastructure
(2014-11-06)Most public organizations have deployed Local Area Networks in their buildings to enhance sharing of resources. These networks are poorly done such that security of data and information is compromised thereby exposing data ... -
Cloud banking security through third party auditing with a digital signature
(2013-11-10)Cloud computing from the last few years has rapidly grown from a business initiative into one of the fastest growing Emerging Technologies of Information and Communication Technology. It is an Internet based model that ... -
Data security: A tool to address challenges of data confidentiality against domain users in an organization
(2016-11-11)Threats resulting from authorized users, specifically insiders, pose as one of the most challenging security issues that many organizations face today. Insiders often attack using authorized access and with actions very ... -
An integrated web based unified telecommunication solution on an n-tier server architecture.
(2014-11-14)Telecommunications technology is ever evolving to meet the rapid changing needs for services in organizations. Private Automated Branch Exchange/Private Branch Exchange (PABX/PBX) is a telephony platform that is privately ... -
Credit risk assessment for customers of Kenyan commercial banks: A case of co-operative bank
(2018-09-23)Over the last two decades, credit assessments made by commercial banks have been evolving. Instead of the traditional assessment of the banks’ credit experts which is subjective, increased credit risk means that comprehensive ... -
Enhancing the management of wireless clients on infrastructure based WLAN’s: Case of UNDP somalia
(2013-11-11)Network Managements entail managing faults, configurations, accounting, performance and security. This is done to guarantee reliability, availability and confidentially key issues in computer and network systems. Most of ...