Browsing by Title
Now showing items 43-62 of 3023
-
A Model to measure information security awareness level in an organization : case study of Kenya commercial bank.
Information Security awareness forms a key basic part of Information Security Strategy within most organizations. Organizations that tend to be more conscious regarding Information Security will invest more than organizations ... -
-
A Phase transition in the distribution of the length of integer partitions
We assign a uniform probability to the set consisting of partitions of a positive integer n such that the multiplicity of each summand is less than a given number d and we study the limiting distribution of the number of ... -
A Preliminary m-payment for m-commerce transactions in Kenya
Paper presented at ICT conference of 2008. Theme : ICT's Role towards a Knowledge Economy -
A pricing proposal for a QoS enabled UMTS network
Third generation networks e.g. the Universal Mobile Telecommunications System (UMTS) provide higher data transfer rates which enables the transport of real-time multimedia traffic e.g. streaming video. The cost of ... -
A Prototype of a virtual union catalogue for Kenya Library and Information Service Consortium (KLISC) member libraries.
Kenya lacks a national library union catalogue. As a result, researchers contend with overwhelming array of independent catalogues whenever they want to do inter-library research. Most libraries in Kenya are individually ... -
A Recommendation system for students career selection
(Strathmore University, 2018-10)Students enroll into higher learning institutions only to realize that they have chosen the wrong course to pursue, they lose on time and money. Selection of the wrong career means that there is a mismatch between the ... -
A requirements elicitation process model for health management information systems: case of Kenyatta National Hospital
Requirements Elicitation (RE) is about learning and understanding the needs of users and stakeholders with the aim of communicating these needs to the system developers. Requirements Elicitation is an important stage in ... -
A Review of the theory of completely primary finite rings
We give a review of recent developments in the theory of finite rings with identity and pay special attention to a class of finite rings whose sets of all zero divisors form additive groups. We further describe the structure ... -
A smooth test of goodness-of-fit for the baseline hazard function in recurrent event models
In this paper, we formulate a smooth test of goodness-of-fit for a simple hypothesis about the baseline hazard function in recurrent-event models. The formulation is an extension of Neyman' s goodness-of-fit approach, ... -
A Software upgrades investment model : a case of Windows operating system in Kenya
The revolution of software has introduced new actors and market mechanisms. Effective software management is crucial for development and survival of any company. IT upgrades investment in a crucial part in software management. ... -
A Study on knowledge, attitude and use of hormonal contraceptives among University students
There has been sustained campaign for adoption of hormonal contraceptives for use by the general population worldwide to avoid unwanted pregnancies, unsafe abortions and reduce population growth. The main targets of ... -
A Study on the role of reflection in the pedagogical competence development of Zambian mathematics teachers : focusing on qualitative analysis using lesson diary
Paper presented at Strathmore International Mathematics Research Conference on July 23 - 27, 2012 -
A summary of for love or for money – or both? by Nancy Folbre and Julie A. Nelson
Nancy Folbre and Julie Nelson study the shift from non‐market to market labour in the contemporary society, of the United States of America (US). The consequences are far reaching with regard to social care, economics and ... -
A Survey of the State of Dataspaces
This paper presents a survey of the state of dataspaces . With dataspaces becoming the modern technique of systems integration, the ach ievement of complete dataspace development ... -
Abuse of diplomatic immunity in bilateral relations: a critique on the vienna convention on diplomatic relations, 1961
(Strathmore University, 2016)This study examines the abuse of diplomatic immunity and privileges. This study further gives an analysis ofthe Vienna Convention on Diplomatic Relations which has been ratified by many states. The Convention is established ...