Search
Now showing items 1-7 of 7
Data-centric information security model for bringYour- own-device environment
(Strathmore, 2014-06)
Information security in the enterprise is challenging and has been considered . a
roadblock to enterprise innovation and adoption of concepts such as Bring- YourOwn-
Device (BYOD). One of the primary reasons for this is ...
Secured web service model for public service interoperability : case of Kenya’s e-government
(Strathmore University, 2014)
A major challenge in E-government application developments for better service delivery is inadequate security features in e-government. This results in untrustworthy websites with stunted growth so that most e-government ...
Inter-shift mobile application: case of Kenyatta National Hospital
(Strathmore University, 2014)
Ensuring continuity of patient healthcare IS very important III all healthcare
institutions. The communication process between nurses in passing down information
upon completion of each and every shift plays a key role ...
An unsupervised credit scoring system for unsecured loan lending
(Strathmore University, 2014)
Due to growmg competition, over-indebtedness, and economic crises,
banks have to pursue their social and financial objectives in an increasingly
constrained environment. The key determinant of Survival, competition ...
A smart phone based dodel for tracing beef products in Kenya
(Strathmore University, 2014)
Food traceability has been faced with challenges like lack of records, paper work challenges and lack of
rapid response to trace back. Most food safety outbreaks are traceable to the processing or slaughter house
but ...
A Model for Adoption of Unified Communication and Collaboration in Organizations
(Strathmore University, 2014)
In its simplest form, Unified Communications and Collaboration (UCC&C) is “Communications integrated to optimize business processes”. The new landscape of business communications and collaboration has necessitated the need ...
Converged network access solution for mass network connections : case of Last Mile Networks
(Strathmore University, 2014)
In current network access, customer premises equipment (CPEs) connect to a single
network option at a time, the CPEs operate based on established connections. Although
telecommunication companies have designed and ...