Search
Now showing items 1-7 of 7
A Prototype for secure key management
(Strathmore University, 2015)
Key Management refers to the cycle of maintaining key exchange from the moment of
initialization to retirement. It has proved to be a major concern for parties concerned where these
keys have landed in the wrong hands ...
Data centric decision making healthcare prototype
(Strathmore University, 2015)
Kenya is classified as one of the fastest growing countries in Africa. With this growth there has been increase in the application of Information and Communication Technology (ICT) in the major ministries in the government ...
Mobile based expert application for the early detection of diabetes in Kenya
(Strathmore University, 2015)
Cases of type 2 diabetes have been on the increase in the last ten years and this has caused many deaths and untold suffering to victims of the disease. One of the main challenges in combating the disease is in the education ...
Smart phone based mushroom farming monitoring model
(Strathmore University, 2015)
Agriculture being a key indicator of Kenya‟s economy in the past and recent makes it a searing focus point for farmers who are focusing on starting or growing their agricultural ventures in the country. Notably, a majority ...
A model to enhance information security in the use of BYOD in Kenyan enterprises
(Strathmore University, 2015)
In recent years there has been drastic increase in the adoption of mobile devices for computing use. This increase has been attributed mainly to the falling mobile devices prices that make these mobile devices within easy ...
A study on the influence of Information Communication Technology (ICT) adoption on bank fraud in Kenya
(Strathmore University, 2015)
Fraud can be seen as the deliberate distortion, dissimulation, or exclusion of the facts for the sole purpose of financial disadvantage of an individual or an organization which also includes embezzlement, theft or any ...
A prototype for threat detection on big data using behavioural analytics for government ministries
(Strathmore University, 2015)
While no one would dispute the capability of big data to enlighten enterprise operations, the present methods of mining and managing big data are still evolving and are posing serious security and privacy challenges. ...