Search
Now showing items 1-10 of 54
CYBER THREATS AND CYBER SECURITY IN THE KENYAN BUSINESS CONTEXT
(GSJ, 2019-09)
Cyber security is basically the process of ensuring the safety of cyberspace from known and unknown threats. The
International Telecommunication Union states that cyber security is the collective application of strategies, ...
Towards Clean Information and Communication Technology Campaign in Public Universities in Kenya
(2015-01-04)
Information and Communication Technology (ICT) accounts for about 2% of total
Greenhouse gas (GHG) emissions. This figure is likely to grow if the use of ICT keeps on
growing unmanaged. Rapid technological advances have ...
A crowdsourced database of event sequence descriptions for the acquisition of high-quality script knowledge
(Universität des Saarlandes, 2016)
Scripts are standardized event sequences describing typical everyday activities, which play an important role in the computational modeling of cognitive abilities (in particular for natural language processing). We present ...
A Model for Code Restructuring, A Tool for Improving Systems Quality in Compliance with Object Oriented Coding Practice
(International Journal of Computer Science Issues (IJCSI), 2019)
A major goal of software restructuring is to preserve or increase
the value of a piece of software. Restructuring a system may
make it possible to add more features to the existing system or
make the software more ...
Detecting Everyday Scenarios in Narrative Texts
(Universitat des Saarlandes, 2019)
Script knowledge consists of detailed information on everyday activities. Such information
is often taken for granted in text and needs
to be inferred by readers. Therefore, script
knowledge is a central component to ...
A Bring Your Own Device Risk Assessment Model
(Computer Science Journals (CSJ), 2021)
Bring Your Own Device (BYOD), a technology where individuals or employees use their own
devices on the organization’s network to perform tasks assigned to them by the organization has
been widely embraced. The reasons ...
A Domains Approach to Remote Access Logical Vulnerabilities Classification
(2019)
Remote access facilitates collaboration and the creation of a seamless work environment. This technology enables employees to access the latest versions of data and resources from different locations other than the ...
Effect of recruitment and selection of employees on the performance of small and medium enterprises in Kisumu municipality, Kenya
(International Journal of Human Resource Studie, 2012)
The study investigated the effect recruitment and election on the performance of SMEs in Kisumu
Municipality, Kenya. Kenya has 1.6 million SMEs, constituting 96% of business enterprises,
employing 75% of the labour force ...
The Effect of Integrating Mobile Technology in Micro Finance Institutions. Case of Small and Micro-Enterprise Program (SMEP) In Kisumu County
(IOSR Journal of Business and Management, 2014)
Recognizing the potential that M-banking holds in strengthening the socioeconomic position of those currently lacking access to banking, especially the rural poor, Safaricom in Kenya and the two leading mobile operators ...
Shortcomings of Ultrasonic Obstacle Detection for Vehicle Driver Assistance and Profiling
(Int. J. Inf. Technol. Comput. Sci, 2019)
Obstacle detection is a challenging problem
that has attracted much attention recently, especially in the
context of research in self-driving car technologies. A
number of obstacle detection technologies exist.
Ultrasound ...