<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
<channel>
<title>Doctor of Philosophy in Computer Science</title>
<link>http://ir.kabarak.ac.ke/handle/123456789/644</link>
<description/>
<pubDate>Mon, 09 Mar 2026 00:43:28 GMT</pubDate>
<dc:date>2026-03-09T00:43:28Z</dc:date>
<item>
<title>A FRAMEWORK FOR THE DESIGN OF PERSONAL HEALTH  INFORMATION SYSTEMS USER INTERFACES</title>
<link>http://ir.kabarak.ac.ke/handle/123456789/1389</link>
<description>A FRAMEWORK FOR THE DESIGN OF PERSONAL HEALTH  INFORMATION SYSTEMS USER INTERFACES
CHEPTEGEI, LAURA CHEMTAI
There is an increasing drive for patients to have greater participation in the management &#13;
of their own health, even beyond hospital visitations. This participation requires them to &#13;
have access to their Personal Health Information (PHI) in order for them to continue &#13;
managing their own health. However, medical data might not be easily interpreted by &#13;
non-medical users with no medical training background, and further that its inappropriate &#13;
presentation may lead to misunderstanding and unintended consequences. Human &#13;
Computer Interaction (HCI) is concerned with developing interactive technologies such &#13;
as Electronic Medical Records (EMR) systems that are accessible, useful, usable and &#13;
safe for users. These systems store PHI that is important for the non-medical users. &#13;
Therefore, this research sought to develop a framework for the design of the user &#13;
interfaces of Personal Health Information Systems (PHIS) in order to effectively &#13;
communicate PHI to non-medical users. The specific objectives were, to examine the &#13;
context of use of the user interface design of the PHIS, to develop a framework that &#13;
guides user interface design of PHIS, to apply the framework on user interface design of &#13;
PHIS, and lastly, to evaluate the effectiveness of the framework in communicating PHI&#13;
to non-medical users. The research approach was qualitative in nature, employing the&#13;
design thinking research methodology. The findings revealed challenges of presenting &#13;
PHI to non-medical users which informed the development of PHI presentation &#13;
framework. To apply the framework, User Interface (UI) design prototypes presenting &#13;
blood pressure readings were developed. The evaluation report showed the effectiveness &#13;
of the framework in the UI designs and the extent in which the framework was applied in &#13;
the UI designs. In conclusion, the study developed a framework for User Interface &#13;
Design (UID) of PHIS, and it recommends presenting other types of PHI tests on UI &#13;
using the framework.
</description>
<pubDate>Tue, 01 Nov 2022 00:00:00 GMT</pubDate>
<guid isPermaLink="false">http://ir.kabarak.ac.ke/handle/123456789/1389</guid>
<dc:date>2022-11-01T00:00:00Z</dc:date>
</item>
<item>
<title>A MODEL FOR DETECTING INFORMATION TECHNOLOGY  INFRASTRUCTURE POLICY VIOLATIONS IN A CLOUD ENVIRONMENT</title>
<link>http://ir.kabarak.ac.ke/handle/123456789/299</link>
<description>A MODEL FOR DETECTING INFORMATION TECHNOLOGY  INFRASTRUCTURE POLICY VIOLATIONS IN A CLOUD ENVIRONMENT
OGINGA, RUTH ANYANGO
The pervasiveness of the internet and available connectivity solutions brought about by cloud computing has led to an unprecedented increase in technologies built based on information technology infrastructures. This has improved the number of cloud users and substantially increasing the number of incidents related to the security of infrastructure and data in the recent past. Most organizations consider the deployment of different types of protection systems to curb various malicious activities. Organizations offer sophisticated monitoring and reporting capabilities to identify attacks against the cloud environment. Users with ill intentions have increasingly used the cloud as an attack vector due to its ubiquity, scalability and open nature despite the existence of policy violation detection systems necessitating the need to strengthen access policies from time to time. Policy violation detection plays a major role in information security by providing a systematic way of detection and interpreting attacks. Some of the known weaknesses of most detection tools are the generation of false positives or false alerts and the inability to perform analysis if traffic is encrypted as well as failure to detect and prevent attacks. This research was therefore concerned with the investigation of weaknesses of firewall and Intrusion Detection Systems (IDS) which are supported by the cloud. The information was then used to build and experiment on an improved model of a policy violation detection system. Experiments revealed the weakness in existing systems specifically IDS and firewalls.  Unlike the existing systems, a new model designed to overcome the shortfall was able to detect both recognized and unrecognized attacks and signatures. Moreover, the model is capable of preventing the occurrence of false positives and terminates suspicious nodes in real time without human intervention. An additional area of application such as movement from data from one cloud to another is not achievable, because of the mixed environment of the cloud. This is a potential area for investigation in the future.
FULL TEXT
</description>
<pubDate>Fri, 01 Nov 2019 00:00:00 GMT</pubDate>
<guid isPermaLink="false">http://ir.kabarak.ac.ke/handle/123456789/299</guid>
<dc:date>2019-11-01T00:00:00Z</dc:date>
</item>
</channel>
</rss>
