• Login
    Browsing Doctor of Philosophy in IT Security and Audit by Issue Date 
    •   KABU Repository Home
    • Thesis and Dissertations
    • Doctorate Theses and dissertation
    • Doctor of Philosophy in IT Security and Audit
    • Browsing Doctor of Philosophy in IT Security and Audit by Issue Date
    •   KABU Repository Home
    • Thesis and Dissertations
    • Doctorate Theses and dissertation
    • Doctor of Philosophy in IT Security and Audit
    • Browsing Doctor of Philosophy in IT Security and Audit by Issue Date
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Browsing Doctor of Philosophy in IT Security and Audit by Issue Date

    Sort by:

    Order:

    Results:

    Now showing items 1-9 of 9

    • title
    • issue date
    • submit date
    • Type
    • ascending
    • descending
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
      • Thumbnail

        AN SMS AND USSD MODEL FOR LOCATION-BASED MOBILE ADVERTISING IN MICROENTERPRISES 

        MOSES MWANGI, THIGA (Kabarak University, 2014-09)
        Technological and financial limitations have hampered the effective advertisement of products and services by microenterprises thus limiting their contribution towards national economic growth. Recent advances in mobile ...
      • Thumbnail

        INVESTIGATING SELECTED EGOCENTRIC USERS ON SOCIAL MEDIA PLATFORMS USING SOCIAL NETWORK ANALYSIS IN MINING FORENSIC EVIDENCE FOR LAW ENFORCEMENT IN KENYA 

        RONOH, .LAMEK KIPRUTTO (KABARAK UNIVERSITY, 2017-10)
        Investigation of social media using social network theory is a new powerful tool that will aid and ease law enforcement agencies in multi-faceted ways in this ever evolving digital landscape. It is against this backdrop ...
      • Thumbnail

        THE ELEMENTS FOR DEVELOPING INFORMATION TECHNOLOGY SECURITY METRICS MODEL FOR UNIVERSITIES IN KENYA 

        Oguk, Charles Ochieng' (KABARAK UNIVERSITY, 2018-07)
        There has been increased frequency of information systems' security breaches within universities. Studies indicate that information technology security management could be improved if IT security management were used ...
      • Thumbnail

        A FUSED MACHINE LEARNING INTRUSION DETECTION MODEL IN MANETS. 

        MINDO, KIRORI GATHUO (KABARAK UNIVERSITY, 2019-11)
        Mobile Ad-Hoc Networks – MANETs are prevalent in healthcare monitoring of high blood pressure, high cholesterol levels and various heart conditions and cardiac misnomers like syncope, third murmurs and atrial fibrillation. ...
      • Thumbnail

        A CLOUD COMPUTING SECURITY ASSESSMENT FRAMEWORK FOR SMALL AND MEDIUM ENTERPRISES IN KENYA 

        Rupra, Satwinder Singh (KABARAK UNIVERSITY, 2020-01)
        Cloud computing plays a very important role in the development of business and competitive edge for many organisations including SMEs. Cloud computing is considered to be a very capable and able internet-based computing ...
      • Thumbnail

        AN ISO 27001 BASED MODEL TO DETERMINE UNIVERSITY INFORMATION SECURITY MATURITY UNDER UNCERTAINTY 

        MAKUPI, DANIEL (KABARAK UNIVERSITY, 2021-01)
        The use of information technology and related process has permeated into organizations of all sizes. Moreover, in recent years, almost all organizations, if not all are involved in protecting their technology investment, ...
      • Thumbnail

        CLIENT SIDE MULTI-LINGUAL MODEL FOR ENHANCING PERFORMANCE IN SHORT MESSAGE SERVICE SPAM DETECTION 

        KIPKEBUT, ANDREW (2022-11)
        Millions of money are lost by mobile phone users every year due to short message service spam, a social engineering skill attempting to obtain sensitive information such as passwords, personal identification numbers ...
      • Thumbnail

        NETWORK FORENSIC FRAMEWORK FOR MANAGING SECURITY INCIDENTS 

        KEMEI, PETER KIPRONO (Kabarak University, 2024-11)
        Network forensics is a science of determining and retrieving evidential information in a computer networked environment about a criminality in such a way as to make it admissible. The established computer networks forensic ...
      • Thumbnail

        AN ENHANCED SECURE DISTRIBUTED LEDGER INTEROPERABILITY FRAMEWORK FOR MEDICAL SYSTEMS 

        BUNDI, DOROTHY GATWIRI (2024-11)
        Absence of consistent data formats and strong protocols in the current medical systems pose significant challenges to accomplishing interoperability. This study developed an enhanced secure Distributed Ledger (DL) ...

        Copyright © 2025 
        Kabarak University Libraries
        | Repository Policy | Send Feedback
         

        Browse

        All of KABU RepositoryCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects

        My Account

        LoginRegister

        Copyright © 2025 
        Kabarak University Libraries
        | Repository Policy | Send Feedback