Search
Now showing items 21-30 of 52
An Analysis of Information Technology (IT) Security Practices: A Case Study of Kenyan Small and Medium Enterprises (SMEs) in the Financial Sector
(2012)
Organizations of all sizes are now significantly reliant upon
information and communication technology for the
performance of their business activities. They therefore need
to ensure that their systems and data are ...
Mathematical Models For Human And Baboon Brain Parameters
(2013)
In this paper linear measurements from ten human and ten baboon brains were used to predict various values for human and baboon brain and body parameters, through multiple regression models. Inter-species values were also ...
Observed Similarity In Satellite Derived Total Column Ozone Data And Ground Based Dobson And Ozonesonde Over Nairobi Kenya
(2013)
This study sought comparison of satellite total column Ozone data from 1985 to 2003
against ground based Dobson spectrophotometer and Ozonesonde data. The area of study
was Nairobi and the main objective was to ascertain ...
Understanding Intention to Use Computer Assisted Audit Tools and Techniques (CAATTs) Using UTAUT Model: Perspectives of Auditors in Kenya National Audit Offi ce (KENAO)
(2010)
Adoption of computer assisted audit tools and techniques (CAATTs) has become
fundamental in many audit methodologies owing to rapid advances in clients'
information system usage. Audit standards encourage auditors to ...
Global environmental change research and capacity building in sub-Sahara Africa
(University of Nairobi, 2010)