Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Wilson Cheruiyot is active.

Publication


Featured researches published by Wilson Cheruiyot.


International Journal of Computer Applications | 2018

Approaches to Curbing Data Breaches in Internet Banking based on Cloud computing

Okiyai Otieng; George Okeyo; Wilson Cheruiyot

Cloud computing is a popular theme of research in information systems. It has revolutionized the perspective of distributed computing from existing methods. Although cloud offers great benefits, it does introduce security threats to the information and data which is currently moved from onpremises to off-premises. Due to the openness of data, cloud computing has been experiencing security threats that must be overcome for this service to be fully utilised. One such threat is data breach, this is because data is stored in different places across the globe hence difficult for security to be monitored. Therefore, security and privacy of data are the two major concerns of users in the cloud technology. Internet banking applications have become popular within banks and almost each bank has got its own service. The login and signature security vary from user/static password authentication method (it is alleged as the weakest way to manage one’s accounts) to certificates and tokens. Considering the confidentiality of this information, for instance passwords and bank accounts, banks need to identify, evaluate and solve distinct risks to security in regard to cloud computing in their management information security system. This paper sought to establish the available security measures employed in curbing data breaches, their shortcomings and suggest possible solutions. The paper employed a descriptive survey research design; a pre-tested questionnaire was used to collect data from the 46 banks that use internet banking in Kenya. The study found that the banks had employees who were certified in security matters but none was certified in cloud computing security and recommended Staff Training and certification on Cloud Computing Security, cloud computing and resource management


service oriented computing and applications | 2016

An aggregated technique for optimization of SOAP performance in communication in Web services

Kennedy Mutange Senagi; George Okeyo; Wilson Cheruiyot; Michael Kimwele


International Journal of Computer Applications Technology and Research | 2014

The Need to Integrate Usability Engineering into Agile Process Models for Mobile Applications and Devices Development

Denish Omondi Otieno; Wilson Cheruiyot; Michael Kimwele


ist africa week conference | 2018

Fuzzy Logic Sensor Fusion for Obstacle Avoidance Mobile Robot

Aggrey Shitsukane; Wilson Cheruiyot; Calvin Otieno; Mgala Mvurya


International Journal of Computer Applications | 2017

Framework for Improving Usability of Learning Management Systems by Integrating Pedagogical Agent

Beryl Adhiambo Odhiambo; George Okeyo; Wilson Cheruiyot


International Journal of Computer Applications | 2017

Framework for Computer Aided Education and Training for Hearing Impaired Learners

Jacob Oloo; George Okeyo; Wilson Cheruiyot


International Journal of Computer (IJC) | 2017

A Framework for an E-government Based on Service Oriented Artichitecture

Dayah Mohamed Ali; Wilson Cheruiyot; Michael Kimwele


International Journal of Computer (IJC) | 2017

Data Security in Cloud Computing with Elliptic Curve Cryptography

Abdulkadir Abdullahi Ibrahim; Wilson Cheruiyot; Michael Kimwele


International Journal of Computer (IJC) | 2017

A Hybrid Based Classification and Regression Model for Predicting Diseases Outbreak in Datasets

Leopord Hakizimana; Wilson Cheruiyot; Stephen Kimani; Mlambo Nyararai


International Journal of Computer (IJC) | 2016

Framework for Vetting and Identifying Emulated Android Mobile Apps

Faustine Moogi Soroncho; Wilson Cheruiyot; Stephen Kimani

Collaboration


Dive into the Wilson Cheruiyot's collaboration.

Top Co-Authors

Avatar

Michael Kimwele

Jomo Kenyatta University of Agriculture and Technology

View shared research outputs
Top Co-Authors

Avatar

Stephen Kimani

Jomo Kenyatta University of Agriculture and Technology

View shared research outputs
Top Co-Authors

Avatar

Abdulkadir Abdullahi Ibrahim

Jomo Kenyatta University of Agriculture and Technology

View shared research outputs
Top Co-Authors

Avatar

Aggrey Shitsukane

Technical University of Mombasa

View shared research outputs
Top Co-Authors

Avatar

Calvin Otieno

Jomo Kenyatta University of Agriculture and Technology

View shared research outputs
Top Co-Authors

Avatar

Dayah Mohamed Ali

Jomo Kenyatta University of Agriculture and Technology

View shared research outputs
Top Co-Authors

Avatar

Kennedy Mutange Senagi

Dedan Kimathi University of Technology

View shared research outputs
Top Co-Authors

Avatar

Leopord Hakizimana

Jomo Kenyatta University of Agriculture and Technology

View shared research outputs
Top Co-Authors

Avatar

Mgala Mvurya

Technical University of Mombasa

View shared research outputs
Researchain Logo
Decentralizing Knowledge