Abstract-There has been growing concerns about the rising costs of doing business and environmental degradation world over. Green ICT has been proposed to provide solutions to the two issues yet it is not being implemented fully in developing economies like Kenya. For its implementation, it is critical to establish the level of green ICT readiness of organisations to inform where to start and where to put more emphasis. Over the past few years this has been done using Molla's G-readiness model. However this model assumes the basic level of Greadiness to be same for both developed and developing economies to be the same with regard to ICT personnel preparedness. Based on green ICT readiness in Kenya, the relationship between ICT personnel's gender, age and training with the G-readiness variables as proposed in Molla's Greadiness model was investigated. The study surveyed ICT personnel in four cases using a questionnaire on a seven scale likert scale. It established that there exists a significant relationship between the ICT personnel related variables and the G-readiness variables. Based on the findings on the relationship, the study extended Molla's G-readiness model to include a sixth dimension of personnel readiness.
Abstract:The information age society is becoming highly dependent on technological advancements and in particular software platform and devices that can access the cyberspace. The way people acquire, access and share data, files and, information have significantly revolutionized peoples" social-technical interactions shaping their lifestyle and activities in regard to both the physical space and cyberspace. Ubiquitous computing for instance tends to offer digital society great, exciting, powerful features and capabilities that enable reliable and productive encounters within convenient environments. In ubiquitous environments however, there is high possibility of users" data, files and other users" digital assets being exposed to high risk of disclosure and tampering by iPredators. Such disclosure and tampering of users" sensitive data and information potentially exposes the targeted persons in society to many risks in regard to their digital and environmental security and privacy. In event of a successful iPredator"s attacks on targets, the aftermath tend to be quite devastating sometimes leading to loss of lives, financial investments, critical data, human dignity and/or freedom. Dangers lurking in the cyberspace where there is increased usage of ICTs within a highly connected society of people and devices are therefore real and costly. The iPredators attack on users in cyberspace is a problem that requires cyber security awareness for users to address. To achieve this, this paper explored the various typologies of iPredators attacks targeting users in the cyberspace. The output of the study lead to a proposed framework by the researcher for preventing iPredators attacks on cyberspace. Desktop study research technique was adopted by the study which inclined to qualitative research design.
Business Continuity Planning (BCP) is essential to the success and continued operation of organizations, and it directly impacts business performance. Good BCP helps institutions prepare for unexpected disasters and crises, enabling them to continue operations in the event of such incidents. BCP plays a critical role in the performance and success of organizations. By establishing a robust BCP, organizations can minimize disruptions, ensure continued operations, and protect their long-term interests, contributing to better business performance. Some of the standards and frameworks that can be leveraged to deliver an effective BCMS are ISO 22301, ISO 27001, COBIT, ISO 31000, ISO 14000, ISO 20000, and ISO 9001. The research design was a qualitative case study. Managers in some Kenyan organizations lack strategies to design and implement suitable, adequate, and effective BCMSs. There is a positive relationship between an effective BCMS and organizational performance.
There has been an increase in crimes involving illegal firearms in the last couple of years. Previous studies have found that most illegal firearms are carried in a concealed manner. The detection therefore of persons carrying concealed firearms is critical in maintaining security especially in public places. Literature indicates that disruption in gait is a major indicator used by security personnel to detect persons carrying concealed firearms especially those tucked on the hip. However, the specific gait parameters that are indicative have not yet been quantitatively determined. The purpose of this study therefore is to analyze the gait of persons carrying a concealed firearm tucked on the right hip and to quantitatively determine the gait characteristics associated with carrying the firearm. A simulation of persons walking while carrying a concealed firearm and when unarmed was recorded using Kinect V2 depth camera. The depth camera provided 3D spatial skeletal joint position features of tracked joints for the armed and unarmed scenario. Paired t-tests were conducted to compare these features. Further, the results of the t-tests were related to the anatomical planes of Motion. Results showed that persons carrying a firearm demonstrated disrupted gait characterized by right arm abduction, left arm adduction, right leg adduction and extension. These findings extend existing gait indicators which can be employed by security personnel to identify persons carrying concealed firearms.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.