if you want to download or view a document you should >click on document then >click on full item page button, scroll down to your document and on left >click download
 
Gretsa Logo
  • English
  • Català
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Italiano
  • Latviešu
  • Magyar
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Suomi
  • Svenska
  • Türkçe
  • Tiếng Việt
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Yкраї́нська
  • Log In
    New user? Click here to register.Have you forgotten your password?
Repository logo
  • Communities & Collections
  • All
  • English
  • Català
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Italiano
  • Latviešu
  • Magyar
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Suomi
  • Svenska
  • Türkçe
  • Tiếng Việt
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Yкраї́нська
  • Log In
    New user? Click here to register.Have you forgotten your password?
  1. Home
  2. Browse by Author

Browsing by Author "GATHONI, MERCY KINYUNYE"

Now showing 1 - 1 of 1
Results Per Page
Sort Options
  • Loading...
    Thumbnail Image
    Item
    ASSESSMENT OF THE SECURITY ISSUES ARISING FROM ADOPTION OF CLOUD COMPUTING: A CASE OF KENYA REVENUE AUTHORITY, THIKA BRANCH, KIAMBU COUNTY, KENYA
    (Gretsa University, 2025-10) GATHONI, MERCY KINYUNYE
    Cloud computing is playing a major role in transforming Kenya’s public sector, helping institutions like the Kenya Revenue Authority (KRA) improve efficiency and deliver better services. But with this shift comes serious security concerns such as data breaches, insider threats, and challenges around regulatory compliance. This study explores these issues at KRA’s Thika branch, focusing on three key areas: how well the organization complies with industry security standards, how it handles insider threats, and how effective its employee training and awareness programs are. Using a descriptive research design, data was gathered from 97 respondents through structured questionnaires and analyzed using SPSS and regression models. The results showed strong positive links between all three factors and how cloud security risks are perceived—compliance (R² = 0.888), insider threats (R² = 0.920), and training awareness (R² = 0.912) all had a significant impact. Spearman’s correlation and Chi-Square tests backed up these findings, leading to the rejection of all null hypotheses. The study concludes that strong compliance practices, proactive strategies to manage internal threats, and continuous employee training and awareness are essential for secure cloud adoption. It recommends regular audits, automated monitoring tools, and collaboration across departments to help protect sensitive data and build a more resilient organization.
Contact Us

Tel: +254712959293
Tel: +254711949006
Tel: +254703917155
Email: library@gretsauniversity.ac.ke
Website: gretsauniversity.ac.ke

Quick Links
  • Privacy Policy
  • End User Agreement
  • Send Feedback
  • Cookie Settings
Institutional Repository

Powered by DSpace
© 2026 GRETSA University
All rights reserved


GRETSA University ICT Department