11 research outputs found

    Norms of Self-Adjoint Two-Sided Multiplication Operators in Norm-Attainable Classes

    Get PDF
    Let B(H) be the algebra of all bounded linear operators on a complex Hilbert space H. In this note, we give characterizations when the elementary operator TA,B: B(H)→B(H) defined by TA,B(X) =AX B + BX A, ∀ X ∈ B(H) and A, B fixed in B(H) is self adjoint and implemented by norm-attainable operators. We extend our work by showing that the norm of the adjoint of TA, B is equal to the norm of TA,B when it is implemented by normal operators

    On self adjoint norm-attainable operators

    Get PDF
    Paper presented at the 4th Strathmore International Mathematics Conference (SIMC 2017), 19 - 23 June 2017, Strathmore University, Nairobi, Kenya.In this paper we present the theory of norm-attainability for Hilbert space operators. In particular, we characterize self-adjointedness of the norm-attainable operators. We also outline the relationship between norm-attainability and normality when the norm-attainable operators are self-adjoint

    On Tensor Products and Elementary Operators

    Get PDF
    In This Paper We Describe Operator Systems And Elementary Operators Via Tensor Products. We Also Discuss Norms Of Elementary Operators

    Assessing the Current Status of Information Security Policies Among Saccos in Kenya

    Get PDF
    In 2013, Communication Authority of Kenya (CAK) recorded cyber-attacks amounting to Sh5.4 million loses. In April 2016, Bandari Savings and Credit Cooperative Society lost Sh5 million through fraudulent ATM withdrawals (Nation Newspapers, April 8, 2016). These examples demonstrate weaknesses that may exist from security breaches and incidents caused by people, processes, and technology. Ministry of ICT and CAK are lacking specific Information Security Models tailored towards SACCOS in Kenya. The study therefore sought to assess the current status of information security policies among SACCOS in Kenya. The study adopted descriptive research design. The unit of observation was 135 SACCOS registered with SACCO Societies Regulatory Authority (SASRA) while the unit of analysis was 270 ICT personnel working in the 135 targeted SACCOS. The study targeted the SACCOS heads of IT department. The study used Nassiuma (2000) formula to get a sample of 85 respondents. Purposive sampling was further used in selecting study participants in every SACCOS who were considered to be knowledgeable of the variables under study. The study utilized questionnaire as the survey instrument to collect both quantitative and qualitative data. The study adopted descriptive statistics. Descriptive data was presented by use of frequency tables. The study established that in all the SACCOS studied, information security policy is used. However, there are still challenges on how information security breaches and incidents can be contained based on the results of the study and therefore calls for further research in academic research. The findings of the study indicate that SACCOS were able to validate that the enhanced information security model using an integrated approach worked as planned and reported to auditors, managers and executives that incident response programs are robust and reliable. If security controls didn’t work as planned, they will need to fix them. The actions and resources needed should be included in in the report to executives in the SACCOS sector in KenyaKeywords: SACCOS, Management controls, Information Security Policies, Risk assessmentDOI: 10.7176/EJBM/11-27-09 Publication date:September 30th 201

    Enhanced information security model using an integrated approach

    Get PDF
    Paper presented at the 5th Strathmore International Mathematics Conference (SIMC 2019), 12 - 16 August 2019, Strathmore University, Nairobi, KenyaOrganizational assets are mainly vulnerable to attacks from user error, hackers and crackers, viruses and cyber criminals. This has resulted in loss of trillions of dollars around the world and over 4 billion shillings in East Africa. The objective of the study is to develop an enhanced information security model using an integrated approach among SACCOS in Kenya and to test and validate the enhanced information security model. The study used descriptive research. The total population of the study comprised of 135 SACCOS. Nassiuma (2000) scientific formula was used to determine the sample size of 85 SACCOS registered with SASRA. A pilot study was carried out to test the validity of the survey instrument. Cronbachs alpha of 0.70 coefficient variation was used to assess the internal reliability of the research instrument. The results of the study revealed that the enhanced information security model is suitable to enhance the information security within the SACCOS sector. This is evident because the findings indicated that the elements of risk assessment have positive significant effect on the enhanced information security among SACCOS. Important contributions to the body of knowledge were the development of an enhanced information security model using an integrated approach for SACCOS in Kenya.Jaramogi Oginga Odinga University of Science and Technology, Kenya
    corecore