Search
Now showing items 1-6 of 6
Small Sized Businesses and E-Marketing Adoption: Towards A Conceptual Model
(International Journal of Scientific Research Engineering & Technology (IJSRET), 2018-04)
The purpose of this study was to develop a conceptual framework for studying E-marketing adoption among small businesses in Kenya. The specific objective was to review existing information systems adoption theories and ...
E-Marketing Adoption among Small Businesses in the Hospitality Industry in Kenya: The Institution Theory Perspective
(International Journal of Advanced Research in Computer and Communication Engineering, 2018-06)
Small sized businesses play an important role in the growth of economies all over the world, yet they appear to be slow in adopting E-marketing technology to market their products and services which may lead to business ...
A Dynamic Scheduling Optimization Model (DSOM)
(International Journal of Research in Engineering and Science (IJRES), 2018-05-17)
Scheduling in computing is the rearrangement of machine instructions to obtain the optimal level
services subject to various constraints. The scheduling activity is controlled by a scheduler (part of the Operating Systems ...
Suitability of Addition-Composition Fully Homomorphic Encryption Scheme for Securing Data in Cloud Computing
(International Journal of Computer Science and Information Security (IJCSIS), 2018-04)
Cloud computing is a technological paradigm that enables the consumer to enjoy the benefits of computing services and applications without necessarily worrying about the investment and maintenance costs. This paper focuses ...
A Systems Dynamics Model for Mobile Industry Governance in the Context of the Kenyan Vision 2030
(International Journal of System Dynamics Applications, 2018)
This article describes how Kenya has emerged in recent times as one of the fastest-growing telecom markets in the world. This article presents a system dynamics-integrated model of the Kenyan telecommunication sector—mobile ...
Secure Timing Advance Based Context-Aware Handover Protocol for Vehicular Ad-Hoc Heterogeneous Networks
(International Journal of Cyber-Security and Digital Forensics, 2018)
Heterogeneous networks and their applications introduce new shortcomings in terms of access control and confidentiality during handover process. Unfortunately, implementing stronger security mechanisms during the handover ...