Search
Now showing items 1-10 of 25
User satisfaction and acceptance of web based marketing information system among microfinance institutions in Nairobi region, Kenya
(International Journal of Academic Research in Business and Social Sciences, 2012-09)
Acceptance of web based marketing information system has remained a topic of interest for a last few decades. Several theories, specifically over the conceptualisation of the technology acceptance model (TAM) have emerged ...
Domestic violence in relation to children rights in Dar es Salaam, Tanzania
(2011-09)
This paper discusses domestic violence in relation to children rights in Temeke District Dar es salaam Tanzania. The main objective is to investigate rights of domestic violence affected children in households in so as to ...
Perceived usefulness, ease of use, organizational and bank support as determinants of adoption of internet banking in east Africa
(HRMARS, 2012-10)
The purpose of this paper to identify the factors that influence corporate customers adoption of Internet banking services in Kenya, Uganda, Tanzania and Rwanda. The hypotheses are empirically evaluated by using Trade ...
Theory of reasoned action as an underpinning to technological innovation adoption studies
(World Journal of Computer Application and Technology, 2016)
There are a number of theories and models that have been employed over the years in understanding and studying users’ technology adoption behaviors. These theories and models focus on people’s intention to engage in a ...
Perceived importance and perfomance of information systems in Azam company- Dar es Salaam
(International Journal of Learning & Development, 2012)
It is increasingly more interesting to the Companies to understand the relationship existing between perceived importance and performance of information systems within their companies. The purpose of this paper is to explore ...
TCP IP header attack vectors and countermeasures
(Science publishing group, 2017-02)
The TCP IP header has security vulnerabilities that make it prone to numerous kinds of attacks such as TCP SYN flooding, TCP RST, source quench, TCP session hijacking, TCP sequence number prediction, port scanning, CHARGEN ...
Secure end point data security using java application programming interface
(IJSRSET, 2017-02)
Most of the current instant messaging applications such as Telegram Secret Chat transmit packets in plain text. This means that an intruder equipped with appropriate remote monitoring tools can sniff the packets being ...
Evaluation of TCP congestion control modus operandi in mesh networks
(International Journal of Computer Networks and Applications, 2017-01)
Abstract – In mesh networks, the sender machine is connected to the receiver machine via multiple paths. Efficient transmissions along these paths require proper link choice so as to quickly deliver the packets the ...
Validation of extended theory of reasoned action to predict mobile phone money usage
(Horizon Research, 2018)
Theory of Reasoned Action (TRA), postulated by social psychologist, has been established to be relevant in guiding Information Systems studies. The theory resulted from attitude research using the Expectancy Value Models. ...
A Framework for secure mobile cloud computing in effective electronic learning
(International Journal of Innovative Research and Advanced Studies, 2018-01)
Abstract: In the last few years, most universities have adopted E-Learning as a new approach to teaching and learning. However, the explosive growth and usage of mobile applications and the emergence of mobile cloud computing ...