Journal Articles
Permanent URI for this collectionhttp://erepository.kibu.ac.ke/handle/123456789/9624
Browse
Recent Submissions
Item Webometrics User Ranking Analysis Model Development and Validation(International Journal of Computer and Organization Trends, 2022-04-26) Mukanda, Adeline; Mbuguah, Samwel Mungai; Wabwoba, FranklinThe webometrics user ranking analysis model was developed and validated. The need for the model arose as directorates of ICT in Kenyan Universities were assigned the challenge of improving their university's webo ranking. Webo ranking is the preferred method of the universities to showcase their niche and what they do to the global community. There are no published models for webometrics ranking. This leads to each university taking different approaches. In this paper, a model has been developed and validated.Item Leveraging P2P Architecture and Semantic Web for Enhanced Resource Discovery(International Journal of Scientific Research in Science, Engineering and Technology, 2024-05-18) Kirui, Leonard K.; Mbuguah, Samuel Mungai; Ronoh, Richard K.Web 4.0, also known as the next generation, intelligent internet, possesses the potential to become a widely and universally used communication medium for various types of information. However, its decentralized architecture lacks strong semantic support, resulting in an internet that is disorganized. The current system lacks the capacity to facilitate users' effective information discovery, extraction, and integration from multiple sources. Additionally, it fails to give consumers efficient tools for manipulating and turning acquired data into knowledge that is useful. Peer-to-peer (P2P) overlay technologies have recently come to light as a way to improve resource discovery on the internet. In dynamic and large- scale situations, these technologies provide a scalable framework for allocating, sharing, and gaining access to resources. The purpose of this research is to discuss on semantically enabled web architecture that makes use of P2P overlay technology. This architecture aims to facilitate structured and precise access to internet resources and promote knowledge sharing among community members who share similar interests. The paper examines the core elements of the semantic web architecture, which encompass the services and protocols responsible for resource advertising, discovery, and management, methods and material. It then delve into the hybrid peer-to-peer (P2P) overlay structure, specifically focusing on indexing and resource location, and explores the mechanisms necessary to facilitate scalable routing within a distributed environment.Item A Fuzzy Ontological Model for Semantic Interoperability in Distributed Healthcare Information Systems(International Journal of Research and Innovation in Applied Science, 2025-01-17) Okemwa, Joshua; Owoche, Patrick Oduor; Mbuguah, Samuel MungaiThe exchange of patient or care data across heterogeneous health systems is crucial in the modern healthcare ecosystem yet remains daunting. Integration and interoperability in siloed health applications require robust health information exchange (HIE) and a pragmatic ontological model to be successful. This paper details a prototype development endeavor and systematic review of literature that has pioneered the development of a robust, practical, and tested fuzzy ontological model to enhance semantic interoperability in siloed, distributed health systems. Leveraging the tenets, standards, LOINC codes, and developed model from this study will enable robust and flexible data mapping and sharing health data in an environment marred with ambiguities and uncertainties but requiring the sophistry of interoperabilityItem Evaluating AI-Blockchain–IoT Capabilities and Effects on Transparency in Kenyan Seed Supply Chain(International Journal of Scientific Research in Science, Engineering and Technology, 2025-09-06) Ronoh, Lilian Cherotich; Mbuguah, Samuel Mungai; Ronoh, Richard K.Agricultural sector plays a very crucial role in Kenyan national economy and within it, is the seed sector which is it’s driver and sustainer. Despite the strides that have been made towards digitalization of the seed sector, still, there are challenges facing it, one of them being lack of transparency. This has resulted in farmers purchasing counterfeit seeds which have adverse effects on the overall crop yields and great financial losses to farmers. This study sought to evaluate the capabilities and the effects of integrating AI-Blockchain-IoT technologies to improve transparency within the seed supply chain. Data was collected from KALRO and KSC staff, farmers and agro-dealers through questionnaires and interviews and data analyses carried out were both descriptive and inferential. Findings revealed varying perceptions on the capabilities of these technologies which show that more awareness needs to be done to enlighten the stakeholders on the benefits of these technologies as well as benefits of their integration. In addition, the findings on the effects revealed that integration of AI-Blockchain-IoT technologies has a statistically significant positive effect on transparency in the seed supply chain. This study contributes to practice by providing insights into technologies that can enhance transparency so that all stakeholders can have clear visibility and access to information on the entire seed supply chain operations.Item Map of the Various Configuration Attributes from IPv4 to IPv6 Networks for Dual Stack, 6to4 Tunnelling and NAT: Modelling Designs in OPNET Modeller(International Journal of Computer Science and Mobile Computing, 2018-07-26) Barasa, Samuel W.; Mbuguah, Samuel Mungai; Karume, Simon M.This paper presents a performance evaluation study of dual stack, 6to4 tunnelling, and Network Address Translation transition schemes on simulative method in IPv4/IPv6 networks. This research aims to find out what IPv4/IPv6 transition scheme performs better in terms of performance parameters packet losses, delays, segment delays, query response times, packet delay variations, packet end-to-end delays, jitters, mean opinion score value, and traffic sent and received for data, voice and video traffic. An equal capacity of network load in terms of probes for the three scenarios is considered and benchmarked to ascertain the impact on the performance parameters on IPv4/IPv6 networks. The scenarios are basically network models configured and simulated using Optimized Network Engineering Tool modeler. The core model designed represents an Internet Service Provider network deployed to form an ideal choice of IP domain corresponded to a realistic network topology running both IPv4 and IPv6 connections. The dual stack, 6to4 tunnelling, and NAT network models are defined which allow the researcher to compare the simulated results. This paper shows that automated 6to4 tunnelling has better performance since it requires only one IPv4 address per tunnel for unlimited number of concurrent sessions though not suitable for voice perhaps because of the encryption overheadItem Cyber-Security Vulnerability Assessment Model for County Governments in Kenya(International Journal of Science and Research, 2021-07-26) Kadima, Victor Chitechi; Omieno, Kelvin K.; Mbugua, Samuel MungaiComputerization of county government daily activities enables faster and better services to their clients. The integration of Information and Communications Technology by the CG into their systems has led to new advancements in technology. The adoption of ICT into the Kenya’s County Governments has contributed to faster growth and output in better client service delivery. The benefits has also encouraged serious attacks to such systems causing risks due to easier penetration in the systems because of vulnerabilities. The attacks have costed county governments more resources and time in case of managing such risks. As a country, we need to ensure that all our systems are well safeguarded from attacks. This paper sought to address the above issue by developing a cyber-security vulnerability assessment model for County Governments in Kenya, The model can be applied as a better approach that will manage and reduce the attacks and risks. The Model was developed from a study that targeted a total population of 170 staff grouped as end users and ICT Experts working in county governments of Kakamega and Bungoma. The study adopted an exploratory research design. Stratified random sampling technique was used to group the counties while purposive sampling was used to identify the correspondence with the required information. A sample size of 98 end users and 37 ICT experts was obtained using Yamane’s formula. Questionnaires and interview schedules were used in data collection. The data was analyzed using SPSS where descriptive statistics of frequencies, charts, percentages and mean regression analysis were used and a null hypothesis was tested at 5% level of significance. Study results showed that there is a positive association between preparedness and awareness, support and funding, policies and regulations, and technology; hence influencing cyber-security. The developed model will be used as a guide to manage cyber security matters in Kenya’s County governments.Item A Survey of Awareness of Social Engineering Attacks to Information Security Management Systems: The Case of Kibabii University Kenya(International Journal of Computer Applications Technology and Research, 2022-03-26) Mbuguah, Samwel Mungai; Otibine, Tobias OkumuComputer based systems are socio-technical systems in nature. The security of the system depends both on technical aspect and also social aspect. The social aspect refers to people in contact with system commonly referred to as wetware. To attack the system you may consider to target the technical or wetware. Social engineering is based on exploiting human traits that make human susceptible to these attacks. The aim of this paper was establish how aware the staff of Kibabii University were of these attributes and how these attributes could be used by social engineers to penetrate the Information Security Management systems at the institution. A survey research was adopted with a questionnaire being developed using Google application, and was administered online to all staff members of Kibabii University. A descriptive analysis was carried out on feedback. The finding was that to a large extent the sampled staff are aware of these traits but there is need for awareness training to enhance the information security management system of Kibabii UniversityItem Association between Metabolic Syndrome and Substance Dependence: A Cross-Sectional Study in Kenya(European Journal of Medical and Health Sciences, 2022-06-28) Mbuguah, Samuel Mungai; Mecha, Ezekiel; Kirira, Peter; Njoroge, Margaret; Malala, Boniface; Gitaka, Jesse; Makokha, Francis; Mwenda, CatherineMetabolic syndrome and its defining components remain an understudied area of human health research in Kenya and Africa. Understanding the relationship between substance dependence and the occurrence of metabolic syndrome is critical in prevention and clinical management of the related complications. This was a cross-sectional study in 6 rehabilitative centers in 3 counties in Kenya with a conveniently selected sample size of 166 participants. A signed informed consent was obtained from each participant following which anthropometric and biochemical measurements were obtained. Descriptive statistics and chi-square test were used to describe the prevalence of metabolic syndrome and the relationship of the defining criteria with the substance of dependence. A quarter of the respondents were overweight and 6% obese. Fasting blood glucose was elevated in 62% of the sampled population with triglycerides having a significant variation with a mean of 216.95mg/ dL and a standard deviation of 151.107. A prevalence rate of 4.8% was established based on the Harmonized Joint Scientific Statement on Metabolic syndrome for the African region. 87.34% of the population showed at least one elevated defining criteria with alcohol as the most prevalent substance of dependence. There was statistical difference of fasting blood glucose and triglycerides with alcohol use. The findings indicate that alcohol use resulted to elevated levels of fasting blood glucose and triglycerides. There is need for emphasis on a multidisciplinary approach to substance dependence and metabolic syndrome management integrating physical activity interventions, dietary modifications and psychotherapeutic approaches.Item Performance Evaluation of Machine Learning Algorithms in Smart Agriculture(International Journal of Advanced Research in Computer and Communication Engineering, 2024-08-26) Gichuki, Dennis Karugu; Owoche, Patrick Oduor; Mbuguah, Samuel MungaiThis study explores the integration of Wireless Sensor Networks (WSN) and Machine Learning (ML) in smart farming to address critical agricultural challenges. By leveraging real-time data collection and advanced analytical tools, the research demonstrates the potential of ML algorithms—Decision Trees, Naive Bayes, Support Vector Machines (SVM), Logistic Regression, and Random Forests—in enhancing crop management, including yield prediction, soil quality assessment, and pest and disease detection. The study finds that Naive Bayes achieves the highest accuracy and balanced precision-recall metrics, while ensemble methods like Random Forests effectively reduce overfitting and improve prediction accuracy. Despite the promising results, the research identifies challenges such as data accessibility, model integration, and user interface design that must be addressed to fully realize the potential of smart farming technologies. Overall, the findings provide valuable insights into optimizing resource utilization, reducing crop losses, and promoting sustainable farming practices, thereby supporting global food security and economic stability.Item Assessing Preparedness for Smart Farming and Technology Adoption among Kenyan Farmers(International Journal of Research and Innovation in Applied Science, 2024-09-16) Gichuki, Dennis Karugu; Mbuguah, Samuel Mungai; Owoche, Patrick Oduor; Oyile, Paul OduorAgriculture is crucial in reducing poverty, promoting economic prosperity, and ensuring food security for the world’s growing population, which is expected to reach 9.7 billion by 2050. This sector is vital to the global economy, contributing significantly to GDP and providing jobs for a large workforce. Precision agriculture and e-commerce advances have proven beneficial, boosting crop yields and rural incomes. Sub-Saharan Africa faces similar agricultural challenges as it anticipates a population of 2.1 billion by 2050. Although the region has made strides in expanding farmland and labour, improvements in crop yields have been limited. The digital revolution offers new opportunities to tackle issues such as undernutrition by improving access to information and technology. In Kenya, with a population projected to reach 95 million by 2050, expanding food production is a pressing challenge. Significant hurdles include declining soil fertility, inadequate water management, and a lack of technical support. While technologies like Wireless Sensor Networks (WSNs) and Machine Learning (ML) have the potential to enhance agricultural productivity, their adoption is constrained by infrastructure issues, high costs, and a shortage of technical expertise. Addressing these barriers and improving farmer education is essential to fully realising these technologies' benefits.Item Unraveling the ‘community effects’ of interventions against malaria endemicity: a systematic scoping review(BMJ Public Health, 2024-10-29) Ko, Yura K; Kagaya, Wataru; Chan, Chim W; Kanamori, Mariko; Mbugua, Samuel Mungai; Rotich, Alex K; Kanoi, Bernard N.; Ngara, Mtakai; Gitaka, Jesse; Kaneko, AkiraObjectives There is an urgent need to maximise the effectiveness of existing malaria interventions and optimise the deployment of novel countermeasures. When assessing the effects of interventions against malaria, it is imperative to consider the interdependence of people and the resulting indirect effects. Without proper consideration of the effects, the interventions’ impact on health outcomes and their cost-effectiveness may be miscalculated. We aimed to summarise how the indirect effects of malariainterventions were and reported. Design We conducted a scoping review. Data sources We searched PubMed, Web of Science and EMBASE. Eligibility criteria We included studies that were conducted to quantify the indirect effects of any interventions for all species of Plasmodium infection. Data extraction and synthesis We used a standardised data collection form to obtain the following information from each record: title, name of authors, year of publication, region, country, study type, malaria parasite species, type of interventions, type of outcomes, separate estimated indirect effect for different conditions, pre-specified to measure indirect effect, secondary analysis of previous study, methods of indirect effects estimation, terms of indirect effects, and if positive or negative indirect effects observed. Results We retrieved 32 articles and observed a recent increase in both the number of reports and the variety of terms used to denote the indirect effects. We further classified nine categories of methods to identify the indirect effects in the existing literature and proposed making comparisons conditional on distance to account for mosquito flight range or intervention density within that range. Furthermore, we proposed using the words community effects or spillover effects as standardised terms for indirect effects and highlighted the potential benefits of mathematical models in estimating indirect effects. Conclusions Incorporating assessment of indirect effects in future trials and studies may provide insights to optimise the deployment of existing and new interventions, a critical pillar in the current fight against malaria globally.Item Trends in Software Architecture Designs: Evolution and Current State(International Journal of Innovative Science and Research Technology, 2025-03-26) Agwenyi, C.A; Mbuguah, Samuel MungaiSoftware architecture combines architectural style and quality attributes with the high-level structure of software system abstraction through composition and breakdown. In addition to meeting the system's primary functionality and performance needs, a software architectural design must also meet non-functional requirements including availability, scalability, portability, and dependability. The set of components, their relationships, how they interact, and how each component is deployed must all be described in a software architecture. There are numerous approaches to characterizing software architecture, including object-oriented modeling with UML (Unified Modeling Language), the Architecture View Model (4+1 view model), and ADL (Architecture Description Language). With an emphasis on microservices, serverless architecture, event-driven architecture, domain-driven design, cloud-native applications, zero trust security, and artificial intelligence integration, this paper reviews the latest developments in software architectural concepts, comparing their trends and contributions to modern computing. This paper reviews the evolution and current trends in software architecture designs from 2016 to 2024. It highlights key shifts, emerging paradigms, and factors influencing architectural decisions. The study is based on a systematic desktop review of existing literature, focusing on industry and academic contributions. Findings indicate a shift towards cloud-native architectures, microservices, event-driven models, and AI-enhanced frameworks. The paper synthesizes these trends and discusses their implications for future software developmentItem ICT Personnel Maturity Towards Green ICT in Kenya(International Journal of Computers & Technology, 2014-04-23) Wabwoba, Franklin; Mbugua, Samuel Mungai; Anselemo, Peters Ikoha; Shisoka, Dorcus ArshleyThough ICT is contributing to the economy associated with innovations, inventions and rapid development in almost all aspects of human life, is responsible for climatic degradation. The rapid increase of ICT usage means more costs of doing business, energy consumption, and more environmental challenges. The rapid changing technology reaching Kenya and lack of their understanding has put a lot of pressure on both management and ICT personnel to implement them on a trial and error manner. This has limited the gains meant to be obtained from green ICT despite its technologies availability. The lack of ICT personnel capacity readiness challenges the reaping of green ICT benefits. The study was informed by the G-readiness model and the enhanced G-readiness model. This study purposed to determine the personnel capacities readiness towards green ICT in Kenya. The study was undertaken using the interpretive, inductive multi-case survey study on a population of four data centres and 116 ICT managerial, technical and user personnel that were purposively sampled. Interview, observation, questionnaire and document analysis methods were used to gather data that was triangulated to increase the reliability and validity. The study established the ICT personnel’s G-readiness was very low on both training and professional development perspectives in Kenya. The study’s findings are useful towards the strategic planning for green ICT implementation, cutting down running costs, improving environmental performance of organisations and contribution to the world of knowledge. The findings provide data for informed ICT personnel and workplace readiness alignment, decision making and ICT curriculum development. The study recommends application of green ICT based on established ICT personnel capacity, inclusion of green ICT training in the curriculum, creation of green ICT responsibilities, provision for a green ICT budget and investment into the development of green ICT personnelItem Interface Features, Program Complexity and Memorability as Indicators of Learnability of Mobile Social Software(International Journal of Science and Research, 2017-10-26) Masese, Nelson Bogomba; Muketha, Geoffrey Muchiri; Mbuguah, Samuel MungaiSocial Computing aims to support the tendency of humans to interact with mobile devices. Technology reinforces this interaction by producing appropriate responses that then lead to improved communication between humans and computational devices. Although latest in mobile phone technologies have opened the way for a new generation of mobile social applications that allow users to interact and share information, there is still very limited user support information on how to use different applications. This problem either increases the learning curve of the users, thereby adversely affects their overall efficiency. The main purpose of this paper is to analyze factors that affect the learnability of mobile social software. A sample of 361 respondents was selected, with 345 respondents returning feedback. Primary data was collected through the use of questionnaires and interviews targeting mobile social users in Nakuru County Kenya. Three social networks were used, namely, WhatsApp, Facebook and Twitter. Data analysis was done using descriptive statistics. Findings indicate that interface features affect learnability across the three social networks, with learnability of WhatsApp turning out to be higher than that of compared to Facebook and Twitter. Findings also indicate that more than 60% program supports compatibility with other applications while 59.4% of the respondents agreed that maintaining language is cheap across the three social networks. Other findings indicate that WhatsApp’s memorability is easy to execute compared to that of Facebook and Twitter.Item Facilitating Factors for Cybersecurity Vulnerabilities in Kenyan County Governments(Asian Journal of Research in Computer Science, 2018-11-13) Kadima, Victor Chitechi; Mbuguah, Samuel Mungai; Omieno, KelvinGlobally, ICT is regarded as a driver and enabler; thus, organisations which have integrated ICT in their systems have had immense growth and output. The adoption of ICT into the Kenyan County Governments, therefore, promises equal growth and output. These benefits notwithstanding, integration of ICT systems into County Governments is faced with a number of challenges in terms of vulnerabilities and other cybersecurity risks. This paper sought to identify the key facilitators of cybersecurity vulnerabilities in Kenyan County Governments only. The exploratory research design was used as a methodology. Questionnaires and interview schedules were the main instruments of data collection. The data was analysed using descriptive and inferential statistics. The findings indicate that there is a need for County Governments in Kenya to prepare for cybersecurity related challenges through policy formulations, End-users and ICT experts awareness on cybersecurity-attacks, Management support through resources funding and cybersecurity infrastructure is key to any system controls. The solutions to cybersecurity vulnerabilities in Kenyan County governments can be solved when these keys are implementedItem Technology-Enabled Self-directed Learning in Developing countries: Adoption Framework(International Journal of Computer Applications Technology and Research, 2022-03-26) Barasa, Godliphas Mamati; Mbugua, Samuel Mungai; Anselemo, Peters Ikoha21st century-learning approach is characterized by self-directedness and the ability to learn anytime, anywhere. Self-directed learning heavily depends on Technology to be effective. Most universities were used to conventional face-to-face learning, but uncertainties like the covid-19 pandemic have challenged this teaching and learning mode, thus pushing universities to explore innovative learning approaches to ensure seamless learning. One such approach is Technology-enhanced self-directed learning. Most developed countries are endowed with enabling infrastructure to actualize this learning approach. However, most developing countries like Kenya are still struggling to adopt self-directed learning due to technological, organizational, and environmental challenges. A framework is needed to guide its adoption. A survey research design using an online questionnaire with a sample size of 572 was used.Four Kenyan public university students participated in the study. Data was collected and analyzed using Exploratory Factor Analysis. Principle component analysis extracted seven factors explaining a total variance of 62.5%. The factors were renamed based on a shared theme, and the average factor loading for each construct was calculated. A percentage weight of each construct was also calculated. Key factors forming the constructs of Technology-enhanced self-directed learning were: E-learning infrastructure, bring your own device policy, Connectivity infrastructure, ICT Competencies, Information security, demographic factors, and laptop ownership programItem Model Driven Architecture a Review of Current Trends(International Journal of Computer Science and Mobile Applications, 2023-01-30) Onunga, Jeremiah; Mbugua, Samuel MungaiThe Object Management Group (OMG) adopted the Model Driven Architecture (MDA) approach from among the various Model Driven Engineering (MDE) methods. The MDA technique, which is based on the separation of concerns principle, aims to automate the software development process by using models rather than traditional coding. Model Driven Architecture (MDA) is a new technique to application modeling and creation that has gotten a lot of attention recently. Many organizations are now considering MDA as a way to organize and manage their application solutions, tool vendors are explicitly referring to their capabilities in terms of "MDA compliance," and the MDA lexicon of platform-specific and platform-independent models is now widely referenced in the industry. The OMG produced the second iteration of the MDA guide in June 2014 in an effort to implement the essential ideas and supplement the 2003 original with more precise specifications. Researchers' interpretations of the MDA words vary due to the 11-year difference and their respective perspectives and backgrounds. What causes uncertainty about what falls under and outside the MDA's scope. In this work, we present an overview of the current MDA trends simplifying integration challenges and enhancing business Information Technology (IT) alignment. This paper establishes boundaries around what constitutes MDA, positioning MDA in relation to other model-driven methods. It will also demonstrate its advantages over conventional software development and other model-driven methodologies. This paper highlights problems and difficulties that researchers have identified that affect the MDA. The paper also provides some insight into the MDA trends in research and directions, particularly with regard to the platforms that the MDA development process is aimed at and its automationItem Effective approaches for enhancing data management and semantic interoperability within the healthcare sector(International Journal of Applied Research, 2023-08-04) Tsinale, Harriet Loice; Mbugua, Samuel Mungai; Luvanda, AnthonyIn a variety of contexts, Big Data is widely used. In healthcare Big Data has its own characteristics, including heterogeneity, incompleteness, timeliness and durability, privacy, and ownership. To enhance health-related science, these features present a number of challenges for data storage, mining, and sharing. Big Data helps to understand electronic health records, gather demographic and medical data such as clinical data, medical conditions and diagnosis, allow doctors to provide a wide variety of patients with quality health care and also to make informative decisions. The large volume of data also provides researchers in the fields of medicine and healthcare with the ability to use tools and techniques to unlock hidden solutions. This study sought to investigate the effects that the existing approaches have on enhancing data management and semantic interoperability in healthcare sector. 180 respondents who took part of the survey were chosen from the Kenyatta University Teaching, Referral & Research Hospital. It was discovered that implementing health standards and tools can help healthcare companies in a number of ways by eliminating compatibility concerns and assuring accurate data representation. Consequently, encouraging successful adoption boosts decision-making processes, encourages sustainability, improves data quality, allows for interoperability, and makes it easier to comply with regulations. These implications help improve patient care, healthcare systems, and overall health outcomesItem Application Lifecycle Management Activities For Quality Assurance In Software Development(International Journal of Trend in Research and Development, 2017-04-26) Otibine, Tobias Okumu; Mbuguah, Samuel Mungai; Kilwake, Juma; Tsinale, Harriet LoiceLifecycle Management approaches promise more systematic and efficient ways to support the development and management of complex products. The concept of Application Lifecycle Management (ALM) indicates the coordination of activities and the management of artifacts during the software product‟s lifecycle. Most of the currently available unified ALM solutions are either based on basic version control and other 'low level' point-to-point integrations, or advocate the adoption of a new and expensive all-in-one solution from a single vendor. The problem with these current solutions is that the first does not go far enough to really provide the previously described benefits of applying an ALM solution, while the second one is often associated with high costs in tools, infrastructure and personnel which in turn affect the quality of software developed for SME‟s and middle level organizations. This paper discusses the effect of application lifecycle management activities on quality assurance in software development. The research employed multiple case study design. The data collection tools included Questionnaire, Observation and Interviews. ALM activities were found to be a direct predictor of Software quality assurance in software development. The research found out that ALM elements and their relations together with good documentation were very key in coming up with an efficient ALM solution and with improved process support and better knowledge and experience on ALM, application lifecycle management activities greatly affected the quality of software's developed thus improving on quality assurance in software development.Item Hotel Branding using Facebook and Dialogic Principles of Internet Communication(International Journal of Advanced Research in Computer Engineering & Technology, 2019-02-26) Owoche, Patrick Oduol; Mbugua, Samuel Mungai; Anselemo, Peters IkohaThis paper examines the extent to which the hotel industry uses Facebook in their branding strategies, to communicate dialogically with its consumers. Using Kent and Taylor’s five principles of dialogic communication, a media content analysis of 64 three to five star rated hotel websites were reviewed. Engagement, posts and posting schedule metrics were analyzed. The study found that 64% of hotels use Facebook. The extent of dialogic principle employment in hotel branding strategies is at infancy stage. The rate of engagement is lower than the hotel industry average. The study also revealed that the presentation of useful information principle is not adequately deployed. Conservation of visitors’ principle of internet communication is also still in its middle stage of implementation.
