Rural Small and Medium Enterprise: Information and Communication Technology as Panacea
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 3
Abstract
Abstract: Though, there are variations in the definitions of small and medium enterprises but it can be generally accepted as business activities that employ the services of 150 or fewer people in its activities and attributed with no link to the public limited company. Among the challenges facing the prospect of small and medium enterprise in the rural areas is the lack of integrating information and communication technology skills or strategies into their practice. Therefore, this paper engages the exploration of previous literatures in finding the benefits of information and communication technology to the rural small and medium enterprise.
Authors and Affiliations
Obadun Mathew Olukayode , Wan Rozaini Sheik Osman , Abdulhameed Hussein , Ahmed Naser Ismael , Ahmed Abdulla Masoud , Abdul Ghafar Mansor
Secure Data Transmission Using Dna Sequencing
The medical record system includes substantial information such as diagnoses of diseases, treatment undergone, patient's health condition, medication information, examination results and nursing actions.Consequently, the...
Processing of Top-k Selection Queries in Relational Database System
Abstract: In many applications, users specify target values for certain attributes, without requiring exact matches to these values in return. Instead, the result to such queries is typically a rank of the top-k tu...
An Efficient Methodology for Clustering Uncertain Data Based on Similarity Measure
Abstract: In data mining clustering is one of the most important and crucial task. There exists various clustering techniques like partitioning and density based techniques. The previous methods worked on traditional par...
Detection and Localization of Multiple Spoofing Attackers in Wireless Networks
Wireless spoofing attacks are easy to launch and can significantly impact the performance of networks. Although the identity of a node can be verified through cryptographic authentication, conventional security a...
Three-Pass Protocol Implementation in Caesar Cipher Classic Cryptography
Abstract: This study combines classic and modern cryptographic algorithms so that the data security of information more awake authenticity. Caesar cipher is the oldest classical cryptography which uses a symmetric key me...