Positioning ecotourism destinations in Kisumu County: Cultural Diversity Perspective
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 6
Abstract
Abstract: Positioning of ecotourism destination is crucial to survival and success of business value chain of the cultural sites as alternative source of livelihood of the local communities in Kisumu County. This paper sought to establish significant factors to consider in branding cultural sites as ecotourism destinations for sustainable livelihood in Kisumu County and its environs. This study was anchored on Place Branding Theory and Social Exchange Theory. The study adopted descriptive embedded case design and cross-sectional survey in the three selected units of analysis methodology with both quantitative and qualitative approaches to source and analyze data. The finding established that positioning of ecotourism destinations will increase visitations in Kisumu County and create business value chain opportunities for sustainable source of livelihood.
Authors and Affiliations
David Omondi Achieng , Patrick O. Hayombe , Stephen G. Agong
Balancing Load in Computational Grids: A New Approach
The emergence of grid computing over the internet needs a hybrid load balancing algorithm which can take into account the various characteristics of the grid computing environment. Hence, this paper proposes a load...
Network Layer Attacks and Their Countermeasures in Manet: A Review
Mobile ad hoc network(MANET) is a collection of mobile nodes that are free to move in any direction. It is an infrastructureless network means it has no fixed or predefined network. MANET is a self configuring network wi...
Celllls breaks tthe Tor’’s Anonymiitty:: Oniion Routter
To hide the communication of users, the anonymity systems pack the application data into equal – sized cells. The size of IP packets in the Tor network can be very dynamic and the IP layer may be repack cells....
A Review on Resource Discovery Strategies in Grid Computing
Abstract : Technological, Finance, Scientific, engineering and other applications and in specific grandchallenge applications are becoming ever more demanding in terms of their computing requirements.Gradually, all...
Detection and Prevention of Black Hole Attack in Mobile Ad-Hoc Networks: A Survey
Abstract: A mobile ad hoc network (MANET) is a self-configuring network that is formed automatically by a collection of mobile nodes. There is no centralized management. Both legitimate and malicious nodes can acce...