<?xml version="1.0" encoding="UTF-8"?>
<rdf:RDF xmlns="http://purl.org/rss/1.0/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/">
<channel rdf:about="https://repository.cuk.ac.ke/handle/123456789/561">
<title>Research Papers</title>
<link>https://repository.cuk.ac.ke/handle/123456789/561</link>
<description/>
<items>
<rdf:Seq>
<rdf:li rdf:resource="https://repository.cuk.ac.ke/handle/123456789/1936"/>
<rdf:li rdf:resource="https://repository.cuk.ac.ke/handle/123456789/1935"/>
<rdf:li rdf:resource="https://repository.cuk.ac.ke/handle/123456789/1934"/>
<rdf:li rdf:resource="https://repository.cuk.ac.ke/handle/123456789/1933"/>
</rdf:Seq>
</items>
<dc:date>2026-05-18T19:12:01Z</dc:date>
</channel>
<item rdf:about="https://repository.cuk.ac.ke/handle/123456789/1936">
<title>Hybrid Encryption Model for Secure Token Distribution Scheme</title>
<link>https://repository.cuk.ac.ke/handle/123456789/1936</link>
<description>Hybrid Encryption Model for Secure Token Distribution Scheme
Ayuma, Michael Juma; Angolo, Shem Mbandu; Kasyoka, Philemon Nthenge
Encryption is essential for safeguarding sensitive data by transforming it into a secret code, which can only be decrypted by authorized parties. This ensures privacy and protects data from unauthorized access. While various encryption algorithms exist, relying on a single method may not provide sufficient security, particularly in the context of token transmission. Common threats such as brute force attacks, man-in-the-middle (MITM) attacks, token modification, and replay attacks are prevalent in adversarial attempts to breach the security of tokens during transmission. When these vulnerabilities are not addressed, they can compromise token integrity and the security of the entire authentication process. This study aims to design an efficient cryptographic protocol for the secure transmission of tokens by investigating existing encryption techniques and developing a hybrid cryptographic scheme. Unlike traditional encryption methods, hybrid cryptography combines multiple encryption algorithms to enhance security, making it more resilient against various types of attacks. Previous applications have shown that hybrid cryptography can effectively ensure confidentiality and prevent unauthorized access to highly sensitive information, such as user credentials and authentication tokens. The proposed model integrates Secure Hash Algorithm (SHA-2), ChaCha20, and Rivest-Shamir-Adleman (RSA). SHA-2 is used to ensure the integrity and confidentiality of the data, providing protection against brute force and relay attacks during token transmission. ChaCha20, a symmetric encryption algorithm, is employed to securely generate private keys for encrypting the tokens, while RSA, an asymmetric encryption method, facilitates secure key exchange within the hybrid system. The design is based on computational complexity theory, where the increased complexity of encryption operations significantly strengthens the system against adversarial attacks. This hybrid encryption model specifically addresses the security of token transmission, offering a robust solution for secure token distribution across diverse fields such as healthcare, education, agriculture, and commerce. By evaluating the impact of adversarial models on hybrid encryption schemes, the study provides insights into mitigating security risks and improving the resilience of token transmission systems.
A Journal article published in the Tech Science Press.
</description>
<dc:date>2026-03-16T00:00:00Z</dc:date>
</item>
<item rdf:about="https://repository.cuk.ac.ke/handle/123456789/1935">
<title>Supply Chain Management Ethical Practices and Sustainable Performance of Public Procurement in Lake Region Economic Block, Kenya</title>
<link>https://repository.cuk.ac.ke/handle/123456789/1935</link>
<description>Supply Chain Management Ethical Practices and Sustainable Performance of Public Procurement in Lake Region Economic Block, Kenya
Kipkorir, Geoffrey; Chege, Dennis; Kamau, Dennis; Ndolo, Jackson
Purpose: The objective of the study was to supply chain management ethical practices on sustainable performance of public procurement in Lake Region Economic Bloc, Kenya. The focus was on the achievement of economic, social and environmental performance metrics across County and National government departments and agencies.&#13;
&#13;
Methodology: Descriptive research design was adopted. The Lake Region Economic Bloc (LREB) that covers 11 counties was used as the focus area of the study. County departments, National government departments and agencies were the targets of the study. A total of 290 officers who are in charge of evaluation of bids, contract administration and users were selected for the sample frame. The researcher therefore distributed 290 questionnaires. Descriptive statistics were developed to facilitate the generation of inferential statistics by use of both univariate and multi-vicariate analysis.&#13;
&#13;
Findings: Based on the findings, the study concluded that supply chain management ethical practices positively and significantly influences sustainable public procurement in Kenya. This study therefore recommends that public procurement in Kenya should establish and enforce clear ethical sourcing guidelines and standards.&#13;
&#13;
Unique Contribution to Theory, Policy and Practice: This study makes a significant contribution to theory, policy, and practice by demonstrating that ethical supply chain management practices are critical drivers of sustainable public procurement performance. Theoretically, it advances existing knowledge by linking ethical practices with economic, social, and environmental outcomes in procurement systems. From a policy perspective, it provides evidence to support the development and enforcement of stronger regulatory frameworks and ethical standards across public institutions. Practically, the study offers actionable insights for procurement professionals, emphasizing the need for clear ethical guidelines, supplier accountability, and continuous capacity building to enhance efficiency, transparency, and long-term sustainability in public procurement.
A journal article published in the International Journal of Supply Chain and Logistics.
</description>
<dc:date>2026-03-30T00:00:00Z</dc:date>
</item>
<item rdf:about="https://repository.cuk.ac.ke/handle/123456789/1934">
<title>Procurement Management Practices and Supply Chain Performance of County Referral Hospitals in Kenya.</title>
<link>https://repository.cuk.ac.ke/handle/123456789/1934</link>
<description>Procurement Management Practices and Supply Chain Performance of County Referral Hospitals in Kenya.
Chepkirui, Mercy; Muthoni, Dennis
Currently, the health business environment is characterized by increasing uncertainties. Procurement management has emerged as an important approach for enterprises to achieve profit and market share objectives by reducing environmental risk experienced due to poor technology adoption. The primary aim of this study was to determine the influence of procurement management on the supply chain performance of county referral hospitals in Kenya. The research was based on specific objectives, such as procurement risk management, stakeholder management, supplier appraisal, and contract management on the supply chain performance of county referral hospitals. Theories, such as the Resource-Based View Theory, stakeholder theory, relational view theory, and agency theory, also guided the study. This study employed a cross-sectional survey approach, mainly concentrating on 47 county referral hospitals in Kenya. To meet the research objectives, the departmental heads in the procurement department was used as observation units across the firms. The pilot study targeted 10 respondents, 10% of the final study sample size, of which respondents were randomly chosen in each firm. The primary data was collected through a self-administered questionnaire that included open and closed-ended questions designed to obtain definite responses. For this study, the quantitative data collected was analyzed by using SPSS version 28 to calculate the response rate using descriptive statistics, including frequencies, percentages, means, and standard deviations. The Cronbach’s Alpha value was greater than 0.7 which indicated that the questionnaire met the minimum acceptable threshold. The study findings showed that procurement management practices namely procurement risk management, stakeholder management, supplier appraisal and contract management significantly influence the supply chain performance of county referral hospitals in Kenya. The study concluded that supply chain performance was predicted to improve for every unit increase in these practices. The study further recommends that county referral hospitals should ensure their risk register is regularly reviewed and revised. To achieve this, companies should establish a structured schedule for risk reviews based on risk severity, assign clear risk owners responsible for updates, and integrate these reviews into routine committee meetings such as quality or risk management committees to monitor and act on changes promptly. This will ensure improved procurement management practices and improve supply chain performance of county referral hospitals.
An article published in the International Journal of Social Science and Humanities Research
</description>
<dc:date>2025-12-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://repository.cuk.ac.ke/handle/123456789/1933">
<title>Personalized Social Media Marketing Strategy and Customer Loyalty in the Kenyan Telecommunications Sector.</title>
<link>https://repository.cuk.ac.ke/handle/123456789/1933</link>
<description>Personalized Social Media Marketing Strategy and Customer Loyalty in the Kenyan Telecommunications Sector.
Langat, Daniel K.; Kibos, Kiprop.; Mohamed, Ali Abdirahman.
Customer loyalty is pivotal for the sustainability and profitability of businesses, especially in competitive sectors like telecommunications. This study investigates the effect of personalized social media marketing strategies on customer loyalty within Kenya's telecommunications industry, focusing on the ability of personalized digital interactions to retain customers and enhance brand loyalty. The research applied an explanatory design with a sample of 384 respondents from major telecom companies in Nairobi, Kenya. Descriptive analysis indicates that frequent social media engagement, such as consistent posts from the telecom brands, positively influences loyalty. Correlation and regression analyses reveal a strong positive relationship between personalized social media marketing and customer loyalty (r = 0.758), with personalized strategies accounting for 57.5% of loyalty variance (R² = 0.575). ANOVA results further confirm the significance of this relationship (F = 349.486, p &lt; 0.001), leading to the rejection of the null hypothesis. The findings underscore the importance of personalized content and regular engagement, suggesting that tailored social media strategies can effectively build and sustain customer loyalty in the telecommunications sector. Recommendations include optimizing posting schedules, investing in data analytics for audience insights, and prompting customer feedback to enhance loyalty further.
A journal article published in the International Journal of Scientific and Management Research.
</description>
<dc:date>2024-11-01T00:00:00Z</dc:date>
</item>
</rdf:RDF>
