Research Article
The Use of E-Marketing Channels and Customer Satisfaction in Uyo Metropolis, Akwa Ibom State, Nigeria
Samuel George Etuk*,
Ini Smart Udoh,
Aniefiok Okon Akpan,
Effiong Mfon Isaac
Issue:
Volume 11, Issue 1, December 2024
Pages:
1-7
Received:
26 March 2024
Accepted:
19 April 2024
Published:
30 September 2024
Abstract: This research was conducted to investigate the influence that the use of e-marketing channels have on customer satisfaction in Uyo Metropolise of Akwa Ibom State. Electronic marketing proxies like social media platforms and website platforms were considered and measured against customer satisfaction in Uyo metropolis. Primary data were collected with the use of the questionnaire from users of electronic marketing channels and the target population of the study were treated as infinite, hence a sample size of 347 respondents were selected using the convenience sampling technique. Data collected were further analyzed using the Pearson’s Product Moment Correlation statistics at a 0.05 level of significance. Findings showed that the two independent variables (social media platforms and website platforms) significantly influence customers’ satisfaction. It was concluded that customers’ access to information on social media platforms and website platforms played a significant role in building customer satisfaction. On the basis of the findings, it was recommended among others, that e-marketing channels like social media platforms should be well utilized by online merchants for engaging and communicating products information, benefits and availability to online shoppers in Uyo metropolis, Akwa Ibom State.
Abstract: This research was conducted to investigate the influence that the use of e-marketing channels have on customer satisfaction in Uyo Metropolise of Akwa Ibom State. Electronic marketing proxies like social media platforms and website platforms were considered and measured against customer satisfaction in Uyo metropolis. Primary data were collected wi...
Show More
Research Article
Increasing Security and Capacity in SDNFV Structures Via Edge Node Extension
Issue:
Volume 11, Issue 1, December 2024
Pages:
8-16
Received:
18 October 2024
Accepted:
13 November 2024
Published:
16 December 2024
Abstract: The rapid proliferation of IoT devices and corresponding requirements for efficient data processing, Software-Defined Networking Function Virtualization (SDNFV) has come to be a key vehicle for agile management of network resources. The advanced SDNFV model proposed in this study is intended to resolve the two main challenges of security and scalability. The sensitivity of the data transmitted through IoT networks as they grow in size and intricacy requires improved security procedures to hold ill-suited access to their information and ensure its integrity. Encryption & Authentication Protocols: Integration of the encryption and authentication protocol together in a model, that secures data streams against potential cyber threats and threats, enhancing security paradigm. Additionally, the model tackles the scalability challenge by implementing multi-edge node support for distributed processing to better manage high volumes of IoT data. Such expansion is especially notable since it solves latency issues and bottlenecks in the network so a more resilient network structure. The current study compares the simulation results of this improved SDNFV model with existing models and showcases that amidst numerous architectures, the suggested model provides higher efficiency in terms of data privacy and processing capability. This latest development in SDNFV may be fundamental to future IoT platforms that are capable of providing a custom non-functioning IoT backbone to cope with the big data requirements of today's ever-growing network surrounding such devices.
Abstract: The rapid proliferation of IoT devices and corresponding requirements for efficient data processing, Software-Defined Networking Function Virtualization (SDNFV) has come to be a key vehicle for agile management of network resources. The advanced SDNFV model proposed in this study is intended to resolve the two main challenges of security and scalab...
Show More