9 research outputs found

    User Interface Challenges of Banking ATM Systems in Nigeria

    Get PDF
    The use of banking automated teller machine (ATM) technological innovations have significant importance and benefits in Nigeria, but numerous investigations have shown that illiterate and semiliterate Nigerians do not perceive them as useful or easy-to-use. Developing easy-to-use banking ATM system interfaces is essential to accommodate over 40% illiterate and semiliterate Nigerians, who are potential users of banking ATM systems. The purpose of this study was to identify strategies software developers of banking ATM systems in Nigeria use to create easy-to-use banking ATM system interfaces for a variety of people with varying abilities and literacy levels. The technology acceptance model was adopted as the conceptual framework. The study\u27s population consisted of qualified and experienced developers of banking ATM system interfaces chosen from 1 organization in Enugu, Nigeria. The data collection process included semistructured, in-depth face-to-face interviews with 9 banking ATM system interface developers and the analysis of 11 documents: 5 from participant case organizations and 6 from nonparticipant case organizations. Member checking was used to increase the validity of the findings from the participants. Through methodological triangulation, 4 major themes emerged from the study: importance of user-centered design strategies, importance of user feedback as essential interface design, value of pictorial images and voice prompts, and importance of well-defined interface development process. The findings in this study may be beneficial for the future development of strategies to create easy-to-use ATM system interfaces for a variety of people with varying abilities and literacy levels and for other information technology systems that are user interface technology dependent

    Engaging Pictorial Images and Voice Prompts Interface Design Strategy to Create Easy to use banking ATM System Interfaces in Nigeria

    Get PDF
    The existing banking ATMs in Nigeria do not adequately cater for a variety of people with varying abilities and literacy levels despite the significant importance of ATM technological innovations in Nigeria, especially in the banking sectors. Illiterate and semiliterate Nigerians, representing about 40.33%, do not perceive the ATMs as useful or easy-to-use. The purpose of this case study was to identify strategies used by software developers of banking ATM systems in Nigeria to create easy-to-use banking ATM system interfaces in Nigeria. The technology acceptance model was adopted as the conceptual framework. One organization in Enugu, Nigeria was used for this study’s population. Data were collected through semi-structured, in-depth face-to-face interviews with nine banking ATM system interface developers and the analysis of 11 documents. Findings from the participants were validated through member checking. One major theme that emerged from data analysis was value of pictorial images and voice prompts in interface design, that encompass the use of: (a) pictorial images, and enhanced voice prompts with short transaction cycle, (b) voice feedback in users’ own language, (c) text-free user interface and extensive use of hand-drawn, and (d) graphics /imagery and voice as inputs. Strategies illustrated by the findings from this study may serve as a basis for positive economic development and social change in this area and may advance the use of other technology outlets that require easy-to-use system interfaces. Keywords: Banking ATM, pictorial images, Voice prompt, interface design, easy-to-use, ease of use, literacy levels. DOI: 10.7176/JIEA/8-1-0

    Security Issues with Mobile IT: A Narrative Review of Bring Your Own Device (BYOD).

    Get PDF
    The use of employee-owned mobile devices such as smart phones, tablets, laptops, etc., to access business enterprise content or networks otherwise referred to as of ‘Bring Your Own Device’ (BYOD) has further made the confidentiality, integrity, and availability of organizations’ data become insecure, and prone to breaches and fraudulent activities. In this study, the authors explored a narrative review that focuses on the theoretical underpinnings of vast works of literature that revealed significant information on the conceptual framework, existing systems that adopt BYOD security, analysis, and synthesis of prior research. Using some keywords “BYOD system security”, “BYOD security threats”, “cyber-attacks and security”, etc., an electronic database search extracted peer-reviewed articles from the last five years. The thematic analysis of fifty-one articles retrieved revealed that breaches and fraudulent activities exist with the use of BYOD that may be perpetrated against organization’s data, intentionally or maliciously. Good policies and guidelines on the use of BYOD coupled with good formulation and communication of same, should be adhered to avert some forms of security breaches. There is the need to preserve user’s privacy, organizations’ data confidentiality, integrity, and availability, and secure same in the devices of employees using their own devices to process corporate and personal data, by using acceptable and effective BYOD Policy and Mobile Device Management Solution (MDMS). This may increase mutual trust and BYOD adoption rate, new innovations and influence that can positively impact the organizations and their employees. Keyword: BYOD, security threats, password, cyber-attacks and security, Information security. DOI: 10.7176/JIEA/8-1-0

    Monitoring IT and Internet Usage of Employees for Sustainable Economic Development in Nigeria: Legal and Ethical Issues.

    Get PDF
    Globally, organization system resources: hardware, software, data, and communication lines and networks are now handled with better interconnected and interdependent facilities because internet connectivity is widely integrated into ambient or ubiquitous environments through intuitive interfaces or “smart” interactions. Organization enterprises are increasingly becoming competitive, with widespread cyberloafing and lawsuits. Through IT and Internet usage, employees may compromise an organization’s confidential information, deliberately or inadvertently. Such concerns prompt companies to introduce employee monitoring to preserve the integrity, availability, and confidentiality of system resources, track employee performance, avoid legal liability, protect trade secrets, and address security concerns. Despite these laudable benefits, employees feel that monitoring is an invasion of their privacy rights. For this study, organizational ethics and major ethical principles of respect for persons, beneficence, and justice representing the key ethical concerns for human subject protection in research were fully adopted as identified in The Belmont Report of 1979. In this study, the authors explored a narrative review, analysis, and synthesis of prior researches that focused on monitoring of employee IT and Internet usage. The authors also extracted peer-reviewed articles within the last five years from electronic databases, using some search keys such as “employee monitoring”, “legal and ethical issues”, “impact of employee monitoring on economic sustainability”, etc. The result of this study revealed that developing an acceptable monitoring policy will keep both employer and employee on the same page as to what is acceptable in the workplace along with what isn’t. This result may further explain the need for employee monitoring, address the legal and ethical issues involved when monitoring employees in a work environment, and provide strategies and practices for acceptable monitoring policy for improved organizational performance and sustainable economic development. Keywords: Employee Monitoring, Legal and Ethical Issues, IT and Internet Usage. Economic Sustainability. DOI: 10.7176/JIEA/9-5-03 Publication date: August 31st 201

    Sustainable Information and Communication Technology (ICT) for Sustainable Data Governance in Nigeria: A Narrative Review.

    Get PDF
    Recent developments in big data have heightened the need for Sustainable Data Governance (SDG). SDG is significant in realizing sustainable economic development in Nigeria. Information and Communication Technologies (ICTs) have made landmark innovational trends in empowering data governance globally. Despite these global impacts of ICT on data governance, numerous investigations have shown that poor sustainability of ICT in Nigeria poses barriers that impede progress related to data governance. SDG which is the pivot for economic growth has remained relatively nonexistence or unattended to due to corrupt policies and practices, ignorance, and illiteracy that plagued sustainable ICT innovations in Nigeria. For this study, the Unified Theory of Acceptance and Use of Technology (UTAUT) was adopted as the conceptual framework. UTAUT model claims that the benefits of using technology and the factors that drive users’ decision to use it, is what determines users’ acceptance behavior. In this study, the authors explored a narrative review, analysis, and synthesis of prior research that focused on the theoretical underpinnings of vast works of literature that revealed significant information on the impact of sustainable ICT on Sustainable Data Governance in Nigeria. The authors also extracted peer-reviewed articles within the last five years from electronic databases, using some keywords such as “ICT and SDG”, “ICT and national economic development”, “Trends for ICT”, etc. The result of this study revealed that strict adherence to policies, laws, and guidelines on the adoption of ICT coupled with good formulation and communication of same, are the major impact of sustainable ICT that can leverage SDG in Nigeria. The result from this study may increase understanding, minimize corrupt practices and encourage trust in ICT innovations, ICT adoption, its acceptance and sustainability that can positively impact SDG and national economic development in Nigerian. Keywords: ICT, Sustainable Data Governance, adoption, sustainability, Trends, Trust, corruption. DOI: 10.7176/JIEA/9-5-02 Publication date: August 31st 201

    Intellectual Property Rights: The Effects on Information Security and Research Innovations in Nigeria

    Get PDF
    The rise of new digital technologies and file-sharing networks has definitely made it harder for organizations to protect their intellectual property (IP).  This is made even harder by the fact that there is no uniformity in the enforcement of laws that are designed to protect against IP theft, especially in Nigeria. Nigeria is ranked among countries in Africa where Intellectual Property (IP) theft or piracy is prevalent. Technology required for the operation of Intellectual Property Rights (IPRs) in Nigeria is still largely undeveloped,out-dated, and non-sustainable despite the huge human resources and technological innovations.This study highlights the gaps created by the ineffectiveness of anti-counterfeiting and anti-piracy tactics to curb the challenges of IP and strategies to close them.  In this study, the authors explored a narrative review of prior research that focused on the theoretical underpinnings of vast works of literature that revealed significant information on IP challenges facing research and innovation for national development and strategies to close these gaps. The authors also extracted peer-reviewed articles within the last five years from electronic databases, using some keywords such as “intellectual property”, “IPRs”, “IP penalty and offences”, etc. Results show that IP regulations and policies are crippled by out-dated, non-sustainable or virtually non-existent policies, counterfeiting and anti-piracy system. Findings from this study may encourage proper implementation of IP: copyrights, trademarks, patents, and trade secrets for technological innovations and development in Nigeria. Keyword:Intellectual property copyrights. Trademarks, Trade secrets, Intellectual property, ICT sustainability\ DOI: 10.7176/ISDE/10-7-06 Publication date: October 31st 201

    Visual Symptoms Among Non-presbyopic Video Display Tterminal (VDT) Operators In Owerri, Nigeria

    No full text
    Visual symptoms appear to be themost frequent and most disturbing of computer associated health problems. This study was aimed at investigating the most prevalent visual symptoms encountered among Video Display Terminal (VDT) users in Owerri municipality prior to presbyopic onset. A total of one hundred and eighty-six (186) respondents, comprising 57 males and 129 females in the age bracket of 17-34years (mean age: 25.83±4.90years) were divided into two (2) groups: groupAcomprises of forty (40) non-VDT users and, group B comprises of one hundred and forty-six(146) VDT users. Each group was investigated, using pre-sampling criteria of visual acuity screening and ocular health assessment, before being handed a well-structured questionnaire, to be filled individually. Data consequently obtained revealed that headache (41.78%); eyestrain (26.72%), pain (31.51%) and lacrimation (19.86%) were the most prevalent visual symptoms among non-presbyopic, Owerri-based. VDT users.Acomparative one-tailed statistical analysis using the Z-test (0.05) revealed that VDT usage increases the prevalence of visual symptoms among users (P> 0.05). It was also revealed that Owerribased, non-presbyopic VDToperators are exposed to environmental risk factors hazardous to them while working. Consequently, this study suggests that intervention programs aimed at ameliorating these problems and the predisposing factors be introduced and sustained, to forestall the outbreak of a dangerous health problem due to VDT usage
    corecore