25 research outputs found

    An Adaptable Business Intelligence Model for Security Organizations

    Get PDF
    Business Intelligence (BI) shows prospect both in private and public sectors. It answers the questions of how things can be done and what result it holds. It was observed that most of the BI papers have centered on private sector with little or no attention to public sectors like security organizations. With security organizations representing the heart of any society, the need arises for a well-integrated model that could aid security personnel towards an effective security implementation of any society. The paper studied one of the existing and popularly used model in Information System and observed the need to integrate a feasibility study for an effective BI system in the security organization.In conclusion, the paper developed an adaptable model that could help security organizations create better decision system and provision of a data warehouse of information. Keywords: Business Intelligence, knowledge acquisition, Information and Communication Technology

    An Empirical Study on the Causes and Effects of Communication Breakdown in Marriages

    Get PDF
    The focus of this study was to find out the causes and effects of communication breakdown in marriages. 100 randomly selected married couples in Babcock University constituted the sample. The percentage frequency was used to compare the causes and effects of communication breakdown. The findings showed that most of the respondents agree to the statement that lack of effective communication is the bane to breakdown in marriage. Based on the findings of this study, it was recommended, that couples consider communication serious in their relationship starting with the courtship stage. Also, marriage counsellors and Clergies should ensure they stress the need for effective communication when counselling couples before and after marriage

    A Reformed Information Security Management System (R-ISMS)

    Get PDF
    An Information Security Management System (ISMS) specifies the instruments and methods that an administration/management level of an institution uses to comprehensibly manage the tasks and activities aimed at achieving information security. ISMS evolved as a systematic and structured approach to managing information following advances in IT infrastructure, services and applications so that they remain secure. While there are various implemented ISMS frameworks, researchers continually try to emphasize and increase human participation in ensuring information security. The aim of this research study is to develop an algorithm-based model to facilitate effective ISMS services for organizations. This algorithm-based ISMS model employed Information Technology General Controls (ITGC) technique as an expansion of the vistas of known ISMS frameworks, to improve information security control in organizations. The purpose of refinement is to make the frameworks more easily understood, implemented, and measured in organizations by stakeholders.Microsoft Office Visio 2010 software was used in designing the reformed model. Bactracking and Branch-and-bound algorithms were used in developing the model. The model utilises the above named methods to address the problem of inadequate management systems for information security. The results of this study showed that, with the level of usability, International Organization for Standardization (ISO) standards are more easily implemented and well recognized by stakeholders (top management, staff, suppliers, customers/clients, regulators) unlike the other security frameworks.  In conclusion, this study showed that R-ISMS is a customized algorithm model that assists organizations to enhance the ability in monitoring the performance of their activities, policies and procedures. Keywords:Information Security Management Systems (ISMSs), Reformed ISMS, International Organization for Standardization/International Electrotechnical Commission (ISO/IEC),  Backtracking / Branch-and-bound algorithms

    Information Systems and Its’ Abuse by Employees of Nigeria Bank

    Get PDF
    Information and Communication Technology (ICT) plays a vital role in every sector of life. Studies have shown that ICT usage in many sectors has been solely abused. This study investigates the abuse of information system in Nigerian Banks. Employees’ perception of abuse of information systems was sought using copies of a structured questionnaire. Findings show that unauthorized access of information or programs via a computer had the highest pick as abuse of information system, followed by unauthorized copying or altering of data or programs, then theft of telecommunications or computer equipment, and so on. In conclusion, it was observed that Unethical practices through the abuse of information system result in lesser productivity, decimation of corporate assets, non-compliance with privacy regulations, legal liabilities, network bandwidth and resources exposure. Thus, deploying comprehensive preventive procedures can help organisations guard against abuse of its information systems. Keywords: Abuse, Information systems, Nigerian banks and Ethics

    Overbusy Schedule in Family Wholeness: A Study of Selected Families

    Get PDF
    Research has shown that the use of home electronics can be of good or bad effect in the wholeness of the family. Intimacy gap as a result of these technologies have become a pressing issue in the togetherness of the family and this has resulted to broken homes and disorderliness in the family. The aim of this study was to look at the impact of home electronic devices in our families and the attendant effects. The method adopted for this research was a descriptive suvey involving the use of questionnaire and personal interviews. A sample size of 200 families picked at random were used durig this research work. The result showed that despite the good deed of home electronics, if there is no policy and co-operate usage in a family results to intimacy gap. In conclusion, It was observed that majority of individuals within the age bracket of  31-40 years with 10 years of marriage experience are getting more involved in marriages of these days. Some of the couples spend more time with the home electronic devices than their spouse and  this has a large tendency of resulting to intimacy and communication gap. Keywords:Family Wholeness, Intimacy gap, Overbusy Schedule, Communication gap and Technology

    A Review of Stroke Cases in a Military Hospital in Nigeria

    Get PDF
    BACKGROUND: CVA (Stroke) remains one of the most common neurological illnesses in the country, accounting for a greater percentage of morbidity and morality. Its increasing prevalence is a source of worry to most health personnel. OBJECTIVES: The aim of the study is to review the patient characteristic, risk factors, clinical features and prognostic factors among the patients with CVA who were admitted within the period under review; with a view to reinforcing measure to address this factor. METHOD: This is a retrospective study of all new patient managed for stroke in the medical ward of Military hospital, Port Harcourt from January 1, 2012 to October 31, 2012. RESULT: A total of 37 patients were admitted with stroke during the period under review. The males were 19 (51.3%) and females, 18 (48.7%). Hypertension (81.1%), Deranged lipid profile (45.9%) and diabetics (24.3%) were the commonest risk factors for stroke. HIV accounted for 10.8% of the patients, and it was also the risk factor in all the patients less than 50yrs. Sixteen (43.2%) patients had left hemparesis, 14(37.8%) right hemiparesis, while global was 7 (18.9%). A total of 7 deaths were recorded in the first 72hrs of admission. CONCLUSION: Stroke still contributes significantly to the increasing mortality and morbidity among patients admitted in our hospitals. Modifiable risk factors should be aggressively addressed to reduce the burden of stroke in our society. Keywords: Stroke, Military Hospital, Nigeria

    Proposed Multi-Mode Home Node-B Air Interface Protocol Stack Architecture

    Get PDF
    A Multi-mode Home NodeB (MHNB) is a system that can offer cellular service(s) to more than one different generation technology. The Universal Mobile Telecommunication System (UMTS) technology using NodeB as its transceiver station was developed to offer a high frequency range of 5MHz and because of this, the signal from the NodeB dilutes faster once reaching indoor. Studies showed that the idea of Home NodeB system by Third Generation Partnership Project (3GPP) came as a means to boost the diluted indoor signals. The challenge with this system is that it can only accommodate small number of subscribers as its Close Subscriber Group (CSG) without allowance for expansion. This study seeks to address the small capacity issue of the existing HNB by proposing a system that will accommodate wider capacity range and also, modify its operation from a single network mode to a Multi network mode technology. This will also offer great benefit to developing countries through extension of their GSM coverage and will also create a uniform platform for all cellular generation technologies. Keywords: Home NodeB, Multi-mode Home NodeB, Third Generation Partnership Project and Close Subscriber Group                                                                                                                        

    Femtocell Congestion Mitigation Technique using Poisson Point Process

    Get PDF
    The idea of femtocell technology came in order to boost the signal strength of indoor Universal Mobile Telecommunication System (UMTS) users. The number of subscribers a femtocell device can accommodate is closed from the manufactures’ end in order to check the capacity limit. The challenge with this form of technology is that only registered subscribers are permitted to gain access. This study seeks to enable flexibility in the control of its capacity limit by employing Poisson Point Process as a congestion control tool. The outcome of the study showed that the spatial Poisson Point Process can effectively be used to control the capacity limit of femtocell device, using co-channel interference technique. This will enable the device to operate as an open system while controlling the capacity limit. Keywords: Femtocell, Poisson Point Process, Cellular Network, Home Node

    Radio Listening Habits among University Students and Their Attitude towards Programmes (A Study of Redeemers University Students)

    Get PDF
    Radio plays a very significant role in the society and that cannot be overlooked. The main objective of this study was to conduct a survey on radio listening habits of university students and their attitude to programmes. Survey research method was used through questionnaires to find the listening habit and attitude students have towards radio. Students of Redeemers University were the sample size for this research work; a total number of 400 copies of questionnaire distributed to the students. From this research work, it was discovered that students have an easy access to radio in the campus, but they face difficulty while listening to radio on campus. The programming pattern adopted by radio stations influence students attitude to programmes. Keywords: Attitude, listening habits, Radio, students

    Idiopathic basal ganglia calcification (Fahr’s disease) in a 9-year-old Nigerian child

    Get PDF
    Fahr’s disease is a rare neurodegenerative disorder characterized by deposition of calcium on the walls of blood vessels of the Basal ganglia and Dentate nuclei of the Cerebellum. Patient can present with diverse array of symptoms including but not limited to seizure, extrapyramidal symptoms and mental retardation. We report a case of a 9-year-old female child with history of recurrent seizure. Brain CT showed symmetrical calcification in the basal ganglia
    corecore