2 research outputs found

    Development of an Enhanced Agility Assessment Model for Legacy Information System

    Get PDF
    Deciding the moment to end the lifecycle of an information system are often not exhaustively studied. It is essential for an organisation to know when to end the life cycle of their legacy information system when it is no longer able to perform and comply with the changes the organization desires. Prolonging the length of an information system lifecycle could lead to a reduction in software cost. Most of the various metrics presented in literatures on agility measurement, such as Cost, Time, Robustness and Scope of changes (CTRS) and Simplicity, Speed and Scope of changes (3S) and the researchers evaluation methods, e.g., Hierarchy Process (AHP) and Fuzzy Mathematics Analytic are qualitative and usually need to be evaluated by domain experts subjectively. This study therefore developed an enhanced agility assessment model to measure legacy information system quantitatively with the agility factors: Speed, Robustness and Complexity in an educational institution. The adoption of a quantitative metrics methodology will lead to an accurate measurement of the student information system. A stand-alone online assessment system based on agility factors and satisfying the maximum metrics benchmark requirements was used for the model implementation. The results were: Complexity of the largest module=96, Robustness=547.5 hours and Speed 0.5 minutes. The complexity of the module that exceeded 20 can be fixed by reducing the control constructs of the source code modules into submodules, with each not greater than 20. The results obtained indicated that the student information system was still agile. Thus, management should continue with the system.    &nbsp

    Combating Cybercrime Perpetrated Via Social Media Channels Using Individual Resilience Techniques

    Get PDF
    Cybercrime is a social vice associated with modern society due to the rapid development of technology. Various studies over the years have shown that there is no society without an element of cybercrime. Cybercrime also has negative economic implications for nations and businesses globally. Over the years, several approaches have been employed to reduce the rate of cybercrime by employing various combating techniques. Hence, this study explores individual resilience techniques used in combating cybercrime perpetrated via social media channels in Abuja. Three goals and research agendas were developed to guide the research toward achieving the stated goal: a review of relevant literature, a qualitative and quantitative survey design involving about seven million, one hundred and ten thousand internet subscribers that use social media in Abuja, and a sample size of four hundred respondents from the study area were selected using the Taro Yamane purposive sampling technique. The respondents’ data were collected using a twelve-item structured questionnaire. Completed instruments of the sample size were analysed using mean values and standard deviations designed using Google Forms. The results showed that identity theft, cyberstalking, malware attacks, and cyber-casing are major cybercrimes perpetrated online by cyber attackers, and these attacks have led to harassment, child exploitation, digital piracy, and intentional damage to individuals’ online reputations. However, anti-malware, outlier detection, password managers, and multi-factor authentication (MFA) are various individual resilience techniques social media users can employ to combat cybercrime on social media. Creating more awareness of cybercrime and the various individual resilience techniques required in protecting social media accounts on web-enabled devices and setting up a special task force void of bias to help cybercrime victims regain their assets were recommended
    corecore