28 research outputs found
Policy framework for adoption of bring your own device (BYOD) by institutions in Nigeria
Mobile computing makes access to data and services available anytime and anywhere. The recent increase in the number of mobile devices like smartphones and tablets has given rise to a phenomenon known as “IT Consumerization” that focuses on satisfying the needs of the consumers to improve their productivity for the benefit of their organization. Recent report from mobile trends indicates that in 2014 alone, manufacturers will ship more than a billion Android devices. It is estimated that seven out of every ten employees (7/10) will use their mobile devices for work in corporate environments. Mobile devices according to studies are known to be more vulnerable compared to laptops and PCs due to their small size, mobility and general lack of protection against viruses and malware. The use of these devices therefore can impact negatively on corporate networks unless properly and effectively managed. Organizations are now adopting a program known as „bring your own device‟ (BYOD) that will enable them capture, register, and manage the mobile devices that connect and use their corporate infrastructure to guarantee the security of the infrastructure and data of the organization. They achieve this by putting in place strategies and policies that involves all stakeholders. This paper surveys literature to extract useful information that serve to enlighten the community of workers and IT leaders on the current and rapid growing phenomenon of BYOD, including the strategies for deployment, BYOD models, benefits, security threats on corporate and user data and infrastructure. The study presents guidelines and a framework for adoption of BYOD by institutions of higher learning in Nigeria in order to improve learning and provide a better workplace. The study will enable IT leaders formulate policies and guidelines that will guarantee smooth adoption and usage of BYOD by their various organizations
An experimental comparison of Predicting customer data in Internet and Mobile Marketing
Currently, the Internet and Mobile technology platforms have gained a lot of popularity in the Nigerian context. Many businesses are seizing the opportunity provided by these platforms to market their goods and services in what is termed ‘e-marketing’. E-Marketing opportunities on these platforms include facebook marketing, twitter marketing, google marketing, whatsapp marketing, youtube marketing, marketing through personal blogs, sms marketing and email marketing, among others. Although these marketing avenues have been engaged by many businesses even with scarce financial resources, the result has been that of little or no corresponding effect on their profit margins. There is therefore the need to predict customer behaviour as regards these marketing avenues so that businesses can know which ones to engage for their marketing activities. This study is therefore aimed at understanding and predicting customer behaviour through correlation analysis and classification techniques in data mining respectively. The results obtained will enable the business community gain an understanding of customer behaviours and engagements on these platforms. Furthermore, the loss on marketing investments by businesses will be minimized leading to increase in business profit margins as businesses make target marketing through the stated channels efficiently
Development of Prepaid Electricity Payment System for a University Community Using the LUHN Algorithm
This work presents a University Community based electricity prepaid billing system. Generally in Nigeria, electricity customers face a lot of problems with respect to their electricity bills from the distribution companies. The challenges they face include wrongly calculated bills as a result inaccurate reading of meters, general human errors in bill preparation among others. In some other semi-automated systems in which prepaid meters are used, consumers waste much time in purchasing utility units for electricity. This is the case presently at the university community we are considered in this work. This paper presents the design and implementation of a combination of a web-based and SMS alert prepaid electricity system called for the community. The implementation of the system was done using C# programming language and Microsoft SQL Server as the database platform. The system incorporates the Luhn algorithm for generating pins for use on the simulated
prepaid meters. The system is able to run on the university intranet and can also serve as internet based application
The Impact of e-Democracy in Political Stability of Nigeria
The history of the Nigerian electoral process has been hitherto characterized by violence stemming from disputes
in election outcomes. For instance, violence erupted across some states in Northern Nigeria when results indicated that a
candidate who was popular in that part of the country was losing the election leading to avoidable loss of lives. Beside, this
dispute in election outcome lingers for a long time in litigation at the electoral tribunals which distracts effective governance.
However, the increasing penetrating use of ICTs in Nigeria is evident in the electoral processes with consequent shift in the
behavior of actors in the democratic processes, thus changing the ways Nigerians react to election outcomes. This paper
examines the trend in the use ICT in the Nigerian political system and its impact on the stability of the polity. It assesses the
role of ICT in recent electoral processes and compares its impact on the outcome of the process in lieu of previous
experiences in the Nigeria. Furthermore, the paper also examines the challenges and risks of implementing e-Democracy in
Nigeria and its relationship to the economy in the light of the socio-economic situation of the country. The paper adopted
qualitative approach in data gathering and analysis. From the findings, the paper observed that e-democracy is largely
dependent on the level of ICT adoption, which is still at its lowest ebb in the country. It recognizes the challenges in the
provision of ICT infrastructure and argues that appropriate low-cost infrastructure applicable to the Nigerian condition can
be made available to implement e-democracy and thus arouse the interest of the populace in governance, increase the
number of voters, and enhance transparency, probity and accountability, and participation in governance as well as help
stabilize the nascent democrac
Machine learning approach for identifying suspicious uniform resource locators (URLs) on Reddit social network
The applications and advantages of the Internet for real-time information sharing can never be over-emphasized. These great benefits are too numerous to mention but they are being seriously hampered and made vulnerable due to phishing that is ravaging cyberspace. This development is, undoubtedly, frustrating the efforts of the Global Cyber Alliance – an agency with a singular purpose of reducing cyber risk. Consequently, various researchers have attempted to proffer solutions to phishing. These solutions are considered inefficient and unreliable as evident in the conflicting claims by the authors. Against this backdrop, this work has attempted to find the best approach to solving the challenge of identifying suspicious uniform resource locators (URLs) on Reddit social networks. In an effort to handle this challenge, attempts have been made to address two major problems. The first is how can the suspicious URLs be identified on Reddit social networks with machine learning techniques? And the second is how can internet users be safeguarded from unreliable and fake URLs on the Reddit social network? This work adopted six machine learning algorithms – AdaBoost, Gradient Boost, Random Forest, Linear SVM, Decision Tree, and Naïve Bayes Classifier – for training using features obtained from Reddit social network and for additional processing. A total sum of 532,403 posts were analyzed. At the end of the analysis, only 87,083 posts were considered suitable for training the models. After the experimentation, the best performing algorithm was AdaBoost with an accuracy level of 95.5% and a precision of 97.57%.publishedVersio
AN INTRANET PORTAL FOR A LEARNING INSTITUTION
With the rise of Internet and telecommunication services in recent times, the communication needs of
human life have been enhanced progressively. From the earliest times, when communication between
people included word of mouth, society evolved from various stages of disseminating information. The
problem of insufficient communication and interaction is common in public schools among students
and lecturers because of dearth of communication technology. In some schools, communication
between faculty members and students are often low. Some students and teachers show resistance to
using electronic method of learning and teaching, as a result of several factors including illiteracy. The
objective of this study is to develop an intranet portal that handles communication and interaction for a
learning institution and also help students improve academically from their comfort zone and outside
the lecture hall. The tools engaged in developing this application include ASP.NET and C# as the
server side programming, and MySQL as the database. With this application, lecturers and students
are able to interact better. The system serves as a medium on which information is communicated and
shared. The benefit of using the developed system for effective communication is that it keeps
members of the institution regularly updated with current information on happenings and events in the
institution. The application will also facilitate collaboration among learners
Measurements of radioactivity levels in part of Ota Southwestern Nigeria: Implications for radiological hazards indices and excess lifetime cancer-risks
Super SPEC RS-125 radiation detector with large 2.0 x 2.0 NaI crystal and linear
energy ranging from 0.80 MeV to 1.2 MeV was used to measure the activities of primordial
nuclides and the radiation dose exposures rate in Iyana-Iyesi, Ota, southwestern Nigeria. The
measured activities vary from 17±0.02 Bqkg-1 to 30.49 ±0.01 Bqkg-1, 50.01 ±0.16 Bqkg-1 to
158.49±0.17 Bqkg-1, and 406.9±0.42 Bqkg-1 to 1275.48±0.82 Bqkg-1 for 238U, 232Th and 40K
respectively. The acquired gamma radiation dose rate range from 138.696 ±2.06 (nGyh-1) to
350.103±7.21 (nGyh-1) with mean value of 148.22 (nGyh-1), almost three times higher than the
recommended safe limit of 55 (nGyh-1). The measured activities and radiation dose rate were
engaged to estimate the annual outdoor effective dose, gamma index, excess lifetime cancer
risks and annual gonadal dose equivalent. It was observed from all the estimated parameters,
those values in the study area are well above the recommended safe limit for normal
background radiation. This suggest that the dwellers and those using the excavated
geomaterials from this area for construction purposes are exposed to very high radiation from
natural radionuclides. Further research to evaluate the mineralogy and geochemistry of the clay
deposits in the area is highly recommende
Approaches for Classifying the Peace-War Orientations of Global News Organizations’ Social Media Posts
The study used the existing conceptualizations of peace and war journalism to
create supervised machine learning text classifiers trained and tested to
identify the war or peace orientations of news stories posted on social media.
Peace-oriented journalists promote peace initiatives, ignore differences, and
promote conflict resolution. In contrast, war-oriented journalists promote
differences between opposing parties and instigate violence as means to
resolving conflicts. Using Naïve Bayes, Logistic Regression, Decision Trees,
Random Forests, and Support Vector Machines (SVM), the study trained and
tested five computational models to detect the peace or war orientations of
the news posted on social media. The results indicate that Random Forest has
the highest predictive accuracy for predicting war or peace orientations of
online news stories. Naïve Bayes ranked the least accurate algorithm for
predicting peace or war orientations of online news stories
Predicting Customer Behavior with Combination of Structured and Unstructured Data
Presently, there are numerous e-marketing and m-marketing mediums that exist such as
YouTube, SMS, What Sapp, Google, twitter, yahoo, Facebook, LinkedIn, email and personal blogs.
These mediums are beginning to be used for marketing purposes, particularly by the SMEs in Nigeria.
The aim of this research is to address the problem of deciding which of the mediums mentioned above
is mostly appropriate to target customer of a particular SME and also to discover the type of data that
is most appropriate for analysis in making this decision. In order to achieve this, data was gathered by
administering questionnaires and pre-processed based on structured and unstructured data sources.
The J48 decision tree classification algorithm was used to mine the data, relevant predictions were
made from the structured and unstructured data and the results were evaluated. The results revealed
that predicting from unstructured data expresses more of popular opinion, so decision can start from
unstructured results and be fined tuned or validated with predicting from structured data. Though
structured prediction appears to be better than unstructured, unstructured prediction is still very
valuable in situations where there are no structured data such as analysing text messages. Also,
Models developed for predicting customer behaviour as regards the marketing channels studied, will
form the foundation for marketing decision making, in small and medium businesses in Nigeri
A comparative study of e-Government successful implementation between Nigeria and Republic of Korea
Many countries in the world have now realized the relevance of adopting e-Government as a medium for providing effective and citizen-centered services. Developing countries like Nigeria have adopted e-government and are taking yet another step at improving their ranking in the United Nations (UN) e-Government Survey carried out bi-annually. The Federal Government of Nigeria in February, 2014 contracted the Korea International Cooperation Agency (KOICA) to evolve an e-Government master plan that will ensure total compliance with e-government practices worldwide. This paper investigates the e-government position in Nigeria and compares it with that of South Korea. The study is used the e-Government survey reports carried out by the UN for the period covering 2008 to 2014. The results present lessons learnt from South Korea and the measures Nigeria needs to put in place in order to improve her ranking in the periodic review