12 research outputs found

    Using Data Analytics to Derive Business Intelligence: A Case Study

    Full text link
    The data revolution experienced in recent times has thrown up new challenges and opportunities for businesses of all sizes in diverse industries. Big data analytics is already at the forefront of innovations to help make meaningful business decisions from the abundance of raw data available today. Business intelligence and analytics has become a huge trend in todays IT world as companies of all sizes are looking to improve their business processes and scale up using data driven solutions. This paper aims to demonstrate the data analytical process of deriving business intelligence via the historical data of a fictional bike share company seeking to find innovative ways to convert their casual riders to annual paying registered members. The dataset used is freely available as Chicago Divvy Bicycle Sharing Data on Kaggle. The authors used the RTidyverse library in RStudio to analyse the data and followed the six data analysis steps of ask, prepare, process, analyse, share, and act to recommend some actionable approaches the company could adopt to convert casual riders to paying annual members. The findings from this research serve as a valuable case example, of a real world deployment of BIA technologies in the industry, and a demonstration of the data analysis cycle for data practitioners, researchers, and other potential users

    Password-Based Authentication and The Experiences of End Users

    Full text link
    Passwords are used majorly for end-user authentication in information and communication technology (ICT) systems due to its perceived ease of use. The use for end-user authentication extends through mobile, computers and network-based products and services. But with the attendant issues relating to password hacks, leakages, and theft largely due to weak, reuse and poor password habits of end-users, the call for passwordless authentication as alternative intensifies. All the same, there are missing knowledge of whether these password-based experiences are associated with societal economic status, educational qualification of citizens, their age and gender, technological advancements, and depth of penetration. In line with the above, understanding the experience of end-users in developing economy to ascertain their password-based experience has become of interest to the researchers. This paper aims at measuring the experience of staff and students in University communities within southeastern Nigeria on password-based authentication systems. These communities have population whose age brackets are majorly within the ages of 16 and 60 years; have people with requisite educational qualifications ranging from Diploma to Doctorate degrees and constitutes good number of ICT tools consumers. The survey had 291 respondents, and collected data about age, educational qualifications, and gender from these respondents. It also collected information about their password experience in social media network, online shopping, electronic health care services, and internet banking. Our analysis using SPSS and report by means of descriptive statistics, frequency distribution, and Chi-Square tests showed that account compromise in the geographical area is not common with the respondents reporting good experience with passwords usage.Comment: 31 pages, 15 tables, 2 figure

    Mining Twitter Data for Business Intelligence Using Naive Bayes Algorithm for Sentiment Analysis

    No full text
    Today social media has grown to be a big player in the way businesses and organizations operate, especially with the coronavirus pandemic increasing the online footprint of organizations. The use of data from social media to drive business intelligence is now of growing interest to both researchers and business owners. Business owners can now utilize platforms like Twitter to learn about their target audience and improve their business processes to meet their growing needs. Twitter makes it easy to see what is going or about to go viral and vital details like why it is going viral and the players behind it. This research aims to help business owners’ especially small and medium enterprises and start-ups gain a competitive advantage in their industry by using the "crowd wisdom" opportunity via social media. The proposed system is based on Twitter and crawls the platform for relevant data, including; locations, trends, and important actors (influencers) within a specified field; the system cleans the data and presents the information in an actionable format. Python was used for Twitter data mining, and sentiment analysis of the tweets was done using Naive Bayes classifiers

    Password-based authentication and the experiences of end users

    No full text
    Passwords are used majorly for end-user authentication in information and communication technology (ICT) systems due to its perceived ease of use. The use for end-user authentication extends through mobile, computers and network-based products and services. But with the attendant issues relating to password hacks, leakages, and theft largely due to weak, reuse and poor password habits of end-users, the call for passwordless authentication as alternative intensifies. All the same, there are missing knowledge of whether these password-based experiences are associated with societal economic status, educational qualification of citizens, their age and gender, technological advancements, and depth of penetration. In line with the above, understanding the experience of end-users in developing economy to ascertain their password-based experience has become of interest to the researchers. This paper aims at measuring the experience of staff and students in University communities within southeastern Nigeria on password-based authentication systems. These communities have population whose age brackets are majorly within the ages of 16 and 60 years; have people with requisite educational qualifications ranging from Diploma to Doctorate degrees and constitutes good number of ICT tools consumers. The survey had 291 respondents, and collected data about age, educational qualifications, and gender from these respondents. It also collected information about their password experience in social media network, online shopping, electronic health care services, and internet banking. Our analysis using SPSS and report by means of descriptive statistics, frequency distribution, and Chi-Square tests showed that account compromise in the geographical area is not common with the respondents reporting good experience with passwords usage. Furthermore, this experience is not in any way related to their age (under 60), and educational qualification. Our experiment did not measure the entropy of end-users' passwords, their password hygiene culture and so cannot relate this experience with the strengths of their passwords nor that of their password hygiene culture. The outcome and recommendations of this research will help inform policy and research direction towards password hygiene culture, management, and the potentials or otherwise of passwordless authentication systems in developing economies

    Optimizing the Sustainability of Renewable Energy: A Review on the Impart of Internet of Things

    No full text
    The problems of energy usage wastage, conservation and optimization has always been there. Most significantly in third world countries with a high level of improper energy resource management. The world has become a global village and tending toward the transformational use of technology assets and materials to optimize the usage of renewable energy; in this case the Internet of things. Renewable Energy are actually energy source that are continually replenished naturally by nature. The internet of things are interconnected system through which hardware system device are given instruction for instance to reduce energy wastage; the potential for further reduction of fossil fuel usage and wasted energy is become cosmic. Optimization here is the appropriate management of the energy generated by energy sources through use of internet of things. The modern technology such as the internet of things is to help harness and improve in management by switching between renewable energy sources alongside the enhancement in making effective energy source at given time and energy consuming device

    Advancement in E Recruitment Towards Expert Recruitment System (ERS)

    No full text
    The inspiration drawn from e-recruitment is in making the process to become more creative, formidable and as well to be cost effective. We are desirous of achieving a lot more attraction than it is currently in order to sustain the process. Before now, we have some existing systems which were traditional methods like employment agencies, doing adverts through the print media. This process was relatively very slow and stressful. In this work, we have developed a remolded ERS based on our former work to hire applicants by accepting applications online and conduction Test and interview through the expert systems knowledge base until the candidate is eventually hired. The expert system is of a recruitment process model where applicants don’t actually have direct interaction with the employers but with the expert system that makes decision. The system provides response to applicant request and also provides procedure for recruitment from start to finishing stage, when the job seeker is now called successful employee. We implored Water fall model in our design. In this model, each stage essentially completes before the next phase can activate so that there will be no overlapping in the phases

    Online Vehicle Recovery Tracking System

    No full text
    In today’s world, Vehicle recovery system are very essential in monitoring and stolen vehicles.  Vehicle Recovery  system is a work which aims in developing a computerized system to provide a better and a more efficient system for owners of registered vehicles to easily get back their stolen vehicles once they are found and also recordkeeping of vehicles. This work seeks to develop a software that facilitate vehicle information, registration of vehicle through which the admin can track and found the stolen vehicle. This system is developed to help the vehicle management to maintain the vehicle registration licensing in the best way possible thereby reducing stress and manual efforts. The system was implemented using PHP scripting language, HTML, MySQL Server, and Macromedia Dreamweaver
    corecore