This document summarizes a study that evaluated compliance with mobile phone usage restrictions in selected public places in Akure, Nigeria. Questionnaires were administered at examination halls, banks, and correctional facilities to assess restriction compliance, attitudes, and phone user perceptions. Analysis found the highest restriction violation in examination halls. While public place managers were encouraging of restrictions, users were not in favor. A proactive method is needed to curb unauthorized mobile phone use.
Adam Mtaho & Fredrick Ishengoma - Factors Affecting QoS in Tanzania Cellular ...Fredrick Ishengoma
Quality of service (QoS) in cellular communication system is a topic that recently has raised much interest for many researchers. This paper presents the findings obtained from the study on factors affecting QoS in Tanzania cellular networks. The study was carried out in Dodoma Municipal, Tanzania. The study employed cross-sectional research design. Information was gathered from structured questionnaire of 240 subscribers during the study of quality of service for the four leading cellular networks in Tanzania (Vodacom, Airtel, Tigo and Zantel). Both qualitative and quantitative data from field survey were collected and analyzed using Statistical Package for Social Sciences (SPSS-version 11) and Excel software. The study findings show that the major factors that degrade QoS in Tanzania cellular networks are inadequate network infrastructure, lack of fairness from service providers and little efforts taken by the government in enforcing the national agreed standards. Other factors are lack of reliable end-to-end systems, geographical terrain, low quality handsets, poor government monitoring on standards and lack of subscriber’s skills and training.
This paper studies the issue the information security for smartphone users in Russia. The report analyses the regulations the state uses to prevent undeclared functionality and malicious programs in mobile phones in Russia; the law enforcement practice in this area; the responsibility of legal entities, officials and persons for non-compliance with the requirements for standardization, ensuring information security and violation of declaration of conformity. The paper develops proposals to improve state regulation of undeclared functionality of mobile devices providing the collection of information, including confidential data. The report discusses specific ethical issues related to privacy, including matters relating to compensation for damage resulting from the leakage of personal information and develops proposals for legal ensuring the information security of mobile phone users. The report first outlines the main actors, terms and concepts used in the report. Second the standards for mobile phone developers, although there is no guarantee of complete information security. In this case, the peculiarity of Russia is that standards used in the field of information security are voluntary. Third how law enforcement agencies protect the user community. In this case there is a potential danger that this may entail uncontrolled access of government agencies to confidential data.
An Examination of the Prior Use of E-Learning Within an Extended Technology A...Maurice Dawson
The purpose of this empirical study was to test specific factors of behavioral intention to use m-learning in a community college setting using a modified technology acceptance model and antecedent factors suggested by the researcher’s review of the literature. In addition, the study’s purpose was to expand understanding of behavioral intention to use m-learning and to contribute to the growing body of research. This research model was based on relevant technology acceptance literature. The study examines the significance of “prior use of e-learning” and correlation with the behavioral intention to use m-learning. Existing models have looked at prior use of e-learning in other domains, but not specifically m-learning. Other models and studies have primarily looked at the prior use of e-learning variable as a moderating variable and not one that is directly related to attitude and behavioral intention. The study found that there is a relationship between prior use of e-learning and behavioral intention to use m-learning. This research direction was proposed by Lu and Viehland.
Use of information Systems in Yemeni Universities Future Vision EECJOURNAL
This research examines the use of computed information systems in Yemeni universities through the use of intermediate variable technology to test the indirect impact of the information systems structure on the relationship between information technology, and the final performance in the computed information systems in Yemeni universities. The applied situation was exemplified by the selection of four universities where the data on the study were collected through special friendly questionnaire, and the number of respondent (224) persons had been used. Many statistical means, percentages, arithmetic mean, standard deviation, and intermediate deviation have been used for the description of the study sample, and for the study variables, as for hypothesis testing, the intermediate variant method was used and the end result was to prove that there was a relationship An incomplete mediation attributed to the structure of information systems that has an indirect impact on the resulting relationship between information technology and the final performance of information systems.
Adam Mtaho & Fredrick Ishengoma - Factors Affecting QoS in Tanzania Cellular ...Fredrick Ishengoma
Quality of service (QoS) in cellular communication system is a topic that recently has raised much interest for many researchers. This paper presents the findings obtained from the study on factors affecting QoS in Tanzania cellular networks. The study was carried out in Dodoma Municipal, Tanzania. The study employed cross-sectional research design. Information was gathered from structured questionnaire of 240 subscribers during the study of quality of service for the four leading cellular networks in Tanzania (Vodacom, Airtel, Tigo and Zantel). Both qualitative and quantitative data from field survey were collected and analyzed using Statistical Package for Social Sciences (SPSS-version 11) and Excel software. The study findings show that the major factors that degrade QoS in Tanzania cellular networks are inadequate network infrastructure, lack of fairness from service providers and little efforts taken by the government in enforcing the national agreed standards. Other factors are lack of reliable end-to-end systems, geographical terrain, low quality handsets, poor government monitoring on standards and lack of subscriber’s skills and training.
This paper studies the issue the information security for smartphone users in Russia. The report analyses the regulations the state uses to prevent undeclared functionality and malicious programs in mobile phones in Russia; the law enforcement practice in this area; the responsibility of legal entities, officials and persons for non-compliance with the requirements for standardization, ensuring information security and violation of declaration of conformity. The paper develops proposals to improve state regulation of undeclared functionality of mobile devices providing the collection of information, including confidential data. The report discusses specific ethical issues related to privacy, including matters relating to compensation for damage resulting from the leakage of personal information and develops proposals for legal ensuring the information security of mobile phone users. The report first outlines the main actors, terms and concepts used in the report. Second the standards for mobile phone developers, although there is no guarantee of complete information security. In this case, the peculiarity of Russia is that standards used in the field of information security are voluntary. Third how law enforcement agencies protect the user community. In this case there is a potential danger that this may entail uncontrolled access of government agencies to confidential data.
An Examination of the Prior Use of E-Learning Within an Extended Technology A...Maurice Dawson
The purpose of this empirical study was to test specific factors of behavioral intention to use m-learning in a community college setting using a modified technology acceptance model and antecedent factors suggested by the researcher’s review of the literature. In addition, the study’s purpose was to expand understanding of behavioral intention to use m-learning and to contribute to the growing body of research. This research model was based on relevant technology acceptance literature. The study examines the significance of “prior use of e-learning” and correlation with the behavioral intention to use m-learning. Existing models have looked at prior use of e-learning in other domains, but not specifically m-learning. Other models and studies have primarily looked at the prior use of e-learning variable as a moderating variable and not one that is directly related to attitude and behavioral intention. The study found that there is a relationship between prior use of e-learning and behavioral intention to use m-learning. This research direction was proposed by Lu and Viehland.
Use of information Systems in Yemeni Universities Future Vision EECJOURNAL
This research examines the use of computed information systems in Yemeni universities through the use of intermediate variable technology to test the indirect impact of the information systems structure on the relationship between information technology, and the final performance in the computed information systems in Yemeni universities. The applied situation was exemplified by the selection of four universities where the data on the study were collected through special friendly questionnaire, and the number of respondent (224) persons had been used. Many statistical means, percentages, arithmetic mean, standard deviation, and intermediate deviation have been used for the description of the study sample, and for the study variables, as for hypothesis testing, the intermediate variant method was used and the end result was to prove that there was a relationship An incomplete mediation attributed to the structure of information systems that has an indirect impact on the resulting relationship between information technology and the final performance of information systems.
Application of ICT and Electronic Technology in Election Management: Challeng...IJAEMSJORNAL
This paper has presented the applications of Information Communication Technology and election management. The study has reviewed several challenges and bottleneck encountered in the electoral democratic system in Nigeria election. During the study, the use of electronic technology adoption in the electoral process has actually reduced human involvement in election process; this is due to irregularities and incessant increase in violence among electorates, party agents and other stakeholders. The relevance of this paper is to address the integration of ICT as well as electronic digital devices in carryout electrons in Nigeria. The research was conducted in the rural areas of the South-Eastern Nigeria States, it was discovered that about 60% of the respondent stated that the use of electronic technology in the deployment to rural areas has inadequate trained personnel in effective handling of the gadgets, issues on the use of card reader malfunctioning was also sported out. It was recommended that the electoral bodies should sensitized, make adequate available of electronic devices for efficient and effective election management in Nigeria.
Master Thesis Proposal: Business Models for Mobile-broadband Media Services –...Laili Aidi
This thesis intends to systematically research the suitable business model options for mobile-broadband media services, which specifically focuses to Indonesia’s telecom market, as one of the world largest emerging economy.
Measuring ICT Access and Use by Households and IndividualsWael Kassem
The Lebanese government through OMSAR and with the support of the UNDP developed between 2003 and 2005 a National ICT Strategy that aims to “Establish Lebanon as the main hub for e-services, creativity and innovation, telecom and internet services” To support the implementation of this initiative, the Lebanese Presidency of the Council of Ministers established the National ICT Strategy Coordination, Office in July 2010, as the body responsible for designing and managing the implementation mechanism for the National ICT Strategy. One of the priority projects of The National ICT Strategy Coordination Office is the collection of ICT statistics recognized internationally and used to place Lebanon in the various international indexes.
Holding the Line: Customer Perceptions of Interactive Voice Response SystemsInteractions Corporation
The attached study looks at customer perceptions of IVRs and other various methods of customer service. The following are its key findings:
• While new technological platforms such as social media and tablet computing are by now familiar to consumers, the telephone remains the preferred method for customer service.
• Most customers still prefer speaking with live customer service representatives, although an overwhelming majority are convinced that CSRs are either failing to get better or are getting worse.
• Customers expect automated telephone service systems to improve, and are inclined to punish companies for failing to comply.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Internet Access Using Ethernet over PDH Technology for Remote AreaRadita Apriana
There was still is gap among people living in city and in remote area to get information access,
especially who lived in the Eastern part of Indonesia. People living in such remote area usually were
isolated from town by natural condition like rivers, valleys, hills and so on. Therefore, telecommunication
infrastructure for remote area using cooper was not effective and efficient way to build. The issue was how
information and communication technology could penetrate such areas. This research aimed to propose
technology that could be implemented to overcome the difficulties. Ethernet over Plesiochronous Digital
Hierarchy (EoPDH) was one of many techniques that provided Ethernet connectivity over non-Ethernet
networks. EoPDH was a standardized methodology for transporting native Ethernet frames over the
existing established PDH transport technology. To provide last milefor the local people, use of Mesh
Wireless Local Area Network was made and connected to internet gateway via Ethernet over PDH based
microwave radio link. The test showed that The Ethernet frames were successfully transported to remote
area with good quality of service such as throughput, response time, and transaction rate.
The impact of e politician on the adoption of e-service perceptions from a sa...ijmpict
The purpose of this study is to establish whether the use of information technology (IT) by elected
municipal representatives, for constituency work, emboldens the adoption of e-service in municipals of a
developing country. The research data was obtained through the completion of a questionnaire by a
sample of respondents who serve as authorities of IT in South African municipals. The findings from both
descriptive and inferential data analysis of collected data confirm that the use of IT by elected municipal
representatives for constituency work impacts the adoption of e-service in municipals. Furthermore, the
use of IT by elected municipal representatives for constituency work correlated with both e-service laws
and e-service security. This study contributes to a better understanding of choices needed when planning
for the adoption of e-service initiatives in municipals of developing countries. Given that 87.2% of
respondents are aware of a high access to telephone mobile, a further research is needed to clarify why
most elected municipal representatives of a developing country choose not to exploit IT for their
constituency work, and similarly why municipals of a developing country do not exploit IT to provide
services.
The myth said that youths arent loyal to any network provider, it has also been said that they're keen to better price offer and advertizing. Find the answer right here.
The adoption and challenges of electronic voting technologies within the sout...IJMIT JOURNAL
Literature has shown that countries such as Brazil and India have successfully implemented electronic
voting systems and other countries are at various piloting stages to address many challenges associated
with manual paper based system such ascosts of physical ballot paper and other overheads, electoral
delays, distribution of electoral materials, and general lack of confidence in the electoral process. It is in
this context that this study explores how South African can leverage the opportunities that e-voting
presents. Manual voting is often tedious, non-secure, and time-consuming, which leads us to think about
using electronic facilities to make the process more efficient. This study proposes that the adoption of
electronic voting technologies could perhaps mitigate some of these issues and challengesin the process
improving the electoral process. The study used an on-line questionnaire which was administered to a
broader group of voters and an in-depth semi-structured interview with the Independent Electoral
Commission officials. The analysis is based on thematic analysis and diffusion of innovations theory is
adopted as a theoretical lens of analysis. The findings reveal that relative advantage, compatibility and
complexity would determine the intentions of South African voters and the Electoral Management Bodies
(IEC) to adopt e-voting technologies. Moreover, the findings also reveal several other factorsthat could
influence the adoption process. The study is limited to only voters in Cape Town and these voters were
expected to have some access to the internet. The sample size limits the generalizability of the findings of
this study.
University Mobile Enrollment System: A Nigeria Perspectiveiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Most Cited Articles in Academia - International Journal of Computer Science a...IJCSES Journal
The AIRCC's International Journal of Computer Science and Engineering Survey (IJCSES) is devoted to fields of Computer Science and Engineering surveys, tutorials and overviews. The IJCSES is a peer-reviewed, open access scientific journal published in electronic form as well as print form. The journal will publish research surveys, tutorials and expository overviews in computer science and engineering. Articles from supplementary fields are welcome, as long as they are relevant to computer science and engineering
Sentiment analysis of comments in social media IJECEIAES
Social media platforms are witnessing a significant growth in both size and purpose. One specific aspect of social media platforms is sentiment analysis, by which insights into the emotions and feelings of a person can be inferred from their posted text. Research related to sentiment analysis is acquiring substantial interest as it is a promising filed that can improve user experience and provide countless personalized services. Twitter is one of the most popular social media platforms, it has users from different regions with a variety of cultures and languages. It can thus provide valuable information for a diverse and large amount of data to be used to improve decision making. In this paper, the sentiment orientation of the textual features and emoji-based components is studied targeting “Tweets” and comments posted in Arabic on Twitter, during the 2018 world cup event. This study also measures the significance of analyzing texts including or excluding emojis. The data is obtained from thousands of extracted tweets, to find the results of sentiment analysis for texts and emojis separately. Results show that emojis support the sentiment orientation of the texts and those texts or emojis cannot separately provide reliable information as they complement each other to give the intended meaning.
Design and Implementation Security Model for Sudanese E-governmentEditor IJCATR
Security is one of the most important issues in E-government projects. E-government applications will be increasingly used
by the citizens of many countries to access a set of services. Currently, the use of the E-government applications arises many
challenges; one of these challenges is the security issues. E-government applications security is a very important characteristic that
should be taken into account. This paper makes an analysis over the security as required for E-government and specify the risks and
challenges that faces E-government projects in Sudan. Finally, the study has proposed security model for Sudanese E-government. The
proposed security model for the Sudanese electronic government is a four layers' model that is divided into sub layers. Each layer will
mitigate group of threats related to an e-services. The model is not generic; it cannot be applied by other countries. It is precisely
designed for Sudanese situation
An Investigation into the Impact of the Electronic Taxation System: A Case St...BIJFMCF Journal
The Namibian government has benefited to date from information technology in many ways. The current research attempts to investigate the impact of electronic taxation systems, how well it is used, understood and utilized in developing countries. The importance of understanding and influencing Namibian citizens’ acknowledgement of E-Government services is key, given the substantial investment in government communication, information system technology and the potential for cost saving. One of the most successful E-Government initiatives, the electronic filing system (e-Filing), allows tax returns to be filed electronically. Despite many taxpayers adopting this method, a large number are still using the traditional manual method of filing tax returns. A descriptive research approach, namely the Quantitative method was used to evaluate the impact of electronic taxation systems. This study utilized the decomposed theory of planned behavior with factors adjusted specifically for Namibia as a developing country to identify the possible determinants of user acceptance of the e-Filing system among taxpayers. This exploratory study was conducted by means of a questionnaire survey.
Application of ICT and Electronic Technology in Election Management: Challeng...IJAEMSJORNAL
This paper has presented the applications of Information Communication Technology and election management. The study has reviewed several challenges and bottleneck encountered in the electoral democratic system in Nigeria election. During the study, the use of electronic technology adoption in the electoral process has actually reduced human involvement in election process; this is due to irregularities and incessant increase in violence among electorates, party agents and other stakeholders. The relevance of this paper is to address the integration of ICT as well as electronic digital devices in carryout electrons in Nigeria. The research was conducted in the rural areas of the South-Eastern Nigeria States, it was discovered that about 60% of the respondent stated that the use of electronic technology in the deployment to rural areas has inadequate trained personnel in effective handling of the gadgets, issues on the use of card reader malfunctioning was also sported out. It was recommended that the electoral bodies should sensitized, make adequate available of electronic devices for efficient and effective election management in Nigeria.
Master Thesis Proposal: Business Models for Mobile-broadband Media Services –...Laili Aidi
This thesis intends to systematically research the suitable business model options for mobile-broadband media services, which specifically focuses to Indonesia’s telecom market, as one of the world largest emerging economy.
Measuring ICT Access and Use by Households and IndividualsWael Kassem
The Lebanese government through OMSAR and with the support of the UNDP developed between 2003 and 2005 a National ICT Strategy that aims to “Establish Lebanon as the main hub for e-services, creativity and innovation, telecom and internet services” To support the implementation of this initiative, the Lebanese Presidency of the Council of Ministers established the National ICT Strategy Coordination, Office in July 2010, as the body responsible for designing and managing the implementation mechanism for the National ICT Strategy. One of the priority projects of The National ICT Strategy Coordination Office is the collection of ICT statistics recognized internationally and used to place Lebanon in the various international indexes.
Holding the Line: Customer Perceptions of Interactive Voice Response SystemsInteractions Corporation
The attached study looks at customer perceptions of IVRs and other various methods of customer service. The following are its key findings:
• While new technological platforms such as social media and tablet computing are by now familiar to consumers, the telephone remains the preferred method for customer service.
• Most customers still prefer speaking with live customer service representatives, although an overwhelming majority are convinced that CSRs are either failing to get better or are getting worse.
• Customers expect automated telephone service systems to improve, and are inclined to punish companies for failing to comply.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Internet Access Using Ethernet over PDH Technology for Remote AreaRadita Apriana
There was still is gap among people living in city and in remote area to get information access,
especially who lived in the Eastern part of Indonesia. People living in such remote area usually were
isolated from town by natural condition like rivers, valleys, hills and so on. Therefore, telecommunication
infrastructure for remote area using cooper was not effective and efficient way to build. The issue was how
information and communication technology could penetrate such areas. This research aimed to propose
technology that could be implemented to overcome the difficulties. Ethernet over Plesiochronous Digital
Hierarchy (EoPDH) was one of many techniques that provided Ethernet connectivity over non-Ethernet
networks. EoPDH was a standardized methodology for transporting native Ethernet frames over the
existing established PDH transport technology. To provide last milefor the local people, use of Mesh
Wireless Local Area Network was made and connected to internet gateway via Ethernet over PDH based
microwave radio link. The test showed that The Ethernet frames were successfully transported to remote
area with good quality of service such as throughput, response time, and transaction rate.
The impact of e politician on the adoption of e-service perceptions from a sa...ijmpict
The purpose of this study is to establish whether the use of information technology (IT) by elected
municipal representatives, for constituency work, emboldens the adoption of e-service in municipals of a
developing country. The research data was obtained through the completion of a questionnaire by a
sample of respondents who serve as authorities of IT in South African municipals. The findings from both
descriptive and inferential data analysis of collected data confirm that the use of IT by elected municipal
representatives for constituency work impacts the adoption of e-service in municipals. Furthermore, the
use of IT by elected municipal representatives for constituency work correlated with both e-service laws
and e-service security. This study contributes to a better understanding of choices needed when planning
for the adoption of e-service initiatives in municipals of developing countries. Given that 87.2% of
respondents are aware of a high access to telephone mobile, a further research is needed to clarify why
most elected municipal representatives of a developing country choose not to exploit IT for their
constituency work, and similarly why municipals of a developing country do not exploit IT to provide
services.
The myth said that youths arent loyal to any network provider, it has also been said that they're keen to better price offer and advertizing. Find the answer right here.
The adoption and challenges of electronic voting technologies within the sout...IJMIT JOURNAL
Literature has shown that countries such as Brazil and India have successfully implemented electronic
voting systems and other countries are at various piloting stages to address many challenges associated
with manual paper based system such ascosts of physical ballot paper and other overheads, electoral
delays, distribution of electoral materials, and general lack of confidence in the electoral process. It is in
this context that this study explores how South African can leverage the opportunities that e-voting
presents. Manual voting is often tedious, non-secure, and time-consuming, which leads us to think about
using electronic facilities to make the process more efficient. This study proposes that the adoption of
electronic voting technologies could perhaps mitigate some of these issues and challengesin the process
improving the electoral process. The study used an on-line questionnaire which was administered to a
broader group of voters and an in-depth semi-structured interview with the Independent Electoral
Commission officials. The analysis is based on thematic analysis and diffusion of innovations theory is
adopted as a theoretical lens of analysis. The findings reveal that relative advantage, compatibility and
complexity would determine the intentions of South African voters and the Electoral Management Bodies
(IEC) to adopt e-voting technologies. Moreover, the findings also reveal several other factorsthat could
influence the adoption process. The study is limited to only voters in Cape Town and these voters were
expected to have some access to the internet. The sample size limits the generalizability of the findings of
this study.
University Mobile Enrollment System: A Nigeria Perspectiveiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Most Cited Articles in Academia - International Journal of Computer Science a...IJCSES Journal
The AIRCC's International Journal of Computer Science and Engineering Survey (IJCSES) is devoted to fields of Computer Science and Engineering surveys, tutorials and overviews. The IJCSES is a peer-reviewed, open access scientific journal published in electronic form as well as print form. The journal will publish research surveys, tutorials and expository overviews in computer science and engineering. Articles from supplementary fields are welcome, as long as they are relevant to computer science and engineering
Sentiment analysis of comments in social media IJECEIAES
Social media platforms are witnessing a significant growth in both size and purpose. One specific aspect of social media platforms is sentiment analysis, by which insights into the emotions and feelings of a person can be inferred from their posted text. Research related to sentiment analysis is acquiring substantial interest as it is a promising filed that can improve user experience and provide countless personalized services. Twitter is one of the most popular social media platforms, it has users from different regions with a variety of cultures and languages. It can thus provide valuable information for a diverse and large amount of data to be used to improve decision making. In this paper, the sentiment orientation of the textual features and emoji-based components is studied targeting “Tweets” and comments posted in Arabic on Twitter, during the 2018 world cup event. This study also measures the significance of analyzing texts including or excluding emojis. The data is obtained from thousands of extracted tweets, to find the results of sentiment analysis for texts and emojis separately. Results show that emojis support the sentiment orientation of the texts and those texts or emojis cannot separately provide reliable information as they complement each other to give the intended meaning.
Design and Implementation Security Model for Sudanese E-governmentEditor IJCATR
Security is one of the most important issues in E-government projects. E-government applications will be increasingly used
by the citizens of many countries to access a set of services. Currently, the use of the E-government applications arises many
challenges; one of these challenges is the security issues. E-government applications security is a very important characteristic that
should be taken into account. This paper makes an analysis over the security as required for E-government and specify the risks and
challenges that faces E-government projects in Sudan. Finally, the study has proposed security model for Sudanese E-government. The
proposed security model for the Sudanese electronic government is a four layers' model that is divided into sub layers. Each layer will
mitigate group of threats related to an e-services. The model is not generic; it cannot be applied by other countries. It is precisely
designed for Sudanese situation
An Investigation into the Impact of the Electronic Taxation System: A Case St...BIJFMCF Journal
The Namibian government has benefited to date from information technology in many ways. The current research attempts to investigate the impact of electronic taxation systems, how well it is used, understood and utilized in developing countries. The importance of understanding and influencing Namibian citizens’ acknowledgement of E-Government services is key, given the substantial investment in government communication, information system technology and the potential for cost saving. One of the most successful E-Government initiatives, the electronic filing system (e-Filing), allows tax returns to be filed electronically. Despite many taxpayers adopting this method, a large number are still using the traditional manual method of filing tax returns. A descriptive research approach, namely the Quantitative method was used to evaluate the impact of electronic taxation systems. This study utilized the decomposed theory of planned behavior with factors adjusted specifically for Namibia as a developing country to identify the possible determinants of user acceptance of the e-Filing system among taxpayers. This exploratory study was conducted by means of a questionnaire survey.
Cell Phones Usage for Academic Activities amongst Undergraduate Students of t...AJSSMTJournal
This study investigated the use of cell phones for academic activities amongst the undergraduate
students of the Federal University of Technology Minna (FUTM). Survey questionnaire was used for collecting
data from 379 respondents drawn based on stratified random sampling. The response rate was 99%. Findings
show that the majority 246(65.6%) of the respondents were very strongly agreed that they have awareness on
the usage of cell phones for making calls, while 224(59.7%) of them were very strongly agreed that they have
used cell phones to access the Internet. Whereas, 122(32.5%) of the respondents were very strongly agreed
that spending more time on cell phone reduces academic performance. Also 209(55.7%) of the respondents
were very strongly agreed that most students of FUTM faced the challenges of slow Internet connection,
252(67.2%) respondents were very strongly agreed that the wireless Internet infrastructure in the university
should be upgraded to ensure quality and faster download, and should be available to students for use all
times
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A CROSS-CULTURAL STUDY ON THE VALUE STRUCTURE OF MOBILE INTERNET USAGE: COMPA...Ranti Yulia Wardani
Abstract: This study aims to examine the usage a pattern of mobile Internet from perspective of intercultural among developing countries. Data obtained from a survey of questionnaire which is distributed in both Thailand and Indonesia during 2013. The multiple regression analysis has been applied to identify between value structures (functional value, emotional value, social value and monetary value) and overall satisfaction in each country. Finding shows that functional value, emotional value, social value, and monetary value significantly affect satisfaction for Indonesia users which is similar to Thai users except the emotional value does not affect the satisfaction. A comparison test to examine the difference in value structure between Indonesia and Thailand has been analyzed. The results show that the functional value, emotional value, social value and monetary value between Indonesia and Thailand are different. The results of these differences are influenced by the perceptions of respondents in Indonesia and Thailand to the different mobile Internet usage pattern. In this case it turns out different cultures influence the way in perceiving the use of different technologies, especially in the mobile Internet usage pattern.
The growth ofsmartphones usage, the unlimited possibilities of the latest mobile phones and the
growing accessibility of this device to every single person in the world have made them indispensable. At the
same time, an increasing number of studies are raising the public awareness
Usability analysis of sms alert system for immunization in the context of ban...eSAT Journals
Abstract Both the market and academia strongly encourage the development of usable systems, and they do so by relying on a number of standards, guide-lines, research and good practice streams. Unfortunately, in the health sector, whilst being the owner of standards under many purposes and topics, seems still falling and running behind as the conceptual issues and practical implications of usability are concerned. In this study, it was found that rapid growth of mobile applications through SMS increases in a significant way in developing countries particularly in Bangladesh. Public satisfaction was highly shown in mobile health services through SMS. In our paper, usability has been analytically investigated throughout a simulated health oriented action setting and against a prototype of SMS based health services in Bangladesh, and several provoking conclusions in terms of “rethinking usability” applied to academic actions and decision making have been derived. Various health institutes can be influenced by this study to challenge existing difficulties against usability potential. Keywords: ICT, mHealth, Mobile applications, SMS, Usability
Cellular mobile phone service is the wireless telecommunication service that is operated via mobile phone or cellular phone (an electronic telecommunication device).
Cellular mobile services in Pakistan commenced in 90’s when two cellular mobile telephone licenses were awarded to Paktel and PakCom (Instaphone) for provision of cellular mobile telephony in Pakistan.
With the passage of time telecom sector in Pakistan has grown rapidly and currently there are 5 mobile phone operators;
Mobilink, Ufone, Telenor, Zong and Warid telecom.
Mobile phones are an integral part of our lives since they have played a vital role in bringing people closer together. They have abundantly been used by people all across the globe as they keep them up-to-date about the happenings in the world. However, these mobile phones have also been used in carrying out various criminal activities for the past few decades, therefore, a new discipline of Mobile Phone Forensics has been introduced which will help a lot in curbing the menace of these crimes by locating the whereabouts of the criminals. This research paper deals with the introduction of this innovative discipline of mobile phone forensics by throwing light on the importance of this discipline. It also deals with the detailed procedure of conducting a formal forensics analysis with the help of these mobile phones.
Company Valuation webinar series - Tuesday, 4 June 2024FelixPerez547899
This session provided an update as to the latest valuation data in the UK and then delved into a discussion on the upcoming election and the impacts on valuation. We finished, as always with a Q&A
Top mailing list providers in the USA.pptxJeremyPeirce1
Discover the top mailing list providers in the USA, offering targeted lists, segmentation, and analytics to optimize your marketing campaigns and drive engagement.
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s DholeraAvirahi City Dholera
The Tata Group, a titan of Indian industry, is making waves with its advanced talks with Taiwanese chipmakers Powerchip Semiconductor Manufacturing Corporation (PSMC) and UMC Group. The goal? Establishing a cutting-edge semiconductor fabrication unit (fab) in Dholera, Gujarat. This isn’t just any project; it’s a potential game changer for India’s chipmaking aspirations and a boon for investors seeking promising residential projects in dholera sir.
Visit : https://www.avirahi.com/blog/tata-group-dials-taiwan-for-its-chipmaking-ambition-in-gujarats-dholera/
LA HUG - Video Testimonials with Chynna Morgan - June 2024Lital Barkan
Have you ever heard that user-generated content or video testimonials can take your brand to the next level? We will explore how you can effectively use video testimonials to leverage and boost your sales, content strategy, and increase your CRM data.🤯
We will dig deeper into:
1. How to capture video testimonials that convert from your audience 🎥
2. How to leverage your testimonials to boost your sales 💲
3. How you can capture more CRM data to understand your audience better through video testimonials. 📊
Recruiting in the Digital Age: A Social Media MasterclassLuanWise
In this masterclass, presented at the Global HR Summit on 5th June 2024, Luan Wise explored the essential features of social media platforms that support talent acquisition, including LinkedIn, Facebook, Instagram, X (formerly Twitter) and TikTok.
Personal Brand Statement:
As an Army veteran dedicated to lifelong learning, I bring a disciplined, strategic mindset to my pursuits. I am constantly expanding my knowledge to innovate and lead effectively. My journey is driven by a commitment to excellence, and to make a meaningful impact in the world.
Discover the innovative and creative projects that highlight my journey throu...dylandmeas
Discover the innovative and creative projects that highlight my journey through Full Sail University. Below, you’ll find a collection of my work showcasing my skills and expertise in digital marketing, event planning, and media production.
Discover the innovative and creative projects that highlight my journey throu...
An evaluation of mobile phone usage restriction in selected public places in akure, nigeria
1. Computer Engineering and Intelligent Systems www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol.4, No.4, 2013
40
An Evaluation of Mobile Phone Usage Restriction in Selected
Public Places in Akure, Nigeria
Wasiu Lawal1*
E.O. Ogunti2
1. Department of Electrical and Electronics Engineering, Federal University of Technology, Akure, Nigeria
2. Department of Electrical and Electronics Engineering, Federal University of Technology, Akure, Nigeria
E-mail of the corresponding author: *awwalawwal@yahoo.com,
Abstract.
The use of mobile phone has become widespread among Nigerians; both old and young. Indiscriminate use
of mobile phone has become popular in public and private places. In public places, it is becoming difficult to
achieve total restriction in mobile phone usage because of varying attitudinal tendencies within the society.
There is need to evaluate the compliance of the individual phone user to non-compliance with various phone
usage restriction laws in public buildings so as to determine the proactive method that can be employed in
forestalling future occurrences. In this paper, the degree of compliance of people to mobile phone usage
restriction laws in public places is evaluated. Information was gathered through questionnaire administration
and visitation to selected public places such as, examination halls, banking halls, and detention centers
(police cells and prison halls) in Akure. The questionnaires were presented in such a way that it will provide
response to the issue of the degree of phone usage restriction compliance, attitudinal responses of public
places managers to violators, and the perception of unauthorized phone users to restriction regulation. The
data obtained were analyzed statistically using descriptive statistics based on percentages. The validation of
the results were carried out using paired- t test to determine whether there is a significant difference between
the degrees of phone usage restriction in the specific public places used in this study. The results of the
analysis showed that the phone usage restrictions were violated in all the places investigated and the highest
violation response was recorded within the examination halls. The analysis further showed that the attitudinal
response of the public places managers were encouraging while those of the users were not in favour of
curbing mobile phone usage restriction. This shows that a proactive method should be devised to curb the use
of mobile phone in unauthorized areas.
Keywords: Mobile phone, call restriction, public places, reactivity.
1. Introduction
Cellular communications is one of the fastest growing and most challenging telecommunication
applications today. It represents a large and continuously increasing percentage of all new telephone
subscribers around the world. In the long term, cellular digital technology may become the universal way of
communication [1]. With respect to communication, the mobile phone is one of the most remarkable features
of advancement. It plays a vital role in business and the economy, as well as in the personal and family lives
of individuals [2]. Because of its being mobile, mobile phones can, amongst other things, save lives and
provide security by making it possible to summon help quickly in an emergency, contact law enforcement or
medical services and bank without having to visit a bank [3]. The Cellular telephone (commonly mobile
phone, cell phone or hand phone) is a long-range, portable electronic device used for mobile communication
[5]. In addition to the standard voice function of a telephone, current mobile phones can support many
additional services such as SMS for text messaging; packet switching for access to the Internet; and MMS for
sending and receiving photos and video. Most current mobile phones connect to a cellular network of base
stations (cell sites), which in turn is interconnected to the public switched telephone network (PSTN), the
exception is satellite phone [1, 2].
On the other hand, the advent of the cell-phone technology with the relentless push towards
micro-miniaturization of devices increases the risk to exploit and misuse this technology for diabolical and
illegal purposes [4]. For example, cell phones hidden in a meeting room, or on a person, lets a competitor
listen in on company discussions. In a hospital, likewise, due to Electromagnetic Interference (EMI), when
phones are near sensitive electronic equipment, important patient-care equipment can fail to perform
2. Computer Engineering and Intelligent Systems www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol.4, No.4, 2013
41
properly, putting patients at risk. Most importantly, vis-à-vis education, the use of mobile phones as aids for
cheating has somewhat become a menace. Consequently, a very real need exists today for individuals,
businesses, institutions and the government to take measures to detect and identify the unauthorized use of
cell phones within the bounds of their controlled premises.
Based on the aforementioned problems, there is need to evaluate factors that determine the degree of
compliance of the mobile phone users to the restriction laws in public buildings namely institutional
buildings, banking hall to mention but few and to determine the effects of the mobile phone usage on the
public, and the feeling of the listeners. The data obtained were analyzed statistically using descriptive
statistics based on percentages. The rest of the paper is presented thus: the materials and methods used to
analyze the system was presented in Section 2, results and discussion on the evaluation of unrestricted use of
mobile phone in public building is given in Section 3, while conclusion is in Section 4.
2. Materials and Methods
Information was gathered through questionnaire administration and visitation to selected public places in
Akure including examination halls, banking halls, and detention centers (police cell and prison halls). Three
sets of questionnaires were used for the investigation. The first category of questionnaires was set in relation
to examination halls with seventeen questions. The second category of questionnaires administered in
banking halls were set with twenty-nine questions, while those administered at correctional facilities (police
detention center and prison halls) had twenty-three questions.
The questions asked targeted the degree of phone usage restriction compliance, attitudinal responses of
public places managers to the culprits and how the unauthorized phone users felt with the regulation and
among others. The data obtained were analyzed statistically using descriptive statistics based on percentages.
The percentages responded to the targeted enquiries; T is calculated as the ratio of the total of actual response,
Ra to the overall total of those that responded to all the enquiries, Ro.That is,
T (%) = (Ra/ Ro) x 100 (1)
The validation of the results was carried out using paired-t test to determine whether there is a significant
difference between the degrees of phone usage restriction in the specific public places used in this study.
3. Results and Discussion
Forty questionnaires based on phone usage in examination halls were distributed out of which twenty-seven
were returned (67.5%). Out of forty questionnaires distributed to the banks thirty-three (82.5%) were
returned, while for the correctional facilities thirty-three (82.5%) out of the forty questionnaires were
returned. From these results, the banks and correctional facilities have the highest percentage of
questionnaires returned while examination halls have the lowest.
The figure 1 shows that the number of workers that have been using mobile phones for at least four years
and above in the correctional facilities is about 100%, while about 74% of workers of educational institutions
have been using cell phones for the same period, and only 45% of bank workers agreed to having been using
cell phones within the same period. The results show that the usage of mobile phone is not new to most
people, even when at work and when doing it against regulation. Most of these people are expected to have
better experience as to what can be the effect of using mobile phone in a restricted area since the device is not
new to them as larger percentage of them fall within the category of people that have been using mobile
phone for three to four years.
3. Computer Engineering and Intelligent Systems www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol.4, No.4, 2013
42
Figure1. Period of using mobile phones.
The results in figure 2 show that those that are with working experience of between 1-4 years took highest
in rank in the banks followed by correctional facilities and lastly examination halls. Those with 5-8 years took
highest rank in the correctional facilities in the chart followed by banks and lastly educational institutional
workers.
Figure 2.Working experience.
The results from figure 3 shows that the employees with higher educational qualifications (HND, PGD, and
BSC degrees) are majorly supervisors of examinations in educational institutions while those with terminal
degrees (PHD) in the institutions do not normally participate in examination supervision. In the banking
sectors, the employees with HND, PGD, and BSC constitute the largest percentage of the work force. In
addition, most staff in correctional facilities is with certificates from WAEC, OND and BSC.
4. Computer Engineering and Intelligent Systems www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol.4, No.4, 2013
43
Figure3. Educational qualification.
The results of figure 4 shows that the different public enterprise under considerations put restrictions on
the usage of mobile phones, banks has the highest restriction followed by correctional facilities and
examination hall as shown on the chart. The percentage of those that have knowledge about the restrictions of
usage of mobile phones in these places are higher than those that do not have knowledge about the restrictions
.This shows that workers are well acquitted with the restriction on the usage of mobile phones in public
buildings and they know well that users are not authorized to use their mobile phones in these areas
considered with the restriction order.
The results of the figure 5 shows that the largest supporters of mobile phone usage restriction came from
the banks followed by correctional facilities and then, the examination halls. This is because the banking
industry is financial institution dealing with people’s money which involves a lot of financial risk and the fear
of been attached by armed robbers. These could be a major threat to the banks workers because the case of
disturbances is not the major concern since customers are allow to talk freely in the banks with a lot of
activities going on. The likely reason for the higher support in correctional facilities for restriction on phone
usage is to prevent the possibility of inmate planning prison brake, or threatening outsiders. For the case of
examination halls, the usage of phones were voted against to discourage the use of as a tool for cheating, and
not for disturbance since the users were not allowed in the first instance to talk during the examinations.
However, student may cheat via receiving text messages according to the result obtained.Moreover, since
examination does not pose threat on live and properties as in the case of banks, the level of supporters of
phone usage restriction in examination hall ranked the lowest when compared with banks and correctional
facilities.
5. Computer Engineering and Intelligent Systems www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol.4, No.4, 2013
44
Figure 4. Restriction on mobile phone usage.
Figure 5. Restriction Support.
The results on figure 6 show the level of compliance of restricting phone users in the public buildings
under consideration. The compliance level of the phone users in the correctional facilities took highest
percentage when compared with banks and examination halls, which is 50-60%. The banks took the next
position of compliance (30-60%), while the phone users in examination halls took the least level of
compliance. This shows that the technique that will detect illegal phone use will be best needed in the
examination hall followed by banking halls and correctional facilities.
6. Computer Engineering and Intelligent Systems www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol.4, No.4, 2013
45
The chart of figure 7 depicts the percentage (%) of staff working under each restricted public building
that have ever seized a phone, the status of the staff seizing such cell phones from unauthorized users. The
highest percentage, which is 67%, is recorded in correctional facilities followed by banks (64%) while the
percentage of staff in the examination halls is the lowest (44%). Looking critically into the figure 5, the level
of support for restrictions was higher in the banks and correctional facilities, and by implication, the level of
support may affect the level of staffs seizing phones, which is as shown in figure 5, and figure 7.
Figure6. Compliance level of mobile phone users
Figure7. Percentage of staff working under each restricted
4. Conclusions
The degree of compliance of people to mobile phone usage restriction in public places was evaluated in this
study. Information was gathered through questionnaire administration and visitation to specifically selected
public places in Akure including examination halls, banks, and police station’s cell and prison. Responses to
the questions asked on the degree of phone usage restriction compliance, attitudinal responses of public
0%
10%
20%
30%
40%
50%
60%
70%
80%
EXAMINAION HALLS BANKSCORRECTIONAL FACILITIES
YES
NO
7. Computer Engineering and Intelligent Systems www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol.4, No.4, 2013
46
places managers to the culprits and how the unauthorized phone users felt with the regulation were collated.
The evaluation of the outcome data was carried out using statistical tools based on percentages. The
findings from the study showed that the phone usage restriction was violated in all the places investigated and
the highest violation response was recorded with the examination halls of the selected public institutions. The
findings further showed that the attitudinal response of the public places managers was encouraging while
that of the public places users was not in support of curbing unauthorized mobile phone usage. This shows
that a proactive method should be devised to curb the use of mobile phone in unauthorized areas.
References
[1] Asha Mehrota (1997), GSM engineering system, Artech house communication series, London,
pp1-5.
[2] M. Mouly, M. B. Pautet, Current Evolution of the GSM Systems, IEEE Personal Communications,
October 1995.
[3] Ian Poole, Cellular Communication Explained: From Basics to 3G” Elsevier Ltd, Oxford, and UK,
2006.
[4] ITT Technology, Detecting and Locating Mobile phones in Correctional Facilities. EVI Technology,
LLC 7065 Columbia Gateway Drive Columbia, MD21046, (2007).
[5] Margaret Rouse (2007), what is cellular Telephone? Archived from Search mobile computing
.techtarget.com
[6] EVI Tech., Detecting and Locating Cell Phones in Correctional Facilities, EVI Technology, LLC. June
2007.
[8] V. Shannon, iPhone Must Be Offered Without Contact Restrictions, German
CourtRules"(inEnglish).TheNewYorkTimes. Information on http://www.nytimes.com/2007/11/21
/technology/21iphone.html. Accessed 2 February 2011.
[9]ETSI, European Telecommunications Standards Institute. 2011, Cellular History". Etsi.org. Archived
from the original on 5 May 2011. http://www.webcitation.org/5yRQXw2sv. Accessed 5 May 2011.
[10] Information on How Cell Phones Work, How Stuff Works A Discovery Company. Accessed April
2009. Website http://www.howstuffworks.com/cellphone.
[11] W. C. Y. Lee, Wireless and Cellular Telecommunications, 3rd Ed. McGraw-Hill Engineering, 2009.
[12] Information on Hackers crack open mobile network. bbc.co.uk. 31 December 2010.
http://www.bbc.co.uk/news/technology-12094227, accessed 20 April 2011.
[13]Nicholas W.S (2011) study of cellular phone detection techniques University of Nebraska - Lincoln
[14] European Telecommunications Standards Institute (2011)"Cellular History". Etsi.org. Archived from
the original on 5 May 2011. http://www.webcitation.org/5yRQXw2sv. Retrieved 5 May 2011.
8. This academic article was published by The International Institute for Science,
Technology and Education (IISTE). The IISTE is a pioneer in the Open Access
Publishing service based in the U.S. and Europe. The aim of the institute is
Accelerating Global Knowledge Sharing.
More information about the publisher can be found in the IISTE’s homepage:
http://www.iiste.org
CALL FOR PAPERS
The IISTE is currently hosting more than 30 peer-reviewed academic journals and
collaborating with academic institutions around the world. There’s no deadline for
submission. Prospective authors of IISTE journals can find the submission
instruction on the following page: http://www.iiste.org/Journals/
The IISTE editorial team promises to the review and publish all the qualified
submissions in a fast manner. All the journals articles are available online to the
readers all over the world without financial, legal, or technical barriers other than
those inseparable from gaining access to the internet itself. Printed version of the
journals is also available upon request of readers and authors.
IISTE Knowledge Sharing Partners
EBSCO, Index Copernicus, Ulrich's Periodicals Directory, JournalTOCS, PKP Open
Archives Harvester, Bielefeld Academic Search Engine, Elektronische
Zeitschriftenbibliothek EZB, Open J-Gate, OCLC WorldCat, Universe Digtial
Library , NewJour, Google Scholar