A Study Into the Challenges and Prospects of Marketing Nigerian Made Computer Softwares

A Study Into the Challenges and Prospects of Marketing Nigerian Made Computer Softwares   Background to the Study Made-in-Nigeria softwares are those that are produced within Nigeria. Nigeria as a third world country needs to produce its own software so that it will help develop its economy in terms of growth and stability. The Nigerian…

Ethical Hacking and Cyber Security in Nigerian Telecommunication Industry: Issues and Solutions

Ethical Hacking and Cyber Security in Nigerian Telecommunication Industry Issues and Solutions   Chapter One of  Ethical Hacking and Cyber Security in Nigerian Telecommunication Industry Issues and Solutions INTRODUCTION BACKGROUND TO THE STUDY Cybersecurity through ethical hacking plays an important role in the ongoing development of telecommunication industry, as well as Internet services (Odinma, 2010)….

Analysis of Data Mining Techniques of Telecommunication Companies in Nigeria: a Case Study of Mtn Nigeria

Analysis of Data Mining Techniques of Telecommunication Companies in Nigeria a Case Study of Mtn Nigeria   Chapter One of Analysis of Data Mining Techniques of Telecommunication Companies in Nigeria a Case Study of Mtn Nigeria INTRODUCTION BACKGROUND TO THE STUDY The telecommunications industry generates and stores a tremendous amount of data (Han et al,…

Effects of Gsm on Service Delivery of Smes in Nigeria (Case Study of Registered Smes in Edo State)

Effects of Gsm on Service Delivery of Smes in Nigeria (Case Study of Registered Smes in Edo State)   Chapter One of  Effects of Gsm on Service Delivery of Smes in Nigeria (Case Study of Registered Smes in Edo State) INTRODUCTION BACKGROUND TO THE STUDY In today’s highly competitive global market place, the pressure on…

How to Prevent Computer System Infection and Compromise Using Trojan Tool and Process

How to Prevent Computer System Infection and Compromise Using Trojan Tool and Process   Chapter One of  How to Prevent Computer System Infection and Compromise Using Trojan Tool and Process INTRODUCTION BACKGROUND TO THE STUDY Computer system infection, also known as malicious code, refers to a program that is covertly inserted into another program with…

The Impact of Internet and the Way It Influence Students Reading Culture (Case Study of Selected Primary Schools in Edo State)

The Impact of Internet and the Way It Influence Students Reading Culture (Case Study of Selected Primary Schools in Edo State)     Chapter One of  The Impact of Internet and the Way It Influence Students Reading Culture (Case Study of Selected Primary Schools in Edo State) INTRODUCTION BACKGROUND TO THE STUDY Reading is an…

Impact of Knowledge Management on Organizational Performance (a Case Study of Selected It Firms in Lagos)

Impact of Knowledge Management on Organizational Performance (a Case Study of Selected It Firms in Lagos)   Abstract on Impact of Knowledge Management on Organizational Performance (a Case Study of Selected It Firms in Lagos) This study was intended to evaluate the impact of knowledge management on organizational performance. This study was guided by the…

Perception of Internet Users on Data Driven Advertising Amongst University Students

Perception of Internet Users on Data Driven Advertising Amongst University Students   Chapter One of  Perception of Internet Users on Data Driven Advertising Amongst University Students INTRODUCTION BACKGROUND TO THE STUDY The internet over the years has developed due to the growth in technology like laptop, telephone, computer, etc. and this has made it possible…

Assessment of Youths and Internet Crime in Nigeria (a Case Study of Warri South Lga)

Assessment of Youths and Internet Crime in Nigeria (a Case Study of Warri South Lga)   Chapter One of Assessment of Youths and Internet Crime in Nigeria (a Case Study of Warri South Lga) INTRODUCTION Background to the study According to techopedia (2016), the concept intercept crime is any crime or illegal online activity committed…

Application of Data Mining Techniques in the Prediction of Climate Effect on Agriculture

Application of Data Mining Techniques in the Prediction of Climate Effect on Agriculture   Abstract on Application of Data Mining Techniques in the Prediction of Climate Effect on Agriculture The purpose of this study is to examine the application of data mining techniques in the prediction of climate effect on agriculture with discussion on different…

Application of Association Rule Learning in Customer Relationship Management

Application of Association Rule Learning in Customer Relationship Management   Abstract on Application of Association Rule Learning in Customer Relationship Management The main purpose of this study is the application of association rule learning using data mining techniques in customer relationship management of a diagnostics centres. Clustering customers is needed to find unsatisfied need, promote…

The Impact of Information Technology (It) on Collection Development and Management in the Delta State University, Abraka

The Impact of Information Technology (It) on Collection Development and Management in the Delta State University, Abraka   Chapter One of The Impact of Information Technology (It) on Collection Development and Management in the Delta State University, Abraka INTRODUCTION Background to the Study The importance of information as a vital resource in today’s society hardly…

Computer Networking Using Wireless Network

Computer Networking Using Wireless Network   Chapter One of Computer Networking Using Wireless Network INTRODUCTION BACKGROUND TO THE STUDY A computer network or data network is a telecommunications network which allows computers to exchange data. In computer networks, networked computing devices pass data to each other along network links (data connections). The connections between nodes…

Effect of Management Information System in the Service Delivery (a Case Study of University of Uyo)

Effect of Management Information System in the Service Delivery (a Case Study of University of Uyo)   Chapter One of Effect of Management Information System in the Service Delivery (a Case Study of University of Uyo) INTRODUCTION Background of the Study Services represent substantial part of business output and investments. In providing these services, Management…

The Significance Introduction of Bitcoin Transactions Into Nigeria Banking Industry

The Significance Introduction of Bitcoin Transactions Into Nigeria Banking Industry   Abstract on The Significance Introduction of Bitcoin Transactions Into Nigeria Banking Industry There are different advancement in money payment procedure in today financial market, a lot of which are built on platforms computerized like the mobile phone, the Internet, and the digital storage card….

Internet of Things (Iot) and Its Challenges for Usability in Nigeria

Internet of Things (Iot) and Its Challenges for Usability in Nigeria   Abstract on Internet of Things (Iot) and Its Challenges for Usability in Nigeria This research presents an overview of the enablement of IoT in developing countries and talks about the aspirations, general applications and challenges of IoT in Nigeria. It additionally addresses issues…

Online Banking Fraud Impact on the Development of Nigeria’s Economy

Online Banking Fraud Impact on the Development of Nigeria’s Economy   Chapter One of Online Banking Fraud Impact on the Development of Nigeria’s Economy INTRODUCTION  BACKGROUND TO THE STUDY The financial industry is one of the most important financial foundation in Nigeria, and a central nervous system to the economy with unique emphasis on its roles…

The Future of Database Management in the Era of Big Data and Cloud Computing in Nigeria.

The Future of Database Management in the Era of Big Data and Cloud Computing in Nigeria.   INTRODUCTION BACKGROUND OF THE STUDY Database is the set of related data and the system it is organized. The database management system” (DBMS) consist of an integrated set of computer software which facilitate the use and the  access…

Big Data Analytics – Telecommunication Approach. A Case Study of Mtn Nigeria

Big Data Analytics – Telecommunication Approach. A Case Study of Mtn Nigeria   INTRODUCTION BACKGROUND OF THE STUDY Database is the set of related data and the system it is organized. The database management system. The advent of big data is as result of the generation of large volume of data. Big data analytics appraises large…

Ethical Issues in Computer as an Instrument to Technology Growth

Ethical Issues in Computer as an Instrument to Technology Growth   INTRODUCTION BACKGROUND OF THE STUDY The Ethics of a society deals with defining in concrete terms behaviors and conducts regarded as good or bad. Therefore every society sets a standard as to  whether certain acts are ethical or not. These rules have been established…

Roles of Mobile Banking in Enhancing Customer Satisfaction in the 21st Century (a Case Study of Fidelity Bank Main Branch Maiduguri

Roles of Mobile Banking in Enhancing Customer Satisfaction in the 21st Century (a Case Study of Fidelity Bank Main Branch Maiduguri   INTRODUCTION BACKGROUND OF THE STUDY The Advent of mobile banking constitutes a recent development in electronic banking. It facilitate the access of customer account balance, transfer of funds, SMS services  , payment transaction…

The Awareness, Accessibility and Usability of Internet Technology in Promoting Effective Teaching and Learning of Basic Science

The Awareness, Accessibility and Usability of Internet Technology in Promoting Effective Teaching and Learning of Basic Science   INTRODUCTION BACKGROUND OF THE STUDY In recent times computers play significant role in the development and application of scientific knowledge, and facilitate the learning of science. Consequently the National Science Teachers Association advocates that computers should be…

Application of Deep Learning for Fraud Detection in E-payment System

Application of Deep Learning for Fraud Detection in E-payment System   INTRODUCTION BACKGROUND OF THE STUDY The high rate of e-payment fraud has called for stronger measures to be applied in detecting fraud. Deep learning is considered to be one of the measure that can be successfully applied for the detecting of e-payment fraud, financial fraud…

Design and Implementation of a Computerized Loan Management System for Rejecting or Approving Loan Request Using Credit Risk and Evaluation Models.

Design and Implementation of a Computerized Loan Management System for Rejecting or Approving Loan Request Using Credit Risk and Evaluation Models.   Over the past few years, the financial sector have dedicated numerous resources to developing internal models to better quantify their financial risks and attain economic capital. These endeavors have been supported and recognized…

A Comprehensive Analysis on Security and Privacy Issues of Digital Currency: Preliminary Evidence From Nigeria

A Comprehensive Analysis on Security and Privacy Issues of Digital Currency Preliminary Evidence From Nigeria   Abstract on A Comprehensive Analysis on Security and Privacy Issues of Digital Currency: Preliminary Evidence From Nigeria A Comprehensive analysis on security and privacy issues of digital currency: preliminary evidence from Nigeria Bitcoin is the most successful cryptocurrency to…

Advanced Honeypot Architecture for Network Threats Quantification

Advanced Honeypot Architecture for Network Threats Quantification   Abstract on Advanced Honeypot Architecture for Network Threats Quantification Through the general usage of computer technology, a large number of devices have become interconnected with other systems. The threat landscape is evolving every day in a fast and with humanity’s increasing dependency on computerized equipment and networks;…

An Assessment of the Effectiveness of the Traffic Lights Installation in Lagos City

An Assessment of the Effectiveness of the Traffic Lights Installation in Lagos City   Abstract on An Assessment of the Effectiveness of the Traffic Lights Installation in Lagos City A traffic light controller allocates right-of-way at an intersection through a sequence of green signals. The rapid growth of population within the metropolis of Lagos is…

Design and Implementation of an Online Android Troubleshooting and Diagnostic System

Design and Implementation of an Online Android Troubleshooting and Diagnostic System   Abstract on  Design and Implementation of an Online Android Troubleshooting and Diagnostic System An Online Android Troubleshooting and Diagnostic System is a help and support tool built to analyze, diagnose and resolve android users’ technical issues. This Troubleshooting and Diagnostic System tool will…

Design and Implementation of Ip Based Patient Monitoring System

Design and Implementation of Ip Based Patient Monitoring System   Abstract on Design and Implementation of Ip Based Patient Monitoring System This review researched online Hospital management system as an apparatus to alter medical profession. With numerous writers censuring how patients queue up for hours to get medical treatment, and some wind up being gone…

Design and Implementation of Matrix Based Shoulder Surfing Security System

Design and Implementation of Matrix Based Shoulder Surfing Security System   Abstract on Design and Implementation of Matrix Based Shoulder Surfing Security System In this project, the discussed issue is design and implementation of matrix based shoulder riding security system. Two principle procedures were utilized in these tasks which are scrambling and AES-128 encryption algorithm….