Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

    Elochukwu Ukwandu

    As several countries were experiencing unprecedented economic slowdowns due to the outbreak of COVID-19 pandemic in early 2020, small business enterprises started adapting to digital technologies to transact business. However, in Africa,... more
    As several countries were experiencing unprecedented economic slowdowns due to the outbreak of COVID-19 pandemic in early 2020, small business enterprises started adapting to digital technologies to transact business. However, in Africa, particularly Nigeria, COVID-19 pandemic resulted to some financial crisis that impacted negatively on the sustainability of small and medium-sized (SMEs) businesses. Thus, this study examined the role of social media on selected SMEs in Nigeria in the heat of the COVID-19 pandemic that led to several lock downs in a bid to curtail the spread of the virus. Cross-sectional survey research design was used alongside convenience population sampling techniques. The population was categorised based on selected SMEs businesses, while a quantitative research approach was adopted, and primary data were collected using a questionnaire. The questionnaires were administered to owners and operators of SMEs in Ikotun and Ikeja areas of Lagos State, Nigeria. A tota...
    The integration of Information and Communication Technology (ICT) tools into mechanical devices in routine use within the aviation industry has heightened cyber-security concerns. The extent of the inherent vulnerabilities in the software... more
    The integration of Information and Communication Technology (ICT) tools into mechanical devices in routine use within the aviation industry has heightened cyber-security concerns. The extent of the inherent vulnerabilities in the software tools that drive these systems escalates as the level of integration increases. Moreover, these concerns are becoming even more acute as the migration within the industry in the deployment of electronic-enabled aircraft and smart airports gathers pace. A review of cyber-security attacks and attack surfaces within the aviation sector over the last 20 years provides a mapping of the trends and insights that are of value in informing on future frameworks to protect the evolution of a key industry. The goal is to identify common threat actors, their motivations, attacks types and map the vulnerabilities within aviation infrastructures most commonly subject to persistent attack campaigns. The analyses will enable an improved understanding of both the cu...
    The paper presents a classification of cyber attacks within the context of the state of the art in the maritime industry. A systematic categorization of vessel components has been conducted, complemented by an analysis of key services... more
    The paper presents a classification of cyber attacks within the context of the state of the art in the maritime industry. A systematic categorization of vessel components has been conducted, complemented by an analysis of key services delivered within ports. The vulnerabilities of the Global Navigation Satellite System (GNSS) have been given particular consideration since it is a critical subcategory of many maritime infrastructures and, consequently, a target for cyber attacks. Recent research confirms that the dramatic proliferation of cyber crimes is fueled by increased levels of integration of new enabling technologies, such as IoT and Big Data. The trend to greater systems integration is, however, compelling, yielding significant business value by facilitating the operation of autonomous vessels, greater exploitation of smart ports, a reduction in the level of manpower and a marked improvement in fuel consumption and efficiency of services. Finally, practical challenges and fut...
    This paper considers bridging the gap associated with system downtime usually experienced during any system failure in a distributed network. Recent studies on disaster management are majorly aimed at reducing the period of system... more
    This paper considers bridging the gap associated with system downtime usually experienced during any system failure in a distributed network. Recent studies on disaster management are majorly aimed at reducing the period of system downtime and level of data losses as the possibility of a zero downtime become elusive. This gap Secure Threshold Cloud-based Disaster Management (TCloud) aims to bridge by proposing a system that is capable of providing robust failover protection at zero downtime in as much as the proposed threshold is not exceeded in the face of cloud failures. This it does by using four cloud services to be known as cloudlets to host data, while using secret sharing scheme to split the data into five chunks. Four of the broken data known as shares are distributed, one for each cloudlet, while the fifth one to be known as magic share is sent to a virtual store. The magic share does not participate in daily system activities. To recreate your data, the system gathers shar...
    The present study investigated the Influence of Information and Communication Technologies (ICTs) on students’ achievement. One hypothesis was postulated and tested in the study as follows: there will be no statistically significant... more
    The present study investigated the Influence of Information and Communication Technologies (ICTs) on students’ achievement. One hypothesis was postulated and tested in the study as follows: there will be no statistically significant relationship between Information and Communication Technologies (ICTs) on students’ achievement. A total of 120 participants were employed for the study. They were selected through simple random sampling technique (Yes/No). A 16item questionnaire on the usage of Information and Communication Technologies (ICTs) on students’ academic performance was employed. It was scored on Yes/No format with a norm of 19.5. The questionnaires were distributed to them to fill in their classrooms. The second part of the questionnaire focused on students’ knowledge and experience of computers and internet services. The design adopted for this study is a cross-sectional one because of differences in the participants’ characteristics. Chi-square statistical tool was used be...
    Increasingly health records are stored in cloud-based systems, and often protected by a private key. Unfortunately the loss of this key can cause large-scale data loss. This paper outlines a novel Cloud-based architecture (SECRET) which... more
    Increasingly health records are stored in cloud-based systems, and often protected by a private key. Unfortunately the loss of this key can cause large-scale data loss. This paper outlines a novel Cloud-based architecture (SECRET) which supports keyless encryption methods and which can be used for the storage of patient information, along with supporting failover and a break-glass policy.
    The twenty-first century can be said to be the time where digitisation is at its peak, with many programmers tapping into the desire of humans to remain connected without time and space limitations. The number of social media sites have... more
    The twenty-first century can be said to be the time where digitisation is at its peak, with many programmers tapping into the desire of humans to remain connected without time and space limitations. The number of social media sites have increased exponentially, with new ones cashing in on the weaknesses of older ones, and others going beyond community guidelines by offering uncensored content. The vendors of these platforms, in order to have a wider reach do not place restrictions on viewing age, give promise of making young people famous, and other such attractive offers that make the youths addicted to the site. The possibility of hacking into accounts of users and using same for fraud is another rave among the Nigerian youths with desire for quick riches. The crash in prices of data, smart phones, and related digital devices has increased availability and access thereby closing digital divide and widening its adverse effects on the youths’ morals and academic pursuits. It is impo...
    The fourth industrial revolution (4IR) widely known as Industry 4.0 is a revolution many authors believe have come to stay. It is a revolution that has been fast blurring the line between physical, digital, and biological technologies.... more
    The fourth industrial revolution (4IR) widely known as Industry 4.0 is a revolution many authors believe have come to stay. It is a revolution that has been fast blurring the line between physical, digital, and biological technologies. These disruptive innovative revolutionary technologies largely rely on high-speed internet connectivity, Cloud technologies, Augmented Reality, Additive Manufacturing, Data science, and Artificial Intelligence. Most developed economies have embraced the revolution while the developing economies are struggling to adopt 4IR because they lack the requisite skills, knowledge, and technology. Thus, this study investigates Nigeria as one of the developing economies to understand her readiness for 4IR and the level of preparedness to mitigate the sophisticated cyber-attacks that comes with the revolution. The investigation adopted quantitative research approach and developed an online questionnaire that was shared amongst the population of interest that incl...
    The study examined the participation of female students of South – Eastern Nigerian tertiary institutions in Information and Communication Technologies (ICTs). The study discussed the tending gender divide in ICTs participation, reasons... more
    The study examined the participation of female students of South – Eastern Nigerian tertiary institutions in Information and Communication Technologies (ICTs). The study discussed the tending gender divide in ICTs participation, reasons for low female participation in ICT, consequences of not bridging the divide and ways of encouraging female participation in ICT. A structured questionnaire was used to elicit information from respondents. A multi – stage random sampling technique was used in the selection of respondents. One hundred and thirty – six (136) undergraduate female students of tertiary institutions in South Eastern Nigeria constituted the study sample. Data collected was analysed using descriptive statistics. Findings suggest that high cost of ICT and high level of male dominance, which made females think that ICT is for males were the major reasons for low female participation in ICT. Reducing the cost of Information Technology, and parental involvement in their children...
    ABSTRACT
    Information and Communication Technology (ICT) solutions (e.g. e-health, telemedicine, e-education, e-Planning) are often viewed as vehicles to bridge the digital divide between developed and developing Nations, rural and urban centers,... more
    Information and Communication Technology (ICT) solutions (e.g. e-health, telemedicine, e-education, e-Planning) are often viewed as vehicles to bridge the digital divide between developed and developing Nations, rural and urban centers, to achieve a better planning and distribution of health infrastructures and equipments, and to resolve shortcomings in the rural health sector. This study focused on factors perceived to influence the uptake and use of ICTs as e-health solutions in rural healthcare centres in Mbaise Imo State, and on structural variables relating to these facilities and processes. Attention was also given to patients who equally decide whether to go for e-health solution or to maintain the statuesque. Facilities on ground that will enable the immediate take off of ICTs e-health solutions were accessed. Recommendations were made with regard to how ICTs can be used more effectively to improve health systems in rural healthcare centres.
    ... Their significant role as civil society actors should be better supported by the public sector (Excerpt ... should be focused on • Widespread introduction of ICT education in public and private educational institutions. ... Ministry... more
    ... Their significant role as civil society actors should be better supported by the public sector (Excerpt ... should be focused on • Widespread introduction of ICT education in public and private educational institutions. ... Ministry of Science and Information & Communication Technology. ...
    Cyber situational awareness has been proven to be of value in forming a comprehensive understanding of threats and vulnerabilities within organisations, as the degree of exposure is governed by the prevailing levels of cyber-hygiene and... more
    Cyber situational awareness has been proven to be of value in forming a comprehensive understanding of threats and vulnerabilities within organisations, as the degree of exposure is governed by the prevailing levels of cyber-hygiene and established processes. A more accurate assessment of the security provision informs on the most vulnerable environments that necessitate more diligent management. The rapid proliferation in the automation of cyber-attacks is reducing the gap between information and operational technologies and the need to review the current levels of robustness against new sophisticated cyber-attacks, trends, technologies and mitigation countermeasures has become pressing. A deeper characterisation is also the basis with which to predict future vulnerabilities in turn guiding the most appropriate deployment technologies. Thus, refreshing established practices and the scope of the training to support the decision making of users and operators. The foundation of the tr...