A study of Internet usage in Nigerian universities: A case study of Obafemi Awolowo University, Ile-Ife, Nigeria (originally published in February 2003)

First Monday ◽  
2007 ◽  
Author(s):  
Kofoworola Jagboro

The Internet is arguably one of the most significant technological developments of the late 20th century. However, despite the added benefits of this tool to learning, teaching and research, a number of problems still plague Internet connectivity and usage in the Nigerian University system. The objective of this study was to evaluate the level of utilization of the Internet for academic research at the Obafemi Awolowo University, Ile-Ife, Nigeria. Questionnaires were administered to postgraduate students spanning art and science based programmes. The results from the analysis of the responses showed that the use of the Internet ranked fourth (17.26 percent) among the sources of research materials. However, respondents who use the Internet ranked research materials (53.42 percent) second to e-mail (69.86 percent). The study concludes that the use of the Internet for academic research would significantly improve through the provision of more access points at Departmental and Faculty levels.

2020 ◽  
Vol 9 (2) ◽  
pp. 235
Author(s):  
Dela Yuliana ◽  
I Komang Ari Mogi

Technological developments are very beneficial for the world of education, such as the use of the internet in finding and managing information and can help in the teaching and learning process. Before using the internet, there was a computer network that played an important role in it. In building a computer network, a concept or method is needed in designing it, and here the PPDIOO method will be used and uses two types of network topologies, namely star and ring topologies. With the design of this computer network, it can help schools in the teaching and learning process and can improve the quality of teaching, the quality of knowledge and the quality of the abilities of students and teachers. Keywords: Education, Technology, Computer Networks, PPDIOO Method, Network Topology


GIS Business ◽  
2019 ◽  
Vol 14 (5) ◽  
pp. 21-28
Author(s):  
Abasiama G. Akpan ◽  
Chris Eriye Tralagba

Electronic learning or online learning is a part of recent education which is dramatically used in universities all over the world. As well as the use and integration of e-learning is at the crucial stage in all developing countries. It is the most significant part of education that enhances and improves the educational system. This paper is to examine the hindrances that influence e-learning in Nigerian university system. In order to have an inclusive research, a case study research was performed in Evangel University, Akaeze, southeast of Nigeria. The paper demonstrates similar hindrances on country side. This research is a blend of questionnaires and interviews, the questionnaires was distributed to lecturers and an interview was conducted with management and information technology unit. Research had shown the use of e-learning in university education which has influenced effectively and efficiently the education system and that the University education in Nigeria is at the crucial stage of e-learning. Hence, some of the hindrances are avoiding unbeaten integration of e-learning. The aim of this research is to unravel the barriers that impede the integration of e-learning in universities in Nigeria. Nevertheless, e-learning has modified the teaching and learning approach but integration is faced with many challenges in Nigerian University.


2012 ◽  
Vol 18 ◽  
pp. 60-70
Author(s):  
Melanie Radue

Everywhere in the media, people talk about the so-called “Twitter and Facebook revolution” in regard to the Green Revolution in Iran or other new social movements which demand democratization in their countries and use the Internet for communication and mobilization. Libertarian advocates of the Internet state that the Internet has democratizing effects because of its reputed egalitarian, open and free technological structure for communication processes. Especially in countries in which the media is under strict control by the government, these characteristics are emphasized as stimulation for political liberalization and democratization processes. This essay critically examines the alleged democratizing effect of the use of the Internet on the Malaysian society exemplified on the social movement Bersih. The Bersih movement demands free and fair elections in Malaysia, often described as an ethnocratic and “electoral authoritarian regime”. 141 The objective of this study is to demonstrate the dependency of such possible effects on context.


Author(s):  
Nasreen Abdel - Ilah Zahra

The study was used to study the reality of the use of postgraduate students for e- mail. The descriptive descriptive method was used. The questionnaire was used as a tool for study، which averaged 1.99 and a standard deviation of 0.61. It was applied to 45 students from post- Different The results showed that postgraduate students have a desire to use e- mail in university education and to communicate with colleagues and faculty members. However، there are obstacles to their use. The faculty members do not encourage students to use e- mail، lack e- mail skills، Access to the internet laboratory at the college، the reluctance of faculty members to give their email address to students، network problems (slow) In the light of the results، a set of recommendations and proposals were presented to activate the use of e- mail in university education، especially among postgraduate students in the Faculty of Education and various Syrian and Arab universities


Author(s):  
W. Benjamin Porr ◽  
Robert E. Ployhart

This chapter presents a framework through which ethical Internet-based organizational research can be conducted. Organizational constraints that promote the use of the Internet for applied research are identified, followed by potential benefits and drawbacks. The chapter then discusses the ethical issues that must be considered when conducting Internet-based organizational research; these include concerns about privacy, confidentiality, anonymity, informed consent and providing a debriefing. A case study illustrates these issues, and the chapter concludes with directions for future research. Numerous tables and figures are used to serve as a quick reference for the key points of the chapter.


Author(s):  
Zelal Gültekin Kutlu

In this study, the periodical differences of industrial revolutions, which is one of the effects of technological developments in the industrial field, and the last stage of it are mentioned. With the latest industrial revolution called Industry 4.0, machines work in harmony with technology at every stage of industrial areas. This period, known as Industry 4.0 or the fourth industrial revolution, refers to the system in which the latest production technologies, automation systems, and the technologies that make up this system exchange data with each other. In addition to the information technologies and automation systems used in Industry 3.0, industrial production has gained a whole new dimension with the use of the internet. With internet networks, machines, operators, and robots now work in harmony. At this point, the concept of internet of objects becomes important. Therefore, another focus of the study is the concept of internet of objects. There are some assumptions about the uses, benefits, and future status of the internet of things.


2011 ◽  
pp. 2159-2163 ◽  
Author(s):  
Simpson Poon

The use of the Internet for business purposes among small businesses started quite early in the e-commerce evolution. In the beginning, innovative and entrepreneurial owners of small businesses attempted to use rudimentary Internet tools such as electronic mail (e-mail) and file transfer protocol (FTP) to exchange messages and documents. While primitive, it fulfilled much of the business needs at the time. Even to date, e-mail and document exchange, according to some of the latest research findings, are still the most commonly used tools despite the fact that tools themselves have become more sophisticated.


Stalking ◽  
2007 ◽  
Author(s):  
Graham D. Glancy ◽  
Alan W. Newman

Cyberstalking involves the use of the Internet or other electronic communication to stalk another person. Already common, it is likely to become more common as the use of the Internet continues to grow. The characteristics of online stalkers and their victims have some differences from those of the offline stalker. Mullen, Pathé, Purcell, and Stuart’s (1999) classification may apply to cyberstalkers except for the apparently common phenomenon of child luring that may be a new category. The methods of cyberstalking, as described in this chapter, are particularly ingenious. We know little about the effect on victims, but postulate that it is similar to offline stalking. We make some suggestions that may prevent cyberstalking, as well as offer some steps to bear in mind once cyberstalking occurs. The proliferation of personal computers with Internet access in the last decade has raised concerns about a new phenomenon known as cyberstalking. The Internet can be used to annoy and harass large numbers of victims in a generic manner by disseminating computer viruses, Internet scams, and “spamming” people with unsolicited e-mail. In 1999 Janet Reno, the attorney general of the United States, defined cyberstalking as the use of the Internet, e-mail, or other electronic communications devices to stalk another person (Reno, 1999). Barak (2005) looked at the issue of sexual harassment on the Internet. He characterizes cyberstalking as one type of sexual coercion. He notes that online behavior is characterized by disinhibition, openness, venture, and bravado—an atmosphere characterized by typical masculine attitudes. He argues that the lack of legal boundaries or enforcement vehicles encourage people to do what they would not have done in offline situations. He notes the near impossibility of implementation of legal procedures on a large scale. In this chapter we will discuss what is known about the prevalence of this phenomenon, the types of cyberstalking, and what is known about the perpetrators. In addition, we will generate some hypotheses about the comparison between online and offline stalkers. We will also discuss the effects on victims and current thoughts and resources for dealing with cyberstalking.


Author(s):  
Ook Lee

ENI Company is an electronic commerce firm in South Korea. ENI Company provides English news items and English lessons to the subscribers through daily e-mail service that includes free English news-related question and answer sessions via e-mail. This case study deals with the struggle of this firm to establish and sustain its business in a less-developed national information infrastructure. Information on national information infrastructure and the Internet in South Korea is provided in order to facilitate understanding of the difficulty that ENI Company faces while conducting e-commerce in South Korea. The chronology of ENI Company evolution is described and the organizational structure of ENI Company is also presented. The marketing of ENI Company’s products that is the biggest challenge for the firm is also discussed. This case is a good example of how to conduct an e-commerce in a county where national IT infrastructure is not ready for it.


Author(s):  
Lynda Holland ◽  
Joy Garfield

This paper links research and teaching through an applied Soft Systems Methodology case study. The case study focuses on the redevelopment of a Research and Professional Skills module to provide support for international postgraduate students through the use of formative feedback with the aim of increasing academic research skills and confidence. The stages of the Soft Systems Methodology were used as a structure for the redevelopment of module content and assessment. It proved to be a valuable tool for identifying complex issues, a basis for discussion and debate from which an enhanced understanding was gained and a successful solution implemented together with a case study that could be utilised for teaching Soft Systems Methodology concepts. Changes to the module were very successful and resulted in significantly higher grades and a higher pass rate.


Sign in / Sign up

Export Citation Format

Share Document