Browsing by Author "Longe, O.,"
Now showing 1 - 2 of 2
- Results Per Page
- Sort Options
Item Information & Communication Technology Adoption Among Adults in South Western Nigeria: An Assessment of Usage-Phobia Factors(2010) Longe, O.,; Boateng, R.,; Longe, F.,; Olaubosun, K.Measures for predicting and explaining ICT adoption among different age groups have practical implications for educators, designers and vendors who would like to assess user preferences for new products. Studying how adults adopt and use technology is therefore premised on the fact that adults must keep up with technological advancements to be able to function effectively in the information age. Our investigation of factors affecting adult’s acceptance of ICT applications in South Western Nigeria is based on the Perceived Ease of Use (PEU) and Perceived Usefulness (PU) constructs. Selected ICT products and applications such as web access (for commercial, educational and social purposes), cell phones, Ipods, ATMs and e-Banking Platforms were employed as usage parameters. A multi-item questionnaire for PEU and PU was pre-tested, validated and administered. Findings from the study showed that the fear of using technology is subsumed by the benefits accruable from usage. Results from the study also gave insights into subtle but important factors that create ICT-Phobia among adults. We conclude by recommending acceptable use environment that will provide positive experiences with ICT products and applications among the target group.Item SAKAWA - The Forms of Cyber Crime in Ghana(2011) Boateng., R.,; Longe, O.,; Isabalija, R.S.; Budu, J.This paper investigates the prevalence of cybercrimes (called ‘sakawa’) in Ghana and examines its forms and implications. Using qualitative approach, we explore efforts by organizations and government agencies in Ghana towards curtailing cybercrimes in terms of apprehension, prosecution, reporting, and law enforcement. Findings from our research showed that although awareness of cyber crime is on the increase, the crimes mostly go unreported. The Ghana Police Service which is the organ of government responsible for arresting and prosecuting cyber criminals also lack the technical know-how and adequate legal support to effectively discharge their duties. We recommend that a multi-stakeholder effort and appropriate technical training for the Police and supportive legislation are required. For online financial transactions, developing strategies which incorporate offline business qualification requirements may be the necessary starting point. Since the perpetrators are young and have some degree of technical competence to commit computer-related crimes. This brings to question the need for appropriate youth development programs which utilize their technical competencies. In future research, we will explore how social theories in criminology can assist in understanding the behavior and intention of both the victim and perpetrators in cyber crime.