Free Essay

Elearning

In:

Submitted By lily4nero
Words 4125
Pages 17
Vol 6. No. 2, June 2013
African Journal of Computing & ICT © 2013 Afr J Comp & ICT – All Rights Reserved - ISSN 2006-1781 www.ajocict.net

Design and Implementation of Real-Time Crime Information System for National Drug Law Enforcement Agency (NDLEA) in Nigeria
C.H. Ugwuishiwu & K.C. Ugwu Department of Computer Science University of Nigeria Nsukka, Nigeria Chilkodili.ugwuishiwu@unn.edu.ng H.C. Inyiamah Department of Computer Engineering Nnamdi Azikiwe University Awka, Nigeria drhcinyiama@gmail

ABSTRACT
The problems of narcotic drugs in Nigeria as manifested in the cultivation, trafficking and abuse of drug is of increasing concern to the government, social researchers, and other stakeholders. The impact of illicit drugs continues to threaten the economies and social structures of both producing and consuming countries. This paper presents an implementation framework for a reliable, efficient and mobile real- time crime information system (CIS) that will help to maintain instant flow of information between the general public and NDLEA. This application solved this problem through a just-in-time flow of crime information from an informant who could be an individual, corporate body or any other government agency to the NDLEA office for a necessary action. This kind of information if handled properly will lead to illicit drug supply suppression hence reduce its availability as well as other substances of abuse. It will also help in drug demand reduction which result in a decline in the consumption of illicit drug substances. Keywords: : NDLEA, Law Enforcement Agency, Crime, Drug Trafficking, illicit drug, information System. .
African Journal of Computing & ICT Reference Format C.H. Ugwuishiwu, H.C. Inyiamah & K.C. Ugwu (2013). Design and Implementation of Real-Time Crime Information System for National Drug Law Enforcement Agency (NDLEA) in Nigeria. Afr J. of Comp & ICTs. Vol 6, No. 1. Pp 129-136.

1. INTRODUCTION Drugs, alcohol and substance abuse have become an ever-increasing problem in Nigeria with serious health and social implications. The cultivation of hard drugs, its abuse together with trafficking has become a source of worry to the government and the society at large. The proliferation of hard drugs and its subsequent abuses has led to mental illness among young people and the deterioration of the health of the nation’s active population. Baniyi( 2008) said that drug and alcohol abuse contribute significantly to the incidence of domestic aggression, violent crimes, broken homes and juvenile delinquency. The Federal Republic of Nigeria, in reaction to the adverse effects of drug abuse on the health of users and also in fulfillment of the country’s international obligation, as a signatory to the 1988 UN Convention, which recommended separate bodies to lead the onslaught against the ravaging drug menace in many parts of the world, set up the NDLEA through Decree No. 48 of 1989, NDLEA (2011). This agency as provided in the decree was charged with eliminating the growing, processing, manufacturing, selling, exporting, and trafficking of hard drugs and psychotropic substances. Since the establishment of NDLEA, despite all the adopted strategies geared towards the control of narcotic drug abuse, illicit drug trafficking is still on the increase. Hence, the question on the lips of everyone is why has the NDLEA been visibly inefficient in drug prevention and control? Generally speaking, criminological insights have shown that very little of the crimes committed in the society are known to law enforcement agencies. Consequently, few of the criminals are arrested and prosecuted and the impacts in our society include premature death, crime, mental health disorders, transmission of HIV/AIDS and other blood borne viruses.

129

Vol 6. No. 2, June 2013
African Journal of Computing & ICT © 2013 Afr J Comp & ICT – All Rights Reserved - ISSN 2006-1781 www.ajocict.net

According to Gyong and Tanimu (2010), less than half of the crimes committed in America each year are reported to the police, and of those recorded by the police, only about 20% are “cleared by arrest”, still an arrest by no means guarantees prosecution and conviction. Similarly, crimes in Nigeria are underdetected, underreported, under-recorded and therefore underestimated. One major cause of these problems is lack of timely flow of crime information and effective collaboration between the NDLEA and the general public. The illicit drug problem has persisted because we have not devised a working solution to the problem. Thus, this work is set to design and develop an effective and efficient mobile real-time crime information system for NDLEA that will enable an informant in any part of the country to instantly send any NDLEA’s crime related information as soon as it is detected. This will to a large extent bridge the communication gap between the agency and the general public and also reduce illicit drug-related activities to the barest minimum. This system will enable the agency to generate annual reports that have records of crimes according to regions, states or cities resulting to accurate statistics to draw analysis such as information of a case, the year a crime was committed, a location with highest crime, age range that normally commit maximum number of crime and the type of crime they commit, officer who investigated the crime. These factors will help in fighting crime effectively. The rest of the work is summarized as follows: Section 2 presents the literature Review; section 3 disuses the system Analysis and Design; section 4 deals with the system Implementation and Discussion of Findings. Section 5 presents the conclusion and recommendation. 2. LITERATURE REVIEW Montaldo (2013) said that crime occurs when someone breaks the law by an overt act, omission or neglect that can result in punishment. A person who has violated a law, or has breached a rule, is said to have committed a criminal offense. According to National Crime Prevention Strategy (1996), Crime results in the deprivation of the rights and dignity of citizens, and poses a threat to peaceful resolution of differences and rightful participation of all in the democratic process. It inhibits our citizens from communicating with one another freely, from engaging in economic activity and prevents entrepreneurs and investors from taking advantage of the opportunities, which our country offers. For these reasons and many more, Government regards the prevention of crime as a national priority.

Drugs are articles that are intended for use in the diagnosis, cure, mitigation, treatment, or prevention of disease in humans or animals, and any articles other than food, water, or oxygen that are intended to affect the mental or body function of humans or animals. Narcotics are any drugs that dull the senses and commonly become addictive after prolonged use. There is no known drug that is not harmful or even poisonous at high doses, and much of the scientific work on drugs has attempted to elucidate the gap between effective and toxic doses. According to United Nations Office on drug and crime (2013), drug trafficking is a global illicit trade involving the cultivation, manufacture, distribution and sale of substances which are subject to drug prohibition laws. The main examples of illicit drugs are the opiates (mostly heroin), cocaine, cannabis, and ATS (amphetamine-type stimulants) such as amphetamines, methamphetamine and ecstasy. National Drug Law Enforcement Agency (2011) stated that drug problem is as old as man and that no society is insulated from the negative consequences of illicit drugs. Many analysts are of the opinion that apart from the genocide of Second World War, no other phenomenon has had more debilitating consequences on mankind like the pandemic drug scourge. This view is anchored on the fact that even the much dreaded HIV/AIDS which has yet defied any known cure has narcotic drugs as one of its principal causes. Besides, drugs are known to induce social vices, civil upheavals and other forms of criminalities, therefore the war on drugs should be fought with vigour to reduce crime in the society, Yahaya (2011). UNRISD (1994) observed that drug users not only suffer physical, social and economic problems themselves, but they also impose many direct and indirect costs on society. Of particular concern is the relationship between drug use and crime, especially the violent crime associated with crack cocaine. Women and children who are not themselves drug users may also be affected by problems related to drug abusing men, including HIV infection. This report also noted that despite the expenditure of billions of dollars on controlling supplies, the successful capture of major traffickers and dismantling of their drug empires, and the weaning of peasant growers away from coca and opium via alternative crop incentives, supply and consumption of drugs has continued to grow. General Assembly of the United Nations (2012) report highlighted that “We will not enjoy development without security, and we will not enjoy security without development" there is a growing recognition that organized crime and illicit drugs are major impediments to development.

130

Vol 6. No. 2, June 2013
African Journal of Computing & ICT © 2013 Afr J Comp & ICT – All Rights Reserved - ISSN 2006-1781 www.ajocict.net

Tim and Tivani (2006), describes prevention as ‘the cornerstone of drug control’, as ‘other methods are useless unless the individual comes to the conclusion that drug use is against his/her own interests’. Prevention includes primary approaches (directly stopping people using drugs such as through education or law enforcement) secondary approaches (convincing users to quit), and tertiary approaches (harm reduction approaches, such as preventing needle sharing). 2.1 Some Existing Crime Information System An information system (IS) is any system that converts data into useful information. Kiirya (2007) described information systems to consist of components that interact to achieve the objective of providing information about day-to-day activities that managers can use to control business operations. An information system contains such elements as hardware, software, personnel, databases, and procedures to accomplish its objectives. Crime Information System (CIS) is any system that could be used to keep records of crimes or criminal cases which can also help in getting information pertaining to certain crimes. CIS can be used to carry out statistical analysis of crime committed within a region-e.g. SouthEastern region, Nigeria. Regional Information Sharing Systems (RISS) – The RISS Program is a federally funded program administered by the U.S. Department of Justice (DOJ), Bureau of Justice Assistance (BJA). This crime information system supports law enforcement efforts nationwide to combat illegal drug trafficking, identity theft, human trafficking, violent crime, terrorist activity, and promote officer safety. RISS was established more than 30 years ago, in response to specific regional crime problems and the need for cooperation and secure information sharing among law enforcement agencies. Today, RISS is a national network comprised of six multistate centers designed to operate on a regional basis. RISS operates a secure intranet, known as RISSNET, to facilitate law enforcement communications and information sharing nationwide, Information Sharing Environment (2012). The National Crime Information Center (NCIC) is a USA computerized database of documented criminal justice information available to virtually every law enforcement agency nationwide. It is a nationwide system operated by the Federal Bureau of Investigation (FBI) dedicated to serving and supporting local, state, and federal criminal justice agencies in their mission to uphold the law and protect the public. The NCIC became operational on January 27, 1967, with the goal of assisting law enforcement in apprehending fugitives and locating stolen property. This goal has since expanded to include locating missing persons and further protecting law enforcement personnel and the public.

The NCIC database consists of 18 files. Seven property files contain records for articles, boats, guns, license plates, securities, vehicles, and vehicle and boat parts. The 11 person files are the Convicted Sexual Offender Registry, Foreign Fugitive, Identity Theft, Immigration Violator, Missing Person, Protection Order, Supervised Release, Unidentified Person, U.S. Secret Service Protective, Violent Gang and Terrorist Organization, and Wanted Person Files. In addition, the database contains images that can be associated with NCIC records to assist agencies in identifying people and property items. The Interstate Identification Index, which contains automated criminal history record information, is also accessible through the same network as the NCIC. Commonwealth (2013). Police Information Management System (PIMS) is an offline project that allows user to store police department’s case details, Complaint Details, First Information Report (FIR) Details, etc. This Software Package allows Police Departments to store all the details related to the department and use them whenever necessary. The project reports various cases, FIR report, charge sheet report, Most Wanted Criminals record, payroll, attendance reports and also can upload and view criminal photos and scanned documents. The requirements for this system was collected from Manglaore Police Station, Free Student Project (2012). 2.2 Drug Consumption and Crime There is obviously a relationship between drug consumption and crime, although it is often not clear which is cause and which is effect. In principal consuming areas such as North America and Western Europe, psycho-pharmacological effects, economiccompulsive drives and systemic violence are considered the principal components of the drugs-crime link. The most harmful psycho-pharmacological effects of drug use, particularly those associated with crack cocaine; involve people becoming irrational, excited, agitated or impulsive. Users may become unable to control their anger and vent it in the form of physical assault, including homicide. In one of the first studies clearly linking violent behaviour and crack cocaine use, it was reported that nearly half the callers to a nationwide cocaine hotline in the United States said they had committed violent crimes or aggressive acts (including child abuse, murder, robbery, rape and physical assault) while using crack, UNRISD (1994).

131

Vol 6. No. 2, June 2013
African Journal of Computing & ICT © 2013 Afr J Comp & ICT – All Rights Reserved - ISSN 2006-1781 www.ajocict.net

3. THE CRIME INFORMATION SYSTEM ANALYSIS AND DESIGN This section of the work includes the architecture of the NDLEA crime information system, the database of the system and the system software requirements. 3.1 Architecture of the crime information system The NDLEA crime information system architecture defines the key components of this system together with the interactions between these components as shown in figure 1. This system architecture consist of an informant, NDLEA Head Office, Database Management System (DBMS), a web based application and NDLEA’s branch Offices at different location in the country.

This system is modeled in a way that when an NDLEA related crime is detected by an informant, he/she sends this information through a web application to NDLEA office with either a mobile phone or computer by opening NDLEA website. This information goes to the NDLEA state office (local level) nearest to the scene of the crime and gives an alert by showing on the screen that there is a new message. This enables NDLEA to instantly initiate the crime investigation process, where the state branch cannot handle the case; they forward it to their head office for a necessary action. The crime information will contain the location of the crime, time it occurred, date of the incident, name of suspect if available, the type of crime committed. This information when sent stores a copy in NDLEA database. This application can equally sends an acknowlegdement message to the crime reporter showing that the information he sent has been received. The NDLEA Database Management System (DBMS) contains all the NDLEA crime information which when properly utilized will help NDLEA to large extent in fighting the war of crime.

Fig. 1: Architecture of The NDLEA Crime Information System

132

Vol 6. No. 2, June 2013
African Journal of Computing & ICT © 2013 Afr J Comp & ICT – All Rights Reserved - ISSN 2006-1781 www.ajocict.net

3.2 Database Database has the core service for storing, processing and securing data. The database server provides controlled access and rapid transaction processing to meet the requirements of the client. Many tables were used in this work for instance a table that list all the tables in the database of this application, others contain Information on admin page, reported crime details, branch office details, etc. 3.3 Operating System and Programming Platform Windows Vista, Microsoft SQL Server, Wamp Server and Php, Css, Javascript, Ajax scripting languages were used to implement the application package. Implementation This refers to the development, deployment (installation and testing) of all the system components. This involves the transformation of ideas such as algorithms, flowcharts, programming language used, etc. into real process flow of information. The system operates as follows: A Welcome Screen Form A welcome screen contains major links to other web pages of the application, some information about NDLEA and also the admin sort code where super administrator (head office admin) can type his password to enter into the admin login page.

Fig 2.Welcome Screen Admin Login page/screen- This is where super Admin login to resume his activities using his username and password. REPORTER’ S PROFILE This page shows the details of the most recently reported crime and it is shown in fig.3. It can be accessed only when the admin logs in. The super Administrator can click on action field (view) this table to confirm, reject or make that information public.

133

Vol 6. No. 2, June 2013
African Journal of Computing & ICT © 2013 Afr J Comp & ICT – All Rights Reserved - ISSN 2006-1781 www.ajocict.net

Fig.3: Recently Reported Crime. View Report page – This page shows the details of the reported crime. This page shows all the available crime information reported in the database. You can click on view field to view individual crime record. On home page or any other page that contains the application links, you can select any of the options such as About NDLEA, View Reports (all reported crimes), The crime Report pageThis page is where the reporter fills the details of the crime information to be sent. To send this information, the crime reporter will fill a form called Crime Report Form which has the following fields: reporter’s name, reporter’s email, reporter’s phone, crime state, crime LGA, Crime location and Crime details. Note that fields that are marked asterisk (*) are compulsory to be filled while the rest are optional.

Fig 4. Crime Reports Page

134

Vol 6. No. 2, June 2013
African Journal of Computing & ICT © 2013 Afr J Comp & ICT – All Rights Reserved - ISSN 2006-1781 www.ajocict.net

REFERENCES Other links are Policies (the policies governing the NDLEA can be viewed here). Crime cases (it shows the treated crime cases), achievements (all the achievements made by NDLEA can be viewed), agencies (it shows the working members of NDLEA), Drug Law (the laws regarding to drugs can be viewed), NDLEA Blacklist (it shows the most wanted person by the NDLEA and other similar cases).

4.

5. 4. CONCLUSION The aim of this research work was achieved by a successful design and implementation of an NDLEA realtime crime information system. This web application enables an informant to instantly communicate NDLEA as soon as crime related to them is detected. From this research, it was observed that there is a strong relationship between drug use and crime, especially the violent crime associated with crack cocaine, it is also noted that these drug users not only suffer physical, social and economic problems themselves, rather they impose many direct and indirect costs on society. It thereby contributes to social disorganization and disintegration. This system when applied properly will to a large extent bridge the communication gap between the agency and the general public which in turn results in reducing the rate and adverse effect of crime in our society. 5. RECOMMENDATION To ensure the effectiveness of the result of this application, some recommendations become inevitable: 1. No single body can solve the illicit drug problem. Collaboration of government agencies, corporate body and the general public is needed. We should all sincerely join hands to fight this societal disorganizer. There is strength in unity, and confronting the menace individually is in fact a waste of time and a lost battle. 2. A parallel effort by Governments to show transparency in their actions against drugs trafficking and to gain solid public trust is paramount. For instance, NDLEA officers should not engage in bribery and must be fair to their judgment so that people will appreciate them and fill happy to join and fight crime. So, without public support and trust, all efforts will fail. 3. Government should provide adequate funding to NDLEA just like in any other respectable programme to enable them to carry out their plan of Action effectively and efficiently. [2]

6.

The necessary technologies must be made available. For example, intelligence gathering and analysis is at the heart of detection and interdiction. This requires the use of the latest technology in satellite surveillance and secure data transmission. Another example is the latest container scanning equipment which allows detection of drugs and other illegal shipments within unopened containers. This is a powerful tool as a deterrent to would be traffickers Adequate and pertinent training is a prerequisite to efficient intervention in combating the trade in illegal drugs. In law enforcement, forensics, rehabilitation, money laundering, information technology, etc…, personnel who do not have the necessary skills cannot win the fight they are engaged in. The programmes set in place are only as good as the people involved in them. If the persons cannot cope, then all the planning and equipment in the world won’t make much difference. Qualified, educated and dedicated people are what make everything work. That is the bottom line.

REFERENCES [1] Abdullahi S.(2009) Drug Trafficking and its Impact on West Africa retrieved from http://www.giaba.org/media/f/231_09Effects_ Of_Drug_Trafficking_For__Parliamentaria ns,_09-comrs.pdf accessed on 06/12/12. Baninyi, M. (2008) Pardigms, Pathologies and Practicalities- policing organized crime in England and Wales, Policing, 2 (1) 63-73. Published in National Guidance 2008. Commonwealth (2013) National Crime Information Center retrieved from http://www.mass.gov/eopss/law-enforce-andcj/cjis/national-crime-information-centerncic.html accessed on 06/12/12. Diane L. and, James L. (2003) ILLEGAL DRUGS AND DRUG TRAFFICKING retrieved from http://www.parl.gc.ca/Content/LOP/ResearchP ublications/bp435- e.htm accessed on 25/12/12

[3]

[4]

135

Vol 6. No. 2, June 2013
African Journal of Computing & ICT © 2013 Afr J Comp & ICT – All Rights Reserved - ISSN 2006-1781 www.ajocict.net

[5]

Free Student Project (2012), Crime Information Management System retrieved from http://www.freestudentprojects.com/studentproj ectreport/projectreport/crime-informationmanagement-system/ accessed on 06/12/12 General Assembly of the United Nations (2012): Thematic Debate of the 66th session of the United Nations General Assembly on Drugs and Crime as a Threat to Development On the occasion of the UN International Day against Drug Abuse and Illicit Trafficking retrieved from http://www.un.org/en/ga/president/66/Issues/dr ugs/drugs-crime.shtml accessed on 06/12/12 George W. B. (2002) The President's National Drug Control Strategy retrieved from http://georgewbushwhitehouse.archives.gov/news/releases/2002/0 2/20020212-2.html Gyong J. E. and Tanimu B. (2010) A Sociological Assessment of the National Drug Law Enforcement Agency’s (Ndlea) Strategies of Arrest and Detention in Nigeria retrieved from http://maxwellsci.com/print/crjss/v2-127132.pdf (journal) accessed on 24/12/12 Information Sharing Environment (2012) Law Enforcement Information Sharing retrieved from http://www.ise.gov/law-enforcementinformation-sharing accessed on 05/12/12 Kiirya G. D. (2007) A Prosecutions Management Information System (PMIS): A Case of the Uganda’s Directorate of Public Prosecutions (DPP) retrieved from dspace.mak.ac.ug/.../3/kiirya-geoffrey-davidcit-masters-report.pdf accessed on 05/12/12 Montaldo C. (2013) What Is a Crime retrieved from http://crime.about.com/od/Crime_101/a/WhatIs-A-Crime.html accessed on 05/12/12 National Crime Prevention Strategy(1996), National Crime Prevention Strategy: Summary retrieved from http://www.info.gov.za/otherdocs/1996/crime1. htm accessed on 0612/12 National Drug Law Enforcement Agency (2011). Brief History of Nigeria’s CounterNarcotic Efforts. Retrieved from http://www.ndlea.gov.ng/v1/?q=content/history accessed on 06/12/12
136

[14]

Public Agenda (2011) Issue Guides: Illegal Drugs-Consider the Choices retrieved from http://www.publicagenda.org/citizen/issueguide s/illegal-drugs/considerchoices accessed on 2512/12 Tim W. and Tivani W. (2006), Root Causes of Illicit Drug and Alcohol Problems in Minority Communities in Northern Thailand, and the Shan State of Myanma retrieved from http://www.diakonia.se/documents/public/resul ts_and_highlights/annex_diakonia_thailan d_report_jan_2007.pdf accessed on 06/12/12 United Nations Office on drug and crime (2013), Drug trafficking http://www.unodc.org/unodc/en/drugtrafficking/index.html accessed on 06/12/12UNRISD (1994) UNRISD Briefing Paper No. 2 World Summit For Social Development http://www.unrisd.org/80256B3C005BCCF9/(h ttpAuxPages)/4C3D0BE90FAD550480256B64 00419B57/$file/bp2.pdf accessed on 05/12/12

[15] [6]

[16]

[7]

[17]

[8]

[9]

[10]

[11]

[12]

[13]

Similar Documents

Free Essay

Elearning

...New eLearning methods of the 21st century Introduction Technology is changing the way we live, including the way we educate ourselves. With the rise of social media and new media, there is an increasing demand for eLearning which presents a vast amount of possibilities. Cambridge Dictionary defines the term eLearning as “learning done by studying at home using computers and courses provided on the internet”. However, new eLearning systems have taken things to collaborative levels beyond stay-at-home learning in recent years. In order to fully understand the potential of eLearning, one also has to take a look at the different tools being used and the emerging trends which will shape the future of both teaching and learning. In particular, this paper will take a look at the two eLearning trends MOOCs and educational games. Only after becoming familiar with these technologies and approaches can we explore the issue of whether ‘traditional’ teaching will become obsolete in the face of eLearning in the years to come. CBT and MOOCs Computer Based Trainig (short: CBT) is the most well-known eLearning approach and has been around for more than 20 years. It refers to offline training with media like CD-ROMs or DVDs as well as Web Based Training (WBT) which requires the user to be connected to the internet in order to download eLearning content. Computer Based Training includes all kinds of virtual learning approaches, for example audio-based courses (podcasts), educational games...

Words: 1592 - Pages: 7

Free Essay

Elearning

...Explain how technology has changed the learning environment. New technology such as E-learning has the use of Internet technologies to enhance knowledge and performance. E-learning technologies have provided learners with the capability to have control over contents, learning sequences, pace of learning, and media database at their fingertips which saves time. It also allows them to tailor their experiences to meet their personal learning objectives. Noe’s thoughts on new technology depicted on p.358 that new technology training methods are superior to traditional methods in one way because they allow trainers to participate in courses at any time or places (Noe, p. 358). I once read a case study which depicted an insurance company who was looking for new ways to cut cost while simultaneously maintaining their competitive edge in the insurance marketing industry. In this scenario, the company was a giant amongst its competitors, and all their employees were grandfathered in as there were practically relatives or good friends of the CEO. When the CEO died, he left the company to his son. After the first year of running the company, his son realize that he could expand the company, increase sales, make a profit, and cut expenses at the same time by using new technology such as multimedia, and E-Services. This was a great idea; very innovative marketing strategy; however, it also meant lay-offs and unemployment for most employees. His concepts for change were based on the...

Words: 1165 - Pages: 5

Premium Essay

Elearning

...國 立 聯 合 大 學 資訊與社會研究所 碩 士 論 文 以整合性科技接受模式探究 哈客網路學院數位學習之研究 The Study of Using UTAUT to Explore the Hakka E-learning Systems 研 究 生:歐淑芬 撰 指導教授:晁瑞明 教授 中華民國九十九年一月 本論文獲行政院客家委員會 99年度客家研究優良博碩士論文獎助 ii 行政院客家委員會獎助客家研究優良博碩士論文精要 一、論文名稱:以整合性科技接受模式探究哈客網路學院數位學習 之研究 二、作者:歐淑芬 三、獎助年度:99年度 四、獎助金額:新台幣伍萬元整 五、研究過程(含研究方法、研究對象、研究工具等) 本研究以 Venkatesh (2003)所發展出的整合型科技接受模式 (Unified Theory of Acceptance and Use of Technology, UTAUT) 中結合神迷經驗(Flow Experience)的構面,來探討哈客網路學院 數位學習的使用作成效;依據文獻蒐集與分析,本研究所謂「科技 的接受度」係指「使用意願」(BI)和「使用行為」(Usage)的強度。 「外部變數」由 UTAUT 中的四個主要構面導入神迷經驗所組成,調 節變數方面以性別(Gender)、年齡(Age),來觀察採用因素對使用 意願的差異。 本研究分為二部分,第一部份說明績效期望、努力期望、社會 影響、促成因素與神迷經驗五個構面與數位學習的使用意圖;第二 部分說明性別與年齡兩個調節變數對哈客網路學院的採用因素之 關係。 i 神迷經驗 Flow Expectancy 使用哈客網路學院意願 績效期望 Performance Expectancy 實際使用哈客 網路學院的行為 努力期望 Effort Expectancy 社會影響 Social Influence 調節變數 moderators 促成因素 Facilitating Conditions 性別 年齡 本研究架構圖 本研究將研究對象鎖定為已具有「哈客網路學院」使用經驗者 為研究對象,透過與哈客網路學院相關的討論區、電子佈告欄進行 問卷訊息的發送,以此接觸目標對象,進行網路問卷填寫蒐集,做 為後續統計分析之資料。本研究問卷分為兩部份:第一部份人口變 項資料問卷,主要了解受試者個人資料、調節變項及哈客網路學院 數位學習的使用行為。第二部分,影響使用者採用哈客網路學院數 位學習因素之衡量,構面量表的計分方式皆採 Likert 五點量表, 從非常不同意到非常同意採雙極計分,等距尺度量測。 六、主要研究發現 影響使用者採用哈客網路學院數位學習的行為意願及使用行 為藉由文獻探討得知,可概分為績效期望、努力期望、社會影響、 促成條件、神迷經驗等五大部份,其中績效期望包括:知覺有用、 工作相關、預期成效等三項;努力期望包括:知覺易用、複雜性、 操作簡單等三項;社會影響包括:社會因素、主觀規範、公眾形象 等三項;促成條件包括:支援系統及自我認知等二項;神迷經驗包 括:專注、愉悅、好奇三項等;而行為意願與促成條件影響使用行 為。 本研究結果藉由研究假說逐一說明如下: 績效期望因素會影響使用者對哈客網路學院數位學習的使用 意願,獲得支持:哈客網路學院數位學習的績效期望會直接影響使 用者採用意願,此即表示使用者認為哈客網路學院可以協助其更有 效率的在網路上數位學習,並能獲得有用的知識,以提升自己工作 ...

Words: 7296 - Pages: 30

Premium Essay

Elearning Project Management

...E-Learning Project Management and Documentation Guidelines The work described in this document has been undertaken by the Human Factors Integration Defence Technology Centre, part funded by the Human Capability Domain of the U.K. Ministry of Defence Scientific Research Programme. © Human Factors Integration Defence Technology Centre 2006. The authors of this report have asserted their moral rights under the Copyright, Designs and Patents act, 1988, to be identified as the authors of this work. Reference .............................................. HFIDTC/WP2.1.5/1 Version.................................................................................2 Date................................................................. 30 April 2006 ©Human Factors Integration Defence Technology Centre 2006 HFIDTC/WP2.1.5/1 Version 2/ 30 April 2006 Authors J. Pike J. Huddlestone Cranfield University Cranfield University ii HFIDTC/WP2.1.5/1 Version 2/ 30 April 2006 Contents 1 2 2.1 Introduction ................................................................................................ 1 The e-learning development lifecycle ......................................................... 2 Instructional design perspective.......................................................................................... 2 2.1.1 Key Stages................................................................................................................ 3 2.1.2 Design and Development...

Words: 9395 - Pages: 38

Free Essay

Mcdonald's Financial Skills Elearning

...them. Our Solution In a matter of days, we developed a prototype for McDonald’s using Articulate. The result convinced them that this tool fully met their requirements – it was a rapid solution that delivered engaging learning, and helped us meet their strict branding requirements. A joint effort The project was very much a collaborative venture. We used the content and scripts developed by the McDonald’s team to create a quality final product. And because Articulate is so easy to work with, staff can develop skills quickly to be able to maintain and update the content – once we’d built the basics, McDonald’s could use it for years to come. Becoming part of the McDonald’s team – we’re happy to serve... As McDonald’s internal elearning capability has grown, further modules have been designed and developed; some by McDonald’s on their own, and some in partnership with City & Guilds Kineo. Working this way gives their team the flexibility they need, calling on us for additional capacity, or specific technical developments need that can’t be addressed in-house. By providing an extension to the McDonald’s in-house team, City & Guilds Kineo provides an invaluable...

Words: 599 - Pages: 3

Free Essay

Critical Success Factors for Elearning

...Creative Education 2012. Vol.3, Supplement, 61-66 Published Online December 2012 in SciRes (http://www.SciRP.org/journal/ce) DOI:10.4236/ce.2012.38b014 Critical Success Factors for Online Distance Learning in Higher Education: A Review of the Literature Bussakorn Cheawjindakarn1, Praweenya Suwannatthachote2, Anuchai Theeraroungchaisri3 1 Faculty of Education, Chulalongkorn University, Bangkok, Thailand Faculty of Pharmaceutical Sciences, Chulalongkorn University, Bangkok, Thailand Email: bussakornonline@gmail.com, praweenya@gmail.com, anuchai@gmail.com 2 Received 2012 The aim of this paper is to specify the Critical Success Factors (CSFs) for Online Distance Learning (ODL) in Higher Education (HE). Research methodology was analyzing and synthesizing the literature review. The literatures were reviewed to determine items relevant to online learning success as implementation, criteria and indicator. A total of 19 papers, published during 2000-2012, were selected from Chulalongkorn University reference databases. Data analysis method was using one of the popular analysis techniques for qualitative research works or the content analysis. The results on the CSFs for ODL can be grouped into 5 factors: 1) institutional management, 2) learning environment, 3) instructional design, 4) services support and 5) course evaluation. Each of these 5 factors includes several important elements that can assist to enhance efficiency of online learning courses in higher education institutions...

Words: 5465 - Pages: 22

Premium Essay

Vines Laboratory and Elearning on Retention of Learning Among Level Ii Student Nurses

...VINES Laboratory and eLearning on Retention of Learning Among Level II Student Nurses A Thesis presented to the Faculty of Institute of Nursing Far Eastern University By: BSN 118 Group 71 Balanay, Shara Jane; Lewis, Samantha; Lisay, Kathreen; Martinez, Nikka; Obar, Zharmaine; Patiño, Mary Caryl; Quigao, Abigael; Reyes, Laurice; Silang, Johnas; Taylor, Ivanna Jane; Uy, Ashley Chloè In Partial Fulfillment of the Requirement for The course in Nursing Research Far Eastern University September 2010 Abstract The study seeks to determine the difference in the learning retention rate of students exposed to either eLearning or VINES laboratory instruction.             88 students from Level II Institute of Nursing of the Far Eastern University were purposively selected for the experiment, specifically those without prior experience with the modules. Subjects were notified of the purposes of the research through an informed consent. The respondents, categorized randomly as either Group A or B and were given the same lessons thru eLearning or a simulated-hospital setting using VINES respectively.             Mean scores gathered from the two groups were computed, with the difference evaluated using independent t-test. Significant difference was noted between the mean scores of students under Group A and B suggestive that VINES provides students greater advantage in learning retention than eLearning.  Given the results, the researchers recommended the use of...

Words: 11711 - Pages: 47

Premium Essay

Fsa Coourse Outline

...Course Outline Programme: International Masters of Business Administration Cohort: 57 Academic Year/Trimester: 2015/2016 Trimester II Course Code and Course Name: INBA 6370 - FINANCIAL STATEMENT ANALYSIS FOR GLOBAL FIRMS Course Type: Core Level: Year 1 Lecturer: Mr. Andre Taitt Lecturer’s e-mail: andre.taitt@fac.gsb.tt Lecturer’s phone #: 1-868-685-5631 Learning Assurance Officer: Alana Ifill Prerequisite/co-requisite course (s): Introduction to Financial Accounting Workshop Involvement of other institutions for delivery: None 1 1.0 Vision and Mission of the Lok Jack GSB Our purpose is to contribute to the development of the human and institutional capacity required to transform the business landscape and shape our own destiny. Through our comprehensive and integrated programmes and consultancy services, we provide a framework for developing new pathways for achieving sustainable growth and competitiveness The mission of the School is to improve the international competitiveness of people and organisations in the Caribbean through business education, training, consulting and research. 2.0 Quality Statement In today’s organization the non financial manager can no longer avoid financial information. Profit statements, operating budgets, and project analyses are constant part of a manager’s day. The concept of the finance and non financial manager has now become very blurred. The modern manager must have the ability to utilize the appropriate...

Words: 3075 - Pages: 13

Premium Essay

Staffing Organization

...just-in-case training designed to facilitate performance improvement and creativity. When compared with time-consuming traditional training methods, elearning can offer immediate results and this has led many to implement it with haste. However, while proficient human resource management and financial planning can lead to the establishment of an elearning solution, failure to take further steps necessary to affect cultural change within the organization may, in the long term, seriously jeopardize the prospect of making such a strategy sustainable. This paper explores examples of best practice in managing the factors necessary for elearning sustainability, namely: detailed planning, creation of a sound business case, involvement of champions, harnessing of technology, transitioning, a blended solution, and sustained evaluation.IntroductionBerge and Kearsley (2003) state that in many cases, “even after distance training has been successfully implemented, sustaining it remains a struggle” (p.6). This need not be the case. The impact of elearning can be immediate (David, 2006). It can offer significant cost-savings. However, the move to elearning must be more than convincing executives to fund a pilot; more than succeeding in the short term, or boasting about initial financial rewards. Given that the organization has a goal of integrating elearning into their performance improvement arsenal, best practice exists to bring about long term success through a change in culture from training to...

Words: 3697 - Pages: 15

Premium Essay

E-Learning

...What is eLearning? The teaching and learning methodology is a four-step progressive / recursive design adapted from experiential education theory. Using this methodology, material covered during this training will be systematically presented (Step A), practiced (Step B), assessed (Step C) and reviewed (Step D). Starting at the top of the circle to the right, Step A represents the introduction to new materials such as theory and skills. Progressing to Step B, participants will practice the application of the newly presented materials. Once applied, participants will assess their work in Step C, which will lead to a reflection or review of lessons learned in Step D that will inform and influence the next progressive iteration the learning cycle, beginning with Step A. A full progression of this methodology will be attempted each day of the training event. For example, the first day of this training will focus on the fundamentals of eLearning, where materials will be presented during the initial part of the day (Step A) and learning activities centered on the application of these materials will be conducted during the latter part (Step B). Concluding the day, participants will be asked to assess their understanding of the fundamentals of eLearning (Step C) and to identify questions and unresolved related issues for the next day’s session (Step D). The second day will build on the materials introduced and practiced during the first and will be guided by the participants’ assessment...

Words: 6690 - Pages: 27

Free Essay

Learning

...afforded through eLearning to target a specific type of learner who does not fit the traditional model of a university student (9). As the leading model of distance learning institution, the OU is well accustomed to educating remote learners and has, through its commercial subsidiary Corous, begun offering “computer based interactive learning and training systems”(25) to organisations looking to train and equip their employees with a number of new skills(25) Despite Professor Lilliard’s assessment, eLearning now plays an integral part in the Open University’s strategy (4) and it is pivotal in their attempts to lure the corporate clients. As far as an individual is concerned, eLearning presents the learner with the opportunity to engage in study without the need to be physically present at his/her institution and as such, is liberated from the need to attend preordained sessions or lectures (23). This emancipation of the learning process means that education is immediately made accessible to those who would otherwise find a fixed time table prohibitive or would otherwise be unable to attend the institution of their choice (26). 6. Limitations and shortcomings of eLearning According to Macpherson, the overwhelming majority of information concerning eLearning gravitates towards its advantages (27), however the author’s experience would suggest otherwise and it has been possible to gather a considerable amount of information relating to the negative aspects of eLearning. As such,...

Words: 703 - Pages: 3

Free Essay

Ambient Insight

...Ambient Insight's Q1-Q3 2015 International Learning Technology Investment Patterns Table Of Contents Tables.................................................................................................. 3 Figures ................................................................................................ 3 The Global Learning Technology Investment Patterns ........................ 4 Scope of this Whitepaper: What We Don't Track and What We Do Track ..... 5 What We Do Not Track .......................................................................................... 5 What We Do Track ................................................................................................ 6 New Interest in Location-based Learning: Mapping Companies Attract Unprecedented Funding........ 7 Cognitive Learning in the Spotlight: Spike in Investments in Behavior Modification Companies ........ 9 Sources of Investment Activity Information .............................................. 11 Investment Patterns in Context: The Longitudinal Perspective ......... 11 Blowing Past the $3 Billion Threshold ....................................................... 12 The China-India-Brazil Juggernaut ............................................................ 12 Opening the Floodgates: Unprecedented Deal Flows in 2015 ............ 13 Funding Amounts Over $50 million in First Three Quarters of 2015 .. 16 Retail Education: Consumer-facing Companies Still Attracting Investments...

Words: 11110 - Pages: 45

Premium Essay

The Future of Education

...could normally be wasted. Whilst you used to be confined to the classroom, the whole world can now be your classroom. Third, It has a Lower cost. As just mentioned, E-Learning can be done wherever you have a device capable of doing so. Therefore again you can fit it in to your schedule, but also save money on the costs of travel.Forth, Tailor it to you. E-Learning courses aren’t confined to be fixed to try and suit the needs of the majority. If you feel you already know a particular area well and don’t need to spend an hour on it again, then you can skim over it and concentrate that time on something you feel you need to work more at. Everyone is able to learn at their own pace – a massive factor that only eLearning can provide for. Fifth, Technological Possibilities – ELearning is fast becoming a more and more popular method and with it, so has the investment into how to improve it further. The computer based nature of training means new technology is being introduced all the time...

Words: 774 - Pages: 4

Premium Essay

Online vs. Traditional Education

...Online Vs. Traditional Education | James JohnsonCOM/155December 15, 2013 | Online Vs. Traditional Education Thesis statement Is online education equal to traditional education? Research shows that online learning is equal or better than traditional classroom experience. There has been a strong debate about online education and traditional on campus education, this essay will point out the facts about both online and traditional, on campus, teaching’s. Traditional Education A. The traditional education system relies on a style of learning intended to allow students to gain individual meaning and learning to the subject matter. Traditional education focuses on individual student’s needs and self-expression. Traditional education has a more hands-on approach that utilizes both the teacher’s intellectual values and skills as well as the students. B. Traditional schools have a more one-on-one intercourse between professor and student. 1. In a traditional school you can interact with students easier than if you were online. Living on campus lets you have a space to call your own. Online Education A. Students are given the opportunity to choose from various schools, programs and courses which are not available in the area where they live in. 1. Offers flexibility to students. Allows a more student-centered teaching approach. B. Getting an online education may help in ensuring that each lesson or material is completely understood before moving...

Words: 1522 - Pages: 7

Free Essay

E Learning

...INTERNET STUDIES SOCIAL E LEARNING BY : ID : TABLE OF CONTENTS Page# | Article . | 1 | Cover Page . | 2 | Table Of Contents . | 3 | Social E learning. | 4 | Introduction to internet and social E learning. | 5 | Applications used in social E learning . | 7 | Internet and traditional education practices . | 8 | Boundaries of internet applications in education . | 9 | What is information security ? | 10 | What are the methods of control in social E learning ? | 11 | What are the conclusion ? | 12 | References . | 13 | Appendixes . | Introduction to internet and social E learning. What is Internet ? The Internet is known to be as a global system of interconnected computers that are networked together and also  that uses the standard TCP/IP which is a protocol suite that works on serving millions and even billions of users throughout the world.  Internet is a network from the networks available that consists of huge amount of private, public, academic, business, and government networks, of local to global scope, that are linked by a broad array of electronic, wireless and optical networking technologies. The Internet is known to carry a very enormous range of information , resources and also services, as its famous examples : the inter-linked which is the HYPERTEXT documents of the world wide web famous by  (WWW) and the also to support emails. However ; people always do get mistaken about the point that the internet and the World...

Words: 2596 - Pages: 11