...Research Paper Social vices associated with the use of Information Communication Technologies (ICTs) in a Private Christian Mission University, Southern Nigeria. Omonijo, Dare Ojo1*, Nnedum, Obiajulu Anthony Ugochukwu2, Fadugba, Akinrole Olumuyiwa3, Uche, Onyekwere Chizaram Oliver4 and Biereenu-Nnabugwu, Makodi5 Department of Student Affairs, Covenant University, P. M. B. 1023 Ota, Nigeria. Department of Psychology, Nnamdi Azikiwe University, P. M. B. 5025 Awka, Nigeria. 3 Department of Business Management, Covenant University, P. M. B. 1023 Ota, Nigeria. 4 Department of Religion and Human Relations, Nnamdi Azikiwe University, P. M. B. 5025, Awka, Nigeria. 5 Department of Political Science, Nnamdi Azikiwe University, P. M. B. 5025, Awka, Nigeria. 2 1 Accepted 6 August, 2013 This study is designed to address social problems associated with Information Communication Technologies (ICTs) and implications they portend on studentship in a Private Christian Mission University, Southern Nigeria. It tries to find out how the engagement of ICT devices results in social vices on campus. Drawing from recorded data between 2006 and 2012 academic year, the study reported six ICT tools associated with eight social- ills. Relying on raw data of 900 students disciplined within this period, the study reported that 187 students were expelled while 46 were advised to withdraw due to their involvement in ICT-related vices. Moreover, the study shows that 78 students served 1 year suspension while 589...
Words: 9381 - Pages: 38
...What factors affect reading? | | | | | | * A non-encouraging reading home environment * A non-encouraging reading classroom environment * Vision problems * Lack of interest in the book * Hearing - Speech impedement, Hard of Hearing, or deafness * Lack of background knowledge * Lack of strong vocabulary base * Gender * Intelligence with the ability to 1) learn, 2) problem solve, or 3) see relationships in reading * Language differences/Dialect/Cultural difference | | In Preventing Reading Difficulties in Young Children, Snow, Burns, & Griffin (1998) presented a synthesis of research on the conditions that contribute to successful reading. The authors identified the following factors as predictors of success and failure in reading: Physical and Clinical Factors | Predictors of School Entry | Acquired Knowledge of Literacy | Family-based Risk Factors | Neighborhood, Community, and School-based Factors | Cognitive deficienciesHearing problemsEarly language impairmentAttention deficit/hyperactivity disordersVision problems | Acquired proficiency in languageVerbal memoryLexical and syntactic skillsOverall languagePhonological awarenessOral Vocabulary | Reading readinessLetter identificationConcepts of printPhonemic awareness | Family history of reading difficultiesHome literacy environmentOpportunities for verbal interactionHome language other than EnglishUse of a nonstandard dialect of English in the homeSocioeconomic status | Environmental...
Words: 3411 - Pages: 14
...Tenth Anniversary Edition Tenth Anniversary Edition TELECOMMUNICATIONS REGULATION HANDBOOK TELECOMMUNICATIONS REGULATION HANDBOOK The Telecommunications Regulation Handbook is essential reading for anyone involved or concerned by the regulation of information and communications markets. In 2010 the Handbook was fully revised and updated to mark its tenth anniversary, in response to the considerable change in technologies and markets over the past 10 years, including the mobile revolution and web 2.0. The Handbook reflects modern developments in the information and communications technology sector and analyzes the regulatory challenges ahead. Designed to be pragmatic, the Handbook provides a clear analysis of the issues and identifies the best regulatory implementation strategies based on global experience. February 2011 – SKU 32489 Edited by Colin Blackman and Lara Srivastava Tenth Anniversary Edition TELECOMMUNICATIONS REGULATION HANDBOOK Edited by Colin Blackman and Lara Srivastava Telecommunications Regulation Handbook Tenth Anniversary Edition Edited by Colin Blackman and Lara Srivastava ©2011 The International Bank for Reconstruction and Development / The World Bank, InfoDev, and The International Telecommunication Union All rights reserved 1 2 3 4 14 13 12 11 This volume is a product of the staff of the International Bank for Reconstruction and Development / The World Bank, InfoDev, and The International Telecommunication...
Words: 132084 - Pages: 529
..."CHII"IURENGA II 1896 - 1897: A REVISIONIST STUDY THESIS Submitted in Fulfilment of the Requirements for the Degree of MASTER OF ARTS of Rhodes University I by MARK PHILLIP MALCOLM HORN January 1986 The following typog~aphical co~~ections attention since submission of this thesis. have come to my p.i line 8, "Phillip" should ~ead Philip. p.vi, li.ne 11, "Risings" should ~ead Rising. p.Vll, line 12, "~esponce" should ~ead ~esponse. p.3, line 17, "wa~f-io~" should read warriors. p.5, line 4, "96" should read 1896. p .. 8, line 3, IILomangLlndi should read LomagLlndi. p.9, line 2, " (inve~ted comma) missing after "role". p.19, line 9, "triatises" should read treatises. p.28, line 18, "analysis" should ~ead analyses. p.30, line 10, "the and" should ~ead "and the". p.42, line 28, "Histo~ians" should ~ead Histo~ian's. p.47, line 13, "Lomangundi" should ~ead Lomagundi. p.48, line 12, ~ sign missing befo~e the figu~e of 121 000. p.52, line 5, 1. ~5ign missing before the figure of 3. p.55, line 1, ~ sign missing befo~e the figu~es 10 to 60. p.55, line 3, -£ sign missing befo~e the figu~e of 100. p.56, lines 7 - 10, quote to be indented. p.b2, li.ne 1tJ, "dela" should be separated out to read "de la". p.tI4, line 4, "assisthim" should be sepa~ated out to ~ead "assist him"~· p.b"?, line 11, "inte~nicine" should t-ead intet-necine. p.83, line 17, "Ma~ch 1895" should ~ead Ma~ch 1894. p.89, line 5, "faction" should ~ead fl~action. p.95, line 29, fn. 12, "lNA" should ~ead NAZ...
Words: 104376 - Pages: 418
...The effects of Cell phone use on the study habits of students. ABSTRACT The objective of this study is to examine the effects of cell phone use on the study habits of students. The research was carried out using questionnaires distributed to 200 students who own cell phones .The questionnaires collected demographic information about the respondents, cell phone type preferences, uses of cell phones during study, predominant usage during study and information about challenges facing students in using mobile phones for study purposes. The results showed significant gender differences in several aspects of cell phone use. The results also revealed that cell phone use has negative and positive effects on the study habits of university students depending on usage patterns .The study concluded that despite the challenges faced by students ,cell phones unlike other educational innovations are firmly rooted in the society in which education and institutions are part of and ignoring the use or applications of this technology would be ill-advised. INTRODUCTION This study investigates the effects of cell phone use during study on the study habits of students. Many students starting university do not always possess the prerequisite skills to cope with the challenges of the new and changing learning environment. An environment where they are expected to study without being told specifically what or when to study. Ultimately their success or failure within university courses is determined...
Words: 5615 - Pages: 23
...International Journal of Education and Research Vol. 1 No. 10 October 2013 The effects of Cell phone use on the study habits of University of Zimbabwe First Year Faculty of Arts students. Leslei Kahari ABSTRACT The objective of this study is to examine the effects of cell phone use on the study habits of University of Zimbabwe 1st year Faculty of Arts students. The research was carried out using questionnaires distributed to 200 students who own cell phones .The questionnaires collected demographic information about the respondents, cell phone type preferences, uses of cell phones during study, predominant usage during study and information about challenges facing students in using mobile phones for study purposes. The results showed significant gender differences in several aspects of cell phone use .The results also revealed that cell phone use has negative and positive effects on the study habits of university students depending on usage patterns .The study concluded that despite the challenges faced by students ,cell phones unlike other educational innovations are firmly rooted in the society in which education and institutions are part of and ignoring the use or applications of this technology would be ill-advised. Key words: Cell phone, study habits, University of Zimbabwe INTRODUCTION This study investigates the effects of cell phone use during study on the study habits of University of Zimbabwe 1st year Faculty of Arts students. Many students starting university...
Words: 5810 - Pages: 24
...Chapter-1 1.0 Introduction With the tremendous advancement of Internet, different aspects of it are achieving the highest peak of growth. An example of it is e-commerce. More and more computers get connected to the Internet, wireless devices and networks are booming and sooner or later, nearly every electronic device may have its own IP address. The complexity of networks is increasing, the software on devices gets more sophisticated and user friendly – interacting with other devices and people are a main issues. At the same time, the complexity of the involved software grows, life cycles are getting shorter and maintaining high quality is difficult. Most users want (or need) to have access to information from all over the world around the clock. Highly interconnected devices which have access to the global network are the consequence. As a result, privacy and security concerns are getting more important. In a word, information is money. There is a serious need to limit access to personal or confidential information – access controls are needed. Unfortunately most software is not bug free due to their complexity or carelessness of their inventors. Some bugs may have a serious impact on the access controls in place or may even open up some unintended backdoors. Security therefore is a hot topic and quite some effort is spent in securing services, systems and networks. On the internet, there is a silent war going on between the good and the bad guys – between the ones...
Words: 8365 - Pages: 34
...Chapter 1 Structure and Functions of a Computer "Hardware: the parts of a computer that can be kicked." ~ Jeff Pesis After completing this chapter, you will be able to: 1. Explain the importance of computer literacy. 2. Define the term computer. 3. Identify the components of a computer. 4. Compare the uses of various types of: input devices, output devices, and storage devices. 5. Describe categories of computers and their uses. Structure and Functions of a Computer 1 1.0 Introduction A computer is an electronic machine designed for the storage and processing of data. The machinery is called hardware, and this highly sophisticated equipment needs equally sophisticated programs (called software) to become a working computer system. Modern society has come to depend very heavily on the use of computer systems. Banks, businesses, government departments, industries, shops, people at home and school all rely on computer to play a vital role in their daily activities. These activities are centered on information. In business, the computer system has been used a lot and replaced filing cabinets as means of storing information, and clerical workers as a means of processing it. By storing and processing information on a computer system, these businesses can function more quickly and efficiently, because information can be found and collated much faster. Discovery Learning: A computer was also called a data processor. Why? 1.1 Major Parts and Functions A Computer is...
Words: 47755 - Pages: 192
...MBA505 INTERNATIONAL BUSINESS MANAGEMENT REV11A CHAPTER 1: ASSESSING THE ENVIRONMENT POLITICAL, ECONOMIC, LEGAL, TECHNOLOGICAL CHAPTER SYNOPSIS This chapter explains the elements of International Business Management. It gives a sound understanding of factors such as Political and Economic Environment, Legal Environment, and Technological Environment. Also, it covers the effects of Regional Trading Blocks, Information Technology, The Globalization of Human Capital, The Global Manager’s Role CHAPTER OUTLINE The Global Business Environment Regional Trading Blocks Information Technology The Globalization of Human Capital The Global Manager’s Role The Political and Economic Environment The Legal Environment The Technological Environment ISSUES FOR REVIEW AND DISCUSSION I. The Global Business Environment A. Global management Global management is the process of developing strategies, designing and operating systems, and working with people around the world to ensure sustained competitive advantage. 1. Globalism “Global competition characterized by networks that bind countries, institutions and people in an interdependent global economy.” 2. Evidence/Indicators of Globalism The growth rate of the trade of goods has grown faster than the world production of goods. The European Union has now caught up with the United States to share the position of the world’s largest investor. 2011 AMERICAN CITY UNIVERSITY Page 1 of 28 MBA505 INTERNATIONAL BUSINESS MANAGEMENT ...
Words: 9226 - Pages: 37
...Names and Education – there will be 4 questions on Education. These are simply names – you do not need to remember them all – you need to choose which ones you want to remember. Cut and paste to reduce. It is vital that you also have a generaloverview of the key ideas so do the same for key concepts / theories 1. Theories of Education – What is the role and purpose of education? |Functionalism | | |E.Durkheim and T.Parsons |Passing on society’s culture: this then unites people together by giving them shared values (value consensus). | | |According to Durkheim schools are societies in miniature - he argues that the key role of education was to teach | | |children moral responsibilities in order to promote social solidarity. Education provides secondary socialisation. | | |(Meaning the teaching of norms and values of society) to add to the primary socialisation provided by the family. | | |Examples of the values that education teaches to children include the importance of achievement, meritocracy and | | |competition. ...
Words: 10426 - Pages: 42
...This article was downloaded by: [University of Macau Library] On: 09 October 2014, At: 18:24 Publisher: Routledge Informa Ltd Registered in England and Wales Registered Number: 1072954 Registered office: Mortimer House, 37-41 Mortimer Street, London W1T 3JH, UK Chinese Journal of Communication Publication details, including instructions for authors and subscription information: http://www.tandfonline.com/loi/rcjc20 “Platonic relationships” in China's online social milieu: a lubricant for banal everyday life? Yann-Ling Chin a a Arts, Humanities and Education, Nottingham Trent University , UK Published online: 14 Nov 2011. To cite this article: Yann-Ling Chin (2011) “Platonic relationships” in China's online social milieu: a lubricant for banal everyday life?, Chinese Journal of Communication, 4:4, 400-416, DOI: 10.1080/17544750.2011.616286 To link to this article: http://dx.doi.org/10.1080/17544750.2011.616286 PLEASE SCROLL DOWN FOR ARTICLE Taylor & Francis makes every effort to ensure the accuracy of all the information (the “Content”) contained in the publications on our platform. However, Taylor & Francis, our agents, and our licensors make no representations or warranties whatsoever as to the accuracy, completeness, or suitability for any purpose of the Content. Any opinions and views expressed in this publication are the opinions and views of the authors, and are not the views of or endorsed by Taylor & Francis. The accuracy of the Content should not be relied...
Words: 10055 - Pages: 41
...Challenges to Criminal Law Making in the New Global Information Society: A Critical Comparative Study of the Adequacies of Computer-Related Criminal Legislation in the United States, the United Kingdom and Singapore Warren B. Chik* Introduction Computer and Internet usage is on the rise due to lower costs of computer ownership and connectivity as well as faster and easier accessibility. As it is another mode of commercial and personal transaction and one that is heavily dependent on interaction through computers and automatic agents rather than face-to-face meetings, which increases distance and allows anonymity, it is another avenue for crimes to perpetuate. “Computer Crime” encompasses crimes committed against the computer, the materials contained therein such as software and data, and its uses as a processing tool. These include hacking, denial of service attacks, unauthorized use of services and cyber vandalism. “Cyber Crime” describes criminal activities committed through the use of electronic communications media. One of the greatest concerns is with regard to cyber-fraud and identity theft through such methods as phishing, pharming, spoofing and through the abuse of online surveillance technology. There are also many other forms of criminal behaviour perpetrated through the use of information technology such as harassment, defamation, pornography, cyber terrorism, industrial espionage and some regulatory offences. The existing criminal laws in most countries...
Words: 24175 - Pages: 97
...Challenges to Criminal Law Making in the New Global Information Society: A Critical Comparative Study of the Adequacies of Computer-Related Criminal Legislation in the United States, the United Kingdom and Singapore Warren B. Chik* Introduction Computer and Internet usage is on the rise due to lower costs of computer ownership and connectivity as well as faster and easier accessibility. As it is another mode of commercial and personal transaction and one that is heavily dependent on interaction through computers and automatic agents rather than face-to-face meetings, which increases distance and allows anonymity, it is another avenue for crimes to perpetuate. “Computer Crime” encompasses crimes committed against the computer, the materials contained therein such as software and data, and its uses as a processing tool. These include hacking, denial of service attacks, unauthorized use of services and cyber vandalism. “Cyber Crime” describes criminal activities committed through the use of electronic communications media. One of the greatest concerns is with regard to cyber-fraud and identity theft through such methods as phishing, pharming, spoofing and through the abuse of online surveillance technology. There are also many other forms of criminal behaviour perpetrated through the use of information technology such as harassment, defamation, pornography, cyber terrorism, industrial espionage and some regulatory offences. The existing criminal laws in most countries...
Words: 24175 - Pages: 97
...ETHICS IN INFORMATION TECHNOLOGY Third Edition This page intentionally left blank ETHICS IN INFORMATION TECHNOLOGY Third Edition George W. Reynolds Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States Ethics in Information Technology, Third Edition by George W. Reynolds VP/Editorial Director: Jack Calhoun Publisher: Joe Sabatino Senior Acquisitions Editor: Charles McCormick Jr. Senior Product Manager: Kate Hennessy Mason Development Editor: Mary Pat Shaffer Editorial Assistant: Nora Heink Marketing Manager: Bryant Chrzan Marketing Coordinator: Suellen Ruttkay Content Product Manager: Jennifer Feltri Senior Art Director: Stacy Jenkins Shirley Cover Designer: Itzhack Shelomi Cover Image: iStock Images Technology Project Manager: Chris Valentine Manufacturing Coordinator: Julio Esperas Copyeditor: Green Pen Quality Assurance Proofreader: Suzanne Huizenga Indexer: Alexandra Nickerson Composition: Pre-Press PMG © 2010 Course Technology, Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without the prior written permission...
Words: 204343 - Pages: 818
...C h a p t e r 1 Prewriting GETTING STARTED (OR SOUP-CAN LABELS CAN BE FASCINATING) For many writers, getting started is the hardest part. You may have noticed that when it is time to begin a writing assignment, you suddenly develop an enormous desire to straighten your books, water your plants, or sharpen your pencils for the fifth time. If this situation sounds familiar, you may find it reassuring to know that many professionals undergo these same strange compulsions before they begin writing. Jean Kerr, author of Please Don’t Eat the Daisies, admits that she often finds herself in the kitchen reading soup-can labels—or anything—in order to prolong the moments before taking pen in hand. John C. Calhoun, vice president under Andrew Jackson, insisted he had to plow his fields before he could write, and Joseph Conrad, author of Lord Jim and other novels, is said to have cried on occasion from the sheer dread of sitting down to compose his stories. To spare you as much hand-wringing as possible, this chapter presents some practical suggestions on how to begin writing your short essay. Although all writers must find the methods that work best for them, you may find some of the following ideas helpful. But no matter how you actually begin putting words on paper, it is absolutely essential to maintain two basic ideas concerning your writing task. Before you write a single sentence, you should always remind yourself that 1. You have some valuable ideas to tell your reader,...
Words: 234754 - Pages: 940