Information Technologist (The) 2021-02-16T10:29:03+00:00 Dr Everest C Madu Open Journal Systems <p><em>The Information Technologist</em> deals mainly with the publication of the results of empirical research in the field of library information science, communcation and information technology as they affect developing countries.</p><p>This journal has been positively evaluated in the Scientific Journal Impact Factor Journal List Evaluation Process with a score of 3.362.</p> Survey of cryptography algorithms for Sub-Saharan countries 2021-02-11T12:02:10+00:00 André Claude Bayomock Linwa Jean-Marc Dali Lebi <p>With the increase of Internet of Things (IoT) and threats on Information Systems (IS) resources, it is urgent for Africa countries to stop being spectator on cyber security and begin to play a more active role. This paper aimed at helping Africa country governments and&nbsp; organizations to understand security challenges that they may face, and propose solutions. The paper described security investment factors, proposed a survey of IoT Worldwide and in Africa, and details as well a survey of cryptography algorithms (symmetric and&nbsp; asymmetric). Indeed, information security, in particular cryptography, seems alien to Africa IT professionals. This lack stems from a deep ignorance about this wonderful field of cryptography and its importance in the system. The authors believe that this trend must be reversed as soon as possible, as Africa strives opening up to the world. Henceforth, this paper presented a comprehensive introductory survey on cryptographic algorithms especially tailored for Africans.</p> <p><strong>Key Words</strong>: Internet, Things, (IoT), Security, costs, cryptography, algorithms, Ciphers, Encryption, Decryption, methods. </p> 2021-02-11T00:00:00+00:00 Copyright (c) Achieving privacy for continuous location based services in smart grid 2021-02-11T14:49:18+00:00 Jennifer Batamuliza Hanyurwimfura Damien <p>Recently, Location Based Services (LBS) is widely used in mobile technology. Location Based Services (LBS) is one of the new emerging mobile technologies in smart grid. In smart grid, however, the use of these technologies has resulted to new challenges. The privacy issues related with these services are becoming main concerns because of the leakage of user’s locations and query contents on smart meters. The most recent studies that have been done for privacy preserving solutions such as temporal and spatial cloaking based methods are not enough to protect user’s location privacy and hence hackers are hacking information, making changes to readings on smart meter too. This is because preserving privacy for LBS, is a very hard task. For instance, preserving privacy for a continuous query that is issued on road network environment and where location semantics are known well remains a serious challenge. Moreover, use of cloud computing result to very serious privacy leakages in this environment. The study designed a protocol and a Semantically-Aware Query Cloaking (SQC) in smart grid. To achieve this, the paper proposed to secure a real continuous query for location based services with queries that are semantically-aware. The authors bring in anonymity to hide the location of the smart grid and use homomorphism encryption mechanisms to secure services over the cloud. Finally, the study analyzed the security of the proposed algorithm and protocol.</p> <p><strong>Key Words</strong>: Location, based, Services, Anonymity, Privacy, Preservation, Dummy, Homomorphism, Cloud, Computing, Smart, Grid, Meter. </p> 2021-02-11T00:00:00+00:00 Copyright (c) Event-driven testing procedures using mutation analysis: Case study of e-mail 2021-02-11T12:46:19+00:00 Emenike Gabriel Chukwu XaveriaYouh-Kimbi Djam Uzoamaka Ebem Deborah Oluwafunke Emeag Ijeoma <p>This paper introduced a six-stage testing procedures for event-driven web application, using mutation analysis to overcome Event Driven Software (EDS) challenges. The authors analyzed proposed testing procedures with the help of four metrics consisting of Fault Detection Density (FDD), Fault Detection Effectiveness (FDE), Mutation Score, and Unique Fault. Using these procedures, the authors prepared&nbsp; prioritized test cases and also discovered a list of unique faults by running the suggested test cases on a sample real-world web&nbsp; application called X-mail System, which was developed. The proposed testing procedure has some advantages such as resolving the problem of message alert prompting, directing sender of an e-mail to add a title when such is missing. However, suggested testing procedure, like any other method, had some drawbacks. Due to the fact that most of the stages in the approach were performed manually, the testing time was increased and also there were problems associated with equivalent mutants.</p> <p><strong>Key Words:</strong> Event, Driven, Software, Fault, Detection, Mutation, Score, Unique, Analysis </p> 2021-02-11T00:00:00+00:00 Copyright (c) Perceived usefulness and internet banking adoption at a selected bank in the Kgalagadi District, Botswana 2021-02-11T14:24:23+00:00 Ushe Makambe Oakantse Aobakwe Mmusi <p>Perceived usefulness (PU) stimulates the adoption of a technology. Premised on the Technology Acceptance Model (TAM), this study&nbsp; examined the effects of PU on the adoption of internet banking by customers of a selected bank in Botswana. A descriptive survey design&nbsp; and the quantitative methodology were adopted. Data was collected from 120 respondents who were randomly selected. The findings of the study revealed that PU played a protuberant role in internet banking adoption based on the Pearson correlation which was statistically significant and a stepwise regression indicating that 49.1% of the variance of the use of internet banking could be accounted for by PU.</p> <p><strong>Key Words</strong>: Technology, Acceptance, Model, internet, banking, perceived, usefulness, adoption, customers, Botswana</p> 2021-02-11T00:00:00+00:00 Copyright (c) Predicting user cognitive predisposition to quality information technology: Toward practices in eHuman Resource Management 2021-02-12T08:47:19+00:00 Rosemary Boateng Coffie Kofi Agyenim Boateng <p>The use of Information Technology (IT) to support the Human Resource Management (HRM) function continues to receive attention from diverse strands of scholarly rendition. Over the years many of these strands have focused attention on perception to the neglect of user&nbsp; cognition which this study believes presents interesting dimensions in terms of how IT quality is determined. Conceptualising the mechanics for the determination of cognition of information quality, the study draws on three factors which include convenience, ease of use and reliability as the means of building cognition for meaningful e-HRM practices. Drawing on the techniques of quantitative research tradition in data collection, the study applies the fundamental assumptions of Structural Equation Modelling (SEM) to analyse the data via the instrumentality of SmartPLS to test all three hypotheses. Findings suggest reliability is the only dimension that has the most significant&nbsp; impact on users‟ cognition of quality IT on the meaningful e-HRM practices. Managerial and research implications were recommended for further studies.</p> <p><strong>Key Words:</strong> E-HRM, Cognition, Ease, Use, Reliability, Convenience, Information, quality </p> 2021-02-12T00:00:00+00:00 Copyright (c) Management and utilisation of cultural resources in cultural heritage institutions in south -east Nigeria 2021-02-12T08:58:53+00:00 Kate Nkechinyere Ogbu Nathaniel Agbo Oche <p>This study examined the management and utilization of cultural resources in cultural heritage institutions in the South-East, Nigeria. Three research questions were developed to guide the study and a descriptive survey research design was adopted for the study. The&nbsp; population&nbsp; of the study consists of all the staff and users of cultural heritage institutions in South-East, Nigeria. A total sample size of 394 respondents was selected using a simple random sampling technique. The researchers developed a questionnaire entitled “Management and Utilisation of Cultural Resources in Cultural Heritage Institutions Questionnaire (MUCRCHIQ) for data collection. The instruments for data collection were trial-tested for reliability using the staff and users of Benue State Public Library, Ugbokolo. A total of 394 copies of the questionnaire were distributed to the respondents, out of which 373 were returned and found usable by the researcher. This gave a response rate of 95%. The data collected were analysed using Mean (X) and Standard Deviations to answer the research questions. Also T-test was used to test the hypotheses. Five null hypotheses were formulated to guide the study and were tested at 0.5 level of&nbsp; significance. Based on the data collected and analysed, the major findings of the study revealed that: cultural resources are not effectively utilised in cultural heritage institutions and there is the need for the management of cultural resources for effective utilization in cultural heritage institutions; The study recommends that there is need for the management of cultural resources for effective utilisation in cultural heritage institutions in South-East, Nigeria.</p> <p><strong>Key Words</strong>: Utilisation, Management, Cultural, Resources, Heritage, Institutions</p> 2021-02-12T00:00:00+00:00 Copyright (c) The influence of funding sources hierarchy on use of library management systems in South-West Public Universities, Nigeria 2021-02-12T09:24:31+00:00 Joseph Olubunmi Olorunsaye Maria Ehioghae Gabriel Bunmi Alegbeleye <p>The study examined the link between the influence of funding sources' hierarchical order and the use of the library management system in public universities in South-West, Nigeria. The study adopted a survey research design. The population of the study consisted of 337&nbsp; library personnel in public universities in South-West, Nigeria. A self-designed and validated questionnaire was used for data collection with an overall reliability index of 0.853. The major findings of the study revealed that there is a positive significant link between the influence of funding sources' hierarchical order and the use of library management systems in public universities in South-West, Nigeria. It is thus recommended amongst others, a pungent reordering of the funding source hierarchy such that the public university in South-West, Nigeria would look inward for more enterprising, creative and innovative library services for use of Library Management Systems rather than the present overdependence on government.</p> <p><strong>Key Words</strong>: Funding, Sources, Preference, Library, Management, Systems, Public, Universitie </p> 2021-02-12T00:00:00+00:00 Copyright (c) An in-depth investigation of sources of information used in generating security information for crime control in two Nigerian University campuses 2021-02-12T10:01:52+00:00 Audrey Gambo Wisdom Shiekuma Felix Tor <p>The study investigated the sources of information used by the security personnel to generate security information for crime control at Samaru and Kongo campuses of Ahmadu Bello University, Zaria, Nigeria. Descriptive survey design was adopted using case study design. Through simple random procedure, a validated questionnaire was used to collect data from a sample of 290 security personnel out of 1,450, and descriptive statistics were deployed for the analysis. It was found that different types of security information are generated at the campuses, majorly through the use interview, tracking devices, gate keeping, and patrol. Based on this, recommendations were provided for improvement.</p> <p><strong>Key Words</strong>: Crime, Control, Information, Nigeria, Security, Sources, University, Campuses. </p> 2021-02-12T00:00:00+00:00 Copyright (c) The use of school library resources in Owerri arch-diocesan Secondary Schools, Imo state- Nigeria: A case study of presentation secondary school, Ogbaku, Imo State- Nigeria 2021-02-12T10:32:33+00:00 Cajethan Anumkua <p>The study was carried out in order to examine how school library resources of Presentation Secondary School, Ogbaku are utilized in helping students and their teachers in learning and teaching. Five research questions were stated to guide the study. The survey research design method was used to conduct the study. The population of the study is 100 which comprise 80 students that were selected randomly, 19 teachers and 1 staff in charge of the school library. There was no sample size since the population is not too large. Questionnaire was used as the main instrument for data collection for the study. Descriptive statistics was used for the analysis of data collected for the study. Findings showed that the school library studied is not fully utilized by students and their teachers in reading, learning and teaching because of inadequate information reading materials, reading space as well as non-availability of audio-visual resources. It is recommended that the Owerri Arch-Diocesan Education Commission should increase allocation of funds given to their schools for the running of their school libraries. The education commission should also provide adequate information reading materials, qualified trained and competent library staff that should be employed to work in school libraries for efficient and effective library services to be achieved.</p> <p><strong>Key Words</strong>: Library, School Resources, Students, Teachers, Educational, Development, Utilization, Services, Provision</p> 2021-02-12T00:00:00+00:00 Copyright (c) Assessing ICT literacy among paraprofessional librarians for service delivery at Abdullahi Fodiyo Library, Usmanu Danfodiyo University, Sokoto 2021-02-16T10:29:03+00:00 Kasim Abdullahi Ali Muhammed Fakandu <p>This article assessed the ICT literacy among Para-professional librarians at Abdullahi Fodiyo Library Complex for effective service delivery. Objectives of the paper include, to establish the source of ICT literacy skills, assess the types of ICT facilities used and to examine the type of services provided by Para-professionals librarians. This study adopted descriptive survey design and the population of the study was the entire one hundred and twenty-six (126) Para-professional librarians in Abdullahi Fodiyo Library complex. Questionnaire was used as the instrument for data collection and data collected were then converted into simple percentages and means scores and presented in tabular form for clarity. Descriptive method was used to analyzed data collected. The findings revealed that majority of the Para-professional librarians acquired ICT literacy through self study, while only few Para-professional librarians indicated that they acquired their ICT skills through workshops and seminars. The findings of the study also showed that majority of the respondents provide internet services in the library, while minority of the respondent provide circulation services. Higher percentage of the Para-professional librarians indicated lack of interest as the major challenge militating against ICT literacy in the library. In order to improve ICT literacy skills for Para-professional librarians, the article recommended that there is the need to provide adequate access to ICT facilities such as laptops, digitals cameras, printers, projectors, photocopiers among others with view to improve competencies of para-professional librarians in providing effective services.</p> 2021-02-12T00:00:00+00:00 Copyright (c) Utilization of internet services among the undergraduate students towards effective academic performance in two selected Universities in southwest Nigeria 2021-02-12T10:44:52+00:00 Samuel Olabode Fabunmi <p>This study investigated the Utilization of internet services among the undergraduate students towards effective academic performance in two universities in Southwest Nigeria. Simple random sampling technique was adopted for the study with questionnaire as instrument for data collection. There are seven selected departments in the Faculty of Education in both Universities. A sample fraction of 12% was used to get the sample size of 350. Data was analyzed using descriptive statistics consisting of tables of frequency and percentages and Statistical Packages for Social Sciences (SPSS) for the research questions. The findings revealed that in UI (63.6%) Internet café, Departmental computer lab and University hostels were their access points of Internet, while in OAU (47.0%) home and University hostel were access points of Internet. Findings also revealed that undergraduate students in both universities use the Internet daily, while the least frequency of use of Internet was once in a month respectively. The study revealed that how to use electronic books and slow access speed was the major factors affecting Internet usage in UI (38.8%) and in AU.</p> <p><strong>Key Words</strong>: Public, Universities, Use, Internet, Academic Performance.</p> 2021-02-12T00:00:00+00:00 Copyright (c) ICT skills and use of electronic resources by undergraduates in selected faith-based private university libraries in south-west, Nigeria 2021-02-16T10:27:36+00:00 Stephen Olakunle Alabi <p>The study investigated ICT skills and use of e-resources by undergraduates in selected private university libraries in South-west, Nigeria. Survey research was adopted. The population of the study was 4,913 undergraduates. Stratified Sampling technique was used to draw a sample size of 370. Data were collected with questionnaire. The result of the hypothesis showed that there was significant relationship between ICT skills and use of electronic resources (r = 0.204, p&lt;0.05). The variable influenced the use of e-resources among undergraduates in faith-based private universities, in South-west, Nigeria. The findings showed that majority of undergraduates use e-resources for finding relevant information in their studies’ areas and assignment writing. The findings also showed that undergraduates possessed high ICT skills, although their formulating search queries and searching and retrieval skills were low. The study recommended that undergraduates should upgrade their ICT skills.</p> 2021-02-12T00:00:00+00:00 Copyright (c)