Samuel Adebayo Oluwadare , Oluwatoyin Catherine Agbonifo , Ayomikun Tinuola Babatunde (2019). Network Traffic Analysis Using Queuing Model and Regression Technique. Journal of Information, 5(1): 16-26. DOI: 10.18488/journal.104.2019.51.16.26
The flow of network traffic on business and academic networks has been on the increase. This necessitates the issue of proper management of traffic network flow in order to ensure optimum performance. Network analysis looks at certain performance measures with a view to gaining insight into the pattern of flow in the network. This research employs a queuing model and regression technique to analyse the performance of the Federal University of Technology, Akure (FUTA) network. Traffic data flows were captured over a period of four weeks using Wireshark capturing tool at different strategic locations in the campus. The arrival rate and service rate were used to obtain the intensity of traffic at these locations. Analysis of the data assisted in determining the variability in the traffic flow. The major contribution of this research is that it developed an empirical model that identified variables that significantly determines network traffic. The model could assist network administrators to monitor, plan and improve on the quality of service.
This paper’s primary contribution is that it employed multiple regression to identify the factors that determine network traffic. The model could be used to plan the usage and monitoring of computer networks
Behavioural Intention to Use Mobile Apps by Gen Y in Malaysia
Krishna Moorthy , Sonia Johanthan , Carmem Tham , Khoo Xiao Xuan , Lee Lit Yan , Tan Xunda , Tee Cheng Sim (2019). Behavioural Intention to Use Mobile Apps by Gen Y in Malaysia. Journal of Information, 5(1): 1-15. DOI: 10.18488/journal.104.2019.51.1.15
The purpose of this study is to identify the factors that affect the behavioural intention to use mobile apps by Gen Y in Malaysia. The Unified Theory of Acceptance and the Use of Technology 2 (UTAUT2) and the Diffusion of Innovation Theory (DIT) are combined to examine the drivers that affect the behavioural intention to use mobile apps. The factors include performance expectancy, habit, price value, social influence, complexity and trialability. Data was collected by distributing self-administered survey questionnaires using the quota sampling technique to Gen Y in five States in Malaysia. The results show that all these variables significantly affect the behavioural intention to use mobile apps by Gen Y in Malaysia. The UTAUT2 and the DIT have been proven to be the suitable theories that can be considered by future researchers who wish to conduct research related to technological innovations. This study is useful for apps’ designers, as they will be able to design apps to suit users’ preferences and expectations by analysing the variables.
This study combined UTAUT2 model and Diffusion Innovation Theory to study the behavioural intention and confirmed their suitability. Any future researchers on technological innovation can use this new model. Additionally, this study is useful for apps’ designers to design apps to suit users’ preferences by understanding the influencing factors.
A Structural Framework for Distributed Electronic Voters Register
Emmanuel Etuh , Umar Zayyanu , Onyebuchi Destiny Jacob (2019). A Structural Framework for Distributed Electronic Voters Register. Journal of Information, 5(1): 27-38. DOI: 10.18488/journal.104.2019.51.27.38
Electronic Voters Register is a key deliverable of the pre-voting stage in an E-voting system that has become a key component of governance in this 21st century. E-voting system is generally grouped into three phases: before-voting, during-voting and after-voting phase. Before-voting handles the enlistment of eligible voters into the voters’ database which is a determinant factor for a successful election. Just being enlisted is not a guarantee that a registered voter will participate in an election unless the voter is present at the particular polling unit where the voter registered, on account of change of location, the voter must request for transfer of data to the new location before the election to qualify for voting. So many voters have been disenfranchised due to inevitable relocation which poses a serious challenge in the efficiency of the voters register. This has greatly reduced the total number of eligible voters in the existing system. The Purpose of this research is to design a structural framework that eliminates the hurdles voters go through to become eligible to elect their preferred candidate. Once the Direct Data Capture (DDC) system registers a voter at each polling unit, a locally distributed database across all the registration centers collate and transmit the data to the central database through the States thereby eliminating duplicates from any quarter, redundancy, and need for transfer request as a result of migration. The most suitable approach is the distributed database model that implements a tree data structure for efficient electronic voters register.
The paper's primary contribution in the proposed framework is the eradication of disenfranchisement due to change of location and seamless registration of voters that produces efficient Electronic Voters Register devoid of duplicates thus laying a solid foundation for a transparent E-Voting.
Cyber-Crime and its Effects on E-Commerce Technologies
Richard Apau , Felix Nti Koranteng , Samuel Adu Gyamfi (2019). Cyber-Crime and its Effects on E-Commerce Technologies. Journal of Information, 5(1): 39-59. DOI: 10.18488/journal.104.2019.51.39.59
Adoption and use of e-commerce technologies continue to rise because they provide access to global markets, offer a competitive advantage and increase the effectiveness of businesses. Safety and trust are important factors that affect users' intentions and use of e-commerce technologies. Considering the upsurge of cyber-crime activities and the paucity of research in this domain particularly in developing countries, this paper investigated how cyber-crime perceptions affect users' intention to conduct business via e-commerce technologies. Using a survey approach, an online questionnaire was distributed and data from 476 participants was rigorously analyzed using Partial Least Square Structural Equation Modelling. The paper extends the theory of reasoned action with relevant constructs; trust and cyber-crime perceptions. The relationships between the constructs were based on deductive reasoning from prior studies. The hypothesized model explained 33.1% of the variance in Attitude Towards Behavior and 41.5% of Consumers Intention to Purchase. The results indicate that trust in internet medium, attitude towards behavior, subjective norm and cyber-crime perceptions are significant predictors of intention to purchase using e-commerce. There was, however, no significant relationships between Trust of Ecommerce Sellers and Cyber Crime Perceptions as well as Trust of Ecommerce Sellers and Consumers Purchase Intention. The findings elucidate businesses and stakeholders on the impacts of trust and cyber-crime perceptions on users' purchase intentions. It also inspires e-commerce technology developers to incorporate security features that reduce the vulnerability of these systems. Finally, the findings for this study are limited to respondents from Ghana hence future analysis could explore other countries.
This study is one of the very few studies which have investigated the effects of cybercrime on e-commerce technologies from the perspective of a developing country. In fact, the first study in Ghana, which attempts to examine consumers’ perception of cybercrime on their purchase intentions using electronic commerce technologies.