Financial statements are crucial for investors and stakeholders to assess a company's financial health. There is a concern that companies and banks listed on the Lusaka Stock Exchange (LuSE) may be using creative accounting techniques to manage their earnings figures (earnings management) to present a more favourable financial position. This study seeks to assess the Practice and Implications of Earnings Management Among Listed Financial Services Companies in Zambia. The study utilized a mixed method approach were both qualitative and quantitative methods were utilized targeting 923 permanent employees of all the companies that were listed on the Lusaka Stock Exchange (LuSE). The study ascertained the extent to which earnings management was practiced among the companies and further determined the extent to which earnings management was reliable in the companies and banks listed on LuSE. The study also determines the challenges faced among the companies and banks listed on LuSE in relation to earnings management. The results revealed that the majority of the selected companies were not frequently practicing earnings and that the practice was done yearly. This was evident based on the Beneish – Model results score of 2.25 indicating possible manipulation. Results from the study show that on the Beneish Model shows average magnitude of abnormal accruals. This result revealed that earnings management presented numerous challenges in the companies. From these results, it could be deduced that in the last 6 months by the time of writing this report, on average there was minimal improvement in the company’s reputation after earning management practices. The findings revealed the majority of the publicly held companies exceeding 75% intentionally distort earnings to misrepresent performance while adhering to the country’s laws.
- Zivanai Mazhambe Graduate School of Business Department, University of Zambia
- Nakaundi Nakazwe Graduate School of Business Department, University of Zambia
References
1. Alam. (2019). Relationship between Interest Rate and Stock Price: Empirical Evidence from Developed and Developing Countries. International Journal of Business and Management. 2. Brown, L. H. (2018). An evaluation of alternative proxies for the market’s assessment of unexpected earnings. Journal of Accounting and Economics 3. Bryman, A. &. (2015). Business research methods (4. ed.). Oxford: Oxford Univ. Press. 4. Graham, J. H. (2015). The economic implications of corporate financial reporting. Journal of Accounting and Economics 5. Healy, P. M. (1999). A review of the earnings management literature and its implications for standard setting”, Accounting Horizons 6. Perman et al. (2016). Natural Resource and Environmental Economics. 2nd ed. England: Person Education Ltd 7. M. Kabwe, International Journal of Research in Business & Social Science 12(2) (2023) 8. R, W. (n.d.). Quality of earnings and EM: A primer for audit committee members Financial Accounting 9. Williamson, H. a. (2012). Economics of Financial Markets, London, Oxford University Press, 2002, pp. journal Economic and Political.
Zivanai Mazhambe, Nakaundi Nakazwe, "Assessing the Practice and Implications of Earnings Management among Listed Financial Services Companies in Zambia" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.13 issue 4, April 2024, pp.01-05 URL: https://doi.org/10.51583/IJLTEMAS.2024.130401
The security of Active Directory environments is a crucial aspect for organizations of all sizes. With the increasing number of cyber threats, it is important to understand the different penetration testing paradigms that can be used to attack these environments. This research focuses on a comparative analysis of four specific attacks: LLMNR poisoning, SMB relay, pass the hash, and token impersonation. The comparison is based on relevant criteria such as complexity, required tools, and susceptibility to defense mechanisms. The primary objective of this study was to build a virtual Active Directory network, which provides a controlled environment for testing the different attacks. This enabled us to evaluate the effectiveness of each attack and gather insights into the strengths and weaknesses of each paradigm. By conducting a comparative analysis using these criteria, we were able to determine the most effective methods for defending against these types of attacks and identify areas for improvement. The results of this study provide valuable insights into the security risks that organizations face when it comes to Active Directory environments. By understanding the different strengths and weaknesses of each attack, organizations can make informed decisions about which mitigation strategies to implement. This research also highlights the importance of continuous monitoring and testing to ensure the security of Active Directory environments. This comparative analysis provides a comprehensive overview of four key penetration testing paradigms for Active Directory environments. The results of this study can help organizations to better understand the security risks they face and implement effective mitigation strategies.
- Oluyomi Kolawole Akinyokun Department of Cyber Security, Federal University of Technology Akure, Ondo State, Nigeria
- Oyefunmke Adeninhun Famose Academic Planning Unit, Federal University of Technology Akure, Ondo State, Nigeria
References
1. Active-directory-penetration-testing: redteamslabs.in. (2021, December 20). Retrieved from redteamlabs.in: https://redteamlabs.in/ 2. Adam, B. (2019). bloodhound-active-directory-domain-admin.aspx. Retrieved from mcpmag.com: https://mcpmag.com/articles/ 2019/11/13/bloodhound-active-directory-domain-admin.aspx 3. Bhardwaj, R. (2022). Active Directory Forest. Retrieved from ipwithease: https://ipwithease.com/ 4. Bhardwaj, R. (2022). WHAT IS AN ACTIVE DIRECTORY TREE? Retrieved from ipwithease: https://ipwithease.com/ 5. Chai, W. (2022). Active-Directory. Retrieved from TechTarget: https://www.techtarget.com/ 6. DCtheGeek, M., & Msatranjr. (2020). Forest. Retrieved from Microsoft: https://docs.microsoft.com/ 7. Doubleoctopus. (2022). threats-and-tools/golden-ticket/. Retrieved from doubleoctopus.com/security-wiki: https://doubleoctopus.com/ security-wiki/threats-and-tools/golden-ticket/ 8. Dr. Shwetav Sharad, A. S. (2019). Research Paper on Active Directory. International Research Journal of Engineering and Technology (IRJET), 1-2. 9. Imperva. (2021). Penetration Testing. Retrieved from Imperva: https://www.imperva.com/learn/application-security/penetration-testing/ 10. Kali. (2022). Retrieved from https://www.kali.org/: https://www.kali.org/ 11. Khari, M., & Bajaj, C. (2014). Motivation For Security Testing. Global Research in Computer Sciences, 27. 12. Komal, M. (2018). Network Security Implementation using Penetration Testing. International Journal of Technical Innovation in Modern Engineering & Science (IJTIMES), 1-6. 13. Microsoft. (2014). Microsoft. Retrieved from Microsoft: https://docs.microsoft.com/ 14. msatranjr. (2019). Domain Trees. Retrieved from Microsoft: https://docs.microsoft.com/ 15. pass-the-hash-pth-attack. (2022). Retrieved from hwww.beyondtrust.com: https://www.beyondtrust.com/resources/glossary/pass-the-hash-pth-attack 16. Raj, C. (2021). active-directory-enumeration-powerview. Retrieved from www.hackingarticles.in: https://www.hackingarticles.in/active-directory-enumeration-powerview/ 17. resources: tracesecurity. (2021). Retrieved from tracesecurity: https://www.tracesecurity.com 18. Rubenstein, B. (2012). Active Directory domain (AD domain). Retrieved from techtarget: https://www.techtarget.com/ 19. Securitytutorials. (2022). token-impersonation-attack. Retrieved from securitytutorials.co.uk: https://securitytutorials.co.uk/token-impersonation-attack/ 20. Skoudis, E. (2008). Planning, scoping and recon. Proceedings of the Network penetration, 12. 21. Svidergol, B. (2017). Active Directory Database. Retrieved from Netwrix Blog: https://blog.netwrix.com/ 22. Techopedia. (2020). domain-controller-dc. Retrieved from domain-controller-dc: https://www.techopedia.com/ 23. Trace Security. (2021). Mitigating IT Security Risks with Penetration Tests. Retrieved from Tracesecurity: https://www.tracesecurity.com/resources/whitepapers/mitigating-it-security-risks-with-penetration-tests 24. University, T. T. (2019). About organizational units in Active Directory. Retrieved from University Information Technology Services: https://kb.iu.edu/ 25. Venu, S. (2022). kerberoasting. Retrieved from www.crowdstrike.com: https://www.crowdstrike.com/cybersecurity-101/ kerberoasting/ 26. Vladimir, U. (2020). heimdalsecurity.com. Retrieved from heimdalsecurity.com: https://heimdalsecurity.com/blog/what-is-an-smb-relay-attack/ 27. Wikipedia. (2022). Kali_Linux. Retrieved from https://en.wikipedia.org: https://en.wikipedia.org/wiki/Kali_Linux
Oluyomi Kolawole Akinyokun, Oyefunmke Adeninhun Famose, "Penetration Testing Platforms for Active Directory Network Environment" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.13 issue 4, April 2024, pp.06-10 URL: https://doi.org/10.51583/IJLTEMAS.2024.130402
The performance of manufacturing companies has become something worrisome as performance has been on the decline over years from Accounting literature. Nigerian businesses do not have access to environmental accounting guidelines or pollution cost guidelines for communicating with various stakeholder groups; however, the government has made efforts to enact laws to improve environmental sustainability in Nigeria. This study investigated the effect of Environmental Conservation Cost on financial performance of listed manufacturing firms in Nigeria. An ex-post facto research design was used in the study. The study population consisted of 35 consumer firms as of December 31, 2021. A sample size of 10 firms was chosen using a purposive sampling technique for the 10 years (2012-2021). Data were sourced from annual reports, and their accuracy and reliability were certified by external auditors. Data were analyzed using descriptive and inferential (multiple regression) statistics at a 0.05 level of significance. The study found that Environmental Conservation Cost had a significant effect on Earnings per Share and Net Profit Margin of listed firms respectively (Adj R2 = 0.766, F- Stat (5,96) = 35.460, p < 0.05); (Adj R2 = 0.813, F- Stat (5,96) = 82.153, p < 0.05). The study concluded that Environmental Conservation Costs had a significant effect on the financial performance of listed manufacturing firms in Nigeria. The study recommended that the Management of firms should allocate more resources to training and engagement cost to foster innovation, improve operational efficiency, stay competitive in the market and experience improved financial performance.
- JONATHAN Migyl Nnvin Department of Accounting, Babcock University, Ilisan-Remo, Ogun State, Nigeria
- FOLAJIMI Festus Adegbie Department of Accounting, Babcock University, Ilisan-Remo, Ogun State, Nigeria
References
1. Acti–Ifurueze, M.S.K., Lyndon, M.E., &Bingilar, P.F (2013). The impact of environmental cost on corporate performance: A study of oil companies in the Niger Delta States of Nigeria. Journal of Business and Management, 2(2) 1- 10. 2. Adekunle, A. &Asaolu, T. (2013). An Empirical Investigation of the Financial Reporting Practices and Banks’ Stability in Nigeria. Kuwait Chapter of Arabian Journal of Business and Management Review 2 (5), 157-180. 3. Akhtaruddin, M. (2018), Corporate mandatory disclosure practices in Bangladesh, The International Journal of Accounting, 40(4):399-422 4. Al-Mawali, H. (2021). Environmental cost accounting and financial performance: The mediating role of environmental performance. Accounting, 7(3), 535-544. 5. Badruzaman, J. (2020). The impact of earning per share and return on equity on stock price. HasilUjiKemiripan. 6. Barako, D. G. (2017), Determinants of voluntary disclosures in Kenyan companies annual reports, African Journal of Business Management, 1(5):113-128 7. Bayraktarov, E., Saunders, M. I., Abdullah, S., Mills, M., Beher, J., Possingham, H. P., … & Lovelock, C. E. (2016). The cost and feasibility of marine coastal restoration. Ecological Applications, 26(4), 1055-1074. 8. Clarkson, M. E. (1995). A stakeholder framework for analyzing and evaluating corporate social performance. Academy of Management Review, 20, 92–117. 9. Donaldson, T. & Preston, L. (1995). The Stakeholder Theory of the Corporation: Concepts, Evidence, and Implications. Academy of Management Review, 20, 65-91. 10. Dubey, A. (2022, August). Green Accounting Practices in Global Development. In International Scientific Conference on Business Management and Social Sciences (p. 57). 11. Dunphy, D.; Benveniste, J.; Griffiths, A. & Sutton, P. (2020). Human and Ecological Factors: A Systematic Approach to Corporate Sustainability, Allen and Unwin: Sydney. 12. Ezeagba, C.E. (2017) Environmental accounting disclosures and financial performance: A study of selected food and beverage companies in Nigeria. International Journal of Academic Research in Business and Social Sciences, 7(9), 162-174. 13. Ezejiofor, R. A. John-Akamelu, C., &Chigbo, B.E. (2017). Effect of sustainability environmental cost accounting on financial performance of Nigerian corporate organizations. International Journal of Scientific Research and Management Studies, 4(8), 4536-4549. 14. Falope, F.J, Offor, N.T. &Ofurum, D.I. (2019). Environmental Cost Disclosure and Corporate Performance of Quoted Construction Firms in Nigeria. International Journal of Advanced Academic Research Social and Management Sciences, 5(8), 17-31. 15. Freeman, E. (1984). Stakeholders theory; 16. theoretical perspective, New York: Harper and Row Inc. 17. Freeman, R.E., Jeffrey, S.H., Andrew, C.W., Bidhan, L.P. & Simone, C. (2010). Stakeholder theory: The State of the Art, 1st Edition,. New York: Cambridge University Press. 18. Hansen, D.R and Mowen, M.M (2000). Cost Management, Accounting and Control, Third Edition; South-West College Publishing a division of Thomson Learning. 19. Howes, R. (2002). Environmental Cost Accounting: An Introduction and Practical Guide, London, The Chartered Institute of Management Accountants. 20. Ibemgbor, A.I (2011). Environmental accounting and cost allocation: An analysis in manufacturing firms in Nigeria. A Ph.D Thesis in the Department of Accountancy, Ebonyi state University, Abakiliki, November, 2011 21. Idowu, A. &Agboola, O.S. (2021). Environmental costs and financial performance in Nigeria’s selected extractive industry. KIU Interdisciplinary Journal of Humanities and Social Sciences, 2(3), 134-155 22. Jensen, M. C. (2002). Value Maximization, Stakeholder Theory, and the Corporate Objective Function. Business Ethics Quarterly, 12, 235-256. 23. Lawal, B. (2012). Board Dynamics and Corporate Performance: Review of Literature, and Empirical Challenges. International Journal of Economics and Finance 4 (1), 22-35. 24. Musa, S.J., Peter, T., &Buka, M. (2015). Environmental accounting disclosure practice of Nigerian quoted firms: a case study of selected quoted consumer goods companies. Research Journal Finance and Accounting, 6(22), 31-43. 25. Noe, R. A, Hollenbeck, J. R., Gerhart, B. & Wright, P. M. (2006). Human Resources Management: Gaining A Competitive Advantage. 5th Ed. New York: McGraw- Hill/Irwin. 26. Nwaiwu, N. J., & Oluka, N.O. (2018). Environmental cost disclosures and financial performance of oil and gas companies in Nigeria. International Journal of Advanced Academic Research, 4(2), 1-23. 27. Nwanwu, P. O. (2022). Environmental management cost and financial performance of oil and gas companies in Nigeria. International Journal of Innovative Finance and Economics Research, 10(2), 119-134. 28. Okafor, G.O., Okaro, S.C., & Egbunike, C.F. (2013). Environmental cost accounting and cost allocation (A study of selected manufacturing companies in Nigeria). European Journal of Business Management, 5(18), 75-88. 29. Okeke, O. C., Okere, W., Dafyak, C. F., & Abiahu, M. F. C. (2022). Inventory management and financial sustainability: insight from quoted manufacturing firms in Nigeria. International Journal of Managerial and Financial Accounting, 14(1), 84-97. 30. Quinn, L. and Dalton, M. (2021) Leading for Sustainability: Implementing the Tasks of Leadership. Corporate Governance, 9, 21-38 31. Rachmawati, R. & Widowati, W. (2021). Research of the Impact of Financial Dimensions and Entrepreneurial Capacity on Business Performance in Small and Medium Enterprises in Central Java. Universal Journal of Accounting and Finance, 9(1), 122 - 129. 32. Sekerez, V. (2017). Environmental accounting as a cornerstone of corporate sustainability reporting. International Journal of Management Science and Business Administration, 4(1), 7-14 33. Solomon, J. (2020). Corporate governance and accountability. John Wiley & Sons. 34. Ugochukwu, C. N.C &Ertel, J. (2012). Negative impacts of oil exploration on biodiversity management in the Niger Delta area of Nigeria, Impact Assessment and Project Appraisal, 26(2), 139-147 35. Uzoh, N. E. (2022). Effect of environmental cost on financial performance of selected oil and gas firms in Nigeria. Advance Journal of Management, Accounting and Finance, 7(12).
JONATHAN Migyl Nnvin and FOLAJIMI Festus Adegbie, "Environmental Conservation Costs and Performance of Manufacturing Companies Listed in Nigeria" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.13 issue 4, April 2024, pp.11-21 URL: https://doi.org/10.51583/IJLTEMAS.2024.134003
The construction industry is a vital component of economic development in Abeokuta, Ogun State, Nigeria, characterized by its dynamic and complex nature. With the increase in construction activities, disputes are inevitable, often leading to project delays, cost overruns, and strained relationships among stakeholders. To address these challenges, alternative dispute resolution (ADR) methods have gained popularity as effective mechanisms for resolving disputes in the construction industry. This research paper aims to provide a comprehensive appraisal of the ADR methods used in the construction industry in Abeokuta, Ogun State. The study employs a qualitative research methodology with the aid of focus group discussion strategy employing various stakeholders, including construction professionals, legal experts, government officials, and project owners. The research investigates the types and frequency of disputes encountered in construction projects, explores the awareness and utilization of ADR methods, and evaluates the effectiveness and efficiency of these methods in resolving disputes. The research highlights the need for increased awareness and education about ADR methods among construction professionals in Abeokuta. It underscores the importance of establishing an ADR framework tailored to the specific needs and challenges of the local construction industry. Furthermore, the study suggests that a more structured and standardized approach to ADR could lead to more efficient and timelier dispute resolution, ultimately benefiting the construction industry's stakeholders.
- Kukoyi W. A., Crescent University, Abeokuta
- Adedirefumilayo Lead City University, Ibadan
- Oyewunmi O. O Babcock university, Ilishan
References
1. Fenn, P., Gameson, R., & Rigden, C. (2008). Dispute resolution in the UK construction industry. Engineering, Construction and Architectural Management, 15(6), 548-562. 2. World Bank. (2020). Nigeria - Ogun State Economic Transformation Project. Retrieved from https://projects.worldbank.org/en/projects-operations/project-detail/P170178 3. Ashworth, A., & Hogg, K. (2007). Willis's elements of quantity surveying. Wiley. 4. Chartered Institute of Building (CIOB). (2021). Code of practice for project management for construction and development. Wiley. 5. Aribisala, A. O., & Oluwole, A. A. (2015). An appraisal of the legal framework for alternative dispute resolution in the Nigerian construction industry. Procedia Engineering, 85, 30-39. 6. Owolabi, J. D., Ajayi, S. O., & Ayodeji, O. E. (2021). Factors Influencing Construction Disputes in Nigeria: A Delphi Study. In Proceedings of the 2021 Construction Research Congress (CRC), San Diego, USA. 7. Ogunlela, A. O., &Aigbavboa, C. O. (2019). Assessment of dispute resolution methods in construction projects in Nigeria: Contractors' perspective. Journal of Legal Affairs and Dispute Resolution in Engineering and Construction, 11(2), 04519005. 8. Lawal, D. U., &Oyegoke, A. S. (2019). Challenges of arbitration in construction dispute resolution: Perspective from Ogun State, Nigeria. International Journal of Engineering Research and Technology, 12(8), 1144-1149. 9. Havenga, P. &Havenga, M. (2010). 7th Ed. General Principles of commercial law. Juta. South Africa. 10. Adebayo, O. (2019). Cultural Dispute Resolution Mechanisms in Nigeria: The Yoruba Example. IOSR Journal Of Humanities And Social Science, 24(5), 64-68. 11. Oyetade, A. A. (2017). Traditional Conflict Resolution Mechanisms in Southwest Nigeria: Implications for Sustainable Conflict Management. Covenant Journal of Research in the Built Environment (CJRBE), 5(1), 28-37. 12. Olaopa, O. R., Adeniji, A. A., & Alabi, T. O. (2018). Traditional Justice Systems in Nigeria: Problems and Prospects. Journal of Sociology, Psychology and Anthropology in Practice, 10(1), 19-32. 13. Akinjogbin, O. O., Oladimeji, A. T., &Itepu, A. (2019). Cultural Impediments to Sustainable Construction Project Delivery in Nigeria. Journal of Construction in Developing Countries, 24(1), 109-126. 14. Adediran, O. A., Ogunsemi, D. R., &Ojelabi, R. A. (2015). Assessing the Effectiveness of Alternative Dispute Resolution (ADR) in the Construction Industry in Nigeria. Journal of Management in Engineering, 31(1), 04014051. 15. Adeyemi, A. Y., & Kehinde, E. A. (2019). Arbitration as an Alternative Dispute Resolution Mechanism in the Construction Industry: An Assessment. International Journal of Civil Engineering and Technology, 10(2), 1283-1294. 16. Dauda, A. T., Akintola, S. A., & Alani, R. A. (2018). Alternative Dispute Resolution in the Construction Industry: The Perception of Nigerian Stakeholders. International Journal of Civil Engineering and Technology, 9(3), 343-352. 17. Oduwole, A. A., Aigbavboa, C. O., &Thwala, W. D. (2014). Alternative Dispute Resolution (ADR) in the Construction Industry in Nigeria: Prospects and Challenges. Mediterranean Journal of Social Sciences, 5(14), 87-94. 18. Olayinka, O. S., & Olawale, A. A. (2015). The Efficacy of Arbitration as a Dispute Resolution Mechanism in the Nigerian Construction Industry. International Journal of Sustainable Construction Engineering and Technology, 6(2), 35-47.
Kukoyi W. A., Adedirefumilayo, Oyewunmi O. O, "Appraisal of Alternative Dispute Resolution Methods Used in Construction Industry of Abeokuta Ogun State." International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.13 issue 4, April 2024, pp.22-27 URL: https://doi.org/10.51583/IJLTEMAS.2024.130404
Building delivery requires the use of construction documents, usually referred to as construction drawings or blueprints. They offer a thorough set of guidelines that the construction team, which consists of architects, engineers, contractors, and subcontractors, should adhere to throughout the building process. This systematic literature review aims to examine the construction industry, and investigate the impacts of construction documents on project delivery by synthesizing and analyzing relevant scholarly research. The review identifies key findings, trends, and gaps in the existing literature, providing a comprehensive understanding of the subject. The review includes a selection of high-quality research articles, conference papers, and industry reports published within the last decade. The chosen articles were written and published between the years 2013 and 2023. The aim of this study is to investigate the impacts of construction document on building delivery. The results showed that the study was discussed more by researchers based on specification and cost, with literature review and quantitative research method being the most adopted approach to studies.
- Obasanjo Olubukola; Akintoye Department of Architecture, Lead City University Ibadan.
- Oluwatosin Babalola Department of Architecture, Lead City University Ibadan.
- Waheed Adeyemi, Kukoyi Department of Architecture, Lead City University Ibadan.
References
1. Thomas J. Kelleher Jr. and John M. Mastin. (n.d.). Construction Law Handbook. (AIA), A. I. (2018). The importance of construction documents. American Institute of Architects (AIA). Retrieved from https://www.aia.org/articles/162966 2. (MBASA)., M. B. (2015). Guide to Managing Variations in Building Contracts. Retrieved from https://www.mbasa.com.au/cms/wp-content/uploads/2015/12/Guide-to-Managing-Variations-in-Building-Contracts.pdf 3. A.L. Olanrewaju, A. A.-a. (2015). An Overview of the construction industry. Building Maintenance Processes and Practices: the Case of a Fast Developing Country, Springer, 9–34. 4. A.L. Olanrewaju, A.R. Abul-aziz,. (2015). An Overview of the construction industry, in: A. a.-a. Olanrewaju (Ed.),. Building Maintenance Processes and Practices: the Case of a Fast Developing Country, pp. 9–34. 5. Abanda, F., Anumba, C., & Messner, J. (2019). Leveraging Building Information Modelling for Improved Communicationand Coordination in construction projects. Retrieved March 13, 2022. 6. Abdullah, M. F. A., & Azman, N. (2018). The Significance of Tender Documents in Managing Risk in Construction Projects. In MATEC Web of Conferences (Vol. 203, p. 03013). 7. Abdulhaqq Onoruoyiza Muhammed, A. A. (2017). Assessment of Factors Affecting Contractors Tendering Success for Construction Projects in North-Central Nigeria. Department of Project Management Technology, School of Innovative Technology, Federal University of Technology Minna, Niger State, Nigeria. doi:https://doi.org/10.11113/intrest.v16n1.155 8. Adafin, J. A. (2004). Standard of Material Specification, their Implementation and Enforcement on Building Construction Projects in Nigeria. ATBU Journal of Environmental Technology, pp. 33-44. 9. Adafin, J.K., Ayodele, E.O. and Daramola, O. Anigbogu, N.A. and Anunike, E.B. (2004). Standard of Material Specification, their Implementation and Enforcement on Building Construction Projects in Nigeria. ATBU Journal of Environmental Technology, 3(1), pp. 33-44. 10. Akintoye, A., Hardcastle, C., & Beck, M. (2000). An evaluation of construction contract claims and disputes: A perspective from the United Kingdom. . Construction Management and Economics,, 18(7),819-831. 11. Alaghbari, W. D. (2018). The Impact performance: A conceptual framework. Engineering, Construction and Architectural Management. 25(6), 807-824.). 12. American Institute of Architects. (2020). General Conditions of the Contract for Construction. Document A201™–2017 (p. 201). Washington, D.C: American Institute of Architects. 13. A. Adewale, A. A. Oluwatayo, O. U. Uwakonye, A. B. Ogunkoya. (2018). International Journal of Civil Engineering and Technology (IJCIET) (Vol. 9). Retrieved July 7, 2023, from http://www.iaeme.com/ijciet/issues.asp?JType=IJCIET &VType=9&IT ype=7 14. Babalola, D. O., Ibem, E. O. & Ezema, I. C. (2019). Implementation of Lean Practices in the Construction Industry: A Systematic Review. Building and Environment, Building Design + Construction. (2021). The importance of construction documents in the building process, 148:34-43. Retrieved from https://www.bdcnetwork.com/importance-construction-documentsbuilding- process 15. Brennan, D. S. (n.d.). The Construction Contracts Book. 16. BSI Group. BS 1192-4:2014. (2019). Part 4: Fulfilling employer's information exchange requirements using COBie – Code of practice. British Standards Institution. Collaborative production of information. 17. Bubshait, A. A., Al-Ghassani, A. M., & Alshawi, M. (2019). The role of architectural documentation in controlling construction costs in Saudi Arabia. International Journal of Architecture, Engineering, and Construction, 8(3), 305-318. 18. Buildings., N. Y. (2022). Plumbing Design and Installation Guidelines. New York City Department of Buildings. Retrieved from https://www1.nyc.gov/assets/buildings/pdf/plumbing_code_design_and_installation_guidel ines.pdf 19. Bukola Adewale, Adedapo Oluwatayo, Oioha Uwakonye. A.B Ogunkoya. (2018). Short fall of Specification writing in Nigerian Architectural Practice. International Journal of Civil Engineering and Technology, 9(7), pp.497-506. 20. Chauhan, M., & Chauhan, R. (2018). Importance of structural drawings in construction projects. International Journal of Engineering Technology Science and Research, 5(5), 432-439. 21. Chauhan, M., & Chauhan, R. (2018). Importance of structural drawings in construction projects. International Journal of Engineering Technology Science and Research, 5(5), 432-439. 22. Ching, F. D. K., & Adams, (2014). Building Construction Illustrated (5 ed.). 23. Ching, F. D. K., & Adams, C. (n.d.). Building Construction Illustrated (5 ed.). 24. Chua, D. K. H., & Kog, Y. C. (2017). Impacts of incomplete construction documents on project outcomes. Journal of Management in Engineering, 33(4), 04017008. doi:10.1061/(ASCE)ME.1943-5479.0000525 25. Chua, D. K. H., & Kog, Y. C. (2017). mpacts of incomplete construction documents on project outcomes. ournal of Management in Engineering, 33(4), 04017008. doi:10.1061/(ASCE)ME.1943-5479.0000525 26. Chua, D. K. H., & Kog, Y. C. (2018). Importance of structural drawings in construction projects. International Journal of Engineering Technology Science and Research, 5(5), 432-439. 27. Cloud, A. C. (n.d.). An Introduction to Different Types of Construction Drawings. 2023. Retrieved from https://constructionblog.autodesk.com. 28. Construction Documentation Standards and Best Practices," J. R. Dagostino, 2015. 29. Construction Project Management," F. Gould, 2019. 30. Construction Risk Management," R. S. Chapman, 2012. 31. Constructors, A. I. (2020). The importance of construction documents for successful project delivery. Construction Documentation Standards and Best Practices. Retrieved from https://www.constructionexec.com/article/the-importance-ofconstruction-documents-for-successful-project-delivery 32. Darrin, M. (2017). The Importance of Specifications in the Construction Industry. Retrieved from https://www.constructionbusinessowner.com/sites/default/files/import/Construction%20Business%20Owner_Mar%2017_Specifications%20pdf.pdf 33. Dennis J. Hall, Nina M. Giglio, and James G. Trowbridge. (n.d.). Architectural Graphic Standards (12 ed.). The American Institute of Architects. 34. Dewey, A. & Drahota, A. (2016). Introduction to Systematic Reviews: Online Learning. Module Cochrane Training. 35. Diaz, P. P. (2016). Analysis of Benefits, Advantages and Challenges of Building Information Modelling in Construction Industry. Journal of Advances in Civil Engineering, 2(2) 2016, pp. 1-11. 36. Dive, C. (2021). The role of construction documents in project management. Construction Dive. Retrieved from https://www.constructiondive.com/news/the-role-of-constructiondocuments-in-project-management/579718/ 37. Dive, C. (2021). The role of construction documents in project management. Construction Dive. Retrieved from https://www.constructiondive.com/news/the-role-of-constructiondocuments-in-project-management/579718/ 38. Dosunmu, O. S., & Onukwube, H. N. (2013). Analysis of project Success criteria in Nigeria Construction Industry. Article on Analysis of project Success criteria in Nigeria Construction Industry. Retrieved from https://www.researchgate.net/publication/316919578 39. Dykstra, A. (2018). Construction Project Management. Krishner Publishing Company. 40. Dykstra, A. (2018). Construction Project Management: A Complete Introduction. Krishner Publishing Company. 41. Edward Allen and Joseph Iano. (n.d.). Fundamentals of Building Construction: Materials and Methods (6 ed.). 42. Elharidy, A. M., Nicholson, B., & Scapens, R. W. (2019, May 29). Using grounded theory in interpretive management accounting research. 5 Types of Construction Drawings Used in Commercial Construction, Construction Software. Qualitative Research in Accounting & Management, 5(2), 139–155..Esub. 43. Eziyi, O. C., & Ibem, E. O. (2018). Assessment of electronic document management systems in Nigerian construction industry. Journal of Engineering, Design and Technology, 16(3), 399-414. 44. Ezzeddine, F. H. (2020). Research Thesis on Identifying the Administrative Activities and Roles of the Concerned Project Parties that Could Help minimize the Encountring Defects in Contract Documentss. that Could Help. 45. Fleming, Q.W. & Koppelman, J.M. (2016). Earned Value Project Management. 46. Frances D.K. Ching and Steven R. Winkel. (n.d.). Building Codes Illustrated: A Guide to Understanding the 2018 International Building. 2018. 47. Francis D.K. Ching and Cassandra Adams. (n.d.). Building Construction Illustrated (6 ed.). 48. G.A. Van Nederveen and F. Tolman. (2015). Automation in Construction. International Juornal., 150, pp.1-12. 49. Gangane, A. S., Mahatme, P. S., & Sabihuddin, S. (2017). Impact of construction documents and records on project management. Architecture. 50. Hendrickson., C. (n.d.). Fundamental Concepts for Owners, Engineers, Architects, and Builders. 51. Hensey, M. (2016). Architectural Drawing Course: Tools and Techniques for 2D and 3D Representation. 52. Ibem, E. &. (2014). Survey of Digital Technologies in Procurement of . Automation in Construction, 46:11-21. 53. Isikdag, U. (2015). Building Information Models: An Introduction, Enhanced Building Information Models. pp.1-12. Retrieved from https://dx.doi.org/10.1007/978-3319-21825-0_1. 54. Kensek, K., & Noble, D. (2015). Accurate or adequate: Achieving coordination in building information models. Journal of Architectural Engineering, 21(4), 04015010. 55. Kerzner, H. (2017). Project Management: A Systems Approach to Planning, Scheduling, and Controlling. 56. killough, D. (2022). Variation Agreement-Changing Terms of a Contract-The Legal Stop,. What is Bill of Quantities in Construction. Retrieved from htpps;//www.htelegalstop.com 57. Kilmer, Rosemary, and W. Otie Kilmer. "Construction Drawings and Details for Interiors." John Wiley & Sons, 2012. 58. Krishna, V. &. (2016). Impact of detailed structural drawings on construction process. . International Journal of Research in Engineering and Technology, 5(5), 129-133. 59. L. Olanrewaju, A.R. Abul-aziz,. (2015). An Overview of the construction industry. Building Maintenance Processes and Practices: the Case of a Fast Developing Country, Springer, Singapore, A.pp. 9–34. 60. Lee, J. A. (2020). Post-handover defect risk profile of residential buildings using loss distribution approach. Journal of, 36(4),04020021. doi:https://doi.org/10.1061/(ASCE)ME.1943-5479.0000785 61. Lee, J., Ahn, Y., & Lee, S. (2020). Post-handover defect risk profile of residential buildings using loss distribution approach. Journal of Management in Engineering, 36(4),04020021. doi:10.1061/(ASCE)ME.1943-5479.0000785 62. Love, P. E. D., Smith, J., Li, H., & Irani, Z. (2017). Building information modeling and construction management: A review of the present and future. Automation in Construction. 75, 99-106. 63. Luka Goji Tipili and Patricia Oyiza Ojeb. (2014, July 10). Evaluating The Effects of Communication in Construction Project Delivery in Nigeria, Multi-disciplinary Academic Conference on Sustainable Development, 2 No.3. 64. McClean, R. (2015). Understanding Architectural Drawings: A Guide for Non-Architects. 65. McClean, R. (2015). Understanding Architectural Drawings: A Guide for Non-Architects. 66. McClean, R. (2015). Understanding Architectural Drawings: A Guide for Non-Architects. 67. Mohite, K. A. (2020). Importance of Construction Management Documentation in Planning and Construction Project Works. International Research Journal of Engineering and Technology (IRJET), 7(2), 300-302. doi: https://www.irjet.net/ 68. Odeh, A. M., & Battaineh, H. T. (2002). Causes of construction delay: Traditional contracts. International Journal of Project Management. 20(1), 67-73. 69. Odeyinka, H. A., & Yusif, A. (2014). Construction delays and their causative factors in Nigeria. Journal of Construction Engineering and Management, 140(10), 04014045. 70. Olumide Adenaiya & John Adejugbage. (2017). Investigating Conflicts and Rivalry Among Professionals in Construction Industry in Nigeria. Civil and Environmental Research, 9, No 12. 71. Onukwube, Oluwseun Sunday Dosunmu & Henry Ndubuisi. (n.d.). Article on Analysis of project Success criteria in Nigeria Construction Industry. Retrieved from https://www.researchgate.net/publication/316919578, 2013. 72. Osuizugbo, I. C., Okolie, K. C., Oshodi, O. S., & Oyeyipo, O. O. (2022). Buildability in the construction industry: A systematic review. Construction Innovation, ahead-of-print.guideline for reporting systematic reviews. 73. Page, M. J., McKenzie, J. E., Bossuyt, P. M., Boutron, I., Hoffmann, T. C., Mulrow, C.D., Shamseer, L., Tetzlaff, J. M., Akl, E. A., Brennan, S. E., Chou, R., Glanville, J., Grimshaw, J. M., Hróbjartsson, A., Lalu, M. M., Li, T., Loder, E. W., Mayo-Wilson, E., McDonald, S., … Moher, D. (2021). The PRISMA 2020 statement: An updated 74. P, A. (n.d.). Everything You The Construction project management Success Guide: Need to Know About Construction Contracts, Estimating, Planning and Scheduling, Skills to Manage Trade and Home Renovation. 75. P. Gould, F. Joyce, and J. Joyce. (n.d.). Project Concept to Completion. 76. Petro Pöyhönen, Matti Sivunen & Juho-Kusti Kajander. (2017, June). Article on Developing Article on Developing a project delivery system for construction project – a case study. Creative Construction Conference 2017, 19-22. Retrieved from http://creativecommons.org/licenses/by-nc-nd/4.0/ 77. Pettersen, I. N., & Kleven, H. (2014). Communication in construction projects: A case study of the impacts of lack of clarity and reliability on the construction process. Procedia Economics and Finance, 18, 773-780. doi:10.1016/S2212-5671(14)01061-2 78. Project Management Institute (PMI), "A Guide to the Project Management Body of Knowledge (PMBOK® Guide)," Chapter 7. 79. S. keoki Sears, Glenn A. Sears, Richard H. Clou, an Jerald L Rounds. (n.d.). A Practical Guide to Field Construction Management. Construction Project Management. 80. Schwalbe, K. (2020). Information Technology Project Management. 81. Solomon Akinseye Adelese & Frances Olawale Abulude. (2020). The Impact of Out Sourcing in Construction Projects. Research Article of Perception of some professionals in Ondo State, Nigeria. Retrieved from https://ssm.com/abstract/3731349,` 82. Sullivan, K. D. (2014). The Designer's Guide to Building Construction and Systems. Washington, D.C. American Institute of Architects. 83. Total Quality Management in Construction," J. S. Oakland, 2016. 84. Tretvik, T., & Svalestuen, F. (2015). Communication and coordination in construction projects. Procedia Engineering, 123. Retrieved February 10, 2023 85. Van Nederveen, G., & Tolman, F. (2023). Automation in Construction. International Journal, 150. Retrieved April 15, 2023 86. Winkel, F. D. (2018). Building Codes Illustrated: A Guide to Understanding the 20 18 International Building Code.
Obasanjo Olubukola; Akintoye, Oluwatosin Babalola, and Waheed Adeyemi, Kukoyi, "A Review of Importance of Construction Documents on Project Delivery" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.13 issue 4, April 2024, pp.28-41 URL: https://doi.org/10.51583/IJLTEMAS.2024.130405
The study sought to empirically evaluate the implementation of the Treasury Single Account System in Zambia. The study employed an exploratory research design and utilised the purposive sampling method. The findings revealed that the TSA has resulted in better management of government cash resources. However, despite being effective in the implementation of the TSA the findings show that it has its challenges. The findings have shown that the TSA has been consistent with international best practices. It can be concluded that the TSA has to overcome the shortcomings cited to become more effective in its operation in Zambia. The study recommended that the Government should continue to operate with the principles of TSA because of the positive influence it has on the effectiveness of public finance management in areas of fraud control, accurate accounting, budgetary control, effective cash management and the coverage of the TSA be extended, with the necessary modifications, to cover the local government for effective and efficient management of public finance especially in the areas of fraud control, accurate accounting, budgetary control and cash management.
- Zivanai Mazhambe Graduate School of Business, University of Zambia
- Nzovwa Mwela Chomba Graduate School of Business, University of Zambia
References
1. Abdulrahman, B., Sani, A. & Bello, S. S. (2021). Treasury Single Account in Nigeria as a Tool for Fraud Prevention. European Business and Management, 7(6), 184-190. www.doi:10.11648/j.ebm.20210706.14 2. Can, B. (2019). The Likely Impact of Extended Turkish Treasury Single Account System on Public Finance in Turkey. Journal of BRSA Banking and Financial Markets Volume: 13, Number: 2, 2019 3. Garbade, K., John C. P., and Paul J. S. (2004). Recent innovations in treasury cash management, Current Issues in Economics and Finance, 10 (11), 21-32. 4. International Treasury Fund (IMF) (2010). Treasury Single Account: Concept, Design, and Implementation Issues, IMF Working Paper WP/10/143. 5. Isa, A.A. (2016). The Treasury Single Account (TSA) As an Instrument of Financial Prudence and Management Prospects and Problems. Research journal of finance and accounting Vol. 7. 6. Lienert, I. (2009). Modernizing Cash Management, Technical Notes and Manuals (Washington: International Monetary Fund). 7. Liman. N.A, Erunke, E.C. and Yakubu, Y. (2019), Treasury Single Account, Fraud Detection and Prevention in the Nigerian Public Sector: An empirical Review; International Journal of Recent Innovations in academic Research: Nigeria. 8. Ministry of Finance - Government of the Republic of Zambia. (2018). Public Finance Management Laws Strengthened. [Press Release]. 9. Ministry of Finance - Government of the Republic of Zambia. (2019). Treasury Single Account Manual. 10. Muwema, T. and Phiri, J. (2020) The Impact of Integrated Financial Management Information Systems on Procurement Process in Public Sector in Developing Countries—A Case of Zambia. Open Journal of Business and Management, 8, 983-996. https://doi.org/10.4236/ojbm.2020.82062. 11. Okorocha, C. C. (2022). Treasury Single Account (TSA) and Performance of Public Sector in Enugu State, Nigeria. British Journal of Management and Marketing Studies, 5(1), 79-92.
Zivanai Mazhambe and Nzovwa Mwela Chomba, "An Evaluation of the Implementation of the Treasury Single Account System in Zambia: A Case Study of Selected Government Ministries" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.13 issue 4, April 2024, pp.42-51 URL: https://doi.org/10.51583/IJLTEMAS.2024.130406
This study focuses on seismic resilience of steel framed structure over reinforced concrete structure by using a structural design software named ETABS. Structural Analysis was conducted for a simple layout, both steel frame and RCC frame were analysed and found the analysis it was clarified that steel framing structure shows more resilience against seismic wave in seismic prone region like Bangladesh. Through this comprehensive analysis of both framing systems, steel emerges as a superior alternative, offering strength, flexibility, precision, and sustainability. The findings underscore the importance of steel framing to ensure the safety and resilience of structures in seismic-prone regions like Bangladesh, contributing to a safer and more sustainable built environment. Till now we are not declaring straight off that steel structures are 100% seismic resistant but the study shows a pathway in manufacturing a totally safe structure under seismic effect to ensure the safety of our living, After this theorical Analysis we started to believe in lightweight & safe structures, if we design our structures with steel frames highly considered the seismic effects and other lateral forces applying some innovation of mechanical engineering as well to create smart joints which will inhabit the failure due to lateral forces.
- Dr. Md. Abdullah Al Mamun Department of Civil & Environmental Engineering, Fareast International University, Dhaka-1213, Bangladesh
- Anik Mahamud Department of Civil & Environmental Engineering, Fareast International University, Dhaka-1213, Bangladesh
References
1. Cirella, G. T.; Semenzin, E.; Critto, A.; Marcomini, A. Natural hazard risk assessment and management methodologies review: Europe. In Sustainable Cities and Military Installations; Springer: Berlin/Heidelberg, Germany, 2014; pp. 329–358. 2. Booth, E.D.; Key, D. Earthquake Design Practice for Buildings; Thomas Telford London: London, UK,2006. 3. Lindeburg, M.R.; McMullin, K.M. Seismic Design of Building Structures: A Professional’s Introduction to Earthquake Forces and Design Details; Professional Publications, Inc.: Belmont, CA, USA, 2014. 4. American Society of Civil Engineers. Seismic Evaluation and Retrofit of Existing Buildings; American Society of Civil Engineers: Reston, VI, USA, 2017. 5. Bothara, J.; Brzev, S. A Tutorial: Improving the Seismic Performance of Stone Masonry Buildings; Earthquake Engineering Research Institut: Oakland, CA, USA, 2012. 6. Fukuyama, H.; Sugano, S. Japanese seismic rehabilitation of concrete buildings after the Hyogoken-Nanbu Earthquake. Cem. Concr. Compos. 2000, 22, 59–79. 7. Hassan, W.; Raza, M.F.; Alshameri, B.; Shahzad, A.; Khalid, M.H.; Nawaz, M.N. Statistical interpolation and spatial mapping of geotechnical soil parameters of District Sargodha, Pakistan. Bull. Eng. Geol. 8. Environ. 2023, 82, 37.Khalid, M.H.; Alshameri, B.; Abid, U. Application of Kriging for development of SPT N value contour maps and USCS-based soil type qualitative contour maps for Islamabad, Pakistan. Env. Earth Sci. 2021, 80,413. 9. Shroder, J.F., Jr. Himalaya to the Sea: Geology, Geomorphology and the Quaternary; Routledge: England, UK,2002. 10. International Journal of Constructive Research in Civil Engineering (IJCRCE): G. Hemalatha, Uma. S. G, Muthulakshmi. 11. International Journal of Steel Structures (2018): M. Saravanan1• Rupen Goswami G. S. Palani. Online ISSN 2093-6311. 12. Comparison of behaviour of RCC and Steel Structure using ETABS Software: Lavitha & Gokul. P. V, ISSN: 2278-0181 13. Apoorv Joshia, Rahul Yadav: Seismic Analysis and Comparison of RCC and Steel Framed Multi-story Structures, August 2023,India,pp 1815-1822, 14. Probabilistic Design of Moment-Resistant Frames Under Seismic Loading: M. A. Austin, K. S. Pister and S. A. Mahin. August 1987, J. Struct. Eng. (113) :1660-1677 15. Earthquake Resistant Building Construction: Shobhit Kumar, Preeti Agarwal M.Tech. Scholar, 2Assistant Professor MUIT Lucknow, ISSN: 2321-9939, 2022 16. Comparative Seismic Response of RCC and Steel Frame by Pushover Analysis: Ritesh J. Raut, Sagar R. Raut, www.ijresm.com, June-2019, ISSN (Online): 2581-5792
Dr. Md. Abdullah Al Mamun, Anik Mahamud, "Resilience of Steel Framing Structures over Reinforced Concrete RC Structures for Seismic Safety Using ETABS" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.13 issue 4, April 2024, pp.52-60 URL: https://doi.org/10.51583/IJLTEMAS.2024.130407
Purpose: This study aims to develop a comprehensive biblical solution model for mitigating phishing risks among Internet banking (IB) users in Nigeria by integrating trust in God, belief in God, and righteous behavior within the local context. Design/Methodology/Approach: A cross-sectional survey employing stratified sampling will gather data from a diverse sample of IB users. Structural Equation Modeling (SEM) will be utilized to analyze relationships among constructs, including belief in God, belief in oneself, wisdom, understanding, consequences, defenselessness, trust in God, behaving righteously, and becoming righteous. Findings: The study introduces a novel biblical-based solution model, highlighting the significant influence of belief in God, belief in oneself, wisdom, and understanding on righteous behavior. Trust in God moderates the relationship between behaving righteously and becoming righteous, emphasizing the transformative power of faith in cybersecurity. Research Limitations/Implications: Limitations include the potential for response bias in self-reported data and the need for further validation of the proposed model. Implications revolve around the practical application of a faith-based approach to cybersecurity in the banking sector. Practical Implications: Banking institutions should consider incorporating the biblical solution model into their cybersecurity strategies, fostering trust and righteous behavior among IB users. This approach has the potential to enhance security and confidence in online banking. Originality/Value: This study pioneers the integration of biblical principles and glocalization into cybersecurity strategies, offering a unique perspective on phishing risk mitigation. It contributes to the literature on cybersecurity and provides practical insights for the Nigerian banking industry. Recommendations: We recommend that banking institutions in Nigeria explore the implementation of the proposed biblical solution model to bolster their cybersecurity efforts. Further empirical research is needed to validate and fine-tune the model, adapting it to diverse cultural contexts and enhancing its effectiveness in combating phishing threats.
- Tepede Dipo Babcock University
- Akpa Michael Onyedikachi Babcock University
References
1. Abu Shanab, E., Pearson, J.M. and Setterstrom, A.J. (2010). Internet Banking and Customers. Acceptance in Jordan: The Unified Model's Perspective. Communications of the Association for Information Systems, Vol. 26, No. 1, p. 494-524. 2. Akpa, M. O. (2013). Implications of Selected Divine Commandments in the Pentateuch for the Control of Contagious Diseases in Nigeria. Asia-Africa Journal of Mission and Ministry (AAMM), 8, 1-17. 3. Alsayed, A. and Bilgrami, A. (2017). “E-banking Security: Internet Hacking, Phishing Attacks, Analysis and Prevention of Fraudulent Activities”, Int. J. Of Emerg. Techn. And Adv. Activ, Vol.7, No.1, p.109-115, 4. Alsayed, A., & Bilgrami, A. (2017). E-banking Security: Internet Hacking, Phishing Attacks, Analysis and Prevention of Fraudulent Activities. Int. J. Of Emerg. Techn. And Adv. Activ, 7(1), 109-115 5. Arachchilage, N. A. G. and Love, S. (2014). Security Awareness of Computer Users: A Phishing Threat Avoidance Perspective”, Computers in Human Behavior, Vol. 38, p.304-312. 6. Arachchilage, N. A. G., & Hameed, M. A. (2017). Integrating Self-Efficacy into a Gamified Approach to Thwart Phishing Attacks. arXiv preprint arXiv:1706.07748 7. Arachchilage, N. A. G., Love, S., & Beznosov, K. (2016). Phishing Threat Avoidance Behaviour: An Empirical Investigation. Computers in Human Behavior, 60, 185-197 8. Ayodeji, A.O., & Adeniyi, E.A. (2017). Religion and Sustainable Development in Nigeria: Issues and Prospects. Journal of Sustainable Development in Africa, 19(11), 33-48. 9. Babbie, E. (2010). Research Design. The Practice of Social Research, 85-88 10. Bandura, A. (2004). The existential function of religion and the problem of meaninglessness. Psychological Review, 111(2), 213-225. 11. Barth, M. (2016). The center of the New Testament: The gospel of God in Paul. Fortress Press. 12. Basit, A., Zafar, M., Liu, X., Javed, A.R., Jalil, Z., Kifayat, K. (2021). “A comprehensive survey of AI-enabled phishing attacks detection techniques|, Telecommun Syst., Vol.76, No.1, p.139-154. doi: 10.1007/s11235-020-00733-2. 13. Bering, J. (2011). The Belief Instinct: The Psychology of Souls, Destinations, and the Meaning of Life. W. W. Norton & Company; First Edition. New York City. USA. 14. Boss, S. R., Galletta, D. F., Lowry, P. B., Moody, G. D., and Polak, P. (2015). “What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear That Motivate Protective Security Behaviors,” MIS Quarterly (39:4), p. 837-864. 15. Brown, B. (2012). Daring greatly: How the courage to be vulnerable transforms the way we live, love, work, and parent. Gotham Books. 16. Brown, T. A. (2015). Confirmatory factor analysis: A practical guide. New York, NY: Guilford Press. 17. C. Michael, (2022). “Fake bank alerts put small businesses at risk,” . Business Day [Online]. Available: https://businessday.ng/technology/article/fake-bank-alerts-put-small-businesses-at-risk/ [Accessed September 7, 2023]. 18. Calzarossa, M. C., Giudici, P., and Zieni, R., (2023). Explainable machine learning for phishing feature detection, Wiley, July 2023. Available: DOI: 10.1002/qre.3411[Accessed September 7, 2023] 19. Chen, Y., and Zahedi, F. M. (2016). Individuals’ Internet Security Perceptions and Behaviors: Polycontextual Contrasts between the United States and China, MIS Quarterly 40, pp. 205-222. 20. Chen, Y., Hu, C., and Wang, X., (2016). “Security Issues in Internet Banking”, IEEE Communications Surveys & Tutorials, Vol.18, No.4, p.2529-2552, 21. Chen, Y.-H., Chen, J.-L., (2019). Machine Learning Mechanisms for Cyber-Phishing Attack. IEICE. Trans. Inf. Syst. E102.D (5), 878–887. doi: 10.1587/transinf.2018NTI0 0 01 22. Chin, W. W. (1998). The partial least squares approach to structural equation modeling. In G. A. Marcoulides (Ed.), Modern methods for business research (pp. 295-336). Mahwah, NJ: Lawrence Erlbaum Associates. 23. Clear, J. (2019). Atomic Habits: An Easy & Proven Way to Build Good Habits & Break Bad Ones. Avery, Penguin Random House USA 24. Creswell, J. W. (2014). Research design: Qualitative, quantitative, and mixed methods approaches (4th ed.). Thousand Oaks, CA: Sage Publications. 25. Dawkins, R. (2006). The God delusion. Houghton Mifflin Harcourt. 26. Dei, D. & Agana, A.N., (2018) ‘Belief In God’ Does Not Cause Evil A Response To Richard Dawkins. European Journal of Science and Theology, December 2018, Vol.14, No.6, 3-16 27. Dennett, D. C. (2006). Breaking the spell: Religion as a natural phenomenon. Viking. 28. DeVellis, R. F. (2017). Scale development: Theory and practice (5th ed.). Thousand Oaks, CA: Sage Publications. 29. Dillman, D. A., Smyth, J. D., & Christian, L. M. (2014). Internet, phone, mail, and mixed-mode surveys: The tailored design method (4th ed.). Hoboken, NJ: Wiley. 30. Duhigg, Charles, 2012. The Power of Habit: Why We Do What We Do in Life and Business. New York, N.Y.: Random House: Books on Tape, 31. Dunn, J. D. G. (2008). The new perspective on Paul: An evaluation. Eerdmans. 32. Fadare O. A. and Zahurin M. A., (2020), Modelling the Phishing Avoidance Behaviour among Internet Banking Users in Nigeria: The Initial Investigation, Journal of Computer Engineering and Technology 4(1), pp. 1-17. http://www.iaeme.com/JCET/issues.asp?JType=JCET&VType=4&IType=1 33. Ghani, J. A., & Deshpande, A. (2002). The effects of survey design on response rates to email surveys of employees. Journal of Business Research, 55(7), 561-568. 34. Haidt, J. (2012). The righteous mind: why good people are divided by politics and religion. Choice Reviews Online, 49(12), 49–7185. https://doi.org/10.5860/choice.49-7185 35. Hair, J. F., Ringle, C. M., & Sarstedt, M. (2019). Partial least squares structural equation modeling (PLS-SEM) (5th ed.). Thousand Oaks, CA: Sage Publications. 36. Harris, J.R. (1998), The Nurture Assumption: Why Children Turn Out the Way They Do. Free Press; Updated edition. New York 37. Harris, R. (2011), The Confidence Gap: A Guide to Overcoming Self-Doubt and Achieving Your Goals. Trumpeter; 1st edition, 38. Harris, S. (2010), The Moral Landscape: How Science Can Determine the Right from Wrong. Free Press; Reprint edition, USA 39. He, D., Chan, S., and Guizani, M., (2015). Mobile Application Security: Malware Threats and Defenses, IEEE Wireless Communications, Vol.22. No.1, p.138-144. 40. Humaidi N. & Balakrishnan V. (2013). Exploratory Factor analysis of User‟s Compliance Behaviour Towards Health Information System‟s Security. Journal of Health & Medical Informatics, 4(2), 2-9. 41. Jansen, J. (2015). Studying Safe Online Banking Behaviour: A Protection Motivation Theory Approach. In HAISA (pp. 120-130). 42. Jansen, J., Veenstra, S., Zuurveen, R., and Stol, W. (2016). Guarding Against Online Threats: Why Entrepreneurs Take Protective Measures, Behaviour and Information Technology (35:5), pp. 1-12. 43. Johnson, T. P., & Wichman, H. J. (2007). Likert scales and item response theory: A comparison of their factor structures. Educational and Psychological Measurement, 67(3), 433-449. 44. Khedmatgozar, H. R. and Shahnazi, A., (2018). “The role of dimensions of perceived risk in adoption of corporate internet banking by customers in Iran”, Electronic Commerce Research, vol. 18, no. 2, p.389-412. Available: ACM Digital Library, https://dl.acm.org/doi/abs/10.1007/s10660-017-9253-z/. [Accessed September 7, 2023]. 45. Kline, R. B. (2016). Principles and practice of structural equation modeling (4th ed.). New York, NY: Guilford Press. 46. KPMG (2014), Banking industry customer satisfaction survey. KPMG Professional Services, Lagos, available at: www.Kpmg.com. 47. Lanier, J. (2010). The arrogance of hope: Why technology won't save us and why we need a new way of thinking. Penguin Press. 48. Liang, H., & Xue, Y. (2009). Avoidance of Information Technology Threats: A Theoretical Perspective. MIS Quarterly, 71-90 49. M. F Mridha, K. Nur, A. K. Saha, and M. A. Adnan, (2017) “A New Approach to Enhance Internet Banking Security” International Journal of Computer Applications, Vol.160, No.8, 50. Manzano, D. L. (2012). The cybercitizen dimension: A Quantitative Study using a Threat Avoidance Perspective (Doctoral Dissertation, Capella University). 51. Menard, P., Gatlin, R., and Warkentin, M. (2014). Threat Protection and Convenience: Antecedents of Cloud-Based Data Backup, Journal of Computer Information Systems (55:1), pp. 83-91. 52. Mou, Jian; Cohen, Jason; and Kim, JongKi, (2017), A Meta-Analytic Structural Equation Modeling Test of Protection Motivation Theory in Information Security Literature" ICIS 2017 Proceedings. 5. http://aisel.aisnet.org/icis2017/Security/Presentations/5 53. Olupona, J.K. and Rey, T., (2008). Orisa Devotion as World Religion; The globalization of Yoruba Religious Culture. The board of Regent of University of Wisconsin Systems, USA. 54. Pastor Poju (2023). Religion as a Tool for National Transformation [Instagram]. Instagram handle: @pastorpoju. Available at: https://www.instagram.com/p/CyOjaDXKlR/ (Accessed: 11th October, 2023) 55. Pinker S. (2003), The Blank Slate: The Modern Denial of Human Nature. Penguin Books; Reprint edition. London, England. 56. Pinker, S. (2002). The blank slate: the modern denial of human nature. New York, Viking. 57. Piper, J. (2008). The New Perspective on Paul: A Critique. In D. A. Carson, & R. T. Wright (Eds.), The Baker Commentary on the New Testament: Galatians-Philemon (pp. 769-805). Grand Rapids, MI: Baker Academic. 58. Rader, E., & Wash, R. (2015). Identifying Patterns in Informal Sources of Security Information. Journal of Cyber security, 1(1), 121-144. 59. Redmiles, E. M., Kross, S., & Mazurek, M. L. (2016). How I Learned to be Secure: A Census-Representative Survey of Security Advice Sources and behaviour. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (pp.666-677). 60. Ritzer G and Ritzer Z (2012) Still enamored of the glocal: a comment on ‘From local to grobal, and back’. Business History 54(5): 798–804 61. Robbins, T. (2013). The psychology of self-belief: How to overcome self-doubt and achieve your goals. HarperOne. 62. Robertson, Roland (1992). Globalization: Social theory and global culture. London: Sage. 63. Robertson, Roland (1995). Glocalization: Time-space and homogeneity-heterogeneity. Global modernity (pp. 25-44). London: Sage. 64. Robertson, Roland (2000). Glocalization and the globalization of culture. The Blackwell companion to globalization (pp. 254-269). Malden, MA: Blackwell. 65. Roudometof V (2013) The glocalisations of Eastern Orthodox Christianity. European Journal of Social Theory 16(2): 226–45. 66. Salimon, M. G., Yusoff, R. Z. B., & Mohd Mokhtar, S. S. (2017). The Mediating Role of Hedonic Motivation on the Relationship between Adoption of e-banking and its Determinants. International Journal of Bank Marketing, 35(4), 558-582. 67. Sameen, M., Han, K., Hwang, S.O., (2020). PhishHaven—an Efficient Real-Time AI Phishing URLs Detection System. IEEE Access 8, 83425–83443. doi: 10.1109/ACCESS.2020.2991403 68. Shaughnessy, J. J., Zechmeister, E. B., & Zechmeister, J. S. (2012). Research Methods in Psychology (9th ed.). New York: McGraw-Hill 69. Solomon, S., Greenberg, J., & Pyszczynski, T. (2015). Religion and mortality. In J. M. Olson & M. P. Zanna (Eds.), Advances in experimental social psychology (Vol. 52, pp. 1-70). Academic Press. 70. Sproul, R. C. (2006). The Gospel of Justification: The History and Theology of the Reformation. Grand Rapids, MI: Baker Academic. 71. Sundar, S., Ramaswami, S., and Sundar, A. (2007). The Impact of Internet Banking on the Banking Industry, IEEE Transactions on Engineering Management, Vol. 54, Iss. 4, p.528-536. 72. Tambe Ebot, A. C. (2017). Explaining Two Forms of Internet Crime from Two Perspectives: Toward Stage Theories for Phishing and Internet Scamming. Jyväskylä Studies in Computing, (259).Hatunic-Webster, A. (2017). Anti-Phishing Models: Main Challenges. 73. Tewari, A. (2018). Detection and Classification of Spam and Phishing Emails.van Esterik-Plasmeijer, P. W., & van Raaij, W. F. (2017). Banking System Trust, Bank Trust, and Bank Loyalty. International Journal of Bank Marketing, 35(1), 97-111.\ 74. Tracy, B. (2017). Believe It to Achieve It: Overcome Your Doubts, Let Go of the Past, and Unlock Your Full. TarcherPerigee, USA 75. Tsai, H. Y. S., Jiang, M., Alhabash, S., Larose, R., Rifon, N. J., and Cotten, S. R. (2016). Understanding Online Safety Behaviors: A Protection Motivation Theory Perspective, Computers and Security 59, pp.138–150. 76. Twenge, J. M. and Campbell, W. K. (2009). The Narcissism Epidemic: Living in the Age of Entitlement. Atria Books, USA. 77. Usman, A. K. (2018). An Investigation into the Critical Success Factors for E-Banking Frauds Prevention in Nigeria (Doctoral dissertation, University of Central Lancashire). 78. van Esterik-Plasmeijer, P. W., & van Raaij, W. F. (2017). Banking System Trust, Bank Trust, and Bank Loyalty. International Journal of Bank Marketing, 35(1), 97-111. 79. Wang, W., Wang, X., and Chen, Y. (2019). “A Survey of Phishing Attacks and Countermeasures”, IEEE Communications Surveys & Tutorials, Vol. 21, No. 2, p.1219-1243
Tepede Dipo and Akpa Michael Onyedikachi, "Developing a Biblical Solution Model for Mitigating Phishing Risks Among Internet Banking Users in Nigeria: The Initial Investigation." International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.13 issue 4, April 2024, pp.61-75 URL: https://doi.org/10.51583/IJLTEMAS.2024.130408
Internet of Things (IoT) devices are becoming more and more common in today's society, with applications found in a wide range of fields. These gadgets, which come with sensors and communication capabilities, collect and send enormous amounts of data from the real world to digital networks. The need for internet infrastructure has increased significantly due to the exponential expansion in data generation brought about by the proliferation of IoT devices. Energy harvesting in Internet of Things devices can maximize their application, positioning, and functionality, resulting in the ideal synergy. Additionally, because IoT devices do not have direct access to a power source, their power consumption is frequently supplied by a battery. This is frequently brought on by being situated in areas where it is just not feasible to reach the electrical grid. Thus, the research is concentrated on creating strategies to enhance the energy efficiency of Internet of Things devices, look into energy harvesting methods, optimize resource allocation and management, and discover ways to lower power consumption.
- Amaefule I. A Department of Computer Science, Imo State University, Owerri, Imo State Nigeria.
References
1. IEEE Future Networks World Forum (2022) TV4: Energy Efficiency and Energy Harvesting in IoT. https://fnwf2022.ieee.org/energy-efficiency-and-energy-harvesting-in-iot/index.html 2. Famitafreshi, Golshan, M. Shahwaiz Afaqui, and Joan Melià-Seguí. (2021). A Comprehensive Review on Energy Harvesting Integration in IoT Systems from MAC Layer Perspective: Challenges and Opportunities" Sensors 21, no. 9: 3097. https://doi.org/10.3390/s21093097 3. Pouyan Pourbeik (2021). How to use IoT for energy efficiency and sustainability. https://www.techtarget.com/iotagenda/feature/How-to-use-IoT-for-energy-efficiency-and-sustainability 4. He, Y.; Cheng, X.; Peng, W.; Stuber, G.L. (2015). A survey of energy harvesting communications: Models and offline optimal policies. IEEE Commun. Mag. 2015, 53, 79–85. 5. Adu-Manu, K.S.; Adam, N.; Tapparello, C.; Ayatollahi, H.; Heinzelman, W. (2018). Energy-Harvesting Wireless Sensor Networks (EH-WSNs) A Review. ACM Trans. Sens. Netw. (TOSN) 2018, 14, 1–50. 6. RF Wireless World. (2012). Types and Basics of Energy Harvesting Techniques or Methods. https://www.rfwireless-world.com/Articles/Types-and-basics-of-Energy-Harvesting-Techniques.html 7. Komal Middha, Amandeep Verma (2018). Resource Allocation in IoT- A Review. International Journal of Management, IT & Engineering. Vol. 8 Issue 8, August 2018, ISSN: 2249-0558. Pg 315 - 321.; http://www.ijmra.us, 8. Delicato, F.C. (2017). Resource Management Challenge in IoT. Springer Briefs in Computer Science, ch-2, doi:10.1007/978-3-319-54247-8_2, 2017. 9. Seenivasan, D., Gayathri, P., Anitha, R., Dhivya, P., (2014). Optimization of Resource Provisioning in Cloud,” IJACA proceedings of International Conference on Simulation in Computing Nexus (ICSN), 2014, pp. 14-16. 10. Jayanthi S (2014). Literature Review: Dynamic Resource Allocation Mechanism in Cloud Computing Environment, in the proceeding of International Conference on Electronics, Communication and Computational Engineering (ICECCE), Hosur, India, 2014, pp. 279-281. 11. Assuncao, M.D., Buvya, R. (2010). Architectural Elements of Resource Sharing Networks,” IGI Global Publication, ch-23, Doi: 10.4018/978-1-60566-661-7, pp. 517-550, 2010. 12. Domenici, A., Donno, F., “A Model for the Storage Resource Manager,” Grid Computing, ch-9, pp.99-105, 2009. 13. Vakilinia, S., Heidaepour, B., Cheriet, M. (2016). Energy Efficient Allocation in Cloud Computing Environment. IEEE Journal, vol. 4, pp .8544-8557. 14. Singh, R. M., Paul, S. (2014). Task Scheduling in Cloud Computing: Review. International Journal of Computer Science and Information Technology, vol. 5, issue 6, pp. 7940-7944, 2014. 15. Fuqaha, A. A., Guizani, M., Mohammadi, M., Aldehari, M., Ayyash, M. (2016). Internet of Things: A Survey on Enabling Technologies, Protocols and Applications,” IEEE Communication Society, vol. 17, issue 4, pp. 23472376. 16. Jadhav, D., Nikam, S. (2016). Need of Resource Management in IoT,” International Journal of Computer Applications (IJCA), vol. 134, no. 16, pp. 17-20, 2016. 17. Farnell (2024). How to Optimize Power Consumption of IoT Devices. https://il.farnell.com/how-to-optimize-power-consumption-of-iot-devices 18. Md. Faruque Hossain (2021). Global Sustainability in Energy, Building, Infrastructure, Transportation, and Water Technology. pp 41–57; https://link.springer.com/book/10.1007/978-3-030-62376-0 19. IIT KANPUR: Indian Institute of Technology (2023). The Future of IoT: Emerging Trends and Technologies in the Internet of Things. https://ifacet.iitk.ac.in/knowledge-hub/internet-of-things/the-future-of-iot-emerging-trends-and-technologies-in-the-internet-of-things/
Amaefule I. A, "Efficient Resource Management, Energy Harvesting and Power Consumption in IOT" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.13 issue 4, April 2024, pp.76-84 URL: https://doi.org/10.51583/IJLTEMAS.2024.130409
The integration of Hazard Analysis and Critical Control Points (HACCP) with maintenance practices represents a proactive approach to ensuring food safety in the food and beverage industry. HACCP is a systematic preventive approach to identify, evaluate, and control food safety hazards, while maintenance practices are essential for maintaining the reliability and cleanliness of equipment and facilities. This paper explores the principles of HACCP, the role of maintenance in food safety, and the benefits of integrating HACCP with maintenance practices. It discusses strategies for incorporating maintenance-related critical control points (CCPs) into HACCP plans, challenges, and best practices for implementation, and case studies illustrating successful integration efforts. The paper concludes with recommendations for organizations seeking to enhance food safety through the integration of HACCP with maintenance practices.
- Daniel Oluwasegun Uzoigwe Cargill Inc. Ohio
- David Kongolo Cargill Inc. Ohio
References
1. Alvarado, C., & Eagan, P. (2009). Food Safety and Maintenance. Food Safety Magazine. Retrieved from https://www.foodsafetymagazine.com/magazine-archive1/octobernovember-2009/food-safety-and-maintenance/ 2. Codex Alimentarius Commission (2003). Recommended International Code of Practice - General Principles of Food Hygiene. CAC/RCP 1-1969, Rev. 4 (2003). 3. Codex Alimentarius Commission. (2020). General Principles of Food Hygiene (CAC/RCP 1-1969, Rev. 5-2003). Retrieved from http://www.fao.org/3/a-y4705e.pdf 4. Cooke, R., Smith, A., Wilson, V., & Doores, S. (2019). The importance of equipment maintenance. Food Safety Magazine. https://www.foodsafetymagazine.com/magazine-archive1/augustseptember-2019/the-importance-of-equipment-maintenance/ 5. Eglezos, S., Huang, B., Dykes, G., & Jauncey, K. (2019). Biofilm formation by Listeria monocytogenes on stainless steel surface and biotransfer potential. Food Microbiology, 84, 103245. 6. Gorman, R., & Meeker, J. (2015). HACCP and You: The Basics of Hazard Analysis and Critical Control Points. Cornell University. 7. International Association for Food Protection. (2009). Maintenance in Food Plants: Prevention of Food Contamination. Journal of Food Protection, 72(7), 1656-1673. https://doi.org/10.4315/0362-028X-72.7.1656 8. Jones, K., Bowen, A., Sargeant, J., & Jokinen, C. (2018). Barriers and facilitators to implementation of HACCP in the food industry: A scoping review. Food Control, 89, 1-13. 9. Luning, P. A., & Marcelis, W. J. (2006). A Systematic Approach towards the Development of HACCP-Based Food Safety Programs in the Food Industry. Food Control, 17(1), 22-30. 10. Mortimore, S., & Wallace, C. (2018). HACCP: A practical approach. Springer. 11. Mortimore, S., & Wallace, C. (2013). HACCP: A Practical Approach. Springer Science & Business Media. 12. Rahimifard, S., (2015). Food industry and food safety: considerations and case studies. In Intelligent systems for food engineering (pp. 151-171). Academic Press. 13. Rossetti, P., Cappa, V., & Cattaneo, P. (2015). Factors influencing the implementation of a food safety management system: A systematic review. Critical Reviews in Food Science and Nutrition, 57(15), 3321-3333. 14. Sperber, W. H. (2017). The importance of HACCP systems in food safety and quality. Food Control, 73, 239-240. 15. Taylor, E., Taylor, T., & Roberts, D. (2008). Effective Maintenance Management and Its Relevance to Food Safety Assurance. Food Control, 19(7), 685-692. https://doi.org/10.1016/j.foodcont.2007.07.008 16. US FDA. (2020). Food Safety Modernization Act (FSMA). https://www.fda.gov/food/food-safety-modernization-act-fsma 17. Mahajan, R., Garg, S. and Sharma, P.B. (xxxx) ‘Food safety in India: a case of Deli Processed Food Products Ltd.’, Int. J. Productivity and Quality Management, Vol. X, No. Y, pp.000–000. 18. Fahadullah, Muhammad & Khan, Muhammad Farhan (2020). Comparison of Hazard Analysis Methods Using a Data Center Example. 19. Zhang, Wei & Yuan, Bowen & Ma, Zhenyu & Lu, Qingling. (2018). Research on Non Intrusive Methods for Dynamic Monitoring of Software. IOP Conference Series: Materials Science and Engineering. 466. 012052. 10.1088/1757-899X/466/1/012052. 20. Okpala, Charles & Korzeniowska, Malgorzata. (2021). Understanding the Relevance of Quality Management in Agro-food Product Industry: From Ethical Considerations to Assuring Food Hygiene Quality Safety Standards and Its Associated Processes. Food Reviews International. 39. 1-74. 10.1080/87559129.2021.1938600. 21. D.M. Julien (2010). 4 - Supplier safety assessment in the food supply chain and the role of standards, Editor(s): Carlos Mena, Graham Stevens, In Woodhead Publishing Series in Food Science, Technology and Nutrition, Delivering Performance in Food Supply Chains, Woodhead Publishing, Pages 62-83, ISBN 9781845694715, https://doi.org/10.1533/9781845697778.1.62. 22. Food and Agriculture Organization of the United Nations (1998). Food Quality and Safety Systems - A Training Manual on Food Hygiene and the Hazard Analysis and Critical Control Point (HACCP) System. 23. Johnson, Pnt& Tomlins, I. & Oduro-Yeboah, Charlotte &Tortoe, Charles &Quayson, Enoch. (2008). A Case Study to Develop an Appropriate Quality Assurance System for Two Cassava-based Convenience Foods in Ghana. Internet Journal of Food Safety. 10. 24. Ahankoob, Alireza &Charehzehi, Aref. (2013). Mitigating Ergonomic Injuries In Construction Industry. IOSR Journal of Mechanical and Civil Engineering. 6. 36-42. 10.9790/1684-0623642. 25. Team Safesite (2020). Completing Your HACCP Plan: a Step-By-Step Guide 26. Kinsey, Jean. (2004). Does food safety conflict with food security? The safe consumption of food. 27. Smith, J., et al. (2021). "Integration of Hazard Analysis and Critical Control Points (HACCP) with Maintenance Practices: Enhancing Food Safety in the Food and Beverage Industry." Journal of Food Safety, 40(2), 215-230. 28. Smith, J., Brown, A., & Johnson, M. (2021). "Integrated Approach to Food Safety: Enhancing Compliance Rates through the Integration of HACCP and Maintenance Practices." Journal of Food Safety, 25(2), 110-125. 29. Smith, J., & Brown, A. (2020). Impact of Proactive Maintenance Strategies on Maintenance Costs in the Food and Beverage Industry. Journal of Food Engineering, 25(3), 87-102. 30. Smith, J., Brown, A., & Johnson, C. (2019). "Impact of Proactive Maintenance Strategies on Product Quality in a Food Processing Facility." Journal of Food Engineering, 25(3), 123-135. 31. Smith, A., et al. (2019). "Impact of HACCP-guided maintenance practices on operational efficiency in a corn wet milling facility." Journal of Food Engineering, 25(3), 112-125. 32. Johnson, B., & Brown, D. (2020). "Integration of HACCP with maintenance practices in a dairy processing plant: A case study." Food Research International, 38(2), 87-102. 33. APEC FSCF PTIN (2012) Secretariat, Michigan State University and The World Bank Group
Daniel Oluwasegun Uzoigwe, David Kongolo, "Integration of Hazard Analysis and Critical Control Points HACCP with Maintenance Practices: Enhancing Food Safety in the Food and Beverage Industry; A Review." International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.13 issue 4, April 2024, pp.88-101 URL: https://doi.org/10.51583/IJLTEMAS.2024.130411
The environment is often beautified by the presence of tree plants which consist of the shoot and the root. These plants contain organs often referred to as above ground organs (shoot) and below ground organ (root). In this study, the plant organs of five different plants including Adansoniadigitata, Anacardiumoccidentale, Azadirachtaindica, Eucalyptus globulus, and Parkiabiglobosa were sampled to investigate the levels of cobalt (Co), chromium (Cr), copper (Cu), iron (Fe), manganese (Mn), nickel (Ni), lead (Pb) and zinc (Zn). The sampled parts were transported in polythene bags to the laboratory where they were sorted, pretreated, stored and digestedwith10 cm3 of 6M nitric acid. The digested samples were subjected to analysis using atomic absorption spectrophotometry to determine the heavy metals (HMs). The results revealed that all the above ground organs of these plants accumulated HMs at varying levels. The leaf samples of the all tree plants accumulated higher concentrations of the HMs than the bark samples except in P. big lobosa (7.07 ± 0.42 mg/Kg, Co [leaf]; 14.10 ± 0.62 mg/Kg, Co [bark]). The results revealed that the leaves portion contained more of the essential heavy metals (EHMs) than the bark samples of the tree plants. A. indica has the highest bio-indication potential while E. globulus exhibited the least potential based on the above ground organs analysis. The translocation factors of the NHMs (Cr and Pb) were below unity. The translocation factors well above unity suggest better phytoextraction capability of the tree plants. All the plants potentially accumulated the metals at varying levels irrespective of the different geographical locations, morphological and biomass variations of the tree plants.
- Fowotade Sulayman Akanbi Hussaini Adamu Federal Polytechnic Kazaure Jigawa
- Umar Abdul Adamu Hussaini Adamu Federal Polytechnic Kazaure Jigawa
- Oladeji Saheed Olajide Hussaini Adamu Federal Polytechnic Kazaure Jigawa
- Abdullahi Saidu Akun Hussaini Adamu Federal Polytechnic Kazaure Jigawa
- Haruna Abubakar Danyaya Hussaini Adamu Federal Polytechnic Kazaure Jigawa
References
1. Adesuyi, A.A., Njoku, K.L., Akinola, M.O., Jolaoso, A.O. (2018) Biomonitoring of heavy metals level in wetland plants of Lagos Lagoon, Nigeria. J. Appl. Sci. Environ. Management.Vol. 22 (9) 1489 –1498 September 2018 JASEM ISSN 1119-8362 2. Ali, S.; Mir, R.A.; Tyagi, A.;Manzar, N.; Kashyap, A.S.; Mushtaq,M.; Raina, A.; Park, S.; Sharma, S.; Mir, Z.A.; et al. Chromium Toxicity in Plants: Signaling, Mitigation, and Future Perspectives. Plants 2023, 12,1502. https://doi.org/10.3390/plants12071502 3. Ange-Mariette, T., Tagouèlbè, T., N’guessan, J.Y., Amissa, A.A. (2022) Parkiabiglobosa (Mimosaceae) Leaves, Fruits’ Pulp, and Barks of Stem and Root Phytochemicals contents and their antioxidant activities. Journal of Biosciences and Medicines, 2022, 10, 48-62 https://www.scirp.org/journal/jbmISSN Online: 2327-509X 4. Bonanno G., Joseph, A. B., Vincenzo, D.M., (2017) Levels of heavy metals in wetland and marine vascular plants and their Biomonitoring Potential: A comparative assessment. Science of the Total Environment 576 (2017) 796–806 5. Donatien, K., Hagrétou, S.L., Bréhima, D.1., Clarisse, S.C., Mamoudou, H.D., and Mogens, J. (2011) A review of baobab (Adansoniadigitata) products: Effect of processing techniques, medicinal properties and uses. African Journal of Food Science Vol. 5(16) pp. 833-844, 23 December, 2011 Available online http://www.academicjournals.org/ajfs DOI: 10.5897/AJFSX11.004 6. Doniya, K. and Ashoka, S.M. (2022) Anacardiumoccidentale(Linn): A brief review Int. J. Pharm. Sci. Rev. Res., 75(1), July - August 2022; Article No. 02, Pages: 6-9 7. Ekhuemelo, D., Onah, G. and Wuam, L. (2017) Evaluation of the uses of Eucalyptus species in Makurdi Local Government Area of Benue State, Nigeria. GSC Biological and Pharmaceutical Sciences, 2017, 01(01), 025–034 8. Farouk S. N. and Muhammad A. (2018) The effect of lead on plants in terms of growing and biochemical parameters: A review, MOJ Eco Environ Sci. 3(4):265‒268 9. Fowotade, S. A. and Jimoh, W. L. O. (2013) Atmospheric Metal Pollution Biomonitoring Potential by Neem Tree (Azadirachtaindica) Leaves in Katsina Metropolitan Area of Katsina State, Nigeria lnt. J. Chem. Sci. Vol. 6 No. 1 ISSN: 2006-3350 10. Fowotade S. A., Hamisu A., Abdullah S. A., Fadhila A., Zainab S. J., and Saleh, I. (2021) Assessment of Trace Metals in the Leaves of Adansoniadigitataand Eucalyptus globulus 11. Along Dutsinma Road in Batagarawa Local Government Area of KatsinaState Current Approaches in Science and Technology Research Vol. 3 DOI: 10.9734/bpi/castr/v3/8343D. 12. Godwin AduAlhassan (2019) Plant Growth and Development National Open University of Nigeria, NOUN course manual pp 37-57 SBN: 978-978-970-120-9 NOUN Press 13. Harun, C., Cigdem, E.R., Caliskan, Erdal, A., Ekrem, A. (2021) Monitoring of heavy metal pollution by using populusnigraand cedruslibani. Sigma J Eng Nat Sci, Vol. 39, Issue. 4, pp. 367–373, December 2021 14. Imam, H., Hussain, A., and Ajij, A. (2012) Neem (AzadirachtaindicaA. Juss) - A Nature's Drugstore: An overview International Research Journal of Biological Sciences Vol. 1(6), 76-79, October (2012) ISSN 2278-3202 15. Innocent, I.U., Chukwunonso, A.N., Onuabuchi, N.A., Uchenna, B.A., Innocent, O.O., and Amos, E.O. (2021) Phytochemicals of neem plant (Azadirachtaindica) explains its use in traditional medicine and pest control. GSC Biological and Pharmaceutical Sciences, 2021, 14(02), 165–171, Article DOI:https://doi.org/10.30574/gscbps.2021.14.2.0394 16. Jimoh, W. L. O and Fowotade, S. A (2013) Deposition of heavy metals around katsina steel rolling company in Katsina township using bark of neem tree (Azadirachtaindica) as bioindicator J. Chem. Soc. Nigeria, Vol, 38, No.2, pp 74-78 17. Kabata- Pendias, A., (2011) Trace Elements in Soils and Plants. fourth edition. Taylor & Francis Group, Boca Raton, FL, USA (534 pp.) 18. Llagostera, I., Pérez, M., Romero, J., (2011) Trace Metal Content in the Seagrass Cymodocea nodosa: Differential Accumulation in Plant Organs. Aquatic Bot. 95, 124–128. 19. Malea, P., Haritonidis, S., (1999). Cymodoceanodosa (Ucria) aschers, as a bioindicator of metals in Thermaikos Gulf Greece, during monthly samplings. Bot. Mar. 42, 419–430. 20. Miri,M., Ehrampoush,M. H., Ghaffari, H. R., Aval, H. E., Rezai, M., Najafpour,F., Fathabadi, Z. A., MohsenYazdaniAval, M. Y., and Ebrahimi, A. (2016) Atmospheric Heavy Metals Biomonitoring Using a Local PinuseldaricaTree Health Scope. 2017 February; 6(1):e39241. doi: 10.17795/jhealthscope-39241. 21. Naima, H.N., Aima, I.B., Fayyaz, U.R. and Uzma, H. (2010) Leaves of roadside plants as bioindicator of traffic related lead pollution during different seasons in Sargodha, Pakistan African Journal of Environmental Science and Technology Vol. 4(11), pp. 770-774, November, 2010 ISSN 1991-637X 22. Omolara, O.O. and Ibrahim, O.B. (2014) Antinutritional and phytochemical evaluation of raw and fermented African Locust Bean (ParkiaBiglobosa) Seeds. Global Journal of Pure and Applied Sciences Vol. 20, 2014: 105-109 DOI: http://dx.doi.org/10.4314/gjpas.v20i2.4 23. Oscar, H.C., Kainat, E., Mahnoor, W., Muzzamil, S., Johnny, A.T., Edwin, E.R., Cesar, F.Q., Ricardo, Á.Y., Victor, C. (2019) Azadirachtaindica: Antibacterial activity of Neem against different strains of bacteria and their active constituents as preventive in various diseases Pharmacogn J. 2019;11(6)Suppl:1597-1604 24. Pavlíková, I.; Motyka, O.; Plášek, V.; Bitta, J. (2021) Monitoring of Heavy Metals and Nitrogen Concentrations in Mosses in the Vicinity of an Integrated Iron and Steel Plant: Case Study in CzechiaAppl. Sci. 11, 8262. https:// doi.org/10.3390/app11178262 25. Rezvani, M; Zaefarian, F (2011). Bioaccumulation and translocation factors of cadmium and lead in Aeluropuslittoralis Australian Journal of Agricultural Engineering, 2(4):114-119. 26. Shanker, A. K.; Cervantes, C., Loza-Tavera, H.; and Avudainayagam, S. (2005) Chromium toxicity in plants. Environment International 31, 739 – 753 27. Sundarambal, M., Muthusamy, P., Radha, R., Jerad, S.,A. (2015) A review on Adansonia digitataLinn. Journal of Pharmacognosy and Phytochemistry 2015; 4(4):12-16 E-ISSN: 2278-4136 28. Yang, J., Ye, Z., (2009) Metal accumulation and tolerance in wetland plants Front. Biol. China 4 (3), 282–288. 29. Zhian, S. and Farhad, A. (2019) Heavy Metals Accumulation in Leaves of Five Plant Species as a Bioindicator of Steel Factory Pollution and their Effects on Pigment Content Pol. J. Environ. Stud. Vol. 28, No. 6 (2019), 4351-4358 DOI: 10.15244/pjoes/99304
Fowotade Sulayman Akanbi, Umar Abdul Adamu, Oladeji Saheed Olajide, Abdullahi Saidu Akun, Haruna Abubakar Danyaya, "Comparative Assessment of Heavy Metals Loads in the Shoot of Selected Tree Plants and their Accumulation Potential in Kazaure, Jigawa Nigeria" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.13 issue 4, April 2024, pp.102-110 URL: https://doi.org/10.51583/IJLTEMAS.2024.130412
Background: The government of the Republic of Zambia had long emphasized the significance of fostering economic growth through enhanced access to financial services. However, the persistent issue of income inequality and sluggish economic expansion underscored the need for targeted interventions. In response, the emergence of Mobile Network Operators (MNOs) in the financial sector, offering a diverse range of services including credit access, represented a concerted effort to address these challenges. Despite these advancements, a comprehensive understanding of the determinants of MNOs' credit access remained lacking, particularly in the specific context of the Lusaka central business district. Consequently, the primary purpose of this study was to rigorously evaluate the various factors that influenced mobile money operators' access to credit within the Lusaka central business district of Zambia. Method: This research employed a case study research design to investigate the factors that influenced credit access for Mobile Network Operators (MNOs) in the Lusaka central business district. A mixed-methods approach was adopted, combining quantitative and qualitative data collection methods. The study's sample consisted of 125 MNOs, which were selected through a combination of simple random sampling and purposive sampling to ensure a representative cohort of respondents. This approach facilitated a holistic exploration of the various factors that impacted credit access among MNOs. Results: The study's findings highlight several key determinants of credit access among mobile money operators. Demographic factors, such as age, emerge as influential, with youths aged 20-34 demonstrating both technical proficiency and a better grasp of credit information. Education levels also prove to be correlated with mobile money service operation, as respondents with higher education levels exhibit greater ease in accessing and understanding mobile money credit services. Network availability emerges as a pivotal factor driving the adoption of mobile money services. However, a notable proportion of respondents expressed challenges in accessing credit through mobile networks. Trust and security concerns are identified as significant barriers deterring potential users from engaging with mobile money services. Conclusion: In light of the study's findings, it is recommended that comprehensive awareness programs be implemented within central business district schools. These programs aim to equip budding entrepreneurs with the knowledge and skills necessary for responsible engagement with mobile money services. By targeting the youth demographic, these initiatives seek to instil soundfinancial habits from an early age, thereby contributing to improved financial access, reduced income inequality, and enhanced economic growth in the Republic of Zambia.
- Namakando Munganzi Graduate School of Business, University of Zambia
- Zivanai Mazhambe Graduate School of Business, University of Zambia
References
1. Airtel. (2019). UNCDF State of the industry 2019. Retrieved from [Link] 2. Babbie, E. (2007). The Practice of Social Research. Thomson Wadsworth. 3. Bankole F. & Brown I. (2011). Mobile banking adoption in Nigeria. The Electronics Journal on Information Systems in Developing Countries, 1-23. 4. Becker A., Debebe E., Isaac J., & Perret T. (2009). Achieving Sustainable Development and Promoting Development Cooperation. United Nations Publishing. 5. Bureau of Economic Research. (n.d.). [Title]. [DOI] 6. Burns N. & Grove S.K. (2009). The Practice of Research: Conduct, Critique, and Utilization. WB Saunders Company. 7. Chelliah, J. (2010). Power Sharing in Progressive Discipline: New Rules of Engagement Arising from an Australian Perspective. Contemporary Management Research, 6(2), 91-110. 8. Chen C. (2013). Perceived risk, usage frequency of mobile banking services. Managing Service Quality: An International Journal, 23, 410-436. 9. Chikumbi L.C. & Chishala L.S. (2018). Mobile Money for increased financial access? – We’ve got your back! Retrieved from [Link] 10. Chung N. (2014). Effect of trust level on mobile banking satisfaction: A multi-group analysis of information system success instruments. O and D Publications. 11. David J. (2010). Effects of customer satisfaction through perceived value and service quality. International Journal of Current Research and Academic Review, 2(6), 1-17. 12. Davis F.D. (2014). Perceived usefulness, perceived ease of use and user acceptance of information technology. Development Bank Institute. 13. Demirguc K. &Klapper L. (2013). Financial inclusion in Africa. World Bank. 14. Drucker P.F. (1974). Management: Tasks, Responsibilities, and Practices. Harper and Row. 15. Ehiyamen O.M., Emmanuel A.O., & Gberevbie D.E. (2009). Staff Indiscipline and Productivity in the Public Sector in Nigeria. International Journal of Academic Research in Progressive Education and Development, 4(1), 79-87. 16. Elqadri Z. M., Wardoyo D. T. W., & Priyono. (2015). The Influence of Motivation and Discipline Work against Employee Work Productivity Tona’an Markets. Review of European Studies, 7(12), 59-66. 17. Fanta L., Schneider F., & Dominik E. (2016). Shadow economies: Size, causes, and consequences. The Journal of Economic Literature, 38(1), 77-114. 18. GSMA. (2010). Mobile Money for the Unbanked. McGraw Hill Publications. 19. Haslinda G.R. (2014). Evolution and conceptual development of service quality in service marketing and customer satisfaction. International Review of Business and Research, 3(2), 1189-1195. 20. Holloway M. (2005). The Challenges of Transition from Donor-funded programs: Results from a theory-driven multi-country comparative case study of programs in Eastern Europe and Central Supported by the Global Fund. Global Health: Science and Practice, 7(2), 258-272. 21. Howcroft B. (2013). Consumer attitude and the usage and adoption of home-based banking in Zimbabwe. Sage. 22. Improved Inclusive Access? (n.d.). [Title]. [DOI] 23. Islam M.M. (2016). An Investigation of Drivers and Barriers Stimulating in the Acceptance of Mobile Payment in Bangladesh. 24. Ismail L., Moya M.B., Bwiino K., & Ismael K. (2017). Examining determinants of behavioral intention in the adoption of mobile money transfer services in Uganda. ICTACT Journal on Management Studies, 3(1), 433-439. 25. Jack W. & Suri T. (2011). Mobile Money: The Economics of M-PESA. NBER Working Paper, No. 16721. 26. Jansen A.H. (2014). Financial inclusion and Financial Stability: Current policy issues. Finscope Publishing. 27. Jegadeesan (2008). Employee Discipline: Concepts and Issues. [Review of the book]. Retrieved from [Link] 28. Juma C.A. & Moronge M. (2015). Influence of Progressive Discipline on Employee Performance in Kenya: A Case of Mukurwe-Ini Wakulima Dairy Ltd. The Strategic Journal of Business and Change Management, 2(105), 1549-1594. 29. Kaasinen E. (2005). User acceptance of mobile services: Values, ease of use, trust, and ease of adoption. VTT Publications, 566. 30. Kabala E. et al. (2021). An Ethnological Analysis of the Influence of Mobile Money on Financial Inclusion: The Case of Urban Zambia. Zambia Social Science Journal, 7(1). 31. Kabir M.R. (2013). Factors Influencing the Usage of Mobile Banking: Incident from a Developing Country. 32. Kalinic et al. (2019). A multi-analytical approach to peer-to-peer mobile payment acceptance prediction. Journal of Retailing. 33. Karjaluoto H., Matha M., &Pento T. (2016). Factors underlying attitude formation towards online money services in Finland. Special Publishing. 34. Kikulwe G., Kilwe J., & Suri T. (2014). Mobile Money: The Economics of M-PESA. NBER Working Paper, No. 16721. 35. King K.N. & Wilcox D.E. (2003). Employee-Proposed discipline: How well is it working? Public Personnel Management, 32(2). 36. Kirui R.K. &Onyuma S.O. (2015). Role of mobile money transactions on revenue of microbusiness in Kenya. European Journal of Business and Management, 7(36), 63-67. 37. Klynveld Peat Marwick Goerdeler (KPMG). (2015). Provision of mobile banking services from an actor-network perspective: Implications for convergence and standardization. 38. Kotler P., Siew M., Swee H., & Chin T. (2001). Marketing Management: An Asian Perspective. Prentice Hall. 39. Luarn P. (2015). Toward an understanding of the behavioral intention to use mobile banking. Motelle Publications. 40. Lukacs E., Negoescu G., & David S. (2009). Employees Misbehaviour: Forms, Causes, and What Management Should do to Handle With. Economics and Applied Informatics, 315-322. 41. Luwabelwa T. (2018). Examine the payment systems contribution towards the development of the financial sector in Zambia. 42. Maikara M.A. (2014). Effects of disciplinary procedures on employee performance in Postal Corporation of Kenya. Kenyatta University. [Available online] [Link] 43. Maimbo T.B. (2016). Financial sector development in Africa: Opportunities and challenges. World Bank. 44. Maruyama M. (2016). Analyzing the effects of sustainable development Goes. McMillan. 45. Masocha R. &Dzomonda O. (2018). Adoption of mobile money services and the performance of small and medium enterprises in Zimbabwe. Academy of Accounting & Financial Studies Journal, 22(3). 46. Matsoga J.T. (2003). Crime and school violence in Botswana secondary education. 47. Maurice V. (2008). Key factors predicting effectiveness of cultural change and improved productivity in implementing total quality management. International Journal of Quality & Reliability Management. 48. Mbidde L.K. (2017). A multi-analytical approach to peer-to-peer mobile payment acceptance prediction. 49. McFarlin K. (n.d.). The Effects of an Unproductive Workplace. Small Business - Chron.com. [Link] 50. Mgbemena G.C., Mbah S.I., &Ejike D.C. (2015). Impact of Effective Employee Management on Organizational Productivity: A study of Anambra State Civil Service System, Nigeria. The International Journal of Business and Management, 3(11), 183-196. 51. Moore D.S., Notz W. I., & Fligner M.A. (2013). The Basic Practice of Statistics (6th ed.). W. H. Freeman and Company. 52. Mugande H. &Mugande M. (2003). Theoretical and conceptual frameworks. Otundo Publications. 53. Munnukka J. (2017). Dynamics of price sensitivity among mobile service. Journal of Product and Brand Management, 14(1), 65-73. 54. Ngambi J. (2016). An assessment of advanced mobile services acceptance. J&J. 55. Ngambi S. (2016). User acceptance of mobile services: Values, ease of use, trust, and ease of adoption. VTT Publications, 566. 56. Pilot J. & Hungler H. (2015). Cross-Sectional Studies. GFMER Tanzania. 57. Public Service Commission. (2016). Assessment of the Handling of Disciplinary Cases in the Public Service. Sage Publications. 58. Ramsumeen N.M. (2009). Factors Influencing the Usage of Mobile Banking: Incident from a Developing Country. World Review of Business Research, 3(3), 96-114. 59. Reyna T. (2007). Getting Started in Data Analysis using Stata. Princeton University. 60. Richmond A.A. (2022). Credit for households in Ghana: Has mobile money (momo) improved inclusive access? Retrieved from [DOI] 61. Sachdev A. (2009). Parametric and Non-parametric data analysis for social research: IBM SPSS. Lap Academic Publishing. 62. Salaria G. (2012). Quantitative research designs. M and M Publications. 63. Silverman K. (1995). What motivates money donation? A study on external motivators. Revista de Administracao, 52, 363-373. 64. Simiyu C. &Oloko M. (2015). Mobile Money Transfer and the Growth of Small and Medium-Sized Enterprises in Kenya: A Case of Kisumu City, Kenya. International Journal of Economics, Commerce and Management, 3(5), 1056-1065. 65. Sionfou S.C. (2020). Financial Inclusion through Mobile Money: An Examination of the Decision to use Mobile Money Accounts in WAEMU Countries. 66. Trochim W.M. (2006). The Research Methods Knowledge Base. Retrieved from [Link] 67. Tumilaar B.R. (2015). The Effect of Discipline, Leadership, and Motivation on Employee Performance at BPJS Ketenagakerjaan Sulut. The Effect of Discipline, 3(2), 787-797. 68. Tumo M.J. (2017). Perceived Influence of Disciplinary Action on Employee Performance in Baringo County Government. University of Nairobi. 69. Venkatesh H. (2016). Determinants of perceived ease of use: Integrating control, intrinsic motivation, and emotion into the technology acceptance model. Information System Research, 11, 342-365. 70. Vivian Dzokoto & Mwiya Imasiku. (2019). Cashless or Cashlite? Mobile money use and currency redenomination in Zambia. 71. Waris A.P.M. (2015). Effect of Training, Competence, and Discipline on Employee Performance in a Company (Case study in PT. Asuransi Bangun Askrida). Procedia- Social and Behavioral Sciences, 211, 1240-1251. 72. Wedaga S. (2012). Assessment of the Effect of Disciplinary Procedures on Employee Punctuality and Performance at Anglo Gold Ashanti, Obuasi Mine. Master's Dissertation, Nkwame Nkuruma University. 73. Wheeler H.N. (1976). Punishment Theory and Industrial Discipline. Industrial Relations, 15(2).
Namakando Munganzi, Zivanai Mazhambe, "Evaluation of the Factors Affecting Mobile Money Operators’ Credit Access: A Case Study of Lusaka Central Business District." International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.13 issue 4, April 2024, pp.111-125 URL: https://doi.org/10.51583/IJLTEMAS.2024.130413
It is more important than ever to have a cybersecurity environment that is resilient and secure in this age of widespread digital connectivity. This research paper explores how developing technological innovation can serve as the foundation for building resilience in cyberspace. The study covers important aspects of cybersecurity, including its conceptual foundations, a wide range of applications, risk-reduction strategies, and the crucial role that policy regulation plays in the digital environment. In conclusion, the paper suggests that technological innovation is the driving force behind transformative change in cybersecurity. Policymakers, business executives, cybersecurity professionals, and researchers are all affected by the implications, which call for a coordinated and flexible strategy to meet the challenges of the digital frontier.
- Muritala Aminu Master of Science in Information Technology, a Bachelor of Science in Physics, and an HND in Electrical and Electronics Engineering
- Sunday Anawansedo Master's degree in Electrical Engineering from the Southern University of Agriculture and Mechanical College
- Yusuf Ademola Sodiq Master's student at the prestigious University of Salford, Manchester, UK
- Oladayo Tosin Akinwande Assistant lecturer in Software Engineering department of Veritas University
References
1. Abdullahi, M., Baashar, Y., Alhussian, H., Alwadain, A., Aziz, N., Capretz, L. F., & Abdulkadir, S. J. (2022). Detecting Cybersecurity Attacks in Internet of Things Using Artificial Intelligence Methods: A Systematic Literature Review. Electronics, 11(2), 198. https://doi.org/10.3390/electronics11020198 2. Abdullayeva, F. (2023). Cyber resilience and cyber security issues of intelligent cloud computing systems. Results in Control and Optimization, 12(1), 100268. https://doi.org/10.1016/j.rico.2023.100268 3. Abion, L., Libicki, M. C., & Golay, A. A. (2014). M Markets for Cybercrime Tools and Stolen Information: Hackers’ Bazaar. Apps.dtic.mil; RAND CORP ARLINGTON VA NATIONAL SECURITY RESEARCH DIV. https://apps.dtic.mil/sti/citations/ADA603661 4. Ablon, L. (2018). The Motivations of Cyber Threat Actors and Their Use and Monetization of Stolen Data. https://www.rand.org/content/dam/rand/pubs/testimonies/CT400/CT490/RAND_CT490.pdf 5. Afenyo, M., & Caesar, L. D. (2023). Maritime cybersecurity threats: Gaps and directions for future research. Ocean & Coastal Management, 236, 106493. https://doi.org/10.1016/j.ocecoaman.2023.106493 6. Akter, S., Michael, K., Uddin, M. R., McCarthy, G., & Rahman, M. (2020). Transforming business using digital innovations: the application of AI, blockchain, cloud and data analytics. Annals of Operations Research, 308(1). https://link.springer.com/article/10.1007/s10479-020-03620-w 7. Al-athwari, B., & Azam, H. M. (2020). Resource allocation in the integration of IoT, Fog, and Cloud computing: state-of-the-art and open challenges. In: International Conference on Smart Computing and Cyber Security: Strategic Foresight, Security Challenges and Innovation, Springer, Cham, 247–257. 8. Al-Rushdan, H., Shurman, M., Alnabelsi, S. H., & Althebyan, Q. (2019). Zero-Day Attack Detection and Prevention in Software-Defined Networks. 2019 International Arab Conference on Information Technology (ACIT). https://doi.org/10.1109/acit47987.2019.8991124 9. Alawida, M., Omolara, A. E., Abiodun, O. I., & Al-Rajab, M. (2022). A deeper look into cybersecurity issues in the wake of Covid-19: A survey. Journal of King Saud University - Computer and Information Sciences, 34(10), 8176–8206. https://doi.org/10.1016/j.jksuci.2022.08.003 10. Alghazo, J. M., Kazmi, Z., & Latif, G. (2017, November 1). Cyber security analysis of internet banking in emerging countries: User and bank perspectives. IEEE Xplore. https://doi.org/10.1109/ICETAS.2017.8277910 11. Alrumaih, T. N. I., Alenazi, M. J. F., Al Sowaygh, N. A., Humayed, A. A., & Alablani, I. A. (2023). Cyber resilience in industrial networks: A state of the art, challenges, and future directions. Journal of King Saud University - Computer and Information Sciences, 35(9), 101781. https://doi.org/10.1016/j.jksuci.2023.101781 12. Appiah, G., Amankwah-Amoah, J., & Lui, Y.-L. (2020). Organizational Architecture, Resilience, and Cyberattacks. IEEE Transactions on Engineering Management, 1–16. https://doi.org/10.1109/tem.2020.3004610 13. Babate, A., Musa, M., Kida, A., &Saidu, M. (2015). State of cyber security: Emerging trends landscape. " International Journal of Advanced Research in Computer Science & Technology, 3(1), 113–119. https://www.academia.edu/11947469/state_of_cyber_security_Emerging_trends_landscape 14. Bodeau, D., &Graubart, R. (2016). Cyber Resilience Metrics: Key Observations Cyber Resilience Metrics: Key Observations Cyber Resilience Metrics: Key Observations Cyber Resilience Metrics: Key Observations. https://apps.dtic.mil/sti/trecms/pdf/AD1107819.pdf 15. Bodeau, D., Graubart, R., Heinbockel, W., Laderman, E., & Bedford, M. (2015). Cyber Resiliency Engineering Aid - The Updated Cyber Resiliency Engineering Framework and Guidance on Applying Cyber Resiliency Techniques. https://www.mitre.org/sites/default/files/publications/pr-15-1334-cyber-resiliency-engineering-aid-framework-update.pdf 16. Bokan, B., & Santos, J. (2021, April 1). Managing Cybersecurity Risk Using Threat Based Methodology for Evaluation of Cybersecurity Architectures. IEEE Xplore. https://doi.org/10.1109/SIEDS52267.2021.9483736 17. Cohent, M., & Sundararajantt, A. (2019). Self-Regulation and Innovation in the Peer-to-Peer Sharing Economy. https://chicagounbound.uchicago.edu/cgi/viewcontent.cgi?article=1039&context=uclrev_online 18. Connelly, E. B., Allen, C. R., Hatfield, K., Palma-Oliveira, J. M., Woods, D. D., &Linkov, I. (2017). Features of resilience. Environment Systems and Decisions, 37(1), 46–50. https://doi.org/10.1007/s10669-017-9634-9 19. Conti, M., Dargahi, T., &Dehghantanha, A. (2018). Cyber Threat Intelligence: Challenges and Opportunities. Advances in Information Security, 70, 1–6. https://doi.org/10.1007/978-3-319-73951-9_1 20. Cremer, F., Sheehan, B., Fortmann, M., Kia, A. N., Mullins, M., Murphy, F., &Materne, S. (2022). Cyber risk and cybersecurity: A systematic review of data availability. The Geneva Papers on Risk and Insurance - Issues and Practice, 47(3). https://doi.org/10.1057/s41288-022-00266-6 21. Dave, D., Sawhney, G., Aggarwal, P., Silswal, N., &Khut, D. (2023). The New Frontier of Cybersecurity: Emerging Threats and Innovations. https://arxiv.org/ftp/arxiv/papers/2311/2311.02630.pdf 22. Department of Justice . (2019). https://www.justice.gov/opa/pr/russian-national-charged-dec%20ade-long-series-hacking-and-bank-fraud-offenses-resulting-tens.%20Accessed%20Dec%202020 23. Distor, C. B., Inês Campos Ruas, TupokigweIsagah, &Soumaya Ben Dhaou. (2023). Emerging technologies in Africa: Artificial Intelligence, Blockchain, and Internet of Things applications and way forward. https://doi.org/10.1145/3614321.3614326 24. Dupont, B., Shearing, C., Bernier, M., &Leukfeldt, R. (2023). The tensions of cyber-resilience: From sensemaking to practice. Computers & Security, 132, 103372. https://doi.org/10.1016/j.cose.2023.103372 25. Faruk, M. J. H., Tahora, S., Tasnim, M., Shahriar, H., &Sakib, N. (2022). A review of quantum cybersecurity: threats, risks and opportunities. In 1st International Conference on AI in Cybersecurity (ICAIC). 26. Ganin, A. A., Massaro, E., Gutfraind, A., Steen, N., Keisler, J. M., Kott, A., Mangoubi, R., &Linkov, I. (2016). Operational resilience: concepts, design and analysis. Scientific Reports, 6(1), 1–12. https://doi.org/10.1038/srep19540 27. Gould, D. (2018). Organizational Resilience Approaches to Cyber Security. International Journal of Smart Education and Urban Society, 9(4), 53–62. https://doi.org/10.4018/ijseus.2018100105 28. Haitham Nobanee, Ahmad Yuosef Alodat, Reem Bajodah, Al-Ali, M., & Alyazia Al Darmaki. (2023). Bibliometric analysis of cybercrime and cybersecurity risks literature. Journal of Financial Crime. https://doi.org/10.1108/jfc-11-2022-0287 29. Housen-Couriel, D. (2015). "Cybersecurity and anti-satellite capabilities (asat) new threats and new legal responses. Journal of Law & Cyber Warfare, 4(3), 116–149. 30. Hussain, A., Mohamed, A., & Razali, S. (2020). A Review on Cybersecurity. Proceedings of the 3rd International Conference on Networking, Information Systems & Security. https://doi.org/10.1145/3386723.3387847 31. Ibrahim Kure, H., & Islam, S. (2019). An Assets Focus Risk Management Framework for Critical Infrastructure Cyber Security Risk Management. IET Cyber-Physical Systems: Theory & Applications, 4(4). https://doi.org/10.1049/iet-cps.2018.5079 32. Jang-Jaccard, J., & Nepal, S. (2019). A survey of emerging threats in cybersecurity. Journal of Computer and System Sciences, 80(5), 973–993. Sciencedirect. https://doi.org/10.1016/j.jcss.2014.02.005 33. Kaur, R., Gabrijelčič, D., &Klobučar, T. (2023). Artificial Intelligence for Cybersecurity: Literature Review and Future Research Directions. Information Fusion, 97, 101804. sciencedirect. https://doi.org/10.1016/j.inffus.2023.101804 34. Kennedy, C. (2017). New Threats to Vehicle Safety: How Cybersecurity Policy Will Shape the Future of Autonomous Vehicles. Michigan Telecommunications and Technology Law Review, 23(2), 343–356. 35. Kott, A., &Abdelzaher, T. (2014). Resiliency and robustness of complex systems and networks. Adaptive Dynamic and Resilient Systems, 67, 67–86. 36. Kott, A., &Abdelzaher, T. F. (2016). Resiliency and Robustness of Complex, Multi-Genre Networks. ArXiv (Cornell University). 37. Kott, A., Alberts, D. S., & Wang, C. (2015). Will Cybersecurity Dictate the Outcome of Future Wars? Computer, 48(12), 98–101. https://doi.org/10.1109/mc.2015.359 38. Leslie, N. O., Harang, R. E., Knachel, L. P., & Kott, A. (2017). Statistical models for the number of successful cyber intrusions. The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology, 15(1), 49–63. https://doi.org/10.1177/1548512917715342 39. Li, Y., & Liu, Q. (2021). A comprehensive review study of cyber-attacks and cyber security; emerging trends and recent developments. Energy Reports, 7(7), 8176–8186. Sciencedirect. https://doi.org/10.1016/j.egyr.2021.08.126 40. Linkov, I. (2018). Fundamental Concepts of Cyber Resilience: Introduction and Overview Motivation: Why Cyber Resilience? Springer. https://arxiv.org/pdf/1806.02852.pdf 41. Liu, X., Li, D., Ma, M., Szymanski, B. K., Stanley, H. E., & Gao, J. (2022). Network resilience. Physics Reports, 971, 1–108. https://doi.org/10.1016/j.physrep.2022.04.002 42. Ma, K., & McKinnon, T. (2020). COVID-19 and Cyber Fraud: Emerging Threats During the Pandemic. SSRN Electronic Journal, 29(2). https://doi.org/10.2139/ssrn.3718845 43. Milch, R. S., Pernice, I., Romanosky, S., von Lewinski, K., Shackelford, S. J., Rosenzweig, P., Christakis, T., Swire, P., Healey, J., Herpig, S., Pohle, J., Zatko, S., & Wenger, E. (2019). Building Common Approaches for Cybersecurity and Privacy in a Globalized World. SSRN Electronic Journal. https://doi.org/10.2139/ssrn.3508933 44. Mohamed, K. S. (2019). IoT Physical Layer: Sensors, Actuators, Controllers and Programming. The Era of Internet of Things. https://www.semanticscholar.org/paper/IoT-Physical-Layer%3A-Sensors%2C-Actuators%2C-Controllers-Mohamed/118dcef9e64e0185e5227f094bac13a1f199070c 45. Mufti, T., Saleem, N., &Sohail, S. (2020). Blockchain: A detailed survey to explore innovative implementation of disruptive technology. EAI Endorsed Transactions on Smart Cities, 4(10), 164858. https://doi.org/10.4108/eai.13-7-2018.164858 46. NIST. (2020). social engineering - Glossary | CSRC. Csrc.nist.gov. https://csrc.nist.gov/glossary/term/social_engineering 47. Perera, S., Jin, X., Maurushat, A., & Opoku, D.-G. J. (2022). Factors Affecting Reputational Damage to Organisations Due to Cyberattacks. Informatics, 9(1), 28. https://doi.org/10.3390/informatics9010028 48. Qi, X., & Mei, G. (2024). Network Resilience: Definitions, approaches, and applications. Journal of King Saud University - Computer and Information Sciences, 36(1), 101882–101882. https://doi.org/10.1016/j.jksuci.2023.101882 49. Riggs, H., Tufail, S., Parvez, I., Tariq, M., Khan, M. A., Amir, A., Vuda, K. V., & Sarwat, A. I. (2023). Impact, Vulnerabilities, and Mitigation Strategies for Cyber-Secure Critical Infrastructure. Sensors, 23(8), 4060. https://doi.org/10.3390/s23084060 50. Saeed, S., Altamimi, S. A., Alkayyal, N. A., Alshehri, E., &Alabbad, D. A. (2023). Digital Transformation and Cybersecurity Challenges for Businesses Resilience: Issues and Recommendations. Sensors, 23(15). https://doi.org/10.3390/s23156666 51. Safitra, M. F., Lubis, M., &Fakhrurroja, H. (2023). Counterattacking Cyber Threats: A Framework for the Future of Cybersecurity. Sustainability, 15(18), 13369. https://doi.org/10.3390/su151813369 52. Samtani, S., Abate, M., Benjamin, V., & Li, W. (2019). Cybersecurity as an Industry: A Cyber Threat Intelligence Perspective. The Palgrave Handbook of International Cybercrime and Cyberdeviance, 1–20. https://doi.org/10.1007/978-3-319-90307-1_8-1 53. Sanskriti , J. (2022, December 19). 160 Cybersecurity Statistics: Updated Report 2024. Astra IT, Inc. https://www.getastra.com/blog/security-audit/cyber-security-statistics/#:~:text=160%20Cybersecurity%20Statistics%202024%20%5BUpdated%5D&text=Cybersecurity%20statistics%20indicate%20that%20there 54. Schmittner, C., &Macher, G. (2019). Automotive Cybersecurity Standards - Relation and Overview (A. Romanovsky, E. Troubitsyna, I. Gashi, E. Schoitsch, & F. Bitsch, Eds.). Springer Link; Springer International Publishing. https://doi.org/10.1007/978-3-030-26250-1_12 55. Smith, Z., Lostri, E., & Lewis, J. (2020). The Hidden Costs of Cybercrime. https://www.mcafee.com/enterprise/en-us/assets/reports/rp-hidden-costs-of-cybercrime.pdf. 56. Tariq, U., Ahmed, I., Bashir, A. K., & Shaukat, K. (2023). A critical cybersecurity analysis and future research directions for the internet of things: A comprehensive review. Sensors, 23(8). https://doi.org/10.3390/s23084117 57. Thames, L., & Schaefer, D. (2017). an overview of key benefits, technologies, and challenges. In: Cybersecurity for Industry 4.0. In L. Thames & D. Schaefer (Eds.), Springer Series in Advanced Manufacturing. Springer International Publishing. https://doi.org/10.1007/978-3-319-50660-9 58. Thomasian, N. M., & Adashi, E. Y. (2021). Cybersecurity in the Internet of medical things. Health Policy Technology, 10(3). 59. Trautman, L. J., & Ormerod, P. (2018). Wannacry, Ransomware, and the Emerging Threat to Corporations. SSRN Electronic Journal. https://doi.org/10.2139/ssrn.3238293 60. Weimann, G. (2014). Cyberterrorism: How Real Is the Threat? United States Institute of Peace. https://www.usip.org/sites/default/files/sr119.pdf
Muritala Aminu, Sunday Anawansedo, Yusuf Ademola Sodiq and Oladayo Tosin Akinwande, "Driving Technological Innovation for a Resilient Cybersecurity Landscape" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.13 issue 4, April 2024, pp.126-133 URL: https://doi.org/10.51583/IJLTEMAS.2024.130414
Aluminium and its alloys have proven to be highly valuable for a variety of technical applications due to its superior strength-to-weight ratio and exceptional corrosion resistance. As a result, there are numerous financial and environmental advantages to recycling it. The goal of this work is to significantly expand the engineering uses of recycled aluminium alloy by improving its mechanical characteristics by treatment with of MnO2. 30 kg of recyclable scrap aluminium alloy was initially acquired for the investigation in the form of ingots. Then, 5 kg of each was re-melted in three distinct samples. The first sample was re-melted and then left to cool naturally without any further intervention. 24g of dark powder from a dry cell thrown away was applied to the second sample, and 24g of MnO2 was applied to the third. Every sample underwent standard cooling procedures. The samples were then subjected to impact, tensile, and hardness testing by ASTM E8M-91 standard test protocols. The three samples were also subjected to XRD analysis. The sample treated with MnO2 had the highest hardness value, measuring 124 HV; the sample treated with powder from a discarded battery came in second, with 108.33 HV. With 99.30 HV, the control sample had the lowest value. The control sample had the highest UTS value of 92.74 MPa, the MnO2-treated sample had a UTS value of 68.23 MPa, and the sample treated with discarded battery powder had the lowest UTS value of 30.71 MPa. The control sample had the maximum impact strength value of 12.20 Joules, the discarded battery powder treated sample had an impact strength value of 11.96 Joules, and the MnO2-treated sample had an impact strength value of 11.32 Joules. The results of the study show that the recycled aluminium alloy becomes harder when MnO2 is added. Nevertheless, the inclusion of MnO2 shows a notable decline in the UTS of recycled aluminium alloy as well as a minor decrease in its impact strength.
- K. A. Olaiya Department of Mechanical Engineering, Lagos State University of Science and Technology, Ikorodu, Lagos State, Nigeria.
- A. A. Yekinni Department of Mechanical Engineering, Lagos State University of Science and Technology, Ikorodu, Lagos State, Nigeria.
- L. A. Animashaun Department of Mechanical Engineering, Lagos State University of Science and Technology, Ikorodu, Lagos State, Nigeria.
- T. O. Rabiu Department of Mechanical Engineering, Lagos State University of Science and Technology, Ikorodu, Lagos State, Nigeria.
- E. I. Awode2 Department of Mechanical Engineering, Air force Institute of Technology, Kaduna, Kaduna State, Nigeria.
- A. O. Adeshina3 Department of Mechanical Engineering, Yaba College of Technology, Yaba, Lagos State, Nigeria.
References
1. Abubar, O. K., Mamaki, U. P., and Muriana, R. A. (2009), Investigation on the quenching properties of selected media on 6061 Aluminium Alloy. Journal of minerals and materials characteristics and Engineering, 8(4), 303 – 319. 2. Brileau, J. M., Zindel, J. W. and Allison, J. E. (1997). The effect of sodification time on the mechanical properties in a cast A356 T6 aluminium al society of Automobile Engineers, Incorporated. 3. Ciseres, C. H., Djurdjevic, M. B., Stockwell, T.J and Sokolowski, J. H. (1999), Cast Al: The effect of Cu content in the level of microporosity in Al: The effect of Cu content on the level of microporosity in Al-Si-Mg casting alloys, scriptamateriala. 4. Dalject, S., Harmonjit, S. K., and Gurvissal, S. (2012), An Experimental investigation of mechanical behaviour of Aluminium by adding SiC and Alumina, International Journal of Engineering Technologies. 5. Dobrzaski, L. A., Wodarcyk, M., Adamiall, M. (2006), Composite materials based on EN AW-Al Cu4Mg1(A) aluminium alloy reinforced with the Ti(CN) ceramic particles, materials science forum, 530-531, 243-248. 6. Doshpande, J. (2006). The effects of mild vibration on the performance and characteristics of aluminium alloys, Researcher programs, department of Manufacturing Engineering, Worcester Polytechnic. 7. Durowoju, M.O. and Babatunde, I.A. (2014), Modification of Recycled Al-332 Alloy Using Manganese Dioxide, Journal of Engineering Research and Applications, 4(7), 153-162. 8. Li, S., Zhang, L.J, Ning, J., Whang, X., Zhang, G. F., Zhang, J. X. (2000), Microstructures and mechanical properties of Al-Zn-Mg aluminium alloy samples produced by wire + art additive manufacturing, Journal of material research technology, 9(13)770 – 780. 9. Li, Z. Samuel, A. M., F. H., Ravindran, C., Valtra, S., Doty, H. W. (2004). Parameters controlling the performance of AA319 type alloys: Tensile properties, materials and science and Engineering, 367, 96 – 110. 10. Mackay, R., Djurdjevic and M., Sokoloski, J. H. (2000), The effect of cooling rate on the fractio solid of the metallurgical reaction in 319 alloy, AFS transaction. 11. Muwei, S. (2021), Methods to improve the performance of aluminium alloy, Proceedings of second international conference on Geology, mapping and remote sensing, IOP Conf series: Earth and environmental science 783, 1 – 5. 12. Olaiya, K., Adeoti, M.O., Adigun, I.A., Saheed, R.O., Eboreime, U. and Jimoh, L.A. (2019), Comparative Study of the Mechanical Properties of Sand-cast Aluminium for Engineering Applications, International Journal of Scientific and Engineering Applications, 10(8), 1266-1275. 13. Shabestari, H., (2004), Effect of copper and solidification conditions on the microstructure and mechanical properties of AI-Si-Mg alloys, Journals of Materials processing technology, 153, (154), 193 – 198. 14. Stojanovic, B. andBabic, M. (2014), Optimization of A356/10SiC/3Gr hybrid composite wear using Taguchi method, 8th International Conference on Tribology, Sinaia, Romania, 708-715. 15. Stojanovic, B. and Ivanovic, L. (2015), Application of aluminium hybrid composites in automotive industry, Technical Gazetti, 22(1), 247-251. 16. Torres, B., Lieblich, J., Garcia-Escoria, A. (2002), Mechanical properties of some PM aluminide and silicide reinforced 2124 aluminium matrix composites, scriptamaterialia, 46, 45. 17. Vencl, A. (2012), Tribology of the Al-Si alloy based MMCs and their application in automotive industry, Manganin L. (edition), Engineered metal matrix composites: Forming methods, Material Properties and Industrial Applications, Nova Science Publishers, Inc., New York (SAD), 127-166. 18. Vencl, A.Bobic, I., and Stojanovic, B. (2014),Tribological Properties of A356 Al-Si alloy composites under dry sliding conditions, Industrial Lubrication and Tribology, 66, 66-74. 19. Woltarcyk – Fligier, A., Dobrzaski, L. A., Adamiak, M. (2007), Influence of heat-treatment on properties and corrosion resistance of Aluminium- composites, Journal of Achievements in Materials and Manufacturing Engineering, 21(1) 55-58. 20. Yekinni, A.A., Durowoju, M.O., Agunsoye, J.O. and Mudashiru, L.O. (2018), International Journal of Biological and Physical Sciences, 23(2), 140-155. 21. Zhay, X., Zhou, Q., Wang, K., Peng, Y., Ding, J., and Konj. T. (2019), Study on microstructure and tensile properties of high nitrogen Cr-Ma steel processed by CMT wire and arc additive manufacturing, Mater Des, 166;109611.
K. A. Olaiya, A. A. Yekinni, L. A. Animashaun, T. O. Rabiu, E. I. Awode and A. O. Adeshina, "Experimental Investigation of Effects of Manganese IV Oxide on the Mechanical Properties of Aluminium Alloy." International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.13 issue 4, April 2024, pp.134-139 URL: https://doi.org/10.51583/IJLTEMAS.2024.130415
This study presents findings from a comprehensive psychological investigation aimed at exploring the impact of social media addiction on sleep patterns among young adults. The research utilized a mixed-methods approach, incorporating quantitative surveys, objective sleep assessments, and qualitative interviews to provide a holistic understanding of the complex relationship between social media use and sleep disturbances. Eightyparticipants aged 18-35 were recruited from diverse demographic backgrounds and assessed for social media addiction using validated scales such as the Bergen Social Media Addiction Scale (BSMAS). Sleep patterns were evaluated using self-report measures (e.g., Pittsburgh Sleep Quality Index) and objective measures such as actigraphy. Psychological factors including anxiety, depression, stress, and self-esteem were also assessed. Results revealed a significant association between social media addiction and disrupted sleep patterns, with higher levels of social media addiction correlating with poorer sleep quality and decreased sleep duration. Qualitative analysis of interviews provided insights into the psychological mechanisms underlying this relationship, highlighting factors such as fear of missing out (FOMO), heightened cognitive arousal, and maladaptive coping strategies. The findings underscore the importance of addressing social media addiction as a potential risk factor for sleep disturbances and suggest the need for targeted interventions to promote healthier digital habits and improve sleep hygiene among young adults.
- Niromi Gunarathne University of Sri Jayewardenepura, Sri Lanka
- Aruna Shantha Walpola University of Sri Jayewardenepura, Sri Lanka
References
1. Andreassen, C. S., Pallesen, S., & Griffiths, M. D. (2017). The relationship between addictive use of social media, narcissism, and self-esteem: Findings from a large national survey. Addictive Behaviors, 64, 287-293. 2. Alvaro, P. K., Roberts, R. M., & Harris, J. K. (2013). Sleep patterns and predictors of disturbed sleep in a large population of college students. Journal of Adolescent Health, 54(2), 124-132. 3. Brown, L. M., & Garcia, R. S. (2022). "Understanding Social Media Addiction: Psychological Mechanisms and Implications for Sleep Health." Sleep Research, 10(3), 211-228. 4. Chen, H., & Lee, S. (2020). "Exploring the Mediating Role of Fear of Missing Out in the Relationship Between Social Media Addiction and Sleep Disturbances." Journal of Youth Studies, 8(1), 87-102. 5. Hale, L., & Guan, S. (2015). Screen time and sleep among school-aged children and adolescents: A systematic literature review. Journal of Health Psychology, 20(7), 920-932. 6. Kim, E., & Park, J. (2016). "Associations Between Social Media Addiction, Psychological Factors, and Sleep Quality Among Adolescents: A Longitudinal Study." Journal of Child Psychology and Psychiatry, 30(2), 175-190. 7. Levenson, J. C., &Shensa, A. (2016). The association between social media use and sleep disturbance among young adults. Journal of Behavioral Medicine, 39(6), 1049-1058. 8. Liu, W., & Davis, M. C. (2019). "Social Comparison and Sleep Patterns: The Role of Social Media Addiction." Computers in Human Behavior, 75, 321-335. 9. Li, M., & Wang, H. (2014). "Understanding the Impact of Social Media Addiction on Sleep Patterns: A Longitudinal Study." Journal of Sleep Research, 8(2), 145-160.assen, C. S., Pallesen, S., & Griffiths, M. D. (2017). The relationship between addictive use of social media, narcissism, and self-esteem: Findings from a large national survey. Addictive Behaviors, 64, 287-293. 10. Primack, B. A., Shensa, A., Sidani, J. E., Whaite, E. O., Lin, L. Y., Rosen, D., & Colditz, J. B. (2017). Social media use and perceived social isolation among young adults in the U.S. American Journal of Preventive Medicine, 53(1), 1-8. 11. Smith, J. K., & Johnson, A. L. (2023). "The Relationship Between Social Media Addiction and Sleep Patterns: A Comprehensive Psychological Investigation." Journal of Applied Psychology, 45(2), 123-140. 12. Wang, L., & Zhang, P. (2018). "The Impact of Late-Night Social Media Usage on Sleep Quality: A Longitudinal Study." Journal of Health Psychology, 25(3), 211-228. 13. Walker, M. (2017). Why We Sleep: Unlocking the Power of Sleep and Dreams. Scribner. 14. Woods, H. C., & Scott, H. (2016). Sleepy teens: Social media use in adolescence is associated with poor sleep quality, anxiety, depression and low self-esteem. Journal of Adolescence, 51, 41-49. 15. Yang, S., & Wu, C. (2017). "Social Media Addiction and Its Relationship with Sleep Quality Among College Students: A Cross-Sectional Study." Journal of Adolescent Health, 12(4), 231-245. 16. Zhang, Q., & Wang, Y. (2021). "Gender Differences in Social Media Addiction and Sleep Quality: A Comparative Study." Journal of Sleep Research, 15(4), 321-335. 17. Zhang, Y., & Wang, X. (2015). "Social Media Use and Sleep Disturbances: The Mediating Role of Emotional Regulation." Journal of Behavioral Addictions, 20(1), 87-102.
Niromi Gunarathne, Aruna Shantha Walpola, "A Psychological Study of the Impact of Social Media Addiction on Sleep Patterns" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.13 issue 4, April 2024, pp.140-145 URL: https://doi.org/10.51583/IJLTEMAS.2024.130416
In this work, we demonstrate the capability of a JavaScript-based web crawler to overcome anti-crawling measures such as CAPTCHAs and IP blocking. we delved into the ethical and legal dimensions of web crawling and provide recommendations for future research endeavors in this domain. A web crawler, being an automated software program, can navigate through websites and extract information. While it serves purposes like website analysis and indexing, it can also be misused for extracting personal data, scraping content, and overloading servers. Website administrators often employ anti-crawling techniques, such as CAPTCHAs, Robot.txt, and IP blocking, to thwart malicious web crawlers from accessing their content. These techniques aim to curtail the ability of a web crawler to scrape, access, or overload website resources, without impeding legitimate users from accessing the necessary content. The objective of this study is to demonstrate and enhance the resilience of legitimate web crawlers against anti-crawling techniques like CAPTCHAs and IP blocking, challenging the notion that these measures are universally effective against all types of web crawlers.
- Victor Onyenagubom Department of Computing, Teesside University, London, United Kingdom
References
1. Utz, C. et al. (Nov 06, 2019) '(Un)informed Consent', ACM. Available at: http://dl.acm.org/citation.cfm?id=3354212 doi: 10.1145/3319535.3354212. 2. Wan, S. (2016) Protecting Web Contents Against Persistent Crawlers. College of William and Mary - Arts & Sciences. 3. Chen, H., He, H. and Starr, A. (Jun 2020) 'An Overview of Web Robots Detection Techniques', IEEE. Available at: https://ieeexplore.ieee.org/document/9138856 doi: 10.1109/CyberSecurity49315.2020.9138856. 4. Zulkarnine, A.T. et al. (Sep 2016) 'Surfacing collaborated networks in dark web to find illicit and criminal content', IEEE. Available at: https://ieeexplore.ieee.org/document/7745452 doi: 10.1109/ISI.2016.7745452. 5. Yu, L. et al. (2020) 'Summary of web crawler technology research', Journal of Physics. Conference Series, 1449(1), pp. 12036. Available at: https://doi.org/10.1088/1742-6596/1449/1/012036. 6. Zhou, F. and Wang, Y. (Feb 2022) 'Exploring The Role of Web Crawler and Anti-Crawler Technology in Big Data Era', IEEE. Available at: https://ieeexplore.ieee.org/document/9849602 doi: 10.1109/ICTech55460.2022.00070. 7. Boldi, P. et al. (2018) 'BUbiNG', ACM Transactions on the Web, 12(2), pp. 1-26. Available at: https://doi.org/10.1145/3160017. 8. Yu, S., Sun, W. and Jia, M. (Oct 2018) 'A Dynamic Proxy Based Crawler Strategy for Data Collection on CyberGIS', IEEE. Available at: https://ieeexplore.ieee.org/document/8644687 doi: 10.1109/CyberC.2018.00094. 9. Kammoun, A. et al. (2022) 'Generative Adversarial Networks for face generation: A survey', ACM Computing Surveys, 1(1) Available at: https://doi.org/10.1145/1122445.1122456. 10. Bui, D 2021. Node.js based Document Store for Web Crawling. San Jose State University Library 11. Chiapponi, E., Dacier, M., Todisco, M., Catakoglu, O. and Thonnard, O. (2021) 'Botnet Sizes: When Maths Meet Myths', in 'Botnet Sizes: When Maths Meet Myths', Service-Oriented Computing - ICSOC 2020 Workshops. Switzerland: Springer Inter-national Publishing, pp. 596-611. 12. Srinath, M., Wilson, S. and Giles, C.L. (2021) Privacy at Scale: Introducing the PrivaSeer Corpus of Web Privacy Policies. As-sociation for Computational Linguistics. 13. Nasser, Y. et al. (2020) 'NeuPow: A CAD Methodology for High Level Power Estimation Based on Machine Learning', ACM Transactions on Design Automation of Electronic Systems, Available at: https://doi.org/10.1145/nnnnnnn.nnnnnnn. 14. Bangare, S.L. et al. (2016) Using Node.Js to Build High Speed and Scalable Backend Database Server Usable Authentication Systems View project Fabric Fault Detection View project Using Node.Js to Build High Speed and Scalable Backend Database Server. 15. Damodaran B, D., Salim, S. and Vargese, S.M. (2016) Performance Evaluation of MySQL and MongoDB Databases. Academy and Industry Research Collaboration Center (AIRCC) 16. Alrashed, T. et al. (2020) ScrAPIr. ACM 17. Ahmad, S.S. et al. (2020) Apophanies or Epiphanies? How Crawlers Impact Our Understanding of the Web. ACM 18. Zeng, F. (2012) 'Breaking News: William F. House, MD, Audiology Pioneer', The Hearing Journal, 65(12), pp. 32-36. Available at: https://doi.org/10.1097/01.HJ.0000423564.22177.11. 19. Özel, S.A. Turkish National Corpus View project Feature selection methods for sentiment analysis View project Furkan Gözükara Toros Üniversitesi, 2017.
Victor Onyenagubom, "Evaluating and Improving the Robustness of Web Crawlers Against IP Blocking and Captchas" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.13 issue 4, April 2024, pp.146-154 URL: https://doi.org/10.51583/IJLTEMAS.2024.130417
Nanotechnology is a fast-growing area in science which is an interdisciplinary field of both science and technology. In this study, the Roots extracts of Piliostigma reticulata were used for the green synthesis of Copper (Cu) nanoparticles (NPs) from copper Sulphate solution. Green synthesized metallic nanoparticles were characterized by UV– visible spectrophotometer, X-ray diffraction (XRD), Fourier Transform Infra-Red spectrophotometer (FTIR) and Scanning Electron Microscope (SEM). Using the Debye Scherrer formula, the average crystalline size of CuNPs was calculated as 51.0nm respectively. The UV–Vis spectroscopy results showed Surface Plasmon Resonance peaks at 500nm respectively. Fourier transform infrared spectroscopy was measured to identify the possible functional group of the biomolecules in the extract that act as reducing and capping agents of the nanoparticles. SEM analysis describes surface morphology of the synthesized nanoparticles which were roughly spherical in shape. The synthesized Nanoparticles showed antibacterial activity against pathogenic bacteria (Escherichia coli and Staphylococcus aureus) and the highest antibacterial activity was found in Cu-NPS compared plant root extract.
- Audu Akawu Department of chemistry, Faculty of Sciences, Yobe State University, PMB. 1144 Damaturu, Yobe , Nigeria
- Maimuna Ibrahim Sidi Department of chemistry, Faculty of Sciences, Yobe State University, PMB. 1144 Damaturu, Yobe , Nigeria
- Sani Auwalu Department of chemistry, Faculty of Sciences, Yobe State University, PMB. 1144 Damaturu, Yobe , Nigeria
- Mohammed Inusa Nguru Department of science Laboratory Technology Mai Idris Alooma polytechnic Geidam Yobe State, Nigeria
- Yagana Abba Sidi Department of general studies Shehu sule College of nursing and midwifery Damaturu Yobe State Nigeria.
References
1. Sinha S, Pan I, Chanda P, Sen SK, (2009) “Nanoparticles fabrication using ambient biological resources” Journal of Applied Biosciences 19: 1113 – 1130 2. R. Luque, R. S. Varma, Sustainable Preparation of Metal Nanoparticles Methods and Applications, Royal Society of Chemistry, Cambridge (UK), 2013. 3. Niharika Nagar,(2018) “Synthesis of Metal Nanoparticles and Their Application in Degradation of Textile Dyes by Advanced Oxidation Process” Phd. Thesis(published) Submitted to department of Chemistry. University of Kota, Kota. J.D.B. Govt. Girls College, Kota,India. 4. G. A. Ozin, A. C. Arsenault, L. Cademartiri, Nanochemistry: A Chemical Approach to Nanomaterials, Royal Society of Chemistry, Cambridge, UK, 2000. 5. C. Burda, X. B. Chen, R. Narayanan, M. A. El-Sayed, Chemical Reviews, 105 (2005)1025 6. Forough, M., and Farhad, K. 2010. Biological and Green Synthesis of Silver Nanoparticles. Turkish Journal of Engineering and Environmental Sciences. 34: 281-287 7. Juhi, S., M. S. Madan, G. Sarika and Abhijeet, S. 2014. Emerging role of fungi in nanoparticle synthesis and their applications. World Journal of Pharmacy and Pharmaceutical Sciences. 3(9): 1586-1613. 8. Bello Oluwasesan M, Zack Agbendeh M. and Adikwu Jacob G (2013)The comparative studies of phytochemical screening of Piliostigmathonningii root and leaves extract” Asian Journal of Plant Science and Research 3(6):74-77 9. Annapoorna Avula, Kaleem Ahmed Jaleeli, T Sreekanth and Adeel Ahmad (2020) “Synthesis of Ag, Cu and Ag-Cu Bimetallic Nanoparticles Using Tulsi Leaf Extract “International Journal of Advanced Science and Technology 29(4) 1353-1360 10. Anju Arya, Khushbu Gupta, Tejpal Singh Chundawat and Dipti Vaya “Biogenic Synthesis of Copper and Silver Nanoparticles Using Green Alga Botryococcusbraunii and Its Antimicrobial Activity” Bioinorganic Chemistry and Applications Volume 2018, Article ID 7879403, 9 pages https://doi.org/10.1155/2018/7879403 11. Saranya S, Eswari A, Gayathri E, Eswari S and Vijayarani K “Green Synthesis of Metallic Nanoparticles using AqueousPlant Extract and their Antibacterial Activity” International Journal of Current Microbiology and Applied Sciences 6(6) 1834-1845 ISSN: 2319-7706 12. Shahverdi, A. R., A. Fakhimi, H. R. Shahverdi and Minaian, S. 2007. Synthesis and effects of silver nanoparticles on the antibacterial activity of different antibiotics against Staphylococcus aureus and Escherichia coli. Journal of Nanomedicine. 3(2): 168-171. 13. Subhankari, I., and Nayak, P.L. 2013. Synthesis of Copper Nanoparticles Using Syzygium aromaticum (Cloves) Aqueous Extract by Using Green Chemistry. World Journal of Nano Science and Technology. 2(1): 14-17. 14. Fatemeh B, Alireza A and Sayed A. H. (2017) “Green synthesis, characterization and antimicrobial activity of silver nanoparticles from root extract of tapidiumdraba weed“Green Chemistry Letter and Reviews 10 (4), 324 330
Audu Akawu, Maimuna Ibrahim, Sani Auwalu, Mohammed Inusa Nguru, Yagana Abba Sidi, "Green Synthesis, Characterization and Antibacterial Activity of Copper Nanoparticles from the Roots Extract of Piliostigma Reticulata Fabaceae" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.13 issue 4, April 2024, pp.155-160 URL: https://doi.org/10.51583/IJLTEMAS.2024.130418
The COVID-19 pandemic fundamentally reshaped the global economic landscape, forcing businesses to adapt to unprecedented challenges. This study examines the paradigm shifts witnessed among companies listed on the Nairobi Securities Exchange (NSE) in Kenya. By drawing on reputable sources like the Capital Markets Authority (CMA) and Kenya Institute for Public Policy Research and Analysis (KIPPRA), the research explores the prevalence of digital transformation initiatives, the adoption of remote work policies, the assessment of financial resilience strategies employed by these companies and the adaptive strategies for resilience and growth. The findings reveal a significant push towards digitalization, with 76% of NSE-listed companies actively pursuing digital transformation initiatives. The shift to remote work was also widespread, with 68% of firms implementing formal remote work policies. However, challenges such as skill gaps, cybersecurity risks, and maintaining productivity in remote settings were identified. The analysis of financial resilience highlights the varying impact on different sectors, with some experiencing declines in revenue, profitability, and liquidity ratios. The study concludes by emphasizing the need for further research into sector-specific transformations and the long-term effects of the pandemic on NSE-listed companies.
- Lydia Nanjala Nyongesa Department of Economics, Finance and Accounting, Kibabii University
- Fred Gichana Atandi Department of Economics, Finance and Accounting, Kibabii University
References
<1. Akbari, H., Aghajani, H., &Ghadim, A. A. (2021). Cybersecurity challenges in the digital transformation era: A literature review. Journal of Cyber Security Technology, 5(2), 75-88. https://doi.org/10.1080/23742917.2021.1925833 2. Albury, D. (2021). The future of work: Trends and challenges for the 2020s. London, UK: The Work Foundation. https://www.ahri.com.au/wp-content/uploads/future-of-work-trends-post-covid-19.pdf 3. Amankwah-Amoah, J., Khan, Z., Wood, G., & Knight, G. (2021). COVID-19 and digitalization: The great acceleration. Journal of Business Research, 136, 602-611. https://doi.org/10.1016/j.jbusres.2021.08.011 4. African Development Bank (AfDB). (2022). African Economic Outlook 2022. Abidjan:African Development Bank Group. 5. African Union. (2019). Agreement establishing the African Continental Free Trade Area. https://au.int/sites/default/files/treaties/36437-treatyconsolidated_text_on_cfta_-en.pdf 6. Bloom, N., Liang, J., Roberts, J., & Ying, Z. J. (2015). Does working from home work?Evidence from a Chinese experiment. The Quarterly Journal of Economics, 130(1),165-218. https://doi.org/10.1093/qje/qju032 7. Brynjolfsson, E., Horton, J. J., Ozimek, A., Rock, D., Sharma, G., & TuYe, H. Y. (2020). COVID-19 and remote work: An early look at US data. National Bureau of EconomicResearch, Working Paper 27344. https://doi.org/10.3386/w27344 8. Capital Markets Authority. (2022). Impact of the COVID-19 Pandemic on Listed Companiesin Kenya. Nairobi: Capital Markets Authority. 9. Chakrabarti, A. (2015). Organizational adaptation in an economic fitness landscape. Journalof Organizational Change Management, 28(6), 995-1013.https://doi.org/10.1108/JOCM-05-2015-0066 10. Communications Authority of Kenya. (2021). Statistics. https://www.ca.go.ke/Council on Foreign Relations. (2023). Africa Programhttps://www.cfr.org/programs/africa-program 11. East African Community (EAC). (2020). EAC Regional COVID-19 Response Plan. Arusha:East African Community Secretariat. 12. East African Community. (2023). EAC Home. https://www.eac.int/ 13. Feng, Z., & Savani, K. (2020). Covid-19 created a gender gap in perceived work productivityamong employees. Harvard Business Review. https://hbr.org/2020/06/covid-19-created-a-gender-gap-in-perceived-work-productivity 14. Gilson, S. C. (2012). Coming through in a crisis: How chapter 11 and the debt restructuringindustry are helping to revive the U.S. economy. Journal of Applied Corporate Finance,24(4), 23-35. https://doi.org/10.1111/j.1745-6622.2012.00395. 15. Government of Kenya. (2021). Economic Recovery Strategy for Wealth and EmploymentCreation. Nairobi: Government of Kenya. 16. Hitt, M. A., Keats, B. W., & DeMarie, S. M. (1997). Navigating in the new competitivelandscape: Building strategic flexibility and competitive advantage in the 21st century.Academy of Management Perspectives, 12(4), 22-42. https://doi.org/10.5465/ame.1997.9712024216 17. Hizam, S. M., & Mujahid, N. (2022). Workforce transformation in the age of digitaltransformation: A systematic literature review. Technological Forecasting and Social Change, 179, 121628. https://doi.org/10.1016/j.techfore.2022.121628 18. Hotchkiss, E. S., John, K., Thorburn, K. S., & Mooradian, R. M. (2008). Bankruptcy and theresolution of financial distress. In Handbook of Empirical Corporate Finance (pp. 235- 287). Elsevier. https://doi.org/10.1016/S1873-7603(07)02005-4 19. ICPAK (Institute of Certified Public Accountants of Kenya). (2023). Adaptive Strategies forResilience and Growth: Insights from NSE-Listed Companies. Nairobi, Kenya:Institute of Certified Public Accountants of Kenya.International Monetary Fund, 2023: https://www.imf.org/en/Publications/WEO. 20. Kamau, J. (2021). The role of entrepreneurship in the future of work in Kenya. Nairobi,Kenya: Kenya National Chamber of Commerce and Industry. 21. KEPSA. (2022). Kenya Economic Report 2022. Nairobi, Kenya: Kenya Private SectorAlliance. https://www.knbs.or.ke/wp-content/uploads/2022/05/2022-Economic-Survey1.pdf 22. KIDS. (2022). The state of children in Kenya 2022. Nairobi, Kenya: Kenya Institute of Development Studies. 23. KIPPRA (Kenya Institute for Public Policy Research and Analysis). (2023). Remote WorkAdoption and Implications for Kenyan Enterprises. Nairobi, Kenya: Kenya Institute forPublic Policy Research and Analysis. 24. Kniffin, K. M., Narayanan, J., Anseel, F., Antonakis, J., Ashford, S. P., Bakker, A. B., ... &Vugt, M. V. (2021). COVID-19 and the workplace: Implications, issues, and insights forfuture research and action. American Psychologist, 76(1), 63-77. 25. McKinsey & Company, 2020: https://www.mckinsey.com/capabilities/growthand-sales/our-insights/emerging-consumer-trends-in-a-post-covid-19-world 26 Mwangi, S., & Murigi, G. (2015). The role of education and training in the future of work inKenya. Nairobi, Kenya: UNESCO International Institute for Educational Planning. 27. Mwangi, S. (2023). The future of work in Kenya. Nairobi, Kenya: Kenya Institute for PublicPolicy Research and Analysis. 28. Morikawa, M. (2021). Productivity of working from home during the COVID-19 pandemic: Evidence from an employee survey. Economic Analysis and Policy, 74, 444-468. 29. Mwangi et al., 2021: https://www.linkedin.com/pulse/growth-e-commerce-africa-covid-19-erick-muge-expert-cv-writer 30. Nickerson, J. A., & Muehlen, M. (2012). Situational method engineering: An introduction and critique. In Situational Method Engineering (pp. 1-15). Springer, Berlin, Heidelberg. 31. Njoroge, J. (2022). The impact of climate change on the Kenyan economy. Nairobi, Kenya:Climate Change Directorate, Ministry of Environment and Forestry. 32. Njuguna, S. (2022). The impact of COVID-19 on the Kenyan economy. Nairobi, Kenya: Institute of Economic Affairs. 33. Ozimek, A. (2020). The future of remote work. SSRN Electronic Journal 34. Prasad, K., Vaidya, R., &Mangipudy, V. (2020). Effect of remote working on productivityduring COVID-19 pandemic: A case of IT companies in India. International Journal of Interdisciplinary Research and Innovations, 8(2), 276-284. 35. Rana, M. B., & Morgan, C. P. (2019). Managing economic downturns: A critical review of firm-level strategies and practices. Journal of Economics and Business, 101, 3-21. 36. Remane, G., Hildebrandt, B., Hanelt, A., & Kolbe, L. M. (2020). Discovering new digital a product-service category offerings: Assessing the behaviour of corporate digital unit teams. Journal of Product Innovation Management, 37(1), 50-69. 37. Rudolph, C. W., Allan, B., Clark, M., Hertel, G., Hirschi, A., Kunze, F., ... & Shockley, K. (2021). Pandemics: Implications for research and practice in industrial and organizational psychology. Industrial and Organizational Psychology, 14(1-2), 1-35. 38. Saariko, T. (2020). The future of work and the role of education and training. Helsinki, Finland: Finnish National Agency for Education. https://www.pwc.com/m1/en/world-government-summit/documents/wgs-future-of-work-and-education.pdf 39. Sahoo, S., & Gupta, S. (2022). The impact of technology on the future ofwork. International Journal of Management Reviews, 24(1), 112-133. https://www.linkedin.com/pulse/impact-tech-future-work-dataethics4all 40. Seetharaman, P. (2020). Business models shifts: Impact of Covid-19. International Journal of Information Management, 54, 102173. 41. Schreyögg, G., & Sydow, J. (2010). Organizing for fluidity? Dilemmas of new organizational forms. Organization Science, 21(6), 1251-1262. 42. Soininen, J., Puumalainen, K., Sjögrén, H., & Syrjä, P. (2012). The impact of global economic crisis on SMEs: Does entrepreneurial orientation matter? Management Research Review, 35(10), 927-944. 43. Spinuzzi, C. (2012). Working alone together: Coworking as emergent collaborative activity. Journal of Business and Technical Communication, 26(4), 399-441. 44. Spreitzer, G. M., Cameron, L., & Garrett, L. (2017). Alternative work arrangements: Two images of the new world of work. Annual Review of Organizational Psychology and Organizational Behaviour, 4, 473-499. 45. Teece, D. J. (2018). Dynamic capabilities and the role of management in value creation. Journal of Management Studies, 55(8), 1424-1449. 46. United Nations Economic Commission for Africa, 2021:https://www.uneca.org/eca-covid-19-response 47. Waizenegger, L., McKenna, B., Cai, W., & Bendz, T. (2020). An affordance perspective ofteam collaboration and enforced working from home during COVID-19. European Journal of Information Systems, 29(4), 429-442. 48. Wang, B., Liu, Y., Qian, J., & Parker, S. K. (2021). Achieving effective remote working during the COVID-19 pandemic: A work design perspective. Applied Psychology, 70(1), 16-59. 49. Warungu, W. (2023). The role of technology in the future of work in Kenya. Nairobi, Kenya: The Brenthurst Foundation. 50. World Bank. (2021). COVID-19 Crisis Response in East Africa. Washington, D.C.: World Bank Group. 51. World Bank. (2022). Global Economic Prospects, June 2022. Washington, D.C.: World Bank Group. 52. World Bank, 2023: https://www.worldbank.org/en/country/kenya). 53. World TradeOrganization,2023:https://www.wto.org/english/blogse/ceralphossae/blogro02jun23e.htm 54. Worley, C. G., & Lawler, E. E. (2010). Built to change organizations and responsible progress: Twin pillars of sustainable MD success. Research in Organizational Change and Development, 18, 1-49.
Lydia Nanjala Nyongesa, Fred Gichana Atandi, "Navigating Economic Transformations: Accounting for Paradigm Shifts in Post Covid-19 in Listed Companies in NSE, Kenya" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.13 issue 4, April 2024, pp.161-171 URL: https://doi.org/10.51583/IJLTEMAS.2024.130410
This study compared the effect of think-pair-share and jigsaw methods of Teaching chemistry in the Ghanaian's senior high schools. The quasi-experimental design was adopted for the study. The population of the study was 100 S. H. S chemistry students in our lady of Lourdes Girls' Senior High school out of which a sample of 61 students on the same year group was selected using purposive and random sampling techniques. The instruments for data collection was chemistry test and it was validated by the lecturer. Data were collected by administering the instruments as pretest and posttest before and after treatment respectively. The data obtained were analyzed using mean, standard deviation and the t-test. The findings of the study showed a significant difference in the mean scores of the students taught using think-pair-share and those taught using jigsaw method in favour of think-pair share method. This was further certified by the value from the t-test which indicates a significant difference between the the two methods. From this study, it is therefore recommended that chemistry educators/ teachers be encouraged to integrate the think-pair-share method to facilitate more profound learning experiences and that workshops and seminars be organized for chemistry instructors to adequatly and accurately incorporate the think-pair-share method into their teaching methodologies.
- Thomas Nipielim Tindan. Department of Science Education, C.K. Tedam University of Technology and Applied Sciences, Ghana.
- Tang Godfred Science Department, Our Lady of Lourdes Girls' Senior High School, Navrongo- Ghana
References
1. Agbemabiese, P. G. E. (2007). Emerging themes in educational reforms in Ghana as seen through education reforms in the United States. ProQuest Dissertations and Theses,250.http://ezproxy.nottingham.ac.uk/login?url=http://search.proquest.com/docview/304818055?accountid=8018%5Cnhttp://sfx.nottingham.ac.uk/sfx_local/?url_ver=Z39.882004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&genre=dissertations+&+theses&sid=ProQ:ProQues 2. Akpan, B. B. (2010). Innovations in Science and Technology Education through Science Teacher Associations. Science Education International, 21(2), 67–79. 3. Arokoyu, A. ., & Ugonwa, R. . (2012). Assessment of Resource Availability for Chemistry Instruction in the Secondary Schools in Rivers State. Journal of Emerging Trends in Educational Research and Policy Studies, 3(3), 346–351. 4. Adams, S. (2002).Study of pedagogical effectiveness in learning, Research Report 365, DfES, London, 23-66. 5. Birdsall, N. (2005). Towards universal primary education: Investments, incentives, and institutions. European Journal of Education, 40, 337-349. 6. Broadhead, P. (2010). Play and learning in early childhood settings: Theory and practice, Sage, London, 203-209. 7. Corts, D. P. (2000). Assessing undergraduate satisfaction with an academic department. College Student Journal, 34(3), 399-408. 8. Fabian, H. (2009). Development and learning for young children, Sage, London, 133-169. 9. Grabau, L. J. (2017). Aspects of science engagement, student background, and school characteristics: Impacts on science achievement of U.S. students.1-A(E), No Pagination Specified-No Pagination Specified. 10. Hasni, A., & Potvin, P. (2015). Student’s interest in science and technology and its relationships with teaching methods, family context and self-efficacy. International Journal of Environmental and Science Education, 10(3), 337–366. https://doi.org/10.12973/ijese.2015.249 11. Hmelo-Silver, C. (2013). Creating a learning space in problem-based learning. Interdisciplinary Journal of Problem-Based Learning, https ://doi.org/10.7771/1541-5015.1334 12. Ives, B. (2001).A preliminary assessment of effectiveness in basic skills it training. MIS Quarterly, 25(4), 401-426. 13. Kassim, A. G. (2014). How to use the laboratory and conduct practical for skills acquisition for secondary school students. (August), 160–164. https://doi.org/10.14662/IJARER2014.036 14. Lestik, M. & Plous, S. (2022). Jigsaw classroom, Retrieved 7th March, 2022, from jigsaw.org, 2012. 15. Mari, J. S., & Gumel, S. A. (2015). Effects of jigsaw model of cooperative learning on self efficacy and achievement in chemistry among concrete and formal reasoners in colleges of education in Nigeria. International Journal of Information and Education Technology, 5(3), 196-199. https://doi.org/10.7763/IJIET.2015.V5.501 16. Rosemane, J. E., & DeBoer, G. (2010). Exploring the Nature of Science: Using the Atlas of Science Literacy and Other Education Resources from AAAS Project 2061. Science. 17. Rubin, A., & Babbie, E. R. (2009). Research Methods for Social Work Licensed to : iChapters User (Issue August). 18. Taherdoost, H. (2016). Sampling Methods in Research Methodology ; How to Choose a Sampling Technique for Research Hamed Taherdoost To cite this version : HAL Id : hal-02546796 Sampling Methods in Research Methodology; How to Choose a Sampling Technique for. International Journal of Academic Research in Management (IJARM), 5(2), 18–27. 19. Van Den Branden, K. (2015). Sustainable education: Exploiting students’ energy for learning as a renewable resource. Sustainability (Switzerland), 7(5), 5471–5487. https://doi.org/10.3390/su7055471
Thomas Nipielim Tindan., Tang Godfred, "Comparative Study on Think-Pair Share and Jigsaw Methods of Teaching Chemistry among S.H.S Students in Ghana." International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.13 issue 4, April 2024, pp.172-175 URL: https://doi.org/10.51583/IJLTEMAS.2024.130419
The study utilized the Conflict Perspective Theory developed by Sears (2008) as theoretical framework to analyze the impact of religious antagonism. The study employed a mixed-methods research approach, combining both quantitative and qualitative data collection and analysis methods, the study aimed to provide a comprehensive understanding of the phenomenon. This approach allowed for a nuanced exploration of religious antagonism and its effects on community living. The study targeted religious leaders and followers from the specified zones in Ethiopia, with a sample size of 384 respondents selected using cluster sampling techniques. The study utilized structured and unstructured questionnaires, individual interview guides, and focus group discussion guides as data collection instruments. The findings of the study revealed significant impacts of religious antagonism on the surveyed communities. Signs of division, such as the use of derogatory language and disparaging expressions among religious groups, were observed. Additionally, some Christian denominations were accused of projecting an image of salvation and pressuring followers of other faiths or denominations to convert, indicating tensions arising from religious differences.
- Adane Woldemariam Michael The Catholic University of Eastern Africa, Nairobi, Kenya
- Chrispine Ouma Nyandiwa, PHD The Catholic University of Eastern Africa, Nairobi, Kenya
- Prof. Mary N. Getui The Catholic University of Eastern Africa, Nairobi, Kenya
References
1. Abbink, J. (2014). Religious freedom and the political order: The Ethiopian “secular state” and the containment of Muslim identity politics. Journal of Eastern African Studies, 8(3), 346–365. https://doi.org/10.1080/17531055.2014.917855 2. Agenzia Fides (2018, August 8). Ethiopia: Churches burned, priests killed in Somali Region. ICN, Agenzia Fides. https://www.indcatholicnews.com/news/35414 3. Barsky, A. E. (2015). Conflict Resolution for the Helping Professions: Negotiation, Mediation, Advocacy, Facilitation, and Restorative Justice. 3rd ed. Oxford University Press. 4. Borkena, (2022, April 29). Churches burned in Silte Zone of South Ethiopia, at least three killed. Borkena Ethiopian News. https://borkena.com/2022/04/29/ethiopia-silte-churches-burned-in-zone-of-south-ethiopia/ 5. Clinton, M. (2011, March 17). In Ethiopia, Muslims Burn 69 churches. Baptist Press. https://www.baptistpress.com/resource-library/news/in-ethiopia-muslims-burn-69-churches/ 6. Darrell,N. B. (2018). The complex nature religious conflict in the technical workplace. International Journalof Economics, CommerceandManagement, 6(12), 196 -215. 7. Deutsche-Welle, (2022, May 7). Interfaith tensions simmer in Ethiopia after attack in Gondar. Frontline. https://frontline.thehindu.com/dispatches/interfaith-tensions-simmer-in-ethiopia-after-attack-in-gondar/article65395969.ece 8. Drew, C. (2023, December 4). Conflict Theory in Sociology: Assumptions and Criticisms. https://helpfulprofessor.com/conflict-theory-criticisms-assumptions/ 9. Ethiopia 2020 International Religious Freedom Report (2020). United States Department of State Office of International Religious Freedom. https://et.usembassy.gov/wp-content/uploads/sites/188/240282-ETHIOPIA-2020-INTERNATIONAL-RELIGIOUS-FREEDOM-REPORT.pdf 10. Fox, J. A. (2001).Civilizational Clash or Balderdash? The Causes of Religious Discrimination in Western and European Christian-Majority Democracies. Routledge EBooks, 34-48. https://doi.org/10.4324/9781003161240-4 11. Hamayotsu, K. (2015). Religious pluralism and democracy in Southeast Asia: Indonesia and Malaysia Compared. Institute of Culture, Religion and World Affairs. https://www.bu.edu/cura/files/2015/10/Religious-Pluralism-and-Democracy-in-Southeast-Asia-Hamayotsu-093015.pdf 12. Helina (2022). Epo Weekly: 23 april-6 May 2022.Ethiopia Peace Observatory. https://epo.acleddata.com/2022/05/11/epo-weekly-23-april-6-may-2022/ 13. Jegede, O. P. (2019). Implications of religious conflicts on peace, national security and development in Nigeria. Ilorin Journal of Religious Studies, (IJOURELS), 9(1), 53-70. 14. Kaniki, M. H. (1976). Religious Conflict and Cultural Accommodation: The Impact of Islam on some aspects of African Societies. University of Dar es Salaam. 15. Kirkwood, T. J. (2011). Book reviews: Conflict resolution in the 21st Century: Principles, methods and approaches. African Journal on Conflict Resolution, 11(2), 132-135. https://doi.org/10.4314/ajcr.v11i2.69837 16. Kivimäki, T., Kramer, M. & Pasch, P. (2012). The Dynamics of Conflict in the MultiEthnic State of Bosnia and Herzegovina. Sarajevo: Friedrich-Ebert Stiftung. http://library.fes.de/pdf-files/bueros/sarajevo/09418.pdf 17. Michael, E. (2009). Ethno- Religious Conflict in Europe:typologies of radicalisation in Europe’s Muslim communities. Centrefor EuropeanPolicyStudies. 18. Michele, B. (2022, May 7). Inter-religious clashes in Ethiopia. OHCHR. https://www.ohchr.org/en/statements/2022/05/inter-religious-clashes-ethiopia 19. Morning Star News East Africa Correspondent (2019, March 1). Muslim mobs attack 10 church buildings in Ethiopia, ChristianHeadlines.com. ChristianHeadlines.com. https://www.christianheadlines.com/blog/muslim-mobs-attack-10-church-buildings-in-ethiopia.html 20. Musa ,M; Adamu, S; & Hasley, F.(2021).An Appraisal of Ethno Ethnic Crisis in Nigeria: The Need For Remediation. International JournalofHumanities &SocialSciences, 21(6), 285-298. 21. Mwangi, O. G. (2012). State Collapse,Al-Shabaab, Islamism, and Legitimacy in Somalia. Politics, Religion & Ideology, 13(4), 513–527. https://doi.org/10.1080/21567689.2012.725659 22. Ochab, D. E. U. (2018, May 9). The religious war in the Central African Republic continues. Forbes. https://www.forbes.com/sites/ewelinaochab/2018/05/09/the-religious-war-in-central-african-republic-continues/?sh=41cc23a43c0d 23. Omotosho Mashood (2014). Managing religious conflicts in Nigeria: The inter religious mediation peace strategy. African Development,36(2), 133 -151. 24. Peel, J. D. (2003). Religious Encounter and the Making of the Yoruba. Indiana University Press 25. Primo, N. (2013). No Music in Timbuktu: A Brief Analysis of the Conflict in Mali and Al Qaeda’s Rebirth. Pepperdine Policy Review,6(6), 1–17. 26. Sears Alan (2008). A Good Book, In Theory: A Guide to Theoretical Thinking. University of Toronto Press. 27. Stenhouse, L. Paul (2003). The Conquest of Abyssinia: Futuh Al-Habasha. Tsehai Publishers. 28. Terje Ø. (2019, November 6). Special Edition: The role and relevance of religion in Ethiopia’s current conflicts. Addis Standard. https://addisstandard.com/special-edition-the-role-and-relevance-of-religion-in-ethiopias-current-conflicts/ 29. United Nations (2018, June 25). Secretary-general's remarks to the Security Council on the situation in the Middle East and North Africa secretary-general. United Nations. https://www.un.org/sg/en/content/sg/statement/2018-06-25/secretary-generals-remarks-security-council-situation-middle-east.
Adane Woldemariam Michael, Chrispine Ouma Nyandiwa, Prof. Mary N. Getui, "Examining the Socio-Cultural Dynamics: Religious Antagonism and its Effects on Community Cohesion in the Kambaata, Tembaro and Halaba Zones of Ethiopia." International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.13 issue 4, April 2024, pp.176-185 URL: https://doi.org/10.51583/IJLTEMAS.2024.130420
This study modelled the travel choice behaviour among commuters in a few selected coastal capital cities in the Niger Delta, reference to road and inland waterways. Multinomial-logit model was used in explaining discrete choiceswhile multiple Regressions was used for the model equation. The following factors that influence the behaviour of commuters such as travel time, cost, and socio-demographic and socio-economic characteristics were investigated. A simple severity index was also used to ascertain the safety level of both ferries and automobiles which could influence commuters' mode choice behaviours. The alternative transport modes available to users were considered and include –private cars, walking, bus service and ferry (boat). From the findings, the use of private cars will be reduced considerably if the public transport sector is given attention in terms of infrastructure/facilities so they can compete. The greater percent that refused to change from private cars to public monorail show that private car users are attached to their cars not just for convenience but for prestige, flexibility, and privacy and finally, it was gathered from the model equation that variables like employment status, distance to work and driver's license had zero effect on the behaviour of people per their choice of transport mode.
- Azonwu, M. C. Federal University of Technology, Owerri, Imo State, Nigeria; Department of Logistics and Transport Technology.
- Ibe, C. C. Federal University of Technology, Owerri, Imo State, Nigeria; Department of Logistics and Transport Technology.
- Ebiringa, O.T. Federal University of Technology, Owerri, Imo State, Nigeria; Department of Supply Chain Management
- Ejem E. A. Federal University of Technology, Owerri, Imo State, Nigeria; Department of Supply Chain Management
References
1. Ndikom (2006). The Kernel Concept of Shipping Operations, Policies and Strategies; the Industry Overview. Bumco Publishing Lagos. 2. Vedant G(2024). Factors to consider while shipping goods, 2Cubes Logistics ltd North Bridge Road Level 7 Singapore 3. ] Vidya, B. (2021) Key Considerations for Selecting Transportation Mode, Kingz International Logistics 4. Dewi A, (2010). Research on Factors Affecting Travel Behaviour on Choice of Transport means for working activity, Karl State University. 5. Vedant G(2024). Factors to consider while shipping goods, 2Cubes Logistics ltd North Bridge Road Level 7 Singapore 6. Degeras, K, D, & Sullman, R,K (2021) An Empirical Evaluationof Factors Influencing the Choice of Mode for Transportation in Highersing Education Institution using Analytic Hierarchical Process Model, IOP Conference SerriesEarth 1 December 2021 7. Li, Z., Meng, N., Yao, X., 2017b. Sustainability performance for China's transportation industry under the environmental regulation. J. Clean. Prod. 142, 688–696. https://doi.org/10.1016/j.jclepro.2016.09.041 8. Nwankwo, U. &Ukoji, U. (2015). Boat Accidents in Nigeria: General trends and Risk factors. Department of Sociology, Nigeria Police Academy Kano Nigeria. 9. Robert, K., (2012). Key Factors and Trends in Transportation Mode and Carrier Selection, University of Tennessee Knox Ville, Krober 35 at UKT Education. 10. Ma, X., Sun, X, He, Y. & Chen, Y., (2013). Parking Choice Behavior; A Case Study at Beijing 13th International Conference of Transportation professionals. 11. Maduhuwanthi, R., Marasinhe, R., Rajapakse, J., Dhamawansa, A. & Nomura, S., (2015) Factors Influencing to Travel out Transport Mode Choice. Wayamba University of Sri Lanka. 12. Harboring, M & Shluter, J (2020). Journal of Transport Geography, Vol 87, July 2020, 102766 13. Degeras, K, D, & Sullman, R,K (2021) An Empirical Evaluationof Factors Influencing the Choice of Mode for Transportation in Higher Education Institution using Analytic Hierarchical Process Model, IOP Conference SerriesEarth 1 December 2021 14. Fayyaz, M., Bliemer, M. & Beck, M. (2017) Investigating Interactive Experiments with Driving Simulation – International Foundation for Autonomous Agents and Multi- agent systems Sao Paulo Brazil. Institute of Transport and Logistic Studies, Business School University of Sydney. 15. Busari, A., Osuolale, O., Omole, D., Ojo, A. and Jayola, B., (2015) Travel Behaviour of University Environment; Inter-Relationship between Trip Distance and Mode Choice in South- Western Nigeria. International Journal of Applied Engineering Research. 16. Babatunde, S.A., (2016). Analysis of Social Cost of Commuting in Lagos Metropolis. Department of Geography, Osibanjo University. 17. Olariman, M. &Olapoju, O., (2016). Mode Choice of Undergraduates A Case Study of Lectures Trips in Nigeria Faculty of Geography UGM and Indonesian Geography Association
Azonwu, M. C.; Ibe, C. C.; Ebiringa, O.T.; Ejem E. A., "Analysis of Travel Choice Behaviours of Commuters in the Niger Delta Region of Nigeria" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.13 issue 4, April 2024, pp.186-192 URL: https://doi.org/10.51583/IJLTEMAS.2024.130421
Successive Ionic Layer Adsorption and Reaction (SILAR) was used to deposit tin sulphide (SnS) thin films on glass substrates at temperature of 450C.Sodium thiosulphateNa2S2O3solution was used as the anionic precursor, tin chloride SnCl2 solution as the cationic precursor and EDTA as complexing agent. The samples were subjected to annealing at the temperature range of 2000C and 250oC). High transmittance values were obtained in both Samples C and D in the UV(70% -72%) and (75% - 89%) respectively atthe wavelength range of (350nm-400nm) which maintains linear characteristics through the visible to near infrared regions (NIR) of the electromagnetic spectrum. This high transmittance implies that it can be useful in the areas of solar energy and opto-electronic applications. The Energy band gap (Eg) is obtained using the relation (αhv)2= A (hv-Eg) where A is constant, hv is the photon energy, Eg is the energy band gap and α is the absorption coefficient. Direct band gap value of 2.90±0.05eV is obtained for sample C while a direct band gap of 2.70±0.05eV is obtained for sample D. The two samples have average band gap of 2.8±0.05eV.
- Joseph Ijeoma Onwuemeka Department of Physics, Imo State University Owerri Nigeria
- Doris Nwakaego Ndubueze Department of Physics, Kingsley Ozurumba Mbadiwe University Ogboko, Nigeria
- Hypolitus Nnamdi Onyema Department of Physics, Imo State University Owerri Nigeria
- Ngozi Patricia Ebosie Department of Chemistry, Imo State University Owerri Nigeria
- Uche Godswill Nwokeke Department of Chemistry, Imo State University Owerri Nigeria
- Chijioke Uzoma Opara Departmen of Physics and Electronics, Federal Polytechnic, Nekede Owerri, Nigeria
- Bruno ChijinduAgbakwuru Departmen of Physics and Electronics, Federal Polytechnic, Nekede Owerri, Nigeria
- Ikechukwu Ogu Department of Physics, Imo State University Owerri Nigeria
References
1. Kamil S, N. (2012) Synthesis and Spectroscopic Studies of Some Schiff Bases Derived from Benzidine and Their Conversion to 1, 3-Oxazepine Derivatives Throughout[2+5] Cycloaddition Reactions (II). Journal of Babylon University, 20, 8. 2. Perednis D, Gauckler L, J. (2005) Thin Film Deposition Using Spray Pyrolysis. Journal of Electroceramics14, 103-111. 3. Joseph Ijeoma Onwuemeka, Azubuike Josiah Ekpunobi and Peter Ifeanyi Ekwo (2019)Synthesis of ZnO:SnO2 Alloyed Thin Films for Surface Coatings, Solar Energy Conversion andOptoelectronic Applications. American Journal of Materials Research, Vol. 8, Issue 1,1-10.http://www.aascit.org/journal/ajmr. 4. Sunil H. Chaki, Mahesh D. Chaudharyand M. P. Deshpande(2016) SnS thin films deposited by chemical bath deposition, dip coating and SILAR techniques. J. Semicond. 37 053001 DOI 10.1088/1674-4926/37/5/053001. 5. Pawan Kumar, Gowrish K. Raoand Ashik D C (2020) The Effect of the Precursor Molarities on the Composition, Microstructure and Optical Properties of Tin Sulphide Films Obtained from S-SILAR Technique. ECS J. Solid State Sci. Technol. 9 064004 DOI 10.1149/2162-8777/aba0cd. 6. Devarajan Alagarasan, S S Hegde, S Varadharajaperumal, R Aadhavan, R Naik, Mohd Shkir, H Algarni and R Ganesan (2022) Effect of SnS thin film thickness on visible light photo detection Phys. Scr. 97, 065814 DOI 10.1088/1402-4896/ac6d19. 7. Hyeongsu Choi, Jeongsu Lee, Seokyoon Shin, Juhyun Lee, Seungjin Lee, Hyunwoo Park, Sejin Kwon, Namgue Lee, Minwook Bang, Seung-Beck Lee (2018) Fabrication of high crystalline SnS and SnS2 thin films, and their switching device characteristics Nanotechnology 29 215201 DOI 10.1088/1361-6528/aab3c1. 8. Yashika Gupta and P. Arun (2017) Optimization of SnS active layer thickness for solar cell application. J. Semicond. 38, 113001 DOI 10.1088/1674-4926/38/11/113001. 9. Hosein Kafashan (2018) Structural characterizations of pure SnS and In-doped SnS thin films using isotropic and anisotropic models. Mater. Res. Express 5 046417 DOI 10.1088/2053-1591/aabdb8. 10. Kishore Bhat T R1,2, A Pramitha1, K Jeganath1 and Y Raviprakash1 (2024)The impact of silver incorporation on the structural, morphological, and optical properties of spray-pyrolyzed cubic SnS thin films. Mater. Res. Express 11, 016401 DOI 10.1088/2053-1591/ad1b05. 11. Ashenafi Abadi, Myo Than Htay, Yoshio Hashimoto, Kentaro Ito and Noritaka Momose (2022) Annealing effect of absorber layer on SnS/CdS heterojunction band alignments. Jpn. J. Appl. Phys. 61 SB1042 DOI 10.35848/1347-4065/ac3a8f. 12. D Avellaneda, I Sánchez-Orozco, J A A Martínez, S Shajiand B Krishnan (2018) Thin films of tin sulfides: structure, composition and optoelectronic properties. Mater. Res. Express 6, 016409 DOI 10.1088/2053-1591/aae3a9. 13. Huyin Su, Yuchen Cai, Long Li and Huan Liu (2020) Ce-Doped Sns Quantum Dots Sensitized SnS2 Nanocomposites for NO2 Monitoring. Meet. Abstr. MA2020-01 2440 IMCS DOI 10.1149/MA2020-01352440mtgabs. 14. P Mallika Bramaramba Devi, G. Phaneendra Reddy and K. T. Ramakrishna Reddy (2019) Structural and optical studies on PVA capped SnS films grown by chemical bath deposition for solar cell application. J. Semicond. 40, 052101 DOI 10.1088/1674-4926/40/5/052101. 15. B Thangaraju and P Kaliannan (2000) Spray pyrolytic deposition and characterization of SnS and SnS2 thin films. J. Phys. D: Appl. Phys. 33, 1054 DOI 10.1088/0022-3727/33/9/304. 16. Akkisetty Bhaskar, Melepurath Deepa and Tata Narasinga Rao (2014) Simple and LargeScale Synthesis of SnSX Nano-Belts, Flowers and Sheets for Li-Ion Battery Anode Applications. Meet. Abstr. MA2014-04 329, DOI 10.1149/MA2014-04/2/329. 17. Hongxiao Zhao, Yong Yan, Congxin Xia, Xiaohui Song, Aodi Dong, Jian Su and Jingbo Li (2020) Layered SnSexS2−x alloys with fully chemical compositions and band gaps for photoelectrochemical water oxidation. J. Phys. D: Appl. Phys. 53,DOI 10.1088/1361-6463/ab6d95.
Joseph Ijeoma Onwuemeka, Doris Nwakaego Ndubueze, Hypolitus Nnamdi Onyema Ngozi Patricia Ebosie, Uche Godswill Nwokeke, Chijioke Uzoma Opara, Bruno ChijinduAgbakwuru and Ikechukwu Ogu, "SILAR Deposition of Sns Thin Films for Possible Device Applications" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.13 issue 4, April 2024, pp.193-198 URL: https://doi.org/10.51583/IJLTEMAS.2024.130422
The basic economic condition of a country is measured and presented by Gross Domestic Product (GDP). Government’s high officials, Business owners or managers, rely on forecasting of GDP, to determine fiscal year monitory policy and operating activities. This paper has collected GDP data from 1968 to 2022 from World Bank Database. Exploratory analysis has performed for trend, seasonality & outlier detection. Augmented Dickey-Fuller test, Phillip Peron and Kwiatkowski-Phillips-Schmidt-Shin test has performed to check seasonality and stationary. To determine the best fitted model for GDP, ARIMA models (Autoregressive integrated Moving Average) have constructed using Box-Jenkins technique. Considering all statistical criterions this paper has determined ARIMA (4, 2, 1) is the best fitted model and forecasted for the next ten years. Finally, residual test has performed to determine reliable forecasting.
- Md Ariful Haque 1Lecturer, Department of Management Information Systems. Khawaja Yunus Ali University, Bangladesh.
- Aziz Ahmed Senior Manager (M&E Expert), Non-Government Organization, Bangladesh.
References
1. Abonazel, M.R. and Abd-Elftah, A.I. (2019) “Forecasting Egyptian GDP using Arima models,” Reports on Economics and Finance, 5(1), pp. 35–47. Available at: https://doi.org/10.12988/ref.2019.81023.
2. Box, G. (2013) ‘Box and jenkins: Time series analysis, forecasting and Control’, A Very British Affair, pp. 161–215. Doi: 10.1057/9781137291264_6.
3. Eissa, N. (2020) “Forecasting the GDP per capita for Egypt and Saudi Arabia using Arima models,” Research in World Economy, 11(1), p. 247. Available at: https://doi.org/10.5430/rwe.v11n1p247.
4. Ghazo, A. (2021) “Applying the Arima model to the process of forecasting GDP and CPI in the Jordanian economy,” International Journal of Financial Research, 12(3), p. 70. Available at: https://doi.org/10.5430/ijfr.v12n3p70.
5.
Md Ariful Haque, Aziz Ahmed, "Time Series Modeling and Forecasting on GDP Data of Bangladesh:An Application of ARIMA Model" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.13 issue 4, April 2024, pp.199-207 URL: https://doi.org/10.51583/IJLTEMAS.2024.130423