0704-883-0675     |      dataprojectng@gmail.com
1

1. ECONOMIC ANALYSIS OF FOOD SAFETY AMONG PORK MARKETERS

BACKGROUND OF THE STUDY

Pig is one of the domestic animals found in Nigeria and most parts of West Africa.  Pigs are reared for the production of meat called pork and fat called lard.  The pig produces litters twice a year.  One litter or...

Read more

2. SECURITY CHALLENGES AND COPING STRATEGIES OF UNIVERSITY LIBRARIES FOR EFFECTIVE SERVICE DELIVERY IN ENUGU STATE

Background Of The Study

Security of library resources is very paramount in the provision of efficient library service delivery. Where there is insecurity of library collections, the resources are exposed to dangers such as theft, mutilation, and vandali...

Read more

3. SECURITY CHALLENGES AND COPING STRATEGIES OF UNIVERSITY LIBRARIES FOR EFFECTIVE SERVICE DELIVERY IN ENUGU STATE

Background Of The Study

Security of library resources is very paramount in the provision of efficient library service delivery. Where there is insecurity of library collections, the resources are exposed to dangers such as theft, mutilation, and vandali...

Read more

4. ECONOMIC ANALYSIS OF FOOD SAFETY AMONG PORK MARKETERS

Pig is one of the domestic animals found in Nigeria and most parts of West Africa.  Pigs are reared for the production of meat called pork and fat called lard.  The pig produces litters twice a year.  One litter or one birth give between eight (8) and sixteen (16) piglets.  Th...

Read more

5. THE EFFECT OF TERRORISM IN DEVELOPING COUNTRIES: IT’S SIGNIFICANCE TO DEVELOPMENT AND PROGRESS (A CASE STUDY OF NIGERIA)

BACKGROUND TO THE STUDY

Terrorism and insurgency is globally becoming a household word as there is no nation that is completely absolved from its effect. This is the reason why Rourke (2015) observes that war, terrorism and other forms of transnational political violenc...

Read more

6. AUTOMATED FORENSIC AUDITING AND FRAUD CONTROL IN NIGERIA

EXCERPT FROM THE STUDY

Nigeria seems to have acquired a name that is synonymous with corruption. As a nation, it has carved out for itself the reputation of the most corrupt in the world. Our treatment in international politics as a parish&nb...

Read more

7. CRITICAL INFORMATION INFRASTRUCTURE PROTECTION TECHNIQUES IMPLEMENTATION AGAINST CYBER ATTACKS USING BIG DATA ANALYTICS (A CASE STUDY OF INEC & JAMB)

Introduction

In 2016, BT, the telecoms company that owns and maintains the physical infrastructure that makes up the UK's broadband network, experienced an outage of a portion of its broadband services, causing hundreds of thousands of customers (in...

Read more

8. DESIGN AND CONSTRUCTION OF AN INTRUDER DETECTOR FOR OFFICE AND HOME USE

Background of Study

Environmental, home and office security against intruders has become a thing of individual, national and international concern. The essence of this project is to provide a cost effective and more efficient security system in areas li...

Read more

9. AN INVESTIGATION ON THE EFFORT OF GOVERNMENT AND THE MANAGEMENT OF SECURITY PROBLEMS IN NIGERIA

Background of the study

After the civil war that broke out in 1970 in Nigeria, the country's security situation has been generally stable ever since. The people have peace, and they are able to travel freely from one section of the nation to another without being ha...

Read more

10. A CRITICAL INVESTIGATION OF SAFETY AND SECURITY THREATS IN HOSPITALITY INDUSTRIES IN CROSS RIVERS STATE (A CASE STUDY OF SOME SELECTED HOTELS IN CALABAR)

Background Of The Study

According to Chan (2022), safety is a state in which risks and conditions that might cause physiological, mental, or physical harm are limited to safeguard the health and well-being of individuals. It is an essential resource for...

Read more

11. COMMUNITY POLICING AND PROMOTION OF PEACE AND SECURITY IN KUJE AREA COUNCIL FCT

    1. Background of the study

The concept of community policing is rapidly gaining traction across the world, particularly in the 21st century. However, the fundamental aspects or central component of community p...

Read more

12. TERRORISM AND IT'S SOCIO-ECONOMIC IMPLICATION ON THE DEVELOPMENT OF BORNO STATE

Background of the study

Terrorism and insurgency have become household terms across the globe, since no nation is immune to their consequences. This is why, according to Rubenstein (2017), war, terrorism, and other forms of international political viole...

Read more

13. THE IMPACT OF INSECURITY ON RESIDENTIAL PROPERTY VALUE

BACKGROUND OF THE STUDY

In recent times, there has been a high level of unprecedented insecurity across developing economies. This is one of the most problems existing in communities, even in low crime rate zones. Insecurity has been established to...

Read more

14. A CRITICAL EXAMINATION OF SAFETY AND SECURITY CONCERNS IN HOSPITALITY INDUSTRY

BACKGROUND OF THE STUDY

       Hospitality means providing service to others, as well as demonstrating consistent excellence and quality. It should also mean profitably providing value at any price level, while demonst...

Read more

15. ¬DESIGN AND IMPLEMENTATION OF A WEB-BASED ALUMNI DATABASE MANAGEMENT SYSTEM

Background of the Study

The Nnamdi Azikiwe University Alumni Association has been in existence for a number of years but has not been able to become a viable entity. The association's goal is to provide a professional network for the graduates of the Nnamdi Azikiwe...

Read more

16. DESIGN AND IMPLEMENTATION OF BOOKS AND LIBRARY LENDING MANAGEMENT SYSTEM

ABSTRACT

Library management, its operation has never been easy to run effectively manually, lending of books, records of returned books, books in the library, its shift and many more. This research work will dwell more on developing and implementing a comprehensive libr...

Read more

17. DESIGN AND IMPLEMENTATION OF A TWO FACTOR AUTHENTICATION LOGIN SYSTEM USING ONE TIME PASSWORD (OTP) WITH SMS

ABSTRACT

The paper examined the design and implementation of a two-factor authentication login system using OTP with SMS. The quest for the application of tighter security measures to web, desktop and mobile applications developed has been a major concern to a lot of pe...

Read more

18. DESIGN AND IMPLEMENTATION OF PASSWORD BASED ACCESS CONTROL WITH INTRUDER ALERT SYSTEM

ABSTRACT

The necessity of a low cost electronic home security system designed in co-ordination with other security measures is always there in our society to reduce the risk of home intrusion. Keeping this problem in mind, we are working on a project on automatic passwo...

Read more

19. AN ANALYSIS OF LEGAL FRAMEWORK ON COMBATING CYBERCRIME IN NIGERIA

ABSTRACT

This research provides a conceptual discourse into the challenges of cybercrimes and the modes of curbing it. The modern society today faces with the greatest achievements of technical and technological development, associated by rapid expansion of information technology and au...

Read more

20. ASSESSMENT OF PASSIVE SECURITY MEASURES IN MIXEDUSE BUILDING OFFA, KWARA STATE

ABSTRACT

Buildings are manmade structures that are primarily meant for shelter. They are designed in different sizes, shapes, forms and functions. Some buildings have only one function and some have multiple functions such as residential and commercial purposes. These types of building...

Read more

21. CLOUD COMPUTING APPLICATION AND OFFLINE DATABASE PROVISION AS CORRELATES OF EFFECTIVE SERVICE DELIVERY IN UNIVERSITY LIBRARIES IN NORTH-WEST, NIGERIA

ABSTRACT

This study investigated the cloud computing technology application and offline database provision as correlate of effective service delivery in three federal university libraries in northwest Nigeria. The study adopted descriptive survey research design with a population of 177...

Read more

22. ASSESSMENT OF PASSIVE SECURITY MEASURES IN THE DESIGN OF A HOTEL IN MINNA, NIGER STATE

ABSTRACT

Security and safety are important factors to be considered in every design. This has in recent times become an issue of concern especially in Northern Nigeria. This research sought to assess the effectiveness of the security measures employed in hotel designs by identifying ava...

Read more

23. RAINFALL PREDICTION FOR MINNA METROPOLIS USING ARTIFICIAL NEURAL NETWORK

ABSTRACT

The effect of rainfall in our society today is stupendous. Rainfall is seen as a benefit to crops and lives. Accurate and timely rainfall prediction can be very helpful for effective security measures for planning water resources management, transportation activities, agricultu...

Read more

24. ASSESSMENT OF KNOWLEDGE AND ATTITUDE OF TEACHERS TOWARDS SAFETY AND SECURITY OF SECONDARY SCHOOL STUDENTS IN NIGERIA

ABSTRACT

The purpose of this study was to assess the knowledge and attitude of teachers towards safety and security of secondary school students in Northern states of Nigeria. An ex-post facto research design was used to study 384 subjects drawn from six states of Northern Nigeria. A mu...

Read more

25. DESIGN AND IMPLEMENTATION OF A COMPUTERIZED CHILD ABUSE DATABASE MANAGEMENT SYSTEM

BACKGROUND OF THE STUDY

The rising violence against young people encompasses all forms of violence and affects persons aged 0 to 18. Child maltreatment (i.e. sexual and emotional abuse, neglect, or physical assault) is the most common form of violence between parents or other authority...

Read more

26. PEOPLE PERCEPTIONS AND ATTITUDES TOWARD REGIONAL SECURITY GROUPS IN MAIDUGURI, BORNO STATE

Background of the study

Regional security groups have become increasingly significant in addressing the complex security challenges faced by various regions worldwide. In the context of Maiduguri, Borno State, Nigeria, the role of such groups has been p...

Read more

27. EXPLORING THE APPLICATION OF NUMBER THEORY IN CRYPTOGRAPHY

Background of the study

Cryptography has a long and intricate history that intertwines with the development of number theory. From the ancient ciphers of Julius Caesar to the complex algorithms used in modern-day encryption, the evolution of cryptograph...

Read more

28. CYBERSECURITY RISKS AND FINANCIAL REPORTING INTEGRITY

Abstract

This study examines the impact of cybersecurity risks on financial reporting integrity in Ogun State, Nigeria. The objectives are to: (1) identify common cybersecurity threats to financial data, (2) assess the impact of these threats on financi...

Read more

29. FINANCIAL REPORTING CHALLENGES IN THE DIGITAL ECONOMY

Abstract:

This study examines the financial reporting challenges faced in the digital economy in Lagos State, Nigeria. The objectives are to: (1) identify key challenges in financial reporting within the digital economy, (2) assess the impact of these c...

Read more

30. THE CHALLENGES ASSOCIATED WITH COST MANAGEMENT IN THE DIGITAL ECONOMY

Abstract: THE CHALLENGES ASSOCIATED WITH COST MANAGEMENT IN THE DIGITAL ECONOMY

This study explores the challenges associated with cost management in the digital economy, focusing on tech companies in Lagos. The objectives are to identify the key cost management challenges, evaluate the...

Read more

31. THE IMPACT OF INSECURITY ON FOOD PRODUCTION IN SHIRORO LOCAL GOVERNMENT AREA

Background of the Study

Insecurity has become a pervasive issue affecting various sectors globally, with agriculture being particularly vulnerable. The relationship between insecurity and food production is complex, involving direct and indirect consequ...

Read more

32. THE ROLE OF TECHNOLOGY ADOPTION AND ITS IMPACT ON PUBLIC ACCOUNTING SERVICES

THE ROLE OF TECHNOLOGY ADOPTION AND ITS IMPACT ON PUBLIC ACCOUNTING SERVICES

This research investigates the role of technology adoption and its impact on public accounting services. The objectives are to identify the key technologies adopted by public accounting firms, to evaluate the i...

Read more

33. THE EFFECT OF DATA ANALYTICS ON PUBLIC ACCOUNTING PRACTICES

ABSTRACT: THE EFFECT OF DATA ANALYTICS ON PUBLIC ACCOUNTING PRACTICES

The objectives of this study are to: 1) Investigate how data analytics tools are transforming public accounting practices, 2) Determine the benefits and challenges associated with integrating data analytics into accou...

Read more

34. THE EFFECT OF DIGITALIZATION ON FIDUCIARY ACCOUNTING SERVICES

THE EFFECT OF DIGITALIZATION ON FIDUCIARY ACCOUNTING SERVICES

 

This research aims to (1) analyze the impact of digital tools on the efficiency of fiduciary accounting services, (2) assess the challenges faced during digital transformation, and (3) evaluate the overall be...

Read more

35. TECHNOLOGY-ENABLED COMPLIANCE SOLUTIONS FOR FIDUCIARY ACCOUNTANTS

TECHNOLOGY-ENABLED COMPLIANCE SOLUTIONS FOR FIDUCIARY ACCOUNTANTS

Abstract: Technology-enabled compliance solutions are revolutionizing the way fiduciary accountants manage regulatory requirements, ensuring greater accuracy and efficiency. This study aims to (1) investigate the effectiv...

Read more

36. THE EFFECT OF DIGITAL TRANSFORMATION ON GOVERNMENTAL ACCOUNTING

THE EFFECT OF DIGITAL TRANSFORMATION ON GOVERNMENTAL ACCOUNTING: This study aims to (i) assess the impact of digital transformation on governmental accounting practices, (ii) identify the challenges and opportunities presented by digital technologies, and (iii) propose strategies for successful d...

Read more

37. THE EFFECT OF DIGITALIZATION ON FUND ACCOUNTING PROCESSES

Abstract: THE EFFECT OF DIGITALIZATION ON FUND ACCOUNTING PROCESSES

The primary objectives of this study are to: (1) evaluate how digitalization has transformed fund accounting processes; (2) assess the impact of digital tools on the accuracy and efficiency of financial reporting; and (...

Read more

38. THE IMPACT OF FUND ACCOUNTING FOR CRYPTOCURRENCY AND DIGITAL ASSETS

ABSTRACT

 

This study investigates THE IMPACT OF FUND ACCOUNTING FOR CRYPTOCURRENCY AND DIGITAL ASSETS, focusing on the adaptation of traditional accounting methods, the challenges of valuation and reporting, and the implications for regulatory compliance. A survey design...

Read more

39. THE INFLUENCE OF CLOUD COMPUTING ON INFORMATION SYSTEMS

THE INFLUENCE OF CLOUD COMPUTING ON INFORMATION SYSTEMS 

Abstract: This study aimed to investigate the influence of cloud computing on information systems within organizations. The objectives were to analyze how cloud computing enhances scalability...

Read more

40. THE IMPACT OF CYBERSECURITY ON INFORMATION SYSTEMS

THE IMPACT OF CYBERSECURITY ON INFORMATION SYSTEMS 

Abstract: This study aimed to assess the impact of cybersecurity on information systems within organizations. The objectives were to examine how cybersecurity measures protect data integrity, ensu...

Read more

41. THE ROLE OF INFORMATION SYSTEMS IN HEALTHCARE MANAGEMENT

Abstract: This study aimed to explore the role of information systems in healthcare management within organizations. The objectives were to investigate how information systems improve patient care delivery, enhance clinical decision-making, and streamline healthcare operations. A survey research...

Read more

42. THE INFLUENCE OF BIG DATA ON BUSINESS ANALYTICS

Abstract: THE INFLUENCE OF BIG DATA ON BUSINESS ANALYTICS 

This study investigates the influence of big data on enhancing the effectiveness and capabilities of business analytics within organizations. The objectives include examining how big data t...

Read more

43. THE IMPACT OF CLOUD COMPUTING ON VOCATIONAL TRAINING DELIVERY SYSTEMS

ABSTRACT: Promoting cybersecurity awareness through vocational education programs is crucial for preparing a workforce capable of addressing modern security challenges. This study aimed to evaluate the effectiveness of vocational education programs in enhancing cybersecurity awareness, ident...

Read more

44. THE ROLE OF CLOUD COMPUTING IN DIGITAL TRANSFORMATION

THE ROLE OF CLOUD COMPUTING IN DIGITAL TRANSFORMATION

The study aims to: (1) investigate the role of cloud computing in facilitating digital transformation, (2) identify the benefits and challenges of cloud adoption, and (3) evaluate the impact of cloud computing on business agility and...

Read more

45. THE ROLE OF CYBERSECURITY IN DIGITAL TRANSFORMATION

THE ROLE OF CYBERSECURITY IN DIGITAL TRANSFORMATION

The study aims to: (1) investigate the role of cybersecurity in facilitating digital transformation, (2) identify key cybersecurity measures that protect digital assets, and (3) evaluate the impact of cybersecurity on digital trust and...

Read more

46. SECURITY CHALLENGES AND PROTEST MANAGEMENT IN NIGERIAN URBAN CENTERS (A CASE STUDY OF ENDBADGOVERNANCE PROTEST IN NIGERIA)

SECURITY CHALLENGES AND PROTEST MANAGEMENT IN NIGERIAN URBAN CENTERS (A CASE STUDY OF ENDBADGOVERNANCE PROTEST IN NIGERIA)

Chapter One: Introduction

1.1 Background of the Study

Protests, while a critical component of democratic expression, often pose significant secu...

Read more
whatsapp