BACKGROUND OF THE STUDY
Pig is one of the domestic animals found in Nigeria and most parts of West Africa. Pigs are reared for the production of meat called pork and fat called lard. The pig produces litters twice a year. One litter or...
Background Of The Study
Security of library resources is very paramount in the provision of efficient library service delivery. Where there is insecurity of library collections, the resources are exposed to dangers such as theft, mutilation, and vandali...
Background Of The Study
Security of library resources is very paramount in the provision of efficient library service delivery. Where there is insecurity of library collections, the resources are exposed to dangers such as theft, mutilation, and vandali...
Pig is one of the domestic animals found in Nigeria and most parts of West Africa. Pigs are reared for the production of meat called pork and fat called lard. The pig produces litters twice a year. One litter or one birth give between eight (8) and sixteen (16) piglets. Th...
BACKGROUND TO THE STUDY
Terrorism and insurgency is globally becoming a household word as there is no nation that is completely absolved from its effect. This is the reason why Rourke (2015) observes that war, terrorism and other forms of transnational political violenc...
EXCERPT FROM THE STUDY
Nigeria seems to have acquired a name that is synonymous with corruption. As a nation, it has carved out for itself the reputation of the most corrupt in the world. Our treatment in international politics as a parish&nb...
Introduction
In 2016, BT, the telecoms company that owns and maintains the physical infrastructure that makes up the UK's broadband network, experienced an outage of a portion of its broadband services, causing hundreds of thousands of customers (in...
Background of Study
Environmental, home and office security against intruders has become a thing of individual, national and international concern. The essence of this project is to provide a cost effective and more efficient security system in areas li...
Background of the study
After the civil war that broke out in 1970 in Nigeria, the country's security situation has been generally stable ever since. The people have peace, and they are able to travel freely from one section of the nation to another without being ha...
Background Of The Study
According to Chan (2022), safety is a state in which risks and conditions that might cause physiological, mental, or physical harm are limited to safeguard the health and well-being of individuals. It is an essential resource for...
The concept of community policing is rapidly gaining traction across the world, particularly in the 21st century. However, the fundamental aspects or central component of community p...
Background of the study
Terrorism and insurgency have become household terms across the globe, since no nation is immune to their consequences. This is why, according to Rubenstein (2017), war, terrorism, and other forms of international political viole...
BACKGROUND OF THE STUDY
In recent times, there has been a high level of unprecedented insecurity across developing economies. This is one of the most problems existing in communities, even in low crime rate zones. Insecurity has been established to...
BACKGROUND OF THE STUDY
Hospitality means providing service to others, as well as demonstrating consistent excellence and quality. It should also mean profitably providing value at any price level, while demonst...
Background of the Study
The Nnamdi Azikiwe University Alumni Association has been in existence for a number of years but has not been able to become a viable entity. The association's goal is to provide a professional network for the graduates of the Nnamdi Azikiwe...
ABSTRACT
Library management, its operation has never been easy to run effectively manually, lending of books, records of returned books, books in the library, its shift and many more. This research work will dwell more on developing and implementing a comprehensive libr...
ABSTRACT
The paper examined the design and implementation of a two-factor authentication login system using OTP with SMS. The quest for the application of tighter security measures to web, desktop and mobile applications developed has been a major concern to a lot of pe...
ABSTRACT
The necessity of a low cost electronic home security system designed in co-ordination with other security measures is always there in our society to reduce the risk of home intrusion. Keeping this problem in mind, we are working on a project on automatic passwo...
ABSTRACT
This research provides a conceptual discourse into the challenges of cybercrimes and the modes of curbing it. The modern society today faces with the greatest achievements of technical and technological development, associated by rapid expansion of information technology and au...
ABSTRACT
Buildings are manmade structures that are primarily meant for shelter. They are designed in different sizes, shapes, forms and functions. Some buildings have only one function and some have multiple functions such as residential and commercial purposes. These types of building...
ABSTRACT
This study investigated the cloud computing technology application and offline database provision as correlate of effective service delivery in three federal university libraries in northwest Nigeria. The study adopted descriptive survey research design with a population of 177...
ABSTRACT
Security and safety are important factors to be considered in every design. This has in recent times become an issue of concern especially in Northern Nigeria. This research sought to assess the effectiveness of the security measures employed in hotel designs by identifying ava...
ABSTRACT
The effect of rainfall in our society today is stupendous. Rainfall is seen as a benefit to crops and lives. Accurate and timely rainfall prediction can be very helpful for effective security measures for planning water resources management, transportation activities, agricultu...
ABSTRACT
The purpose of this study was to assess the knowledge and attitude of teachers towards safety and security of secondary school students in Northern states of Nigeria. An ex-post facto research design was used to study 384 subjects drawn from six states of Northern Nigeria. A mu...
BACKGROUND OF THE STUDY
The rising violence against young people encompasses all forms of violence and affects persons aged 0 to 18. Child maltreatment (i.e. sexual and emotional abuse, neglect, or physical assault) is the most common form of violence between parents or other authority...
Background of the study
Regional security groups have become increasingly significant in addressing the complex security challenges faced by various regions worldwide. In the context of Maiduguri, Borno State, Nigeria, the role of such groups has been p...
Background of the study
Cryptography has a long and intricate history that intertwines with the development of number theory. From the ancient ciphers of Julius Caesar to the complex algorithms used in modern-day encryption, the evolution of cryptograph...
Abstract
This study examines the impact of cybersecurity risks on financial reporting integrity in Ogun State, Nigeria. The objectives are to: (1) identify common cybersecurity threats to financial data, (2) assess the impact of these threats on financi...
Abstract:
This study examines the financial reporting challenges faced in the digital economy in Lagos State, Nigeria. The objectives are to: (1) identify key challenges in financial reporting within the digital economy, (2) assess the impact of these c...
Abstract: THE CHALLENGES ASSOCIATED WITH COST MANAGEMENT IN THE DIGITAL ECONOMY
This study explores the challenges associated with cost management in the digital economy, focusing on tech companies in Lagos. The objectives are to identify the key cost management challenges, evaluate the...
Background of the Study
Insecurity has become a pervasive issue affecting various sectors globally, with agriculture being particularly vulnerable. The relationship between insecurity and food production is complex, involving direct and indirect consequ...
THE ROLE OF TECHNOLOGY ADOPTION AND ITS IMPACT ON PUBLIC ACCOUNTING SERVICES
This research investigates the role of technology adoption and its impact on public accounting services. The objectives are to identify the key technologies adopted by public accounting firms, to evaluate the i...
ABSTRACT: THE EFFECT OF DATA ANALYTICS ON PUBLIC ACCOUNTING PRACTICES
The objectives of this study are to: 1) Investigate how data analytics tools are transforming public accounting practices, 2) Determine the benefits and challenges associated with integrating data analytics into accou...
THE EFFECT OF DIGITALIZATION ON FIDUCIARY ACCOUNTING SERVICES
This research aims to (1) analyze the impact of digital tools on the efficiency of fiduciary accounting services, (2) assess the challenges faced during digital transformation, and (3) evaluate the overall be...
TECHNOLOGY-ENABLED COMPLIANCE SOLUTIONS FOR FIDUCIARY ACCOUNTANTS
Abstract: Technology-enabled compliance solutions are revolutionizing the way fiduciary accountants manage regulatory requirements, ensuring greater accuracy and efficiency. This study aims to (1) investigate the effectiv...
THE EFFECT OF DIGITAL TRANSFORMATION ON GOVERNMENTAL ACCOUNTING: This study aims to (i) assess the impact of digital transformation on governmental accounting practices, (ii) identify the challenges and opportunities presented by digital technologies, and (iii) propose strategies for successful d...
Abstract: THE EFFECT OF DIGITALIZATION ON FUND ACCOUNTING PROCESSES
The primary objectives of this study are to: (1) evaluate how digitalization has transformed fund accounting processes; (2) assess the impact of digital tools on the accuracy and efficiency of financial reporting; and (...
ABSTRACT
This study investigates THE IMPACT OF FUND ACCOUNTING FOR CRYPTOCURRENCY AND DIGITAL ASSETS, focusing on the adaptation of traditional accounting methods, the challenges of valuation and reporting, and the implications for regulatory compliance. A survey design...
THE INFLUENCE OF CLOUD COMPUTING ON INFORMATION SYSTEMS
Abstract: This study aimed to investigate the influence of cloud computing on information systems within organizations. The objectives were to analyze how cloud computing enhances scalability...
THE IMPACT OF CYBERSECURITY ON INFORMATION SYSTEMS
Abstract: This study aimed to assess the impact of cybersecurity on information systems within organizations. The objectives were to examine how cybersecurity measures protect data integrity, ensu...
Abstract: This study aimed to explore the role of information systems in healthcare management within organizations. The objectives were to investigate how information systems improve patient care delivery, enhance clinical decision-making, and streamline healthcare operations. A survey research...
Abstract: THE INFLUENCE OF BIG DATA ON BUSINESS ANALYTICS
This study investigates the influence of big data on enhancing the effectiveness and capabilities of business analytics within organizations. The objectives include examining how big data t...
ABSTRACT: Promoting cybersecurity awareness through vocational education programs is crucial for preparing a workforce capable of addressing modern security challenges. This study aimed to evaluate the effectiveness of vocational education programs in enhancing cybersecurity awareness, ident...
THE ROLE OF CLOUD COMPUTING IN DIGITAL TRANSFORMATION
The study aims to: (1) investigate the role of cloud computing in facilitating digital transformation, (2) identify the benefits and challenges of cloud adoption, and (3) evaluate the impact of cloud computing on business agility and...
THE ROLE OF CYBERSECURITY IN DIGITAL TRANSFORMATION
The study aims to: (1) investigate the role of cybersecurity in facilitating digital transformation, (2) identify key cybersecurity measures that protect digital assets, and (3) evaluate the impact of cybersecurity on digital trust and...
SECURITY CHALLENGES AND PROTEST MANAGEMENT IN NIGERIAN URBAN CENTERS (A CASE STUDY OF ENDBADGOVERNANCE PROTEST IN NIGERIA)
Chapter One: Introduction
1.1 Background of the Study
Protests, while a critical component of democratic expression, often pose significant secu...