This chapter discusses cybercrime and cybercrime regulation in the Nigeria. It gives the meaning to cybercrime, types of cybercrimes (of which advance fee fraud is the most prevalent in Nigeria), means of perpetrating cybercrimes, the current situation and efforts towards combating cybercrime in Nigeria.
The paper provides an overview of some elements that are necessary for ensuring hardware and software interoperability in library and information systems. It specifically proffers meaning to the term system interoperability and identified the need for interoperability alongside some globally accepted standards and mechanisms that will guarantee system interoperability. Based on this, the paper examined library automation standards such as DCMES, MARC-21, OAI-PMH and Z39.50 standards. Bottlenecks in ensuring operability through standardization were highlighted, the way forward in achieving interoperability among libraries in a library system were also itemized and recommendations were put forward.
The purpose of this chapter is to provide an overview of password policy. It specifically identifies some basic elements of password policy, password and password policy life cycles, essence of password policy within an organization, password policy usability considerations, implementation/enforcement of password policies within organizations, the importance of access control in relation to password policy and computer security, and future trends in password policy are set forth. Generally, the absence of a password policy leaves a large void in any organization‘s ability to operate effectively and maintain business continuity, and allows for ad-hoc decisions to be made by unauthorized personnel.
The objective of this chapter is to give an insight to virus, virus infection, and prevention in cybercafés. Specifically, it gives the meaning of virus, types of viruses, classification of viruses, sources of viruses in cybercafés, why cybercafé systems are vulnerable to attacks or infections, how to detect virus infections or symptoms of virus infection in cybercafé systems or networks, virus prevention and control, and future trends. It is argued that with the advent of WiFi technologies, virus writers can launch their dubious malcode from just about anywhere in the world, and as such there exist a form of cyber-terrorism that cannot be easily stopped.
This chapter discusses organizational software use policies. Specifically it gives the meaning of software use policy, software use policy components bothering on; general statement of policy, user education, budgeting and acquisition of software, registration, installation, storage and documentation of software, record keeping, software use, internet and shareware use, software audit and use survey, employee/user duty to report underlicensing, disciplinary measures on defaulters, corporate handling of employee questions regarding an organization’s software, need for software use policy in an organization, organizational software use policy formulation process, qualities of a software use policy, policy education and enforcement, problems of software use policy as well as future trends in organizational software use policy.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.