Nowadays, the application or acceptance of mobile learning in teaching and conducting research and other academic activities have been successful in developed and some developing countries of the world and have proven to be more efficient than the customary learning systems. Most of students and academia in these developed nations have embraced mobile technology because of its simplicity, flexibility and also provide opportunity for students and academia to collaborate with one another irrespective of their geographical location for research purposes. Few literatures suggest that the level of technology acceptance in the country is still very low compared to other parts of European and some Asian countries. However, findings of the quantitative analysis and collected works have also shown that students and academia hesitant to embrace mobile computing technology is one of the most significant factors that affect the level of mobile learning in most African countries. Keywords: Mobile learning, digital natives, autodidact, e-learning.
Cloud-Based Data Management Security Models 1. Introduction Cloud Computing (CC), as an emerging technology of the next generation of computing has become extremely popular and has received significant interest from big data users. Cloud Computing evolved from other technologies like distributed computing, grid computing, virtualization, etc., and supports the theme of one application and many users. This was brought about due to rapid development of processing and storage intensive technologies. And with the success of the Internet, computing resources have become cheaper, more powerful and more ubiquitously available than ever before [1]. These resources: CPU and storage are provided as general utilities that can be leased and released by users through the Internet in an on-demand fashion. The emergence of cloud computing has made a tremendous impact on the Information Technology (IT) industry over the past few years, where large companies such as Google, Amazon and Microsoft strive to provide more powerful, reliable and cost-efficient cloud platforms, such that sectors and industries seek to reshape their business models to gain benefit from this new paradigm. Indeed, cloud computing provides several compelling features that make it attractive to sectors, industries and Governments. The main usage of cloud computing is data storage and computing [2].Governments, Industries and organizations are outsourcing their private and confidential data over the cloud which makes the Cloud users, and the data vulnerable to cyber threats [3][4][5]. The nature of cloud computing raises serious security issues regarding user Authentication, data/information Availability, integrity and confidentiality (AAIC), while transferring, storing and accessing the data from and to data centers with efficient performances issues [6][7] [8]. Most of the prevailing Cloud security uses Cryptographic encryption schemes [9][6]. The schemes are tightly coupled to the host-based Internet architecture that requires users to interact with numerous servers for authentication, license acquisition and retrieval of the protected content [7]. However, Organizations across industries are seekingmore effective ways to protect their data, infrastructure, people and reputations [10], in order to have full control of their own data [7][12], and restrict the Cloud providers/third party from sharing, updating, and querying a dataset [13]. In order to implement a system that optimizes the organizational security and privacy, the techniques needs to optimize speed and resistivity coupled with high level of performance [14] [15]. [9]Opines the need for a solution between user applications and database servers in the cloud initiated by the Organization to secure its Accessibility and data with guarantees they remain under Administrative control and are never exposed in storage or in transit.
A large number of connected smart objects and sensors, as well as the establishment of seamless data exchange between them, have been made possible by the Internet of Things (IoT) technology's recent rapid development. As a result, there is a high demand for platforms for data analysis and data storage, such as cloud computing and fog computing. IoT makes it possible to customize apps for older persons as well as for rapidly expanding markets that must modify their products to match the preferences of their customers. This study suggests a framework for a decision-support system and a protected health monitoring system using IoT data collected from senior residents' homes. The study intends to provide security to the users’ data from the point of acquiring of the data to the relaying of the data to cloud and to the alert generation using blockchain technology. Further research should focus on key management and security, as well as the capability to easily replace lost or compromised keys.
Nigeria has long recognized the significance of university–industry linkage (UIL) not only as a critical driver in promoting the country’s science, technology and innovation agenda (STI) but also as a determinant of its global competitiveness in terms of economic development. Experts have reasoned that universities in Nigeria can serve as catalysts by performing their primary function of teaching and carrying out basic and applied research as well as conducting community services. This goal can be effectively achieved if the partnership is being facilitated by a robust enabling policy environment (EPE). It is in light of this that this study was conducted to assess the effect of UIL on innovative behaviour of universities, mediated by EPE within the context of national STI system of Nigeria. The study was built on the theoretical basis of the Triple Helix framework. A cross-sectional survey was conducted on Nigerian universities’ senior academics and officers, spreading across six geopolitical zones, serving as clusters for data collection. Composite index approach was used to determine the level of association and causality while Andrew F. Hayes’s process was used to measure the mediation effects among the study variables. The results show the existence of a positive correlation among the variables as well as that of causality and mediation. Policy-makers should encourage collaborations among players from both streams by providing an enabling environment that would foster innovation, transfer and the commercialization of knowledge.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.