Oluwasegun Olaniyan

Learn More
Following the wave of democratization during the 1990s, elections are now common in low-income societies. However, these elections are frequently flawed. We investigate the Nigerian general election of 2007, which is to date the largest election held in Africa and one seriously marred by violence. We designed and conducted a nationwide field experiment(More)
Political accountability and participation are taken as key ingredients for development. In this context voter education and informational campaigns are becoming popular with donors. We followed a large-scale randomized campaign against electoral violence sponsored by an international NGO during the 2007 Nigerian elections. Substantial direct effects on(More)
Over the years, several security measures have been employed to combat the menace of insecurity of lives and property. This is done by preventing unauthorized entrance into buildings through entrance doors using conventional and electronic locks, discrete access code, and biometric methods such as the finger prints, thumb prints, the iris and facial(More)
In this study, we evaluated the association between high-risk human papillomavirus (hrHPV) and the vaginal microbiome. Participants were recruited in Nigeria between April and August 2012. Vaginal bacterial composition was characterized by deep sequencing of barcoded 16S rRNA gene fragments (V4) on Illumina MiSeq and HPV was identified using the Roche(More)
Electioneering processes, particularly in the developing world has been marred by electoral frauds such as ballot snatching, multiple voting and other vices. The situation is compounded by the use of paper-based voter registration and voting systems. Although, there are already tendencies towards the adoption of electronic voting in some developing(More)
The human factor is often described as the weakest part of a security system and users are often identified to be the weakest link in the security chain. Likewise, authentication is a cornerstone of most security systems today, and most users interact with these mechanisms on a daily basis. Usability of the authentication mechanisms has seldom been(More)
  • 1