Stella C. Chiemeke

Learn More
The inefficiencies of current spam filters against fraudulent (419) mails is not unrelated to the use by spammers of good-word attacks, topic drifts, parasitic spamming, wrong categorization and recategorization of electronic mails by e-mail clients and of course the fuzzy factors of greed and gullibility on the part of the recipients who responds to(More)
The world of today has undergone a technological revolution that has drastically transformed society. The world is now accessible to every age group. One common application of modern computing among the younger generation is computer games. Although there are some advantages, many researchers have shown that they may be somewhat harmful to the growth and(More)
This study examines the impacts of information culture (individual, institutions, technological and national) on e-learning innovations adoption in Nigeria learning institutions within the context of Technological Acceptance Model s (UTUAT and Delone and McLean IS model). The model’s explanatory power differs across institutions due to the level of(More)
Institutions constantly process accumulated and stored data into information. One of the most desired features of organizational data is that it should possess high quality. Data quality is usually perceived in relation to how it meets user requirements. The implication is that an acceptable level of quality is achieved if the data conforms to a(More)