Search results for: Essang Anwana Onuntuei
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2

Search results for: Essang Anwana Onuntuei

2 EMPIRICAL ASSESSMENT OF THE ROLE OF INFORMATION COMMUNICATION, TELE DENSITY, NETWORK PROVIDERS AND SUBSCRIPTION, AND CONSUMER COMPLAINTS ON THE GROSS DOMESTIC PRODUCT IN NIGERIA AND ACROSS THE GLOBE: PROBLEMS AND PROSPECTS

Authors: Essang Anwana Onuntuei, Chinyere Blessing Azunwoke

Abstract:

The study used secondary data from foreign and local organizations to explore major challenges and opportunities abound in Information Communication. The study aimed at exploring the tie between tele density (network coverage area) and the number of network subscriptions, probing if the degree of consumer complaints varies significantly among network providers, and assessing if network subscriptions do significantly influence the sector’s GDP contribution. Methods used for data analysis include Pearson product-moment correlation and regression analysis, and the Analysis of Variance (ANOVA) as well. At a two-tailed test of 0.05 confidence level, the results of findings established about 85.6% of network subscriptions were explained by tele density (network coverage area), and the number of network subscriptions; Consumer Complaints’ degree varied significantly among network providers as 80.158291 (F calculated) > 3.490295 (F critical) with very high confidence associated p-value = 0.000000 which is < 0.05; and finally, 65% of the nation’s GDP was explained by network subscription to show a high association.

Keywords: Tele density, Subscription, Network coverage, Information communication, Consumer

Procedia PDF Downloads 1
1 EMPIRICAL ANALYSIS OF A GLOBAL IMPACT OF CONSUMER PRIVACY AND PROTECTION LAWS, ELECTRONIC TRANSACTION LAWS, PRIVACY AND DATA PROTECTION LAWS, AND CYBERCRIME LEGISLATION ON CYBER ATTACKS AND MALWARE TYPES: PROBLEMS AND PROSPECTS

Authors: Essang Anwana Onuntuei, Chinyere Blessing Azunwoke

Abstract:

The study aimed to probe how well cyber law operates worldwide, and then draw a logical conclusion on Nigeria’s experience using a deductive reasoning approach. With a purposive or structured sampling technique, seventy-eight countries (thirteen countries each from six continents of the world) were selected as sample size. The methods used for analysing the data include the Analysis of Variance (ANOVA), Pearson product-moment correlation and regression analysis, and multiple regression analysis methods respectively. At a two-tailed test of 0.05 confidence level, the results of findings established that about 23.74 (F calculated) which is > 2.23 (F critical) claimed the total cyber-attacks and malware types vary significantly. Also, at a two-tailed confidence level test of 0.05, 0.75 (F calculated) is < 1.7 (F critical), and the P-value = 0.73 to establish significantly that cybercrime legislation does not vary statistically. More so, the calculated value (tcalculated) = 7.305 is < table value (tcritical) = 12.05 at a two-tailed test of 0.05 to imply that electronic transactions law does not statistically impact the total number of cyber-attacks. The result also proved that Consumer Privacy and Protection law does not statistically impact the total number of cyber-attacks as the calculated value (tcalculated) = 6.21 < table value (tcritical) = 20.82 at a two-tailed test of 0.05. In addition, the calculated value (tcalculated) = 7.97 < table value (tcritical) = 14.76 at a two-tailed test of 0.05 implied that Privacy and Data Protection law does not statistically impact the total number of cyber-attacks worldwide. The calculated value (tcalculated) = 5.75 < table value (tcritical) = 12.65 at a two-tailed test of 0.05 to prove that cybercrime law does not statistically impact the total number of cyber-attacks. Finally, the calculated value (tcalculated) = 6.21 < table value (tcritical) = 20.82 at a two-tailed test of 0.05 concludes that combined multiple cyber laws do not significantly impact the total number of cyber-attacks worldwide. Recommendations were made based on the results of findings from the study.

Keywords: Cybercrime Legislation, Cyber Attacks, Consumer Privacy and Protection Law, Detection, Electronic Transaction Law, Prevention, Privacy and Data Protection Law, Prohibition, Prosecution

Procedia PDF Downloads 1