ISSN (Print): 2374-1953

ISSN (Online): 2374-1988

Editor-in-Chief: Sergii Kavun

Website: http://www.sciepub.com/journal/AJIS

   

Article

Gender and Age Comparison of Information Communication and Technology Usage among Ghanaian Higher Education Students

1Information Technology Department, Methodist University College, Accra Ghana

2Information Technology Department, University of Professional Studies Accra, Ghana


American Journal of Information Systems. 2016, 4(1), 1-6
doi: 10.12691/ajis-4-1-1
Copyright © 2016 Science and Education Publishing

Cite this paper:
Samuel NiiBoi Attuquayefio, Hillar Addo. Gender and Age Comparison of Information Communication and Technology Usage among Ghanaian Higher Education Students. American Journal of Information Systems. 2016; 4(1):1-6. doi: 10.12691/ajis-4-1-1.

Correspondence to: Samuel  NiiBoi Attuquayefio, Information Technology Department, Methodist University College, Accra Ghana. Email: samuel_attuquayefio@yahoo.com

Abstract

The paper attempts to explore gender and age differences in intention to use ICT and ICT usage, by students of higher educational institutions in Ghana. Cross-sectional survey designed was employed for the data collection. The study was carried on 950 Ghanaian higher educational students. We use the t-test statistics to investigate the difference among groups. There was no difference in intention to use ICT between male and female student. However, there were significance differences in the use of ICT among gender, male students actually use the ICT for learning and research more than their female counterpart. There were mixed results in the use of ICT between the young and the old students, however, there was no significant difference in the use of ICT for learning and research. Promoters of ICT usage in higher education must institute measures that could bridge the gap between male and female ICT use behaviour. Self confidence building programs must be organized for the female student so that can comfortably communicate with their peers and lecturers.

Keywords

References

[1]  Al-Zahrani, S., “An information management system model for the industrial incidents in Saudi Arabia: a conceptual framework based on SDLC methodology”. Journal of computer science 2(5): 447-454, 2006.
 
[2]  Bennett, S. J., Maton, K. A. & Kervin, L. K.., “The 'digital natives' debate: a critical review of the evidence”, British Journal of Educational Technology, 39 (5), 775-786, 2008.
 
[3]  Busari, A. O. “Identifying Difference in Perceptions of Academic Stress and Reaction to Stressors Based on Gender among First Year University Students” , International Journal of Humanities and Social Science Vol. 2 No. 14, 2012.
 
[4]  Glenda G, Sonia M, Dwayne D, Philmore A. and Peter G. A., Perceptions of information and communication technology among undergraduate management students in Barbados”, International Journal of Education and Development Using ICT, Vol 2, No 4 ,2006
 
[5]  Inoue, Y., University students’ perceptions of computer technology experiences. Paper presented at the AERA Annual Meeting, April 9-13, 2007, Chicago
 
Show More References
[6]  Khalid Mahmood, Gender, subject and degree differences in university students’ access, use and attitudes toward information and communication technology (ICT)”, International Journal of Education and Development using Information and Communication Technology(IJEDICT), , Vol. 5, Issue 3, pp. 206-216, 2009.
 
[7]  Kripanont N. “Examining a Technology Acceptance Model of Internet Usage by Academics within Thai Business Schools”, Tesis Ph.D, Victoria University Melbourne, Australia.2007.
 
[8]  Kubiatko,M,, Halakova, Z., “Slovak high school students' attitudes to ICT using in biology lesson”. Computers in Human Behaviour, 25(3), 743-748, 2009.
 
[9]  Owusu-Ansah, S, “Application Of Information And Communication Technology (Ict): A Comparative Analysis Of Male And Female Academics In Africa”, Library Philosophy and Practice (journal).Paper 108 ; http://digitalcommons.unl.edu/libphilprac/1087, 2013.
 
[10]  Neil S. (2008), “An investigation of differences in undergraduates' academic use of the internet”. In: Active Learning in Higher Education, 1, pp. 11-22, 9, 2008.
 
[11]  Simin Z., Exploring the Gender Effect on EFL Learners’ Learning Strategies, Theory and Practice in Language Studies, Vol. 2, No. 8, pp. 1614-1620, 2012
 
[12]  Neuman, W. L, Social Research Methods: Qualitative and Quantitative Approaches, (4th ed). Boston: Allyn & Bacon, 2000
 
[13]  Pallant, J., SPSS survival manual: a step by step guide to data analysis using SPSS for windows (Version 12). 2nd ed. Maidenhead: Open University Press, 2005.
 
[14]  Venkatesh, V., & Morris, M. G. “Why don't men ever stop to ask for directions? Gender, social influence, and their role in technology acceptance and usage behavior”, MIS Quarterly, 24 (1), 115-139, 2000.
 
Show Less References

Article

Cloud Computing Adoption in the Higher Education (Sudan as a model): A SWOT Analysis

1Department of Information System, AL Baha University, AL Baha City, Saudi Arabia

2Department of Computer Science, AL Baha University, AL Baha City, Saudi Arabia


American Journal of Information Systems. 2016, 4(1), 7-10
doi: 10.12691/ajis-4-1-2
Copyright © 2016 Science and Education Publishing

Cite this paper:
Mohmed Sirelkhtem Adrees, Majzoob K.Omer, Osama E. Sheta. Cloud Computing Adoption in the Higher Education (Sudan as a model): A SWOT Analysis. American Journal of Information Systems. 2016; 4(1):7-10. doi: 10.12691/ajis-4-1-2.

Correspondence to: Mohmed  Sirelkhtem Adrees, Department of Information System, AL Baha University, AL Baha City, Saudi Arabia. Email: mkomer@bu.edu.sa

Abstract

The use of cloud computing technology in higher education in the least developed countries represents a real opportunity for those countries. This study aims to perform SWOT analysis to determine the impact of the cloud computing implementation such as Strengths, Weaknesses, Opportunities and Threats (SWOT) in higher education institutions of the least developed countries, Republic of Sudan as model, and that from the perspective of Directors, Teachers and Students, to find the effect of strengths, weaknesses, opportunities and threats when using cloud computing technology in higher education. The study revealed positive results, because of the advantages offered by such as the flexibility and efficiency, and the ability to acquiring knowledge. There were drawbacks in the implementation of cloud computing such as privacy and security issues, and give this paper solutions to benefit from the opportunities, and to overcome the threats mentioned.

Keywords

References

[1]  ENISA, Cloud computing: benefits, risks and recommendations for information security, 2009.
 
[2]  http://www.nationsonline.org/oneworld/least_developed_countries.htm.
 
[3]  http://www.investopedia.com/terms/s/swot.asp.
 
[4]  Mohmed, s ,Adrees & Majzoob, K, Omer & Osama E. Sheta (2015) Cloud Computing Architecture for Higher Education in the Third World Countries (Republic of The Sudan as Model) ( IJDMS ) Vol.7, No.3, June 2015
 
[5]  Ghaffari, K., Delgosha, M. S., & Abdolvand, N. (2014). Towards Cloud Computing: A SWOT Analysis on its Adoption in SMEs. arXiv preprint arXiv:1405.1932.
 
Show More References
[6]  Masrom, M., & Rahimli, A. (2015). Cloud Computing Adoption in the Healthcare Sector: A SWOT Analysis. Asian Social Science, 11(10), p12.‏
 
[7]  Valkanos, E., Anastasiou, A., & Androutsou, D. (2009). The importance of SWOT Analysis for educational units that belong to the field of Vocational Education and Training: The case of the State Institute (IEK) of Epanomi in Thessaloniki, Greece1.‏
 
[8]  Ibe-Ariwa, K. C., & Ariwa, E. Green Technology Sustainability and Deployment of Cloud Computing in Higher Education.‏
 
[9]  Asiimwe, E. N., & Khan, S. Z. (2013). Ubiquitous Computing in Education: A SWOT Analysis by Students and Teachers. In 12th World Conference on Mobile and Contextual Learning (mLearn 2013), 18.
 
[10]  Omer, M. K. A., Adrees, M. S., & Sheta, O. E. Alternative Central Mobile Application Strategy to Deaf and Dumb Education in Third World Countries.
 
Show Less References

Article

Cloud Computing Adoption in Insurance Companies in Kenya

1School of Computing and Informatics University of Nairobi, Kenya


American Journal of Information Systems. 2016, 4(1), 11-16
doi: 10.12691/ajis-4-1-3
Copyright © 2016 Science and Education Publishing

Cite this paper:
Pastor Meshack Akhusama, Christopher Moturi. Cloud Computing Adoption in Insurance Companies in Kenya. American Journal of Information Systems. 2016; 4(1):11-16. doi: 10.12691/ajis-4-1-3.

Correspondence to: Pastor  Meshack Akhusama, School of Computing and Informatics University of Nairobi, Kenya. Email: makhusama@gmail.com

Abstract

Cloud Computing allows companies to access ICT-based services i.e. computer infrastructure, applications, platforms and business processes, via the internet. Cloud Computing is still at the infancy stage in Africa. Studies have indicated a lack of cloud based awareness, even among big organizations in Africa. Kenya just like any other African market is yet to fully adopt cloud based systems due to trust and security concerns. This study aimed at identifying the extent and characteristics of Cloud Computing adoption in insurance companies in Kenya. The study assessed Cloud Computing uses in terms of productivity applications, business applications (CRM, SaaS), infrastructure on-demand (storage, network, and server), finance applications, core business application, databases and desktop. The adoption of the Cloud Computing services in insurance companies was relatively low. The results obtained would assist in providing a roadmap for the best practices to improve Cloud Computing services in the insurance industry in Kenya.

Keywords

References

[1]  Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A., ... & Zaharia, M. (2010). A view of cloud computing. Communications of the ACM, 53(4), 50-58.
 
[2]  Buyya, R. (2009). Market-Oriented Cloud Computing: Vision, Hype, and Reality of Delivering Computing as the 5th Utility. CCGRID '09 Proceedings of the 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid , 3622-3624.
 
[3]  Foster, I., Zhao, Y., Raicu, I., & Lu, S. (2008, November). Cloud computing and grid computing 360-degree compared. In Grid Computing Environments Workshop, 2008. GCE'08 (pp. 1-10). IEEE.
 
[4]  Khajeh-Hosseini, A., Greenwood, D., & Sommerville, I. (2010). Cloud migration: A case study of migrating an enterprise it system to iaas. In Cloud Computing (CLOUD), 2010 IEEE 3rd International Conference on (pp. 450-457). IEEE.
 
[5]  Kim, W., Kim, S. D., Lee, E., & Lee, S. (2009). Adoption issues for cloud computing. In Proceedings of the 7th International Conference on Advances in Mobile Computing and Multimedia (2-5). ACM.
 
Show More References
[6]  Kshetri, N. (2010). Cloud computing in developing economies. ieee Computer, 43(10), 47-55.
 
[7]  Mather, T., Kumaraswamy, S., & Latif, S. (2009). Cloud security and privacy: an enterprise perspective on risks and compliance. O'Reilly Media, Inc.
 
[8]  Omwansa, T. K., Waema, T. M., & Omwenga, M. B (2014). Cloud Computing in Kenya A 2013 Baseline Survey.
 
[9]  Wambu, C. W., & Irungu, D. N. (2014). Does Adoption of Information Technology Improve Firm Performance? A Survey of Firms Listed in the Nairobi Securities Exchange. Journal of Economics and Sustainable Development, 5(23), 112-117.
 
[10]  Winkler, V. (2011). Securing the Cloud: Cloud Computer Security Techniques and Tactics . New York: Syngress.
 
Show Less References