关注
Olumide Longe
Olumide Longe
American University of Nigeria - Fulbright Fellow & Research Scholar, Southern University, Baton
在 fulbrightmail.org 的电子邮件经过验证
标题
引用次数
引用次数
年份
Sakawa-cybercrime and criminality in Ghana
R Boateng, L Olumide, RS Isabalija, J Budu
Journal of Information Technology Impact 11 (2), 85-100, 2011
1092011
CYBER CRIME AND CRIMINALITY IN NIGERIA: WHAT ROLES ARE INTERNET ACCESS POINTS IN PLAYING?
OB Longe, SC Chiemeke
EUROPEAN JOURNAL OF SOCIAL SCIENCES 6 (4), 132-139, 2008
1082008
Research outputs from Nigerian tertiary institutions: an empirical appraisal
S Chiemeke, OB Longe, FA Longe, IO Shaib
Library Philosophy and Practice, 1, 2009
912009
Criminal uses of information & communication technologies in sub-Saharan Africa: trends, concerns and perspectives
O Longe, O Ngwa, F Wada, V Mbarika, L Kvasny
Journal of Information Technology Impact 9 (3), 155-172, 2009
892009
Users' perceptions of the use of academic libraries and online facilities for research purposes in Nigeria
S Chiemeke, OB Longe, SS Umar, IO Shaib
Library Philosophy and Practice 9 (2), 1-13, 2007
592007
Exposure of children and teenagers to internet pornography in South Western Nigeria: Concerns, trends & implications
OB Longe, SC Chiemeke, OFW Onifade, FM Balogun, FA Longe, VU Otti
Journal of information technology impact 7 (3), 195-212, 2007
572007
Preliminary insights into the influence of mobile phones in micro-trading activities of market women in Nigeria
R Boateng, R Hinson, R Galadima, L Olumide
Information Development 30 (1), 32-50, 2014
532014
Information and communication technology penetration in Nigeria: Prospects, challenges and metrics
SC Chiemeke, OB Longe
Asian Journal of Information Technology 6 (3), 280-287, 2007
432007
Seeing beyond the surface, understanding and tracking fraudulent cyber activities
OB Longe, V Mbarika, M Kourouma, F Wada, R Isabalija
arXiv preprint arXiv:1001.1993, 2010
392010
An empirical test of the space transition theory of cyber criminality: The case of Ghana and beyond
P Danquah, OB Longe
African Journal of Computing & ICTs 4 (2), 37-48, 2011
322011
Action speaks louder than words-understanding cyber criminal behavior using criminological theories
F Wada, O Longe, P Danquah
Journal of internet banking and commerce 17 (1), 1-12, 2012
312012
Cyber deception and theft: An ethnographic study on cyber criminality from a Ghanaian perspective
P Danquah, OB Longe
Journal of Information Technology Impact 11 (3), 169-182, 2011
312011
The nigerian web content: Combating pornography using content filters
OB Longe, FA Longe
Journal of Information Technology Impact 5 (2), 59-64, 2005
282005
Checking Internet masquerading using multiple CAPTCHA challenge-response systems
OB Longe, ABC Robert, U Onwudebelu
2009 2nd International Conference on Adaptive Science & Technology (ICAST …, 2009
252009
On the origins of advance fee fraud electronic mails: A technical investigation using Internet protocol address tracers
O Longe, A Osofisan
The African Journal of Information Systems 3 (1), 2, 2011
212011
„Information & communication technology adoption among adults in south western Nigeria: an assessment of usage-phobia factors‟
O Longe, R Boateng, F Longe, K Olatubosun
Journal of Information Technology Impact 10 (1), 65-86, 2010
172010
A Sobel edge detection algorithm based system for analyzing and classifying image-based spam
N Woods, O Longe, A Roberts
Journal of Emerging Trends in Computing and Information Sciences 3 (4), 506-511, 2012
162012
Mathematical modelling of the spatial distribution of a COVID-19 outbreak with vaccination using diffusion equation
B Kammegne, K Oshinubi, O Babasola, OJ Peter, OB Longe, ...
Pathogens 12 (1), 88, 2023
152023
An ensemble learning approach for software defect prediction in developing quality software product
YK Saheed, O Longe, UA Baba, S Rakshit, NR Vajjhala
Advances in Computing and Data Sciences: 5th International Conference …, 2021
152021
Comparative stochastic study for credit-card fraud detection models
AA Ojugo, D Allenotor, DA Oyemade, O Longe, CN Anujeonye
African J. of Computing and ICT 8 (1-2), 2015
152015
系统目前无法执行此操作,请稍后再试。
文章 1–20