Claim Missing Document
Check
Articles

Found 4 Documents
Search

Improved services traceability and management of a food value chain using block-chain network: a case of Nigeria Maureen Ifeanyi Akazue; Rume Elizabeth Yoro; Bridget Ogheneovo Malasowe; Obinna Nwankwo; Arnold Arnold Ojugo
Indonesian Journal of Electrical Engineering and Computer Science Vol 29, No 3: March 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v29.i3.pp1623-1633

Abstract

Competitive asset markets and increased globalization have continued to ripple the food value chain with complex dynamics, which has led to a range of challenges such as food safety and quality, traceability, and overall supply chain inefficiency. These have further continued to endanger the general well-being of society. With rice as a staple food in Nigeria, the rice food supply value chain consists of a series of tasks, processes, and activities that are linked together from freshly harvested products to consumer demand and supply. Study advances the SmartRice, a sensor-based block-chain framework that decentralizes as well as provides a decision-support for the food supply value chain process by first ensuring that accurate data of harvested goods are reported, and passed on to a chain. The study advances a decentralized framework to eliminate various forms of fraud rippled across the existing centralized system, minimize corruption through its sensor-based layered model as well as minimize the error in reported data along the value chain.
Empirical evidence of phishing menace among undergraduate smartphone users in selected universities in Nigeria Maureen Ifeanyi Akazue; Arnold Adimabua Ojugo; Rume Elizabeth Yoro; Bridget Ogheneovo Malasowe; Obinna Nwankwo
Indonesian Journal of Electrical Engineering and Computer Science Vol 28, No 3: December 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v28.i3.pp1756-1765

Abstract

In our exploratory quasi-experimental study, 480-student were recruited and exposed to social engineering directives during a university orientation week. The directives phishing attacks were performed for 10 months in 2021. The contents attempted to elicit personal user-data from participants, enticing them to click compromised links. The study aimed to determine cybercrime risks among undergraduates in selected universities in Nigeria, observe responses to socially-engineered attacks, and explore their attitudes to cybercrime risks before/after such attacks. The study generalized that all participants have great deal awareness of cybercrime, and also primed all throughout study to remain vigilant to scams. The study explores various types of scam and its influence on students’ gender and age on perceived safety on susceptibility to phishing scams. Results show that contrary to public beliefs, none of these factors were associated with scam susceptibility and vulnerability rates of the participants.
Evidence of personality traits on phishing attack menace among selected university undergraduates in Nigerian Rume Elizabeth Yoro; Fidelis Obukohwo Aghware; Maureen Ifeanyi Akazue; Ayei Egu Ibor; Arnold Adimabua Ojugo
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 2: April 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v13i2.pp1943-1953

Abstract

Access ease, mobility, portability, and improved speed have continued to ease the adoption of computing devices; while, consequently proliferating phishing attacks. These, in turn, have created mixed feelings in increased adoption and nosedived users’ trust level of devices. The study recruited 480-students, who were exposed to socially-engineered attack directives. Attacks were designed to retrieve personal data and entice participants to access compromised links. We sought to determine the risks of cybercrimes among the undergraduates in selected Nigerian universities, observe students’ responses and explore their attitudes before/after each attack. Participants were primed to remain vigilant to all forms of scams as we sought to investigate attacks’ influence on gender, students’ status, and age to perceived safety on susceptibility to phishing. Results show that contrary to public beliefs, age, status, and gender were not among the factors associated with scam susceptibility and vulnerability rates of the participants. However, the study reports decreased user trust levels in the adoption of these new, mobile computing devices.
Forging a User-Trust Memetic Modular Neural Network Card Fraud Detection Ensemble: A Pilot Study Arnold Adimabua Ojugo; Maureen Ifeanyi Akazue; Patrick Ogholuwarami Ejeh; Nwanze Chukwudi Ashioba; Christopher Chukwufunaya Odiakaose; Rita Erhovwo Ako; Frances Uche Emordi
Journal of Computing Theories and Applications Vol 1, No 2 (2023): (in Process)
Publisher : LPPM Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33633/jcta.v1i2.9259

Abstract

The advent of the Internet as an effective means for resource sharing has consequently, led to proliferation of adversaries, with unauthorized access to network resources. Adversaries achieved fraudulent activities via carefully crafted attacks of large magnitude targeted at personal gains and rewards. With the cost of over $1.3Trillion lost globally to financial crimes and the rise in such fraudulent activities vis the use of credit-cards, financial institutions and major stakeholders must begin to explore and exploit better and improved means to secure client data and funds. Banks and financial services must harness the creative mode rendered by machine learning schemes to help effectively manage such fraud attacks and threats. We propose HyGAMoNNE – a hybrid modular genetic algorithm trained neural network ensemble to detect fraud activities. The hybrid, equipped with knowledge to altruistically detect fraud on credit card transactions. Results show that the hybrid effectively differentiates, the benign class attacks/threats from genuine credit card transaction(s) with model accuracy of 92%.