Internet Access, use and Monitoring Policies in Selected Organisations in Ibadan, Nigeria

Adelowo Oluremi
Adelowo Oluremi
Adeoye Adetola Atinuke
Adeoye Adetola Atinuke
Adelowo Oluremi Titilope
Adelowo Oluremi Titilope
National Open University of Nigeria National Open University of Nigeria

Send Message

To: Author

Internet Access, use and Monitoring Policies in Selected Organisations in Ibadan, Nigeria

Article Fingerprint

ReserarchID

02G4G

Internet Access, use and Monitoring Policies in Selected Organisations in Ibadan, Nigeria Banner

AI TAKEAWAY

Connecting with the Eternal Ground
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu
Font Type
Font Size
Font Size
Bedground

References

77 Cites in Article
  1. H Adams,S Scheuing,S A Feeley (2000). E-mail Monitoring in the Workplace: The Good, the Bad and the Ugly.
  2. A Adebayo (2007). An Investigation of the Use of ICT in the Nigerian Construction Industry.
  3. B Alese,S Owoyemi (2004). Factor Analytic Approach to Internet Usage in South Western Nigeria.
  4. A Ali,D Denga (1989). An introduction to research methods in statistics in education and social sciences.
  5. B Alge (2001). Can corporate security, privacy coexist? Retrieved.
  6. Olusesan Awoleye,Oluwanishola Okogun,Williams Siyanbola (2008). Technological assessment of banking innovation in Nigeria.
  7. (2005). Survey of Internet Access Management in Public 8. Libraries.
  8. Anonymous (2000). E-business or Bust: The Impact of the Internet/Net Effects.
  9. Anonymous (2001). Internet Abuse is on the Increase.
  10. J Bus (1998). The Secret Agents of Fortune.
  11. L Camille (2002). Methods and Extent of Employer Use of Electronic Monitoring and Surveillance, Employee Privacy Law Retrieved.
  12. W Caroll (2007). Electronic Monitoring in the Workplace: A Review and Discussion about Future Trends.
  13. W Cochran (1987). Sampling techniques.
  14. D David,F David,G Marczyk (2005). Essentials of research design and methodology.
  15. R Davies (2001). Cybers lacking: Internet abuse in the workplace.
  16. L Dancaster (2001). Internet Abuse: A Survey of South African Companies.
  17. Per Larsson,Joby Kochumalayil,Lars Wågberg (2005). Oxygen and Water Vapour Barrier Films with Low Moisture Sensitivity Fabricated from Self-Crosslinking Fibrillated Cellulose.
  18. K Detienne,N Abbott (1993). Developing an employee centred electronic monitoring system.
  19. M Elise (1317). Association between competing interests and conclusions.
  20. P Erah,E Dairo (2008). Pharmacy Students Perception of the Application of Learning Management System in Patient-oriented Pharmacy Education: University of Benin Experience.
  21. Professor Steven Furnell (2007). The Sixth International Network Conference (INC 2006).
  22. (2000). Employers Crack Down on Internet Abuse.
  23. Barak Gahtan,Sanketh Vedula,Gil Samuelly Leichtag,Einat Kodesh,Alex Bronstein (2002). From Lab to Wrist: Bridging Metabolic Monitoring and Consumer Wearables for Heart Rate and Oxygen Consumption Modeling.
  24. Mark Griffiths (2000). Does Internet and Computer "Addiction" Exist? Some Case Study Evidence.
  25. Ginni Rometty (2004). Message from the Senior Vice President, Global Business Services.
  26. Masahiko Itoh,Yuzuru Tanaka (2004). Multispace information visualization framework for the intercomparison of data sets retrieved from web services.
  27. P Jason (1997). Banking on computers.
  28. F Lane (2003). The Naked Employee: How Technology Is Compromising Workplace Privacy.
  29. Bill Lehr,Frank Lichtenberg (2000). Information Technology and Its Impact on Productivity: Firm-Level Evidence from Government and Private Data Sources, 1977-1993.
  30. Louis Leung,Ran Wei (1999). The gratifications of pager use: sociability, information-seeking, entertainment, utility, and fashion and status.
  31. Louis Leung,Ran Wei (1999). Who are the Mobile Phone Have-Nots?.
  32. L Leung,R Wei (2000). More than just talk on the move: Uses and gratifications of the cellular phone.
  33. Louis Leung (2001). College Student Motives for Chatting on ICQ.
  34. Louis Leung (2002). Loneliness, Self-Disclosure, and ICQ ("I Seek You") Use.
  35. E Lim,G Vivien (2002). The IT way of loafing on the job: cyberloafing, neutralizing and organizational justice.
  36. Susan Lippert (2004). The Effect of Trust on Personal Web Usage in the Workplace.
  37. P Lyold (1967). The City of Ibadan.
  38. C Marsan (2000). Employee Study Cites Rampant Internet Abuse.
  39. I Madueme (2010). Evaluation of the Impact of Information Communication Technology on Banking Efficiency Using the Transcendental Logarithmic Production function and Camel Rating.
  40. (2000). Author index for volume 31.
  41. Abdullahi Shehu Araga,Eunice Adegbola,Sa’adatu Balarabe Adam,James Tyohen,Keswet Andrew Musa (2005). GOVERNMENT FUNDING INTERVENTION AND SUSTAINABLE OPERATIONS OF MICRO, SMALL AND MEDIUM ENTERPRISES IN NIGERIA.
  42. Williams Nwagwu (2007). The Internet as a source of reproductive health information among adolescent girls in an urban city in Nigeria.
  43. W Olatokun,O Adeboyejo (2009). Information And Communication Technology Use By Reproductive Health Workers In Nigeria: State Of The Art, Issues, and Challenges.
  44. C Omolase,C Ihemedu,T Ogunleye,B Omolase (2010). Use of Internet for Health Information amongst Medical Practitioners in a Nigerian Community.
  45. E Orhuozee (2002). More Promising E-Governance Strides in Nigeria, PC World West Africa.
  46. E Otokhine (2002). Revised Health Reform Bill Moves Forward In Senate.
  47. M Overly (1999). E-Policy: How to Develop Computer, E-mail, and Internet Guidelines to Protect your Company and its Assets.
  48. Zizi Papacharissi,Alan Rubin (2000). Predictors of Internet Use.
  49. E Paul,C Ibrahim (1996). E-Mail: Balancing Corporate Assets and Employee Privacy.
  50. O Peters (2007). Social Psychological Determinants of Mobile Communication Technology Use and Adoption: A Comparison of three Models to Explain and Predict Mobile Communication Technology Behavior.
  51. (2011). Privacy Rights Clearing House web site.
  52. P Raposa,B Mujtaba (2003). HIPAA Privacy Standards take effect in April: What you need to know.
  53. (2004). Annual Index.
  54. L Seltzer (2000). Cutler-Hammer launches powerful new NetSolver PC-based industrial control software.
  55. A Schulman (2000). Privacy Foundation web site.
  56. D Silva (2001). Companies Take Steps to Combat Internet Abuse.
  57. Claire Simmers,Murugan Anandarajan (2004). Convergence or Divergence? Web Usage in the Workplace in Nigeria, Malaysia, and the United States.
  58. M Singh (2004). Managing employee Internet abuse.
  59. Jo Verdin,Anthony Pagano (2002). Current Trends in the Use of Computer Technology by Human Resource Managers.
  60. Sonny (2002). Computer Monitoring: Benefits and Pitfalls Facing Management.
  61. Sr (2000). Snoop at Your Peril.
  62. T Stratopoulos,B Dehning (2000). Does Successful Investment in Information Technology Solve the Productivity Paradox?.
  63. K Sullivan (1996). Teaching norms and publication productivity.
  64. S Swanson (2001). Beware: Employee Monitoring Is On The Rise.
  65. Tron Inglar (2004). Yrkesfaglærere og elever i et globalisert samfunn - deres utvikling og ontologiske sikkerhet.
  66. J Thompson (1994). Here come the giants.
  67. (2007). Internet Use For Business Development: An Introductory Set Of Training Modules For Policymakers.
  68. A Urbaczewski (2000). Monitoring Strategies for Internet Technologies. Personal Web Usage in Workplace: A guide to Effective Human Resources Management.
  69. K Vanscoy (2001). What Is Your Diagnosis?.
  70. N Villeneuve (2008). Breaching Trust: An Analysis of Surveillance and Security Practices on China's TOM-Skype Platform, Information Warfare Monitor/ONI Asia.
  71. P Wallace (2004). The Internet in the Workplace: How new technology is Transforming Work.
  72. Websense (2005). Homepage of Websense Internet filtering company.
  73. L Wei,M Zhang (2008). The Adoption and Use of Mobile Phone in Rural China: A Case Study of Hubei, China.
  74. C Wilder (2001). A Question of Ethics.
  75. Kimberly Young,C Case (2003). Employee Internet Management: Current Business Practices and Outcomes.
  76. Ramayah Yulihasri,J Norzalila,I Amlus (2006). Use and Misuse of the Internet in the Malaysian Workplace: Preliminary Findings from an Exploratory Study IAMOT.
  77. E Zuckerman (2010). Intermediary Censorship in Access controlled.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

How to Cite This Article

Adelowo Oluremi. 2015. \u201cInternet Access, use and Monitoring Policies in Selected Organisations in Ibadan, Nigeria\u201d. Global Journal of Management and Business Research - A: Administration & Management GJMBR-A Volume 15 (GJMBR Volume 15 Issue A11).

Download Citation

Journal Specifications

Crossref Journal DOI 10.17406/GJMBR

Print ISSN 0975-5853

e-ISSN 2249-4588

Keywords
Classification
GJMBR-A Classification JEL Code: L29
Version of record

v1.2

Issue date
November 13, 2015

Language
en
Experiance in AR

Explore published articles in an immersive Augmented Reality environment. Our platform converts research papers into interactive 3D books, allowing readers to view and interact with content using AR and VR compatible devices.

Read in 3D

Your published article is automatically converted into a realistic 3D book. Flip through pages and read research papers in a more engaging and interactive format.

Article Matrices
Total Views: 3915
Total Downloads: 1980
2026 Trends
Related Research
Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Internet Access, use and Monitoring Policies in Selected Organisations in Ibadan, Nigeria

Adeoye Adetola Atinuke
Adeoye Adetola Atinuke
Adelowo Oluremi Titilope
Adelowo Oluremi Titilope

Research Journals