dc.contributor.author | Touray, Almamy | |
dc.date.accessioned | 2015-07-24T09:26:40Z | |
dc.date.available | 2015-07-24T09:26:40Z | |
dc.date.issued | 2013 | |
dc.identifier.citation | Touray, A. (2013). Internet abuse by university students: a neglected theme in Africa. <i>International Journal on Information Technologies and Security</i>, <i>5</i>(4), 3-12. | |
dc.identifier.other | CONVID_23189334 | |
dc.identifier.other | TUTKAID_60477 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/46538 | |
dc.description.abstract | The purpose of this paper is to investigate potential Internet
abuse by university students, an area lacking research focus in Africa. A
case study was conducted at the University of The Gambia (UTG) in
2012. A total of 200 questionnaires were randomly administered to UTG
students and 181 valid responses were available for analyses. The result
indicates that about 18% of UTG students use the Internet for unspecified
activities, demonstrating attributes that could reveal potential Internet
abuse. Considering the negative implications of this phenomenon, African
researchers cannot afford to neglect this theme. | fi |
dc.language.iso | eng | |
dc.publisher | Union of Scientists in Bulgaria | |
dc.relation.ispartofseries | International Journal on Information Technologies and Security | |
dc.relation.uri | http://ijits-bg.com/ijitsarchive | |
dc.subject.other | Africa | |
dc.subject.other | Internet abuse | |
dc.subject.other | The Gambia | |
dc.subject.other | university students | |
dc.title | Internet abuse by university students: a neglected theme in Africa | |
dc.type | article | |
dc.identifier.urn | URN:NBN:fi:jyu-201804202308 | |
dc.contributor.laitos | Tietojenkäsittelytieteiden laitos | fi |
dc.contributor.laitos | Department of Computer Science and Information Systems | en |
dc.type.uri | http://purl.org/eprint/type/JournalArticle | |
dc.date.updated | 2015-07-23T12:33:08Z | |
dc.type.coar | journal article | |
dc.description.reviewstatus | peerReviewed | |
dc.format.pagerange | 3-12 | |
dc.relation.issn | 1313-8251 | |
dc.relation.numberinseries | 4 | |
dc.relation.volume | 5 | |
dc.type.version | publishedVersion | |
dc.rights.copyright | © 2013 the Author & International Journal on Information Technologies and Security. | |
dc.rights.accesslevel | openAccess | fi |