Posts

Showing posts from December, 2012

Promoting trade and e-Commerce in Nigeria

Image
Trade is the voluntary exchange of goods and services and is an essential component for the healthy existence of all social systems. It allows an individual to obtain something desirable in a fair manner from another individual who also obtains something in return. Over the years this model of exchange has evolved from direct exchange of goods, known as the barter system, to the use of legal tender, otherwise known as money for exchange. The means through which goods and services are provided and obtained evolved as exchange medium evolved.  The current evolution of methods in which goods and services are provided can be attributed to contributions and capabilities provided by information technology. Electronic commerce is the term used to describe the “new” improved ways in which goods and services are exchanged using information technology. E-commerce has made trade relatively easy for businesses and this paper investigates its benefits and examines ways in which e-comm

E-Voting and Nigeria’s Democracy

Image
An election is an event at which someone or a group of people is chosen to hold positions of responsibility or leadership.  It ensures that a leader is chosen by the majority of the populace and not by a powerful minority.  However, some candidates may seek to get a political office by all means and adopt shady methods or techniques to manipulate the election results in their favor.  This practice has been seen in developed countries that are presumably at the forefront of democratic governance from election disputes to alleged rigging by candidates.   If an election is widely perceived as flawed, arguments and prejudice normally follows  and much time will be spent on arbitration in law courts. The most popular method of voting is the traditional paper ballot system in which a candidate’s name is marked and dropped through a slit into a box, by the electorates.  The box is opened after the casting of votes and the ballot papers are manually counted.  Counting is done in a

Off-shoring, offshore outsourcing, near-shoring, co-shoring and information security cost: A comparative study

Off-shoring, offshore outsourcing, near-shoring, co-shoring and information security cost: A comparative study. Abstract The main objective of any individual or group going into business is to make profit.    Their profit is the difference between the cost of providing the good or service and the actual cost to the consumer.   As more companies venture into the same line of business the competition for customers gets intense thus bringing into play the law of supply and demand.   Oversupply of a good or service pushes the price consumer has to pay down.   These forces have pushed managers and business strategists into the search for ways to increase the bottom line while reducing cost of good or service delivery.          Using information technology has been a way to maintain business competitive advantage for many of the biggest companies.   Typical uses of information technology in business are the automation of payroll, human resource management, key business process

How the legal environment and the key IT security and privacy issue affect information management in any business environment

How the legal environment and the key IT security and privacy issue affect information management in any business environment.   Abstract: People have the right to protect their personal information from prying eyes or the general public.  This right is a regarded as one of the fundamental human rights and is known as the right to privacy.  As with all rights, any one whose privacy has been infringed can sue the offending party.  On the other hand there has to be some balance between how much information about people is available to the general public and how much they keep away .  This balance is needed because of the influence too much or too little available information about people would have on how the society functions.  For instance, some businesses depend on customer information to run efficiently and it is often necessary for them to store the information.  The practice raises several issues regarding who owns the pool of personal information gathered from people and