<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
<title>Information Technology</title>
<link href="http://196.220.128.81:8080/xmlui/handle/123456789/163" rel="alternate"/>
<subtitle/>
<id>http://196.220.128.81:8080/xmlui/handle/123456789/163</id>
<updated>2026-04-27T00:01:38Z</updated>
<dc:date>2026-04-27T00:01:38Z</dc:date>
<entry>
<title>DATA INTEGRATION MODEL FOR ACADEMIC INFORMATION MANAGEMENT SYSTEM</title>
<link href="http://196.220.128.81:8080/xmlui/handle/123456789/988" rel="alternate"/>
<author>
<name>ODUNTAN, EVELYN BOSEDE</name>
</author>
<id>http://196.220.128.81:8080/xmlui/handle/123456789/988</id>
<updated>2023-02-07T11:37:29Z</updated>
<published>2019-12-01T00:00:00Z</published>
<summary type="text">DATA INTEGRATION MODEL FOR ACADEMIC INFORMATION MANAGEMENT SYSTEM
ODUNTAN, EVELYN BOSEDE
In data integration, users are provided with a homogeneous logical view of data that is physically distributed over heterogeneous data sources. However, there exists elements of ”Chaotic Information Systems” in most institutions as a result of the presence of ad-hoc incompatible information systems comprising of fragmented mixtures of single function systems that were built to meet certain operational requirements of the user departments and therefore neither share data nor communicate effectively with other sub-systems within the organization. But if a unified data warehouse exists in an academic institution, then that constraint of viewing only the data a unit has will be solved. A typical tertiary institution often comprises a lot of subsystems crucial for its internal processes and operations. Therefore this study presents a data integration model for the management information system in a tertiary institution. Auchi Polytechnic is used as a case study to test the viability of the model with the integration of data from 3 units (Admission, Result Processing and Bursary) called local sources. The Local-As-View (LAV) data integration approach is used, and treating all local sources as relational databases. Schematic mappings were used to map and create relationship between the global (mediated) schema and the local sources in order to form the unified view. A mediator in the proposed system acts as an intermediate medium transforming queries issued by users/clients to sub-queries, integrating result data and resolving conflicts and inconsistencies. Wrappers transform sub-queries to specific local queries so that each local system is able to understand the queries to get expected results. The model is implemented using web-enabling applications with apache as a web server with extended capability for PHP scripting language and MySQL database. The system was tested bythree sets of users of the system: Frequent users (6) who will use the system on daily basis, Occasional users (7) who use the system say monthly and Rare users (4) who may use the system yearly. The system was evaluated using a questionnaire that was filled by these users (IT and non-IT staff of Auchi Polytechnic, Auchi). From their responses that were analysed along side the results/output from the system, it was concluded that the data integration system was viable as the outputs obtained from the issued queries to the system were precise due to the fact that the result of the precision metrics shows that mean is 71.5% and Range is 71.0%. This model can be adapted by any tertiary institution, only just to con it to their operational system.
PH.D THESIS
</summary>
<dc:date>2019-12-01T00:00:00Z</dc:date>
</entry>
<entry>
<title>PROPRIETARY SOFTWARE PROTECTION AND COPYRIGHT ISSUES IN CONTEMPORARY INFORMATION TECHNOLOGY</title>
<link href="http://196.220.128.81:8080/xmlui/handle/123456789/898" rel="alternate"/>
<author>
<name>LONGE, OLUMIDE BABATOP.E</name>
</author>
<id>http://196.220.128.81:8080/xmlui/handle/123456789/898</id>
<updated>2023-02-07T11:38:47Z</updated>
<published>2004-12-01T00:00:00Z</published>
<summary type="text">PROPRIETARY SOFTWARE PROTECTION AND COPYRIGHT ISSUES IN CONTEMPORARY INFORMATION TECHNOLOGY
LONGE, OLUMIDE BABATOP.E
Software occupies a pride of place in the development of information technology&#13;
systems. Programming management must therefore safeguard the creative efforts&#13;
a~d investment of resources represented by proprietary software. lnlmtcal. to&#13;
.software development are the activities of pirates and hackers who copy and&#13;
reproduce software at the expense of those who laboured to write them and to the&#13;
detriment of the users. The research has been able to identify three rnaior types of&#13;
attacks among others on the intellectual property contained in software. These are&#13;
reverse engineering, software piracy and tampering. The aim is to elucidate and&#13;
provide technical and legal counter measures against these attacks while also&#13;
advocating the embracement of the 'open-source software' alternative. In order to&#13;
evaluate the impact of piracy on users and development in information technology,&#13;
questionnaires were distributed. Responses were analyzed using chi square&#13;
distribution between .01 and .05 level. The results of the analysis showed that the&#13;
use of pirated software is responsible for some of the problems encountered by&#13;
users of computers and other IT systems. A software system christened&#13;
"PROGRAMTESTER" has also been developed and implemented using VisualBasic&#13;
VI as an aid to establishing copyright infringements.
M.TECH THESIS
</summary>
<dc:date>2004-12-01T00:00:00Z</dc:date>
</entry>
</feed>
