Adebayo A.O.

Adebayo A.O.
Babcock University · Computer Science

Doctor of Philosophy
I am at the moment developing e-Learning course materials for Fundamentals of Information Defense Technologies.

About

16
Publications
22,951
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
48
Citations
Citations since 2016
13 Research Items
40 Citations
201620172018201920202021202202468101214
201620172018201920202021202202468101214
201620172018201920202021202202468101214
201620172018201920202021202202468101214
Introduction

Publications

Publications (16)
Article
Full-text available
Abstract There is no doubt, that Artificial Intelligent (AI) has a lot of contributions to the overall well-being of humanity and improving productivity, it is worth noting that there is also a negative impact associated with the use of the technology on ethical grounds ranging from privacy issue to lack of transparency. Quite a lot of work has bee...
Article
Full-text available
The world has gradually embraced Cryptocurrency at various levels of capacity and it is not governed or regulated by any Control system. It has over time been used by participants as a means to invest despite the volatility of the market. Though Government does not have the means to outright stop the virtual marketing deals of Cryptocurrency, recen...
Article
Full-text available
Ethics is a moral value inherent in a man to do the right thing.However, the christian character which engender this Ethical practices in all walks of life including professional circle such as Computing sciences and research are today emasculated by sharp practices e.g Plagiarism and Internet frauds.This work investigated the impact of Ethical stu...
Article
Full-text available
One of the mainstream strategies identified for detecting Malicious Insider Threat (MIT) is building stacking ensemble Machine Learning (ML) models to reveal malevolent insider activities through anomalies in user activities. However, most anomalies found by these learning models were not malicious because MIT was treated as a single entity, wherea...
Article
Full-text available
Ethical issues involve diverse professions in which Information Technology project management (ITPM) is not an exception. ITPM professionals are obligated to perform a variety of tasks conscientiously and ethically because their decisions affect the performance and functionality of their product outcome, which in turn affect the welfare and well-be...
Article
Full-text available
Health Informatics (HI) has played vital roles in the management of several diseases especially in the tropics. It has revolutionized the mainstream healthcare and healthcare delivery system. This paper applies the principle of Health Informatics to addressing the detection and management of arboviruses particularly Zika and Dengue viruses around w...
Article
Full-text available
The emergence of computer has greatly fuelled the advancement of Science and Technology and drastically changed the way human live. Beside these advancements is increasing sense of insecurity and apprehension. Security issues, particularly those relating to users, which include identification, authentication, authorization and accountability, have...
Article
Full-text available
Information systems are employed by organizations for the collection, filtering, and processing of data, and creation and distribution of information. In healthcare delivery, patients are required to share information with certain categories of health personnel to facilitate correct diagnosis and to determine appropriate treatment. There have been...
Article
Full-text available
Data breach is probable, damaging and costly to organizations. There is a high probability that a data breach is through some form of hacking. It is, therefore, important to fortify network security and to surf the internet smartly in order to reduce the risk of a data breach, which this research is focused on addressing. Converging views in extant...
Article
Full-text available
Privacy and Security of data in cloud database is a vital issue as it enables the storage, management and sharing of complex data in a secure platform. Cloud database, a technology that clings onto Cloud Computing paradigm, has privacy and security challenges such as lack of awareness and hegemony of place of data stored, transaction log of data, m...
Article
Digital watermarking is the process of embedding information into digital media such as image, audio or video data to easily identify the copyright ownership of the media. Such information is for different purposes, such as for broadcast monitoring, copyright protection, source tracking, and piracy deterrence and many others. It is usually embedded...
Article
Full-text available
Management, exchange and control of clinical information flow, and decision support have remained a challenge in most secondary/tertiary healthcare institutions in Nigeria amidst the continued advancement in Information Technology. Many of those in need of healthcare are often attracted to Military health facilities owing to the public perception t...
Article
Component-Based Software Engineering (CBSE) research is an important emerging area of Software Engineering (SE) that supports and enhances evolution of reusable components useful for creation of software solutions. CBSE has assumptions that components exist in repositories, but this is usually not the case. That is, components are in want. The aim...
Article
Full-text available
Generally speaking, Ethical issues involve religion, philosophical paradigms, moral responsibilities, customs/cultural, societal beliefs, self conscience and professional rules and regulations as the case may be. A number of professional organizations in the field of computing have published their own code of ethics. Computing professionals are obl...
Article
Full-text available
Secure chat system is essential for effective and efficient communication in succeeding organizations. Current 'free' chat systems make breach risk of confidentiality probable, and organizations lose possession of logged chat messages. Their designs are also not readily available for examination and subsequent improvement. There is therefore the ne...
Article
Full-text available
Analysis of breach data would provide fresh insight into the subject of Information Security. There is, therefore the need to examine breach data repositories on which the analyses would be based. This work set to identify and describe breach data repositories, and highlight whatever is revealed. The use of Datalossdb.org data set as a base to be e...

Network

Cited By

Projects

Projects (2)
Project
Survey of impact of ethics study on Computing sciences research