Ehigiator Iyobor Egho-PromiseUniversity College Birmingham · Computing
Ehigiator Iyobor Egho-Promise
PhD in Business Administration and PhD in Data Communication & Networking
I lecture and supervise undergraduate & postgraduate Cybersecurity and Comp. Sc. students' dissertations
About
34
Publications
6,489
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
19
Citations
Introduction
I lecture and supervise undergraduate & PG students at University College Birmingham; Visiting Computer Science Lecturer at Birmingham Newman University; ext. examiner for graduate and postgraduate Cybersecurity students at National Open University of Nigeria; an academic peer reviewer and editorial board member of some international journal. My research areas include Cybersecurity, Cyber Forensics, Networking, and Telecommunication. I have published over 30 articles in peer reviewed journals.
Publications
Publications (34)
Power system is a grid of electrical apparatuses used to supply and transmit power [1]. Telecommunication is the use of telephone to send traffic from a source to destination through transmission media. A happy customer is a returning customer. When customers are not satisfied with the network services they pay for or do not get value for their mon...
Multimedia is a collection of several media presentations or formats such as images, videos, animations, etc. Cyber forensics is a branch of computer science that deals with how to obtain, preserve, analyze, document and present digital data from cyber space. The fake images in multimedia can be detected by a cyber forensic investigator using the n...
Liquefied Petroleum, Gas (LPG) has become the cleanest, effective and efficient petroleum for domestic and commercial use. It is used in vehicles, for cooking, baking, etc. Although LPG is the most patronized and cost effective fuel for households and commercial use yet there is a major challenge associated with buying the gas at the stations. Ther...
The rapidly evolving landscape of cyber threats necessitates robust and adaptable strategies to safeguard networking. This study explores the development and evaluation of a comprehensive framework for threat mitigation, integrating advanced methodologies from cybersecurity, risk management, and threat intelligence. Leveraging a mixed-methods appro...
This study aimed at developing a comprehensive framework that enhances cyber security and improves vulnerability management in a digital environment. The study reviewed the challenges of vulnerability management in digital environments, with a focus on cyber-physical power systems (CPPS). Through a comprehensive literature review, existing Cyber Se...
This study aimed at developing a comprehensive framework that enhances cyber security and improves vulnerability management in a digital environment. The study reviewed the challenges of vulnerability management in digital environments, with a focus on cyber-physical power systems (CPPS). Through a comprehensive literature review, existing Cyber Se...
In today's digital landscape, cybersecurity has become a critical concern due to the increasing sophistication of cyber threats. Traditional cybersecurity measures are often inadequate against evolving attacks, necessitating the development of comprehensive and adaptive threat mitigation frameworks. This study aims to address this gap by proposing...
Digital forensics in cloud computing environments presents significant challenges due to the distributed nature of data storage, diverse security practices employed by service providers, and jurisdictional complexities. This study aims to develop a comprehensive framework and improved methodologies tailored for conducting digital forensic investiga...
Intellectual property (IP) protection is critical for promoting innovation in academic institutions. However, IP awareness and utilization remains low at Uganda's Makerere and Kyambogo Universities despite their strong research and innovation potential. This study assessed the level of IP utilization as a tool for fostering creativity and innovatio...
Collective Management Organizations (CMOs) negotiate and collect royalties for intellectual works on behalf of its owners. These royalties fund Collective Management Organizations (CMO) activities, with portions going to copyright holders and the government (VAT). Higher education institutions make substantial contributions to copyright as makers a...
Information technology has greatly impacted the multimedia industry, particularly in the areas of video and audio content. There are various applications available for managing individual videos and converting them into formats suitable for online sharing. With the widespread use of mobile phones and computers, capturing and storing pictures and vi...
An IoT-based weather monitoring system that collects and stores weather data allowing easier access and recording is what this project entails. It is also incorporated with the ability to predict future weather data based on previous recordings. Keeping track of weather conditions is one of the most concentrated areas in our current society. Weathe...
The significant role of Small and Medium Enterprises (SMEs) in various economies especially the developing ones have been highly established. These SMEs have been identified as the medium through which development and rapid industrialization of these economies can be achieved. The manual record-keeping system for processing of products bought and s...
The significant role of Small and Medium Enterprises (SMEs) in various economies especially the developing ones have been highly established. These SMEs have been identified as the medium through which development and rapid industrialization of these economies can be achieved. The manual record-keeping system for processing of products bought and s...
Telecommunication is the transmission of traffic from one place to another in a network through a media using mobile station. Cell site is referred to as the base station of telecommunication, it is part of telecom network that allow subscribers to access services from the telecom service providers. Cell sites depend on core network and transmissio...
Telecommunication is the transmission of traffic from one place to another in a network through a media using mobile station. Cell site is referred to as the base station of telecommunication, it is part of telecom network that allow subscribers to access services from the telecom service providers. Cell sites depend on core network and transmissio...
The transmission of traffic either in form of voice or data from a source to destination over a transmission media such as fiber cable or digital microwave radio is termed telecommunication. The telecommunication is classified into three categories namely: Access network, core network and transmission system. The access network directly provides ne...
Every social media platform involves exchange of information between two or more persons. The aim is to perform some online activities. These activities could be buying of gods and services or exchange of false or harmful messages from one person to another. This type of harmful messages could be detrimental to the receiver’s reputation. Cyberbully...
The emergence of ecommerce almost three decades ago has completely transformed the approach to purchasing goods and services across various countries in the world. Almost every country in the globe, now have some form of ecommerce operations, this has further been enhanced by the stay at home COVID-19 induced lockdowns. The value and volume of tran...
Fuel is one of the most essential commodities in the market and it plays a key instrument in the economy of every country, hence measuring and monitoring fuel to check the quantitiesof fuelin the tank is important. Over the years fuel stations inKoforidua, Ghanause the traditional way of monitoringand measuring the fuel levels in storage tanks, kno...
This paper focuses on the development of Automated Telecom Network Information System (ATNIS), a case study of Glo Mobile Ghana Limited, Ghana. Network information system is the management of network data for business intelligence purposes. Because the data needs to be processed and shared among different users in a networking environment, this can...
One of the key factors of economy growth in Ghana is agriculture. It is believed that agriculture sector forms a vital part of building resilient economy. E-Agriculture is a farm management system that uses IT or ICT devices to facilitate the production of crops and animals. In this research, a web-based system name e-Agriculture Management System...
Data security in Information Technology today is a tough undertaking, particularly with the growing intricacy and bulk of attacks targeted at stealing information. In light of the current corporate conventional use of mobile devices in the operation of industrial and cooperative institutions in Ghana, data security has become a key challenge. In so...