
Olayemi OlawumiUniversity of Eastern Finland | UEF · School of Computing
Olayemi Olawumi
Doctor of Philosophy
About
20
Publications
16,662
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
216
Citations
Publications
Publications (20)
Personality traits play a significant role in many organisational
parameters, such as job satisfaction, performance, employability, and
leadership for employers. One of the major social networks, the unemployed derives satisfaction from is Facebook. The focus of this article is to introduce association rule mining and demonstrate how it may be appl...
Different personality traits respond differently to unfavourable life situations. Unemployment can have several negative social, economic, and domestic consequences. Many people use social media for a variety of reasons. The aim of this study is to examine the way different personality traits respond to Facebook in the period of unemployment. Data...
Full terms and conditions of access and use, archived papers, submission instructions, a search tool, and much more can be found on the JISE website: http://jise.org ABSTRACT This study examined the use of a social media platform-WhatsApp-by computer science students for learning computing education in the context of a Nigerian education institutio...
Electronic healthcare management system (EHMS) is seen to have a
positive impact on healthcare, but its implementation and adoption are still very low; also, research results on its influence are limited. To ascertain the cause for this gap, a study was conducted to identify gaps in research and knowledge regarding EHMS adoption. This study sought...
Different personality traits respond differently to unfavourable life situations. Unemployment can have several negative social, economic, and domestic consequences. Many people use social media for a variety of reasons. The aim of this study is to examine the way different personality traits respond to Facebook in the period of unemployment. Data...
Social media has become an important platform where users share, comment, discuss, communicate, interact, and play games. Aside from using social media for personal, social, and business purposes, the use of social media has gained attention, particularly for collaborative learning in the educational sector. This paper examines the role of social m...
Information and communication technology (ICT) has fundamentally transformed
business transactions. While its uses have become ubiquitous in the advanced economies, emerging and developing economies are still struggling with the mode and
manner of the deployment of ICT for business. Thus, this study seeks to investigate
how small‐ and medium‐sized...
In this paper, we propose a novel triple algorithm based on RSA (Rivest-Shamir-Adleman), AES (Advanced Encryption Standard), and TwoFish in order to further improve the security of Bluetooth that is currently using only 128-bit AES for encryption in its latest versions (Bluetooth 4.0–5.0). Furthermore, older Bluetooth 1.0A–3.0+HS (High-Speed) devic...
Activities of prominent terrorist groups like Boko Haram, Al-Shabaab, Ansaru, and Ansar Dine have left thousands of people dead and properties destroyed for a number of decades in some developing nations. The high level of insecurity occasioned by operations of terror groups has impacted negatively on the socio-economic development of these nations...
Activities of prominent terrorist groups like Boko Haram, Al-Shabaab, Ansaru, and Ansar Dine have left thousands of people dead and properties destroyed for a number of decades in some developing nations. The high level of insecurity occasioned by operations of terror groups has impacted negatively on the socio-economic development of these nations...
Security is a very important issue in Smart Home Environments due to the sensitive nature of private and confidential data being transmitted via wireless communication links. The wireless technologies being used in the implementation of smart homes have serious security issues that could have severe security implications if they are not carefully t...
Security is an important issue in Smart Home Environments. Most especially in situations where smart homes can store and release sensitive data to third parties, which makes data collected within smart environments vulnerable to severe security and privacy abuses. Therefore, identification of these security issues is crucial to taking the appropria...
The development of wireless technology enabled smart home and mobile health systems are on the rise and the integration of these smart home technologies to support healthcare is acquiring an increasing global significance. Teleradiology systems and various other telemedicine devices are being integrated into smart home technologies and these device...
There are two solutions in data security field for ensuring that only legitimate recipients will have access to the intended data: Steganography and cryptography. These solutions can be used for providing a high level of security. With the exponential growth of challenges in the field of computer security, the use of Bluetooth technology is expandi...
In this paper, three practical attacks against ZigBee security are carried out in our laboratory environment. The attack scenarios are based on utilizing several vulnerabilities found from the main security components of ZigBee technology. The first attack is based on discovering all ZigBee-enabled networks within range as well as the configuration...