Victor Yisa

Victor Yisa
Dalhousie University | Dal · Faculty of Computer Science

Msc management information systems

About

11
Publications
8,696
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
29
Citations

Publications

Publications (11)
Conference Paper
Full-text available
Password authentication is one of the most common forms of authentication, verification and access control mechanism; Passwords remain the standard way to enhance the security of confidential information. Password cracking has become a salient part of penetration testing; white hat hackers will make use of password cracking tools to try to break in...
Article
Full-text available
People often congratulate and celebrate one another on social media, unknowingly disclosing critical information about themselves which may lead to privacy issues. Through quantitative, structural equation modeling, and thematic analytical methods used on our data of 700 Nigerian participants using snowball sampling, comprising 48.4% men (339) and...
Article
Full-text available
The privacy calculus framework and trust heuristics has been used to understand people’s privacy decision-making processes. However, most existing studies are mainly focused on people from developed countries. In this study, we use the privacy calculus in combination with trust heuristics to analyse how people from a developing African nation make...
Article
Full-text available
Technology-assisted living is a growing trend in most developing nations, particularly for young-aged demographic countries, as it presents a platform for personal development and knowledge management. However, this society-scaping trend has also introduced the myriad opportunity for the formation of complex crime, which is often beyond the (immedi...
Conference Paper
Full-text available
When it comes to web application, confidentiality, availability and integrity of individuals and organizations data are not assured. Open Web Application Security Project (OWASP) has identified SQL injection attacks as common threat to the web application. Consequently, many researchers have proposed different approaches for either detection, preve...
Article
Full-text available
Unauthorized Access has been difficult to stop or prevent in the last few decades using username and password authentication only. For an individual, data breach might just be a simple case of espionage or the loss of private credentials, for an enterprise, this could mean the loss of billions of dollars. Preventing Unauthorized Access to Enterpris...
Conference Paper
Full-text available
Online social networks (OSNs), since the advent of the first, have continued to influence virtually every facet of human existence, as well as appeal to users of different ages and races, including students. This study seeks to investigate the usage of online social networks and associated risks experienced among university students in North-Centra...
Conference Paper
Full-text available
Spamming has attained a global dimension and continued to maintain an upward trend, both in sophistication and frequency. And, so far, it has defied every effort, including technical and non-technical proposals, to curb it. This study seeks to investigate the prevalence of spam SMS, with focus on Nigeria. To quantify the prevalence, primary data wa...
Conference Paper
Full-text available
In March and April, 2015, for the first time in the history of Nigeria, elections were conducted, using partial electronic voting means. Specifically, smart card readers were utilized for accreditation of prospective voters. While the 2015 election exercise was adjudged the best ever in the history of the country, it was not without challenges. One...
Article
Full-text available
There are several other techniques that could be used to control paths in the integration of Wide Area Networks (WANs) with diverse routing protocols such as frame relay, enhanced interior gateway routing protocol (EIGRP), etc. In this paper, the concept of route redistribution was considered to integrate Wide Area Networks with different routing p...

Network

Cited By