Kofi Akotoye - Academia.edu (original) (raw)
Papers by Kofi Akotoye
Journal of Educational Management, 2012
The rapid evolution of information tech no logy, the pro Iiferation of computer and media devices... more The rapid evolution of information tech no logy, the pro Iiferation of computer and media devices and the rapid growth in the use ICT and the internet for organisational management have spawned new forms of crimes and made old crimes easier to commit it. References to news in Ghanaian newspapers confirm the rising incidence of these crimes. A review of available literature, however, portrays a paucity of research that explores such crimes in African and for that matter, Ghanaian settings. In this position paper, we use "Academic 419" as a metaphor to describe computer crimes, highlighting some of such crimes from the international literature with a major focus on the types that can potentially occur in the University of Cape Coast. For us, it is imperative for leadership and management in their utilisation of ICT to be more vigilant in security issues and accept the need to safeguard their ICT systems to achieve maximal efficiency and effectiveness in their institutions. T...
IPv6 is the next–generation Internet Protocol developed to solve the problems of IPv4. IPv6 is an... more IPv6 is the next–generation Internet Protocol developed to solve the problems of IPv4. IPv6 is an innovate step from IPv4. However, both protocols differ in header structure. The difference in header structure between the two protocols means that routing network traffic in IPv6 will no longer be supported by the conventional routing protocols used in IPv4. New routing protocols that are supported by IPv6 must be used. In this paper, performance of two routing protocols supported by IPv6 has been evaluated and compared for some applications such as database query, remote login, and ftp using Riverbed Modeler Academic Edition 17.5. These protocols are OSPFv3 and IS–IS. Performance evaluation is based on database query response time, remote login response time, ftp download/upload response times and traffic received as the main parameters. The main objective of this paper is to compare both protocols and to evaluate their performance in order to determine which of them will be the more...
Int. J. Recent Contributions Eng. Sci. IT, 2017
The widespread adoption of electronic distribution of material is accompanied by illicit copying ... more The widespread adoption of electronic distribution of material is accompanied by illicit copying and distribution. This is why individuals, businesses and governments have come to think of how to protect their work, prevent such illicit activities and trace the distribution of a document. It is in this context that a lot of attention is being focused on steganography. Implementing steganography in text document is not an easy undertaking considering the fact that text document has very few places in which to embed hidden data. Any minute change introduced to text objects can easily be noticed thus attracting attention from possible hackers. This study investigates the possibility of embedding data in text document by employing the entropy rate of the constituent characters of words not less than four characters long. The scheme was used to embed bits in text according to the alphabetic structure of the words, the respective characters were compared with their neighbouring characters...
International Journal of E-Services and Mobile Applications
The use of ICTs in many parts of sub-Saharan Africa, including Ghana, has been described as trans... more The use of ICTs in many parts of sub-Saharan Africa, including Ghana, has been described as transformational. However, there is paucity of research on user perspectives on ICTs in institutions of higher learning. This cross-sectional study assessed the perception of students at the University of Cape Coast in Ghana regarding cost as a limiting factor to the use of conference call technology. The complementary log-log regression model was based on a sample of 62 students surveyed in April and May 2015; which sixty-nine percent indicated that cost was a limiting factor. Though Chi-square statistic failed to reject the hypothesis, at the bivariate level, some relationships were statistically significant. Most of these relationships were not robust and disappeared completely when other factors were controlled in the multivariate model. Also, some relationships were absent at the bivariate level and only appeared at the multivariate level indicating that the connection between students&#...
Journal of Educational Management, 2012
The rapid evolution of information tech no logy, the pro Iiferation of computer and media devices... more The rapid evolution of information tech no logy, the pro Iiferation of computer and media devices and the rapid growth in the use ICT and the internet for organisational management have spawned new forms of crimes and made old crimes easier to commit it. References to news in Ghanaian newspapers confirm the rising incidence of these crimes. A review of available literature, however, portrays a paucity of research that explores such crimes in African and for that matter, Ghanaian settings. In this position paper, we use "Academic 419" as a metaphor to describe computer crimes, highlighting some of such crimes from the international literature with a major focus on the types that can potentially occur in the University of Cape Coast. For us, it is imperative for leadership and management in their utilisation of ICT to be more vigilant in security issues and accept the need to safeguard their ICT systems to achieve maximal efficiency and effectiveness in their institutions. T...
IPv6 is the next–generation Internet Protocol developed to solve the problems of IPv4. IPv6 is an... more IPv6 is the next–generation Internet Protocol developed to solve the problems of IPv4. IPv6 is an innovate step from IPv4. However, both protocols differ in header structure. The difference in header structure between the two protocols means that routing network traffic in IPv6 will no longer be supported by the conventional routing protocols used in IPv4. New routing protocols that are supported by IPv6 must be used. In this paper, performance of two routing protocols supported by IPv6 has been evaluated and compared for some applications such as database query, remote login, and ftp using Riverbed Modeler Academic Edition 17.5. These protocols are OSPFv3 and IS–IS. Performance evaluation is based on database query response time, remote login response time, ftp download/upload response times and traffic received as the main parameters. The main objective of this paper is to compare both protocols and to evaluate their performance in order to determine which of them will be the more...
Int. J. Recent Contributions Eng. Sci. IT, 2017
The widespread adoption of electronic distribution of material is accompanied by illicit copying ... more The widespread adoption of electronic distribution of material is accompanied by illicit copying and distribution. This is why individuals, businesses and governments have come to think of how to protect their work, prevent such illicit activities and trace the distribution of a document. It is in this context that a lot of attention is being focused on steganography. Implementing steganography in text document is not an easy undertaking considering the fact that text document has very few places in which to embed hidden data. Any minute change introduced to text objects can easily be noticed thus attracting attention from possible hackers. This study investigates the possibility of embedding data in text document by employing the entropy rate of the constituent characters of words not less than four characters long. The scheme was used to embed bits in text according to the alphabetic structure of the words, the respective characters were compared with their neighbouring characters...
International Journal of E-Services and Mobile Applications
The use of ICTs in many parts of sub-Saharan Africa, including Ghana, has been described as trans... more The use of ICTs in many parts of sub-Saharan Africa, including Ghana, has been described as transformational. However, there is paucity of research on user perspectives on ICTs in institutions of higher learning. This cross-sectional study assessed the perception of students at the University of Cape Coast in Ghana regarding cost as a limiting factor to the use of conference call technology. The complementary log-log regression model was based on a sample of 62 students surveyed in April and May 2015; which sixty-nine percent indicated that cost was a limiting factor. Though Chi-square statistic failed to reject the hypothesis, at the bivariate level, some relationships were statistically significant. Most of these relationships were not robust and disappeared completely when other factors were controlled in the multivariate model. Also, some relationships were absent at the bivariate level and only appeared at the multivariate level indicating that the connection between students&#...