ACCEPTANCE OF WEB 2.0 IN LEARNING IN HIGHER EDUCATION: A CASE STUDY NIGERIA
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2013, Vol 4, Issue 10
Abstract
Technology acceptance has been studied in different perspectives. Though a few empirical studies on acceptance of Web 2.0 as a social networking tool in teaching and learning exist, none of such studies exist in Nigeria which is the focus of this study. This paper reports on a pilot study that begins to fill this gap by investigating the perceptions, attitude and acceptance of Web 2.0 in e-learning of this country. Based on literature review and initial primary study, a conceptual model of 9 variables and associated hypotheses was designed. The model was operationalised into a questionnaire that was used to collect data from 317 students from 5 universities. The findings that came from data analysis indicate that all the variables except motivation via learning management systems which are not presently used in these universities affect intention to use Web 2.0 in e-learning in Nigeria. Some of the validated variables are perceived usefulness and prior knowledge. The major conclusions and recommendations include the utilisation of Web 2.0 facilities to stimulate participation in learning. This work will contribute to the body of knowledge on acceptance of Web 2.0 social networking tools in teaching and learning. It will aid management decisions toward investing better on technology so as to improve the educational sector. This research will also be beneficial in the social development of individuals, local communities, national and international communities
Authors and Affiliations
Razep Echeng, Abel Usoro, Grzegorz Majewski
Verifiable Search Over Updatable Encrypted Data in Cloud Computing
With all the benefits from cloud computing, there are negative influences for the data trust and integrity since clients lose control over the outsourced data in clouds. We propose a verification scheme that supports key...
Faster Scalar Multiplication Algorithm to Implement a Secured Elliptic Curve Cryptography System
Elliptic Curve Cryptography provides similar strength of protection comparing other public key cryptosystems but requires significantly smaller key size. This paper proposes a new faster scalar multiplication algorithm a...
Mobile Malware Classification via System Calls and Permission for GPS Exploitation
Now-a-days smartphones have been used worldwide for an effective communication which makes our life easier. Unfortunately, currently most of the cyber threats such as identity theft and mobile malwares are targeting smar...
Comparison of Multilevel Wavelet Packet Entropy using Various Entropy Measurement for Lung Sound Classification
Wavelet Entropy (WE) is one of the entropy measurement methods by means of the discrete wavelet transform (DWT) subband. Some of the developments of WE are wavelet packet entropy (WPE), wavelet time entropy. WPE has seve...
Analysis of k-Coverage in Wireless Sensor Networks
Recently, a concept of wireless sensor networks has attracted much attention due to its wide-range of potential applications. Wireless sensor networks also pose a number of challenging optimization problems. One of the f...