ACCEPTANCE OF WEB 2.0 IN LEARNING IN HIGHER EDUCATION: A CASE STUDY NIGERIA
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2013, Vol 4, Issue 10
Abstract
Technology acceptance has been studied in different perspectives. Though a few empirical studies on acceptance of Web 2.0 as a social networking tool in teaching and learning exist, none of such studies exist in Nigeria which is the focus of this study. This paper reports on a pilot study that begins to fill this gap by investigating the perceptions, attitude and acceptance of Web 2.0 in e-learning of this country. Based on literature review and initial primary study, a conceptual model of 9 variables and associated hypotheses was designed. The model was operationalised into a questionnaire that was used to collect data from 317 students from 5 universities. The findings that came from data analysis indicate that all the variables except motivation via learning management systems which are not presently used in these universities affect intention to use Web 2.0 in e-learning in Nigeria. Some of the validated variables are perceived usefulness and prior knowledge. The major conclusions and recommendations include the utilisation of Web 2.0 facilities to stimulate participation in learning. This work will contribute to the body of knowledge on acceptance of Web 2.0 social networking tools in teaching and learning. It will aid management decisions toward investing better on technology so as to improve the educational sector. This research will also be beneficial in the social development of individuals, local communities, national and international communities
Authors and Affiliations
Razep Echeng, Abel Usoro, Grzegorz Majewski
Using Rule Base System in Mobile Platform to Build Alert System for Evacuation and Guidance
The last few years have witnessed the widespread use of mobile technology. Billions of citizens around the world own smartphones, which they use for both personal and business applications. Thus, technologies will minimi...
Hardware Segmentation on Digital Microscope Images for Acute Lymphoblastic Leukemia Diagnosis Using Xilinx System Generator
Image segmentation is considered the most critical step in image processing and helps to analyze, infer and make decisions especially in the medical field. Analyzing digital microscope images for earlier acute lymphoblas...
Power Analysis Attacks on ECC: A Major Security Threat
Wireless sensor networks (WSNs) are largely deployed in different sectors and applications, and Elliptic Curve Cryptography (ECC) is proven to be the most feasible PKC for WSN security. ECC is believed to provide same le...
An Open Source P2P Encrypted Voip Application
Open source is the future of technology. This community is growing by the day; developing and improving existing frameworks and software for free. Open source replacements are coming up for almost all proprietary softwar...
Reverse Area Skyline in a Map
Skyline query retrieves a set of data objects, each of which is not dominated by another object. On the other hand, given a query object q, “reverse” skyline query retrieves a set of points that are “dynamic” skyline of...