Implication of Cell Phone Usage on Study Patterns of Teens
Journal Title: International Journal of Computer & organization Trends(IJCOT) - Year 2014, Vol 4, Issue 1
Abstract
Cell phone usage has become worldwide commodity for every person regardless of their ages. Over the years, teenagers within the age bracket of thirteen to nineteen are more vulnerable towards the use of the technology in a negative way. The study approached the implication of cell phone usage on study patterns of teens in relation with searching useful information and irrelevant information while they are studying. The study sampled 100 students within the age of 13 to 19 year. The students were selected across different levels of education for proper representations of the population; t-test and cross-tabulation together with graphical representation (3D bars charts) were used to analyse the data. Among others, the findings show that female students did use cell phone to source useful information than male. In contrary, ages of students do not imply use of cell phone for either useful or irrelevant information. Lastly, the higher the level of a student the more the student source for useful information via cell phones. It is recommended that proper monitoring should be applied in schools regarding the use of cell phone for other things except academic purposes because children of today are the leaders of tomorrow.
Authors and Affiliations
Ismail Olaniyi Muraina , Basirat Abiola Adenowo , Adebisi Sylvester Olude , Solomon Onen Abam , Wasiu Olatunde Oladapo
Gradation of NGO’s Role in Rural Development: A Fuzzy Soft Set Theoretic Approach
The non-governmental organizations (NGO) are recognized as important institutional actors that are expected to facilitate the participation of beneficiaries in the development programmes such as mobilising communit...
Image Registration Methods and Validation Techniques
Image registration is the process of aligning two or more images into a common coordinate system. The images can be of the same object taken at different time instants or angles or by different sensors. The images can al...
A Brief Survey on Encryption Schemes in Cloud Environments
For the last two years cloud computing is a important in the IT industry. In cloud computing data owners and service providers are not in the same trusted domain so the Service providers should not be a trusted one and t...
A Survey Of Key Management Schemes In Wireless Sensor Networks
In near future, the Wireless Sensor Networks (WSN) is widely used in many applications like military and civil domains. The wireless sensor networks are always deployed in hostile and pervasive environment. Security is m...
Breast Cancer Detection In Mammogram Images Using Region-Growing And Contour-Based Segmentation Techniques
An increase in the use of computers to improve human-to-humanand human-to-computer interaction has necessitated automated methods that extract information on human behavior in an efficient manner. Technology has highly i...