Implication of Cell Phone Usage on Study Patterns of Teens
Journal Title: International Journal of Computer & organization Trends(IJCOT) - Year 2014, Vol 4, Issue 1
Abstract
Cell phone usage has become worldwide commodity for every person regardless of their ages. Over the years, teenagers within the age bracket of thirteen to nineteen are more vulnerable towards the use of the technology in a negative way. The study approached the implication of cell phone usage on study patterns of teens in relation with searching useful information and irrelevant information while they are studying. The study sampled 100 students within the age of 13 to 19 year. The students were selected across different levels of education for proper representations of the population; t-test and cross-tabulation together with graphical representation (3D bars charts) were used to analyse the data. Among others, the findings show that female students did use cell phone to source useful information than male. In contrary, ages of students do not imply use of cell phone for either useful or irrelevant information. Lastly, the higher the level of a student the more the student source for useful information via cell phones. It is recommended that proper monitoring should be applied in schools regarding the use of cell phone for other things except academic purposes because children of today are the leaders of tomorrow.
Authors and Affiliations
Ismail Olaniyi Muraina , Basirat Abiola Adenowo , Adebisi Sylvester Olude , Solomon Onen Abam , Wasiu Olatunde Oladapo
A Survey Of Key Management Schemes In Wireless Sensor Networks
In near future, the Wireless Sensor Networks (WSN) is widely used in many applications like military and civil domains. The wireless sensor networks are always deployed in hostile and pervasive environment. Security is m...
A New Approach For Image Cryptography Techniques
With the progress in data exchange by electronic system, the need of information security has become a necessity. Due to growth of multimedia applications, security becomes an important issue of communication and storage...
SE code optimization using Data Mining Approach
Data mining also holds promises for other software engineering processes, which have to deal with uncertainty and intangible data such as cost estimation, effort estimation and quality. It can also aid in interesti...
Redundancy Efficient Crosstalk Avoidance Scheme in VLSI Circuits
In deep sub micrometer design interconnect delay has become a major factor. Crosstalk is highly evident in deep sub micrometer design. Crosstalk depends on different data patterns that are transmitted on the bus. For the...
Cataloguing and Avoiding the Buffer Overflow Attacks in Network Operating Systems
The application software has a different dimension, size and intricacies is rising rapidly in current technology era and simultaneously increase a programming bugs also. The programming bugs cause vulnerabilities to the...