CYBER CRIME AND CRIMINALITY IN NIGERIA: WHAT ROLES ARE INTERNET ACCESS POINTS IN PLAYING? OB Longe, SC Chiemeke EUROPEAN JOURNAL OF SOCIAL SCIENCES 6 (4), 132-139, 2008 | 118 | 2008 |
Criminal uses of information & communication technologies in sub-Saharan Africa: trends, concerns and perspectives O Longe, O Ngwa, F Wada, V Mbarika, L Kvasny Journal of Information Technology Impact 9 (3), 155-172, 2009 | 96 | 2009 |
Research outputs from Nigerian tertiary institutions: an empirical appraisal S Chiemeke, OB Longe, FA Longe, IO Shaib Library Philosophy and Practice, 1, 2009 | 94 | 2009 |
Sakawa-cybercrime and criminality in Ghana R Boateng, L Olumide, RS Isabalija, J Budu Journal of Information Technology Impact 11 (2), 85-100, 2011 | 84 | 2011 |
An improved assessment of personality traits in software engineering AS Sodiya, OB Longe, SA Onashoga, O Awodele, LO Omotosho Interdisciplinary Journal of Information, Knowledge, and Management 2, 163, 2007 | 65 | 2007 |
Preliminary insights into the influence of mobile phones in micro-trading activities of market women in Nigeria R Boateng, R Hinson, R Galadima, L Olumide Information Development 30 (1), 32-50, 2014 | 63 | 2014 |
Users' perceptions of the use of academic libraries and online facilities for research purposes in Nigeria S Chiemeke, OB Longe, SS Umar, IO Shaib Library Philosophy and Practice 9 (2), 1-13, 2007 | 59 | 2007 |
Exposure of children and teenagers to internet pornography in South Western Nigeria: Concerns, trends & implications OB Longe, SC Chiemeke, OFW Onifade, FM Balogun, FA Longe, VU Otti Journal of information technology impact 7 (3), 195-212, 2007 | 58 | 2007 |
Cyber Crime and Criminality in Ghana: Its Forms and Implications. R Boateng, OB Longe, V Mbarika, I Avevor, SR Isabalija Amcis, 507, 2010 | 49 | 2010 |
Information and communication technology penetration in Nigeria: Prospects, challenges and metrics SC Chiemeke, OB Longe Asian Journal of Information Technology 6 (3), 280-287, 2007 | 46 | 2007 |
Seeing beyond the surface, understanding and tracking fraudulent cyber activities OB Longe, V Mbarika, M Kourouma, F Wada, R Isabalija arXiv preprint arXiv:1001.1993, 2010 | 40 | 2010 |
An empirical test of the space transition theory of cyber criminality: The case of Ghana and beyond P Danquah, OB Longe African Journal of Computing & ICTs 4 (2), 37-48, 2011 | 37 | 2011 |
Action speaks louder than words–understanding cyber criminal behavior using criminological theories F Wada, O Longe, P Danquah Journal of internet banking and commerce 17 (1), 1-12, 2012 | 33 | 2012 |
Cyber deception and theft: An ethnographic study on cyber criminality from a Ghanaian perspective P Danquah, OB Longe Journal of Information Technology Impact 11 (3), 169-182, 2011 | 32 | 2011 |
The Nigerian web content: Combating pornography using content filters OB Longe, FA Longe Journal of Information Technology Impact 5 (2), 59-64, 2005 | 29 | 2005 |
Checking Internet masquerading using multiple CAPTCHA challenge-response systems OB Longe, ABC Robert, U Onwudebelu 2009 2nd International Conference on Adaptive Science & Technology (ICAST …, 2009 | 26 | 2009 |
An ensemble learning approach for software defect prediction in developing quality software product YK Saheed, O Longe, UA Baba, S Rakshit, NR Vajjhala Advances in Computing and Data Sciences: 5th International Conference …, 2021 | 23 | 2021 |
Mathematical modelling of the spatial distribution of a COVID-19 outbreak with vaccination using diffusion equation B Kammegne, K Oshinubi, O Babasola, OJ Peter, OB Longe, ... Pathogens 12 (1), 88, 2023 | 21 | 2023 |
Comparative stochastic study for credit-card fraud detection models AA Ojugo, DA Oyemade, D Allenotor, OB Longe, CN Anujeonye African J. of Computing and ICT 8 (1-2), 2015 | 20 | 2015 |
On the origins of advance fee fraud electronic mails: A technical investigation using Internet protocol address tracers O Longe, A Osofisan The African Journal of Information Systems 3 (1), 2, 2011 | 20 | 2011 |