University of Wollongong

Displaying 1-32 of 32 results

  • White Papers // Feb 2012

    Security Analysis of A Single Sign-On Mechanism for Distributed Computer Networks

    Single Sign-On (SSO) is a new authentication mechanism that enables a legal user with a single credential to be authenticated by multiple service providers in distributed computer networks. Recently, Chang and Lee proposed a new SSO scheme and claimed its security by providing well-organized security arguments. In this paper, however,...

    Provided By University of Wollongong

  • White Papers // Feb 2012

    Fault Analysis of the KATAN Family of Block Ciphers

    In this paper, the authors investigate security of the KATAN family of block ciphers against differential fault attacks. KATAN consists of three variants with 32, 48 and 64-bit block sizes, called KATAN32, KATAN48 and KATAN64, respectively. All three variants have the same key length of 80 bits. They assume a...

    Provided By University of Wollongong

  • White Papers // Aug 2011

    P2CP: A New Cloud Storage Model to Enhance Performance of Cloud Services

    This paper presents a storage model named Peer-To-Cloud and Peer (P2CP). Assuming that the P2CP model follows the Poisson process or Little's law, the authors prove that the speed and availability of P2CP is generally better than that of the pure Peer-To-Peer (P2P) model, the Peer-To-Server, Peer (P2SP) model or...

    Provided By University of Wollongong

  • White Papers // Jul 2011

    Evidence Of Financial Integration In Asia: An Empirical Application Of Panel Unit Root Tests And Multivariate Cointegration And Causality Procedures

    This paper measures the extent of financial integration and interdependence among Asian equity markets over the period January 1993 to June 2006 using daily data. The analysis includes three developed markets (Hong Kong, Japan and Singapore) and eight emerging markets (China, India, Indonesia, Korea, Malaysia, the Philippines, Taiwan and Thailand)....

    Provided By University of Wollongong

  • White Papers // Jul 2011

    Assessing Financial Integration in European Union Equity Markets, 1990-2006: Panel Unit Root And Multivariate Cointegration And Causality Evidence

    This paper measures financial integration among selected European Union equity markets over the period July 1990 to June 2006 using daily data. Eleven markets (Austria, Belgium, Denmark, France, Germany, Greece, Ireland, Italy, Netherlands, Spain and the United Kingdom) are included in the analysis. Panel unit root tests are used to...

    Provided By University of Wollongong

  • White Papers // Jul 2011

    Responsible Financing?: The Equator Principles And Bank Disclosures

    The purpose of this paper is to consider the impact of the Equator Principles on banking disclosures. The paper explores whether signatory banks are disclosing information related to their obligations under the Equator Principles and discusses the types of disclosures being made publicly available. The paper illustrates that banks are...

    Provided By University of Wollongong

  • White Papers // Jul 2011

    An Empirical Survey Of Individual Consumer, Business Firm And Financial Institution Attitudes towards Islamic Methods

    Islamic finance - financial institutions, products and services designed to comply with the central tenets of Sharia (Islamic law) - is one of the most rapidly growing segments in global financial services. However, despite its growing importance, it is only relatively recently that attempts have been made to evaluate the...

    Provided By University of Wollongong

  • White Papers // May 2011

    Drivers for Information and Communication Technology Adoption: A Case Study of Nigerian Small and Medium Sized Enterprises

    In recent times, the current use of Information and Communication Technology (ICT) in many organizations causes some forms of revolution in their business practices. ICT is increasingly becoming related to organizational values. Researchers reveal that there is a growing support for the positive relationship between ICT and its advantages. According...

    Provided By University of Wollongong

  • White Papers // Apr 2011

    PEREA: Practical TTP-Free Revocation of Repeatedly Misbehaving Anonymous Users

    Several anonymous authentication schemes allow servers to revoke a misbehaving user's ability to make future accesses. Traditionally, these schemes have relied on powerful TTPs capable of deanonymizing (or linking) users' connections. Such TTPs are undesirable because users' anonymity is not guaranteed, and users must trust them to judge misbehaviors fairly....

    Provided By University of Wollongong

  • White Papers // Jan 2011

    Identity-Based Chameleon Hash Scheme Without Key Exposure

    The notion of chameleon hash function without key exposure plays an important role in designing chameleon signatures. However, all of the existing key-exposure free chameleon hash schemes are presented in the setting of certificate-based systems. In 2004, Ateniese and de Medeiros questioned whether there is an efficient construction for identity-based...

    Provided By University of Wollongong

  • White Papers // Jan 2011

    Three-Round Abuse-Free Optimistic Contract Signing With Everlasting Secrecy (Short Paper)

    Contract signing is an important part of business transactions. Fairness is a basic requirement for contract signing. However, most of the existing contract signing protocols only focuses on the fairness while ignoring the privacy of the players. The authors argue that the privacy of the players is close related to...

    Provided By University of Wollongong

  • White Papers // Dec 2010

    Can Superior CRM Capabilities Improve Performance In Banking

    The market enthusiasm generated around investment in customer relationship management (CRM) technology is in stark contrast to the nay-saying by many academic and business commentators. This raises an important research question concerning the extent to which banks should continue to invest in CRM technology. Drawing on field interviews and a...

    Provided By University of Wollongong

  • White Papers // Dec 2010

    Why Build A Customer Relationship Management Capability?

    The market enthusiasm generated around investment in CRM technology is in stark contrast to the nay saying by many academic and business commentators. This raises an important research question concerning the extent to which companies should continue to invest in building a CRM capability. Drawing on field interviews and a...

    Provided By University of Wollongong

  • White Papers // Nov 2010

    Retooling The Corporate Brand: A Foucauldian Perspective On Normalisation And Differentiation

    In this paper the authors draw upon the social theory of Michel Foucault to explore the neglected tension between normalization and differentiation in corporate branding. The mainstream response to addressing this tension would lead managers to strive for the singular identity that represents the ideal compromise between differentiation and conformity....

    Provided By University of Wollongong

  • White Papers // Jul 2010

    On Knowing, Accounting And The Methodological Position Of Geertz

    Since the calls to view accounting as a cultural defined discipline Geertz's work yields significant debate from accounting scholars. This review paper argues that Geertz ? la interpretive anthropology has been inaccurately discerned by many accounting methodologists. They overlook the theoretical anchoring Geertzian conception of culture schemes - "By isolating...

    Provided By University of Wollongong

  • White Papers // Jul 2010

    Corporate Governance In Five Arabian Gulf Countries

    In this paper, the authors discuss the state of corporate governance in five countries, Kuwait, Bahrain, the United Arab Emirates, Qatar and Oman, of the Arabian Gulf. The countries are similar in culture and part of a locality with characteristics which make it distinctive in terms of wealth, state of...

    Provided By University of Wollongong

  • White Papers // Jul 2010

    Fair Value Accounting In China: Neoliberalisation And Accounting Change

    This paper explores the tension between neoliberal theory and practice by using China as an example. This paper investigates the implementation of Fair Value Accounting (FVA) in China and argues that market share prices are not 'Fair values' of companies' financial position as theories of FVA assume, rather, they project...

    Provided By University of Wollongong

  • White Papers // Jul 2010

    The Baryulgil Mine: Asbestos And Aboriginality

    This paper documents the history of corporate paternalism and the effects of asbestos mining on the indigenous community at Baryulgil in northern New South Wales. Despite the lack of profitability of the asbestos mine at Baryulgil, the operations continued for over 30 years leaving a legacy of asbestos-related issues. The...

    Provided By University of Wollongong

  • White Papers // Jun 2010

    An Analysis Of Visual Images And Associated Motifs In The Annual Reports Of HSBC, 1958-2008

    This paper seeks to further understand the visual communication of annual reports by presenting a historical review of the annual reports of HSBC over the period 1958 to 2008. Visual images and associated motifs contained in HSBC's annual reports over a period of half a century are surveyed and analysed...

    Provided By University of Wollongong

  • White Papers // Jun 2010

    Wireless Aquatic Navigator for Detection and Analysis (WANDA)

    The cost of monitoring and detecting pollutants in natural waters is of major concern. Current and forthcoming bodies of legislation will continue to drive demand for spatial and selective monitoring of the environment, as the focus increasingly moves towards effective enforcement of legislation through detection of harmful events, and unambiguous...

    Provided By University of Wollongong

  • White Papers // Mar 2010

    Benefits of Information and Communication Technology in Small and Medium Sized Enterprises: A Case Study of a Nigerian SME

    Research indicates that the use of Information and Communication Technology (ICT) in organizations offers promising opportunities in order to meet the challenges of an ever-changing environment. ICTs, having a remarkable potential to contribute to sustained competitive advantage for businesses, have been identified as key tools in management processes. In Small...

    Provided By University of Wollongong

  • White Papers // Feb 2010

    Information and Communication Technology Adoption: Challenges for Nigerian SMEs

    Although Information and Communication Technology (ICT) provides enormous opportunities such as storing, processing, retrieving, disseminating and sharing of information, its use within SMEs in developing countries is still plagued with many problems that hinder effective and efficient management. Researchers argue that in national and regional economies, Small and Medium Sized...

    Provided By University of Wollongong

  • White Papers // Feb 2010

    Evaluating The Impact Of A Rapidly Changing Economic Environment On Bank Financial Performance Using The Dupont System Of Financial Analysis

    This paper presents a model for the financial analysis of a bank in a rapidly changing environment based on the DuPont system of financial analysis. The DuPont system of financial analysis is based on analysis of return on equity which is disaggregated into net profit margin, total asset turnover and...

    Provided By University of Wollongong

  • White Papers // Nov 2009

    The Emerging Ethics of Humancentric GPS Tracking and Monitoring

    The Global Positioning System (GPS) is increasingly being adopted by private and public enterprise to track and monitor humans for Location-Based Services (LBS). Some of these applications include personal locators for children, the elderly or those suffering from Alzheimer's or memory loss, and the monitoring of parolees for law enforcement,...

    Provided By University of Wollongong

  • White Papers // Sep 2009

    How to Construct Identity-Based Signatures Without the Key Escrow Problem

    The inherent key escrow problem is one of the main reasons for the slow adoption of identity-based cryptography. The existing solution for mitigating the key escrow problem is by adopting multiple Private Key Generators (PKGs). Recently, there was a proposal that attempted to reduce the trust of the PKG by...

    Provided By University of Wollongong

  • White Papers // Sep 2009

    RFID-Enabled Inventory Control Optimization: A Proof of Concept in a Small-to-Medium Retailer

    This study examines the impact of Radio-Frequency Identification (RFID) technology on the inventory control practices of a small-to-medium retailer using a Proof of Concept (PoC) approach. The exploratory study was conducted using a single case study of a hardware retailer stocking 5000 product lines provided by 110 active suppliers. To...

    Provided By University of Wollongong

  • White Papers // Sep 2009

    Ricardian Equivalence And The Efficacy Of Fiscal Policy In Australia

    Events surrounding the global financial and economic crises of 2008 and 2009 have sparked a renewed interest in discretionary fiscal policy. This paper considers whether private saving in Australia behaves in a manner that is consistent with Ricardian equivalence, thus mitigating the effects of fiscal policy, or conversely, if fiscal...

    Provided By University of Wollongong

  • White Papers // Jun 2009

    Categorical Data Modeling: Logistic Regression Software

    A Matlab based software for logistic regression is developed to enhance the process of teaching quantitative topics and assist researchers with analyzing wide area of applications where categorical data is involved. The software offers an option of performing stepwise logistic regression to select the most significant predictors. The software includes...

    Provided By University of Wollongong

  • White Papers // Jun 2009

    3D Spatial Interaction With the Wii Remote for Head-Mounted Display Virtual Reality

    This research investigates the design of a low-cost 3D spatial interaction approach using the Wii Remote for immersive Head-Mounted Display (HMD) virtual reality. Current virtual reality applications that incorporate the Wii Remote are either desktop virtual reality applications or systems that use large screen displays. However, the requirements for an...

    Provided By University of Wollongong

  • White Papers // Jun 2009

    Information Security Issues in Mobile Computing

    During the last decade the decrease in the size of computing machinery, coupled with the increase in their computing power has lend to the development of the concept of mobile computing. Effects of this new vision is currently evident in the flourishing numbers of mobile telephones and portable computing units....

    Provided By University of Wollongong

  • White Papers // Apr 2009

    A Sensor Network Data Aggregation Technique

    Existing sensor network data aggregation techniques assume that the nodes are preprogrammed and send data to a central sink for offline querying and analysis. This approach faces two major drawbacks. First, the system behavior is preprogrammed and cannot be modified on the fly. Second, the increased energy wastage due to...

    Provided By University of Wollongong

  • White Papers // Jan 2009

    Improving Speech Security and Authentication in Mobile Communications

    This paper points out certain weaknesses in the existing security system of Global System of Mobile Communications (GSM) and proposes a better security system for GSM. The proposed security provides an authenticated session key distribution protocol between the Authentication Center (AUC) and the Mobile Station (MS) for every call attempt...

    Provided By University of Wollongong

  • White Papers // Mar 2010

    Benefits of Information and Communication Technology in Small and Medium Sized Enterprises: A Case Study of a Nigerian SME

    Research indicates that the use of Information and Communication Technology (ICT) in organizations offers promising opportunities in order to meet the challenges of an ever-changing environment. ICTs, having a remarkable potential to contribute to sustained competitive advantage for businesses, have been identified as key tools in management processes. In Small...

    Provided By University of Wollongong

  • White Papers // Sep 2009

    RFID-Enabled Inventory Control Optimization: A Proof of Concept in a Small-to-Medium Retailer

    This study examines the impact of Radio-Frequency Identification (RFID) technology on the inventory control practices of a small-to-medium retailer using a Proof of Concept (PoC) approach. The exploratory study was conducted using a single case study of a hardware retailer stocking 5000 product lines provided by 110 active suppliers. To...

    Provided By University of Wollongong

  • White Papers // Jun 2009

    Information Security Issues in Mobile Computing

    During the last decade the decrease in the size of computing machinery, coupled with the increase in their computing power has lend to the development of the concept of mobile computing. Effects of this new vision is currently evident in the flourishing numbers of mobile telephones and portable computing units....

    Provided By University of Wollongong

  • White Papers // Jan 2009

    Improving Speech Security and Authentication in Mobile Communications

    This paper points out certain weaknesses in the existing security system of Global System of Mobile Communications (GSM) and proposes a better security system for GSM. The proposed security provides an authenticated session key distribution protocol between the Authentication Center (AUC) and the Mobile Station (MS) for every call attempt...

    Provided By University of Wollongong

  • White Papers // Dec 2010

    Why Build A Customer Relationship Management Capability?

    The market enthusiasm generated around investment in CRM technology is in stark contrast to the nay saying by many academic and business commentators. This raises an important research question concerning the extent to which companies should continue to invest in building a CRM capability. Drawing on field interviews and a...

    Provided By University of Wollongong

  • White Papers // Dec 2010

    Can Superior CRM Capabilities Improve Performance In Banking

    The market enthusiasm generated around investment in customer relationship management (CRM) technology is in stark contrast to the nay-saying by many academic and business commentators. This raises an important research question concerning the extent to which banks should continue to invest in CRM technology. Drawing on field interviews and a...

    Provided By University of Wollongong

  • White Papers // Feb 2010

    Evaluating The Impact Of A Rapidly Changing Economic Environment On Bank Financial Performance Using The Dupont System Of Financial Analysis

    This paper presents a model for the financial analysis of a bank in a rapidly changing environment based on the DuPont system of financial analysis. The DuPont system of financial analysis is based on analysis of return on equity which is disaggregated into net profit margin, total asset turnover and...

    Provided By University of Wollongong

  • White Papers // Jun 2009

    3D Spatial Interaction With the Wii Remote for Head-Mounted Display Virtual Reality

    This research investigates the design of a low-cost 3D spatial interaction approach using the Wii Remote for immersive Head-Mounted Display (HMD) virtual reality. Current virtual reality applications that incorporate the Wii Remote are either desktop virtual reality applications or systems that use large screen displays. However, the requirements for an...

    Provided By University of Wollongong

  • White Papers // Nov 2010

    Retooling The Corporate Brand: A Foucauldian Perspective On Normalisation And Differentiation

    In this paper the authors draw upon the social theory of Michel Foucault to explore the neglected tension between normalization and differentiation in corporate branding. The mainstream response to addressing this tension would lead managers to strive for the singular identity that represents the ideal compromise between differentiation and conformity....

    Provided By University of Wollongong

  • White Papers // Nov 2009

    The Emerging Ethics of Humancentric GPS Tracking and Monitoring

    The Global Positioning System (GPS) is increasingly being adopted by private and public enterprise to track and monitor humans for Location-Based Services (LBS). Some of these applications include personal locators for children, the elderly or those suffering from Alzheimer's or memory loss, and the monitoring of parolees for law enforcement,...

    Provided By University of Wollongong

  • White Papers // Sep 2009

    How to Construct Identity-Based Signatures Without the Key Escrow Problem

    The inherent key escrow problem is one of the main reasons for the slow adoption of identity-based cryptography. The existing solution for mitigating the key escrow problem is by adopting multiple Private Key Generators (PKGs). Recently, there was a proposal that attempted to reduce the trust of the PKG by...

    Provided By University of Wollongong

  • White Papers // Jul 2010

    On Knowing, Accounting And The Methodological Position Of Geertz

    Since the calls to view accounting as a cultural defined discipline Geertz's work yields significant debate from accounting scholars. This review paper argues that Geertz ? la interpretive anthropology has been inaccurately discerned by many accounting methodologists. They overlook the theoretical anchoring Geertzian conception of culture schemes - "By isolating...

    Provided By University of Wollongong

  • White Papers // Jun 2010

    An Analysis Of Visual Images And Associated Motifs In The Annual Reports Of HSBC, 1958-2008

    This paper seeks to further understand the visual communication of annual reports by presenting a historical review of the annual reports of HSBC over the period 1958 to 2008. Visual images and associated motifs contained in HSBC's annual reports over a period of half a century are surveyed and analysed...

    Provided By University of Wollongong

  • White Papers // Jul 2010

    Corporate Governance In Five Arabian Gulf Countries

    In this paper, the authors discuss the state of corporate governance in five countries, Kuwait, Bahrain, the United Arab Emirates, Qatar and Oman, of the Arabian Gulf. The countries are similar in culture and part of a locality with characteristics which make it distinctive in terms of wealth, state of...

    Provided By University of Wollongong

  • White Papers // Jul 2010

    Fair Value Accounting In China: Neoliberalisation And Accounting Change

    This paper explores the tension between neoliberal theory and practice by using China as an example. This paper investigates the implementation of Fair Value Accounting (FVA) in China and argues that market share prices are not 'Fair values' of companies' financial position as theories of FVA assume, rather, they project...

    Provided By University of Wollongong

  • White Papers // Jul 2010

    The Baryulgil Mine: Asbestos And Aboriginality

    This paper documents the history of corporate paternalism and the effects of asbestos mining on the indigenous community at Baryulgil in northern New South Wales. Despite the lack of profitability of the asbestos mine at Baryulgil, the operations continued for over 30 years leaving a legacy of asbestos-related issues. The...

    Provided By University of Wollongong

  • White Papers // Jun 2009

    Categorical Data Modeling: Logistic Regression Software

    A Matlab based software for logistic regression is developed to enhance the process of teaching quantitative topics and assist researchers with analyzing wide area of applications where categorical data is involved. The software offers an option of performing stepwise logistic regression to select the most significant predictors. The software includes...

    Provided By University of Wollongong

  • White Papers // Apr 2009

    A Sensor Network Data Aggregation Technique

    Existing sensor network data aggregation techniques assume that the nodes are preprogrammed and send data to a central sink for offline querying and analysis. This approach faces two major drawbacks. First, the system behavior is preprogrammed and cannot be modified on the fly. Second, the increased energy wastage due to...

    Provided By University of Wollongong

  • White Papers // Apr 2011

    PEREA: Practical TTP-Free Revocation of Repeatedly Misbehaving Anonymous Users

    Several anonymous authentication schemes allow servers to revoke a misbehaving user's ability to make future accesses. Traditionally, these schemes have relied on powerful TTPs capable of deanonymizing (or linking) users' connections. Such TTPs are undesirable because users' anonymity is not guaranteed, and users must trust them to judge misbehaviors fairly....

    Provided By University of Wollongong

  • White Papers // Jun 2010

    Wireless Aquatic Navigator for Detection and Analysis (WANDA)

    The cost of monitoring and detecting pollutants in natural waters is of major concern. Current and forthcoming bodies of legislation will continue to drive demand for spatial and selective monitoring of the environment, as the focus increasingly moves towards effective enforcement of legislation through detection of harmful events, and unambiguous...

    Provided By University of Wollongong

  • White Papers // Jul 2011

    Responsible Financing?: The Equator Principles And Bank Disclosures

    The purpose of this paper is to consider the impact of the Equator Principles on banking disclosures. The paper explores whether signatory banks are disclosing information related to their obligations under the Equator Principles and discusses the types of disclosures being made publicly available. The paper illustrates that banks are...

    Provided By University of Wollongong

  • White Papers // Jul 2011

    Evidence Of Financial Integration In Asia: An Empirical Application Of Panel Unit Root Tests And Multivariate Cointegration And Causality Procedures

    This paper measures the extent of financial integration and interdependence among Asian equity markets over the period January 1993 to June 2006 using daily data. The analysis includes three developed markets (Hong Kong, Japan and Singapore) and eight emerging markets (China, India, Indonesia, Korea, Malaysia, the Philippines, Taiwan and Thailand)....

    Provided By University of Wollongong

  • White Papers // Jul 2011

    Assessing Financial Integration in European Union Equity Markets, 1990-2006: Panel Unit Root And Multivariate Cointegration And Causality Evidence

    This paper measures financial integration among selected European Union equity markets over the period July 1990 to June 2006 using daily data. Eleven markets (Austria, Belgium, Denmark, France, Germany, Greece, Ireland, Italy, Netherlands, Spain and the United Kingdom) are included in the analysis. Panel unit root tests are used to...

    Provided By University of Wollongong

  • White Papers // Jul 2011

    An Empirical Survey Of Individual Consumer, Business Firm And Financial Institution Attitudes towards Islamic Methods

    Islamic finance - financial institutions, products and services designed to comply with the central tenets of Sharia (Islamic law) - is one of the most rapidly growing segments in global financial services. However, despite its growing importance, it is only relatively recently that attempts have been made to evaluate the...

    Provided By University of Wollongong

  • White Papers // Sep 2009

    Ricardian Equivalence And The Efficacy Of Fiscal Policy In Australia

    Events surrounding the global financial and economic crises of 2008 and 2009 have sparked a renewed interest in discretionary fiscal policy. This paper considers whether private saving in Australia behaves in a manner that is consistent with Ricardian equivalence, thus mitigating the effects of fiscal policy, or conversely, if fiscal...

    Provided By University of Wollongong

  • White Papers // Jan 2011

    Identity-Based Chameleon Hash Scheme Without Key Exposure

    The notion of chameleon hash function without key exposure plays an important role in designing chameleon signatures. However, all of the existing key-exposure free chameleon hash schemes are presented in the setting of certificate-based systems. In 2004, Ateniese and de Medeiros questioned whether there is an efficient construction for identity-based...

    Provided By University of Wollongong

  • White Papers // Jan 2011

    Three-Round Abuse-Free Optimistic Contract Signing With Everlasting Secrecy (Short Paper)

    Contract signing is an important part of business transactions. Fairness is a basic requirement for contract signing. However, most of the existing contract signing protocols only focuses on the fairness while ignoring the privacy of the players. The authors argue that the privacy of the players is close related to...

    Provided By University of Wollongong

  • White Papers // Aug 2011

    P2CP: A New Cloud Storage Model to Enhance Performance of Cloud Services

    This paper presents a storage model named Peer-To-Cloud and Peer (P2CP). Assuming that the P2CP model follows the Poisson process or Little's law, the authors prove that the speed and availability of P2CP is generally better than that of the pure Peer-To-Peer (P2P) model, the Peer-To-Server, Peer (P2SP) model or...

    Provided By University of Wollongong

  • White Papers // Feb 2012

    Fault Analysis of the KATAN Family of Block Ciphers

    In this paper, the authors investigate security of the KATAN family of block ciphers against differential fault attacks. KATAN consists of three variants with 32, 48 and 64-bit block sizes, called KATAN32, KATAN48 and KATAN64, respectively. All three variants have the same key length of 80 bits. They assume a...

    Provided By University of Wollongong

  • White Papers // Feb 2012

    Security Analysis of A Single Sign-On Mechanism for Distributed Computer Networks

    Single Sign-On (SSO) is a new authentication mechanism that enables a legal user with a single credential to be authenticated by multiple service providers in distributed computer networks. Recently, Chang and Lee proposed a new SSO scheme and claimed its security by providing well-organized security arguments. In this paper, however,...

    Provided By University of Wollongong

  • White Papers // Feb 2010

    Information and Communication Technology Adoption: Challenges for Nigerian SMEs

    Although Information and Communication Technology (ICT) provides enormous opportunities such as storing, processing, retrieving, disseminating and sharing of information, its use within SMEs in developing countries is still plagued with many problems that hinder effective and efficient management. Researchers argue that in national and regional economies, Small and Medium Sized...

    Provided By University of Wollongong

  • White Papers // May 2011

    Drivers for Information and Communication Technology Adoption: A Case Study of Nigerian Small and Medium Sized Enterprises

    In recent times, the current use of Information and Communication Technology (ICT) in many organizations causes some forms of revolution in their business practices. ICT is increasingly becoming related to organizational values. Researchers reveal that there is a growing support for the positive relationship between ICT and its advantages. According...

    Provided By University of Wollongong