Library and Information Science
Permanent URI for this collectionhttp://197.211.34.35:4000/handle/123456789/206
Library and Information Science
Browse
7 results
Search Results
Item The Role of Academic Libraries in Enhancing Workflow in African Universities(Proceedings of the International Conference on Information and Communication Technology and Its Applications, School of Information and Communication Technology, Federal University of Technology, Minna, Nigeria, 2016) Abduldayan, F.J.; Dang, T.L.; Karemani, A.; Obadia, S.B.An academic library may be beautifully designed but with little impact on the research output of its users. This study identified these gaps with reference to African libraries. Researchers, irrespective of their areas of interest, have a common research workflow which defines the entire research process. Information and Communication Technologies (ICT) can be embedded at every level of the workflow, creating an enabling research environment to ease research processes and better output. Academic librarians, as part of their role in supporting teaching, learning, and research, are expected to introduce, advocate, and create awareness and offer support services on available relevant products and services that can be embedded at every level of the research workflow. This study identified new products and services and suggested how they should be embedded through the research process. The study concluded that embedding these new products and services in research workflow will improve the quality of researches emanating from Africa and ultimately improve our research visibility globally.Item Assessment of Plagiarism in Undergraduate Projects in the Department of Library and Information Technology, Federal University of Technology, Minna, Niger State(Nigerian Libraries: Journal of the Nigerian Library Association (NLA), 2017) Abduldayan, F.J.; Obaje, A.M.; Oyedum, G.U.The study examined students' plagiarism in undergraduate final year projects for the 2014/2015 academic session in the Department of Library and Information Technology, Federal University of Technology, Minna. Turnitin anti-plagiarism software was used in checking the similarity index and percentage of plagiarized content in the students’ projects. The acceptable benchmark for similarity index was 20% in line with the University policy. All the cases of plagiarism are treated as a case of examination misconduct by the University. The study utilized the analysis of Turnitin anti-plagiarism software as the method for determining the rate of plagiarism. The total population of 42 students for the 2014/2015 was considered, of which 31 (73.8%) successfully trained in their work and graduated with percentages ranging from 14% to 20% similarity indices. The study determined different tricks and methods adopted by students in manipulating the results of Turnitin in order to get the acceptable percentages. Findings revealed some of the challenges faced by students while using Turnitin for plagiarism check. These included students’ lack of paraphrasing skills, time constraints, and lack of continuous monitoring of students’ progress by faculty instructors. The study concluded that Turnitin has helped improve students’ work integrity among students and staff and has also ensured integrity in intellectual outputs emanating from the university. This has led to the increased research visibility and academic ranking of the Federal University of Technology, Minna on the Web. The study recommended that the University should encourage all students to start turning in their work early and not at the end of the project, as this would give them time to paraphrase their work before submission deadlines. The need for comprehensive training on how to paraphrase contents was also recommended.Item Use of Library Resources by the Undergraduate Students in Nigerian Federal Universities(Information Trends, Kaduna, 2014) Oyedum, G. U.; Abduldayan, F.J.; Chuks-Ibe, P.O.Students' use of university library resources is essential in order to achieve their educational objectives in the universities. This paper, therefore, assessed the level of undergraduate students' use of library resources in Nigerian federal universities. The study also ascertained which of the library resources the undergraduate students use most in the university libraries. The survey research method was used for the study and the study population was 1,453 undergraduate students from across Arts, Education, Engineering, Law, Science, and Social Science faculties in the selected universities. The main instrument used for the data collection was a questionnaire. Descriptive statistics such as frequency and percentage tabulation were used in analyzing the data. Results revealed that the level of students' use of library resources in Nigerian federal universities is low. The study also revealed that students frequently visit the federal university libraries in Nigeria in order to use resources to support their classwork activities. To increase the level of library use by undergraduate students in Nigerian federal universities, the majority of the respondents indicated the need for the provision of electronic resources/internet-connected computers and the creation of a more conducive atmosphere, among other recommendations, to attract students to effectively use the university libraries.Item Research data management and information security: Role of Library and Information Technology Service (ITS) units in federal universities of technology in Nigeria(I-Manager’s Journal on Information Technology, 2019) Abduldayan, F. J.; Abifarin, F. P.; Oyedum, G. U.; Alhassan, J. A.This exploratory study presents how information security affects research data management in all the Federal Universities of Technology (FUTs) in Nigeria. These FUTs in Nigeria are: The Federal University of Technology, Minna; Federal University of Technology, Akure; Federal University of Technology, Owerri; Modibbo Adama University of Technology, Yola; and Abubakar Tafawa Balewa University, Bauchi. Lack of trust in the available security systems and safety procedures guiding the Institutional Repositories (IR) has been identified as a perceived impediment to depositing intellectual outputs and the underlying research data by researchers. The consequence of this is poor patronage of the IR and low content of repositories of FUTs in Nigeria. The objective of this study was therefore to identify the available support systems in the Libraries and Information Technology Service (ITS) Units of FUTs in Nigeria. The study used face-to-face semi-structured interview methods conducted on five university librarians and five heads of ITS Units of FUTs in Nigeria, who are responsible for the development and management of institutional repositories and are also stakeholders in effective research data management. For data transcription and analysis, this study adopted the Braun and Clarke (2006) thematic analysis approach, which involves a six-phase qualitative data analysis. Findings of the study confirmed that hacking, as a cyber threat, still poses a great threat to intellectual output and research data deposited in the IR of FUTs in Nigeria. The study recommended the need for continued capacity building to improve the cybersecurity skills and data management skills of ITS staff and librarians, respectively.Item Development of Marking Scheme(In Ohize, E.J. et al (Eds). Instructional Pedagogy. Sokoto, University Press, 2019) Akor, P.U; Udoudoh, S.J; Abduldayan, F.J.One of the most recurring and difficult situations in classroom practice is assessing the quality and quantity of learning that has taken place. This is because teaching has intended outcomes that are geared towards behavioural change. In this regard, a good teacher assesses the progress of the students through tests, assignments among others using standardized criteria. It goes without saying that adopting a standard for marking students’ scripts is a fantastic tool to help teachers ensure that marking is consistent across all students’ scripts in a particular examination, test or assignment. Hence, this unit explores the development of a good marking scheme suitable for eliminating teachers’ biasness when marking.Item Development of Library System Automation Software: A Study of Federal University of Technology, Minna Library(Lapai Journal of Management Science, Lapai, 2016) Oyedum, G.U; Abduldayan, F.J; Amos, V.The paper examined the provision of automated software for Library services in Nigerian Universities, using Federal University of Technology, Minna Library as a case study. The system design methodology was used in the study. The general objective of this study is to explore the potentials of providing effective and efficient library services of record-keeping of books and users; and giving easy access to these records to users when needed, using a desktop Java application at the University Library. This software is used to register students and staff, new books that arrive the circulation unit, lend out books to users and-make returning of the books easy. With the software, the library staff can view user record, edit the record, and calculate fine of defaulters automatically. The software can also send e-mail to various users/members who default in returning borrowed Library books. The software also generates report for the Chief Administrator to view activities carried out in various units of the Library. This software was designed and developed with Java Programming Language. The software will enhance Library services and boost professional standing of the librarian as well. Based on this study, it is recommended that provision of digital library services in Federal University of Technology Minna as well as other tertiary institutions of learning should be implemented in line with current global digital trend.Item Privacy and National Security Issues in Social Networks: The Challenges(International Journal of the Computer, the Internet and Management, Thailand, 2011-09-13) Shafi’i M. Abdulhamid; Sulaiman Ahmad; Victor O. Waziri; Fatima N. JibrilOnline social networks are becoming a major growth point of the internet, as individuals, companies and governments constantly desire to interact with one another, the ability of the internet to deliver this networking capabilities grows stronger. In this paper, we looked at the structure and components of the member profile and the challenges of privacy issues faced by individuals and governments that participate in social networking. We also looked at how it can be used to distort national security, how it became the new weapons of mass mobilization and also how social networks have became the rallying forces for revolutions and social justice.