i-manager's Journal on Information Technology (JIT)


Volume 7 Issue 4 September - November 2018

Article

Analysis of Key Dynamics of Software Piracy in Sub-Saharan Africa

Mboungou Mouyabi Seke*
*University of the Witwatersrand, Johannesburg, South Africa.
Mouyabi seke, M.(2018). Analysis of Key dynamics of software piracy in Sub-Saharan Africa, i-manager's Journal on Information Technology, 7(4), 1-10 https://doi.org/10.26634/jit.7.4.15071

Abstract

Since Africa faces a growing pressure of Information and Communication Technology (ICT) adoption in the light of commercial investments, one of the predicaments the continent still struggles with is a lucrative "business" that has caught the attention of organized crime groups in a number of countries. This profitable business called software piracy is by definition one of the most common types of computer crimes. Its exact impact is hard to quantify, but there is no doubt that this trend has been increasing everywhere in the world. However, Africa is the continent that counts several developing countries that are not presently operating service economies; consequently, there is no shame concomitant with downloading, purchasing, or selling pirated software products. Thus far, there are many reasons provided by various knowledge bases to why software piracy happens; this paper, however discussed four causal factors of software piracy in the Sub-Saharan Africa. It emphasises on their dynamics identified to be crucial in encouraging this sordid behaviour in this particular sub-region of the globe. In addition, this paper argues the major issues surrounding this topic and suggests a way forward towards an anti-piracy continent.

Article

Social Media Impacts and Security Issue on Data

Tella Prameela* , Elodie**
*Assistant Professor, Computer Science and Engineering, Siddartha Educational Academy Group of Institutions, Tirupathi, Chittoor(Dist), Andhra Pradesh, India.
**Assistant Professor, Computer Science and Engineering VEMU Institute of Technology, P.Kothakota, Chittoor(Dist), Andhra Pradesh, India.
Prameela, T., Samakoti , T.(2018) Social Media Impacts and Security Issue on Data, i-manager's Journal on Information Technology, 7(4), 11-15. https://doi.org/10.26634/jit.7.4.14574

Abstract

In this world everyone is interested in Social Media. There are so many advantages and disadvantages on using social media in political, educational, entertainment, etc, areas. Here the main concern is Social Media users to be aware of what is going on in a day-to-day life. There is no wrong in updating their views professionally or personally, but one should be careful in using Social Media. Social media platforms like Facebook, Twitter, Whatsapp, etc., companies also give a support for protecting the users' data. In this paper, the authors have discussed the impact of social media in all sectors, how the social media influence the users, and also explained the real time issue done in America Elections, and finally provides idea on how to overcome data leakage in social media users.

Research Paper

The Insights of Mobile Augmented Reality Applications on Humans Performing the Task of Order Picking

Tom Page* , Gisli Thorsteinsson**
*Associate Professor, Department of Product Design, Nottingham Trent University, England.
**Professor, Department of Design and Craft Education, University of Iceland, Iceland.
Page, T., Thorsteinsson , G.(2018). The Insights of Mobile Augmented Reality Applications on Humans Performing the Task of Order Picking, i-manager's Journal on Information Technology, 7(4), 16-29. https://doi.org/10.26634/jit.7.4.14697

Abstract

Augmented Reality (AR) is a technology that overlays specific objects on a camera with virtual images, graphics, and communication. This paper presents series of secondary sources with a wide range of subjects connected to this topic. These include order picking as logistical problem, different views on the implementation of augmented reality, and previous experiments using augmented reality to solve logistical problems. This paper investigates the results from an observational experiment created by the author. This experiment involves a range of participants searching for specific books on a library shelf, once with the aid of a mobile AR application and once without. Participants are then asked a series of questions about their experiences with the AR application and to give their own personal comments. The times, feedback, and observations from the participants are correlated with previous theories and experiments using AR in a library to provide insights to research questions.

Research Paper

Designing of Wireless Sensor Network to Protect Agricultural Farm from Wild Animals

Prashant V. Mane Deshmukh*
* Assistant Professor, Department of Electronics, Jayawantrao Sawant College of Commerce and Science, Hadapsar, Pune, Maharashtra, India.
Mane-Deshmukh, P. V.(2018)Designing of Wireless Sensor Network to Protect Agricultural farm from wild Animals, i-manager's Journal on Information Technology, 7(4), 30-36. https://doi.org/10.26634/jit.7.4.14505

Abstract

Nowadays, the agricultural sector demands innovative technology to enhance the quality of agricultural products as well as to protect the same. New technologies such as Wireless Sensor Network are widely utilized in this sector for drip irrigation, soil parameter monitoring, green house control, etc. However, on a survey it is found that the agricultural land protection is one of the challenging tasks. Considering such fact it is proposed to design a wireless sensor network to protect agricultural land. The wireless sensor network is the most suitable technology to overcome traditional systems, save time of human being. The wireless network is designed to ensure real time patrolling at the border of agricultural farm and presented in this paper. For present research work, embedded technology based on sensor node have been designed by deploying advance microcontroller PIC 18F4550. The nodes are used to identify the movement of the wild animals crossing in to the border and monitor the activity occurred at border of agricultural land. Moreover, the sensor node is equipped with the IEEE 802.15.4 standard based RF module for wireless communication. The WSN collects information of the wild animals trying to enter into the cultivated crops and the same is disseminated towards the base station located at farmhouse. Moreover, it creates an irritating sound for animals to run away from the typical area. The developed smart graphical user interface helps the farmer to find correct location of the wild animals’ movement. From the database, the farmers can immediate take action for protection of crops.

Research Paper

Context Information Device Enriched Architecture for Context Computing

G. K. Mohan Devarakonda* , Y. K. Sundara Krishna**
* Research Scholar and Academic Consultant, Department of Computer Science, Krishna University, Machilipatnam, Andhra Pradesh, India.
** Professor, Department of Computer Science, Krishna University, Machilipatnam, Andhra Pradesh, India..
Devarakonda, M. G. K., KRISHNA, S. Y. K. (2018) Context Information Device Enriched Architecture for Context Computing,i-manager's Journal on Information Technology, 7(4), 37-42. https://doi.org/10.26634/jit.7.4.15075

Abstract

With the increased use of smartphone devices, the business domains are fetching new ways to promote their services. One such business model of computing is to locate the customer through his geographical coordinates and providing the service accordingly, which is termed as context computing or context aware computing or location based service (Payton, Roman, & Julien, 2004). However, the business domains are concentrating on the service point of view, but not on the user choice of required service. For example, a user when moving in a medical emergency may not be able to find out the right hospital based on his type of emergency because hospitals may be of different specialities. In earlier types of context awareness applications, location of user at any particular point of time is termed as the context. This paper redefines the context not only as user location at any particular point of time, but also the user’s state of mind and choice of required service as the context and concentrates more on the services from the user’s point of view. Concentration on the user requirement and customization of services is also a key point in the business, which increases the market substantially. This paper proposes a new approach for context based computing that enables the user to avail services based on his requirement. This paper also proposes a methodology and architecture to provide context aware services to the user in a customizable manner so that the user can specify his requirements more clearly and avail the service that suits his requirement. This approach helps smaller markets to grow more and larger markets to increase further.