Research outputs from Nigerian tertiary institutions: an empirical appraisal S Chiemeke, OB Longe, FA Longe, IO Shaib Library Philosophy and Practice, 1, 2009 | 90 | 2009 |
The nigerian web content: Combating pornography using content filters OB Longe, FA Longe Journal of Information Technology Impact 5 (2), 59-64, 2005 | 27 | 2005 |
„Information & communication technology adoption among adults in south western Nigeria: an assessment of usage-phobia factors‟ O Longe, R Boateng, F Longe, K Olatubosun Journal of Information Technology Impact 10 (1), 65-86, 2010 | 17 | 2010 |
The Nigerian web content: Combating the pornographic malaise using web filters OB Longe, FA Longe Journal of Information Technology Impact 5 (2), 29-50, 2005 | 10 | 2005 |
Subscribers’ Perception of the Quality of Service (QoS) of the Global System for Mobile Services in Ibadan, Nigeria F Longe Computing, Information Systems and Development Informatics Journal 2 (2), 1-14, 2011 | 8 | 2011 |
O. & Shaib, IO (2009) Research outputs from Nigerian Tertiary Institutions: An Empirical Appraisal SL Chiemeke, OB Longe, FA Longe Library philosophy and practice, 0 | 8 | |
Enhanced content analysis of fraudulent Nigeria electronic mails using e-STAT OB Longe, A Abayomi-Alli, IO l Shaib, FA Longe 2009 2nd International Conference on Adaptive Science & Technology (ICAST …, 2009 | 6 | 2009 |
Camouflages and Token Manipulations-The Changing Faces of the Nigerian Fraudulent 419 Spammers OB Longe, SC Chiemeke, OFW Onifade, FA Longe African Journal of Information & Communication Technology 4 (3), 2008 | 5 | 2008 |
Text manipulations and spamicity measures: implications for designing effective filtering systems for fraudulent 419 scam mails OB Longe, SC Chiemeke, OF Onifade, FA Longe International Conference on Adaptive Science and Technology, 2007 | 5 | 2007 |
User acceptance of Web-marketing in Nigeria: Significance of factors OB Longe, OF Onifade, SC Chiemeke, FA Longe Proceedings of the International Conference on Applied Business & Economics …, 2007 | 5 | 2007 |
An x-ray of potentials for collaboration between the academia and the IT industry O Longe, C Uwadia, F Longe Proceedings of the 8th International Conference of the Nigerian Computer Society, 2005 | 5 | 2005 |
Adoption and use of Information and Communication Technologies for Intellectual capital Management among small and medium scale Enterprises in Ibadan, Nigeria OG Omiunu, FO Omotayo, FA Longe Asian Journal of Management 12 (1), 6-14, 2021 | 4 | 2021 |
Information & communication technology adoption among adults in south western Nigeria: An assessment of usage-phobia factors L Olumide, R Boateng, F Longe, K Olatubosun Journal of Information Technology Impact 10 (1), 65-86, 2010 | 4 | 2010 |
Internet Service Providers and Cybercrime in Nigeria–Balancing Services and ICT Development OB Longe, SC Chiemeke, S Fashola, F Longe, A Omilabu | 3 | 2008 |
Adoption and use of YouTube to enhance teaching and learning of research methodology at the postgraduate level in Nigeria Universities OG Omiunu, FA Longe, EG Igwe Technology-Supported Teaching and Research Methods for Educators, 1-32, 2019 | 1 | 2019 |
Towards an online bachelor of information science degree programme in a Nigerian University: Part 2–Lessons from a market survey M Tiamiyu, I Ajiferuke, F Longe, W Nwagwu, K Ogunsola, A Opesade, ... Education for Information 29 (2), 121-145, 2012 | 1 | 2012 |
A Prototype Scalable System for Secured Bulk SMS Delivery on Mobile Networks. OB Longe, A Abdulganiyu, FA Longe, K Adegoke International Journal of Advanced Research in Computer Science 3 (1), 2012 | 1 | 2012 |
Towards an online bachelor of information science degree programme in a Nigerian University: Part 1–Lessons from the literature and existing curricula I Ajiferuke, M Tiamiyu, F Longe, W Nwagwu, K Ogunsola, A Opesade, ... Education for Information 29 (2), 89-119, 2012 | | 2012 |
Computing, Information Systems & Development Informatics Journal FA Longe, F Wada, K Ukpe Journal. Vol 1 (1), 19-23, 0 | | |
“The Risk of Internal Bleeding”-Addressing Malicious Insider Threats in Organizational Information Systems using Honeybaits. LO Babatope, SC Chiemeke, AL Tolani, FA Longe, AA Omilabu | | |