Olumide Longe
Olumide Longe
Fulbright Fellow & Research Scholar, Southern University, Baton Rouge, Louisiana, USA
Verified email at fulbrightmail.org
Title
Cited by
Cited by
Year
People’s perception on household solid waste management in Ojo Local Government Area in Nigeria
EO Longe, OO Longe, EF Ukpebor
IRANIAN JOURNAL OF ENVIRONMENTAL HEALTH SCIENCE AND ENGINEERING (IJEHSE) 6 …, 2009
812009
CYBER CRIME AND CRIMINALITY IN NIGERIA: WHAT ROLES ARE INTERNET ACCESS POINTS IN PLAYING?
OB Longe, SC Chiemeke
EUROPEAN JOURNAL OF SOCIAL SCIENCES 6 (4), 132-139, 2008
772008
Criminal uses of information & communication technologies in sub-Saharan Africa: trends, concerns and perspectives
O Longe, O Ngwa, F Wada, V Mbarika, L Kvasny
Journal of Information Technology Impact 9 (3), 155-172, 2009
532009
Research outputs from Nigerian tertiary institutions: an empirical appraisal
S Chiemeke, OB Longe, FA Longe, IO Shaib
Library philosophy and practice, 1, 2009
482009
Exposure of children and teenagers to internet pornography in South Western Nigeria: Concerns, trends & implications
OB Longe, SC Chiemeke, OFW Onifade, FM Balogun, FA Longe, VU Otti
Journal of information technology impact 7 (3), 195-212, 2007
382007
Sakawa-cybercrime and criminality in Ghana
R Boateng, L Olumide, RS Isabalija, J Budu
Journal of Information Technology Impact 11 (2), 85-100, 2011
372011
Seeing beyond the surface, understanding and tracking fraudulent cyber activities
OB Longe, V Mbarika, M Kourouma, F Wada, R Isabalija
arXiv preprint arXiv:1001.1993, 2010
342010
Users' perceptions of the use of academic libraries and online facilities for research purposes in Nigeria
S Chiemeke, OB Longe, SS Umar, IO Shaib
Library Philosophy and Practice 9 (2), 1-13, 2007
312007
Preliminary insights into the influence of mobile phones in micro-trading activities of market women in Nigeria
R Boateng, R Hinson, R Galadima, L Olumide
Information Development 30 (1), 32-50, 2014
302014
The nigerian web content: Combating pornography using content filters
OB Longe, FA Longe
Journal of Information Technology Impact 5 (2), 59-64, 2005
222005
An empirical test of the space transition theory of cyber criminality: The case of Ghana and beyond
P Danquah, OB Longe
African Journal of Computing & ICTs 4 (2), 37-48, 2011
202011
Checking Internet masquerading using multiple CAPTCHA challenge-response systems
OB Longe, ABC Robert, U Onwudebelu
2009 2nd International Conference on Adaptive Science & Technology (ICAST …, 2009
192009
Cyber deception and theft: An ethnographic study on cyber criminality from a ghanaian perspective
P Danquah, OB Longe
Journal of Information Technology Impact 11 (3), 169-182, 2011
182011
Action speaks louder than words-understanding cyber criminal behavior using criminological theories
F Wada, O Longe, P Danquah
The Journal of Internet Banking and Commerce 17 (1), 1-12, 1970
181970
On the origins of advance fee fraud electronic mails: A technical investigation using Internet protocol address tracers
O Longe, A Osofisan
The African Journal of Information Systems 3 (1), 2, 2011
162011
The design and implementation of an E-mail encryptor for combating Internet spam
OB Longe, SC Chiemeke
Proceedings of the Ist International Conference of the International …, 2006
162006
Cyber Crime and Criminality in Ghana: Its Forms and Implications.
R Boateng, OB Longe, V Mbarika, I Avevor, SR Isabalija
AMCIS, 507, 2010
152010
A sobel edge detection algorithm based system for analyzing and classifying image based spam
NC Woods, OB Longe, ABC Roberts
Journal of Emerging Trends in Computing and Information Sciences 3 (4), 506-512, 2012
142012
Information & communication technology adoption among adults in south western Nigeria: An assessment of usage-phobia factors
O Longe, R Boateng, F Longe, K Olaubosun
122010
Technophobia and its impact on adults learning to use computers in south western Nigeria
OB Longe, OV Uzoma
Journal of Information Technology Impact 7 (1), 81-90, 2007
82007
The system can't perform the operation now. Try again later.
Articles 1–20