ABSTRACT
Information Communication Technology (ICT) refers to several forms of information exchange between two or more devices like computers, mobile PDAs and hi-tech devices through which any of the several methods of interconnection, principally through the Internet can be initiated to perform a defined task. These technologies provide speedy, inexpensive, secure and convenient means of communication.
Therefore, in developing countries Nigeria precisely, the impact of ICT in the maritime sector for maritime operations and security cannot be over emphasised.
It is as a result of this that this research study is determined to assess the impact of ICT on security of Maritime operations.
The cross-sectional survey research design, which involves the use of questionnaires and interviews were adopted in this study. Using simple random sampling technique a total of sixty (60)respondents were drawn from Apapa and Tincan Island Ports, Lagos, Nigeria.
This design was chosen because it provides appropriate methodology for assessment of security and ICT in the Maritime sector of the nation’s economy.
TABLE OF CONTENTS
TITLE PAGE
APPROVAL PAGE
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
TABLE OF CONTENTS
CHAPTER ONE
INTRODUCTION
1.1BACKGROUND OF STUDY
1.2STATEMENT OF PROBLEMS
1.3THE OBJECTIVE OF THE RESEARCH
1.4SCOPE AND DELIMITATION OF STUDY
1.5RESEARCH QUESTIONS
1.6 RESEARCH HYPOTHESES
1.7SIGNIFICANCE OF THE STUDY
1.8DEFINITION OF TERMS
REFERENCES
CHAPTER TWO
LITERATURE REVIEW
CONCEPTUAL REVIEW
2.1 ICT, SECURITY AND NATIONAL SECURITY
2.1.1 INFORMATION COMMUNICATIONS TECHNOLOGY (ICT) TOOLS/MATERIALS
2.1.2 SECURITY ACTORS IN THE SECURITY SYSTEMS
2.1.3 NATIONAL SECURITY
2.2 THEORETICAL REVIEW
2.3 ICT REVOLUTION AND GLOBALIZATION
2.4 ICT, GLOBALIZATION AND SECURITY MATTERS
2.5 ICT, GLOBALIZATION AND MARITIME PIRACY IN CONTEMPORARY AFRICA
2.6 MARITIME SECURITY IN NIGERIA AND AFRICA THE DYNAMICS AND TRENDS OF MARITIME PIRACY IN CONTEMPORARY AFRICA
2.7 THE SECURITY IMPLICATIONS OF SEA PIRACY AND MARITIME INSECURITY IN CONTEMPORARY AFRICA
2.8 MEASURES TO MAINTAIN NATIONAL SECURITY
2.9 ROLES OF INFORMATION AND COMMUNICATION TECHNOLOGY
2.10 PROBLEMS OF INFORMATION AND COMMUNICATION TECHNOLOGY AND NATIONAL SECURITY
CHAPTER THREE
RESEARCH METHODOLOGY
3.1RESEARCH DESIGN
3.2SAMPLE AND SAMPLING TECHNIQUES
3.2.1SAMPLING TECHNIQUES
3.3RESEARCH INSTRUMENT
3.4METHOD OF DATA COLLECTION
3.5METHOD OF DATA ANALYSIS
CHAPTER FOUR
DATA PRESENTATION AND ANALYSIS
HYPOTHESIS TESTING
CHAPTER FIVE
SUMMARY, RECOMMENDATION AND CONCLUSION
5.1SUMMARY
5.2RECOMMENDATIONS
5.3 CONCLUSION
APPENDIX