ABSTRACT
Information Communication Technology (ICT) refers to several forms of information exchange between two or more devices like computers, mobile PDAs and hi-tech devices through which any of the several methods of interconnection, principally through the Internet can be initiated to perform a defined task. These technologies provide speedy, inexpensive, secure and convenient means of communication.
Therefore, in developing countries Nigeria precisely, the impact of ICT in the maritime sector for maritime operations and security cannot be over emphasised.
It is as a result of this that this research study is determined to assess the impact of ICT on security of Maritime operations.
The cross-sectional survey research design, which involves the use of questionnaires and interviews were adopted in this study. Using simple random sampling technique a total of sixty (60)respondents were drawn from Apapa and Tincan Island Ports, Lagos, Nigeria.
This design was chosen because it provides appropriate methodology for assessment of security and ICT in the Maritime sector of the nation’s economy.
TABLE OF CONTENTS
TITLE PAGE
APPROVAL PAGE
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
TABLE OF CONTENTS
CHAPTER ONE
INTRODUCTION
1.1 BACKGROUND OF STUDY
1.2 STATEMENT OF PROBLEMS
1.3 THE OBJECTIVE OF THE RESEARCH
1.4 SCOPE AND DELIMITATION OF STUDY
1.5 RESEARCH QUESTIONS
1.6 RESEARCH HYPOTHESES
1.7 SIGNIFICANCE OF THE STUDY
1.8 DEFINITION OF TERMS
REFERENCES
CHAPTER TWO
LITERATURE REVIEW
CONCEPTUAL REVIEW
2.1 ICT, SECURITY AND NATIONAL SECURITY
2.1.1 INFORMATION COMMUNICATIONS TECHNOLOGY (ICT) TOOLS/MATERIALS
2.1.2 SECURITY ACTORS IN THE SECURITY SYSTEMS
2.1.3 NATIONAL SECURITY
2.2 THEORETICAL REVIEW
2.3 ICT REVOLUTION AND GLOBALIZATION
2.4 ICT, GLOBALIZATION AND SECURITY MATTERS
2.5 ICT, GLOBALIZATION AND MARITIME PIRACY IN CONTEMPORARY AFRICA
2.6 MARITIME SECURITY IN NIGERIA AND AFRICA THE DYNAMICS AND TRENDS OF MARITIME PIRACY IN CONTEMPORARY AFRICA
2.7 THE SECURITY IMPLICATIONS OF SEA PIRACY AND MARITIME INSECURITY IN CONTEMPORARY AFRICA
2.8 MEASURES TO MAINTAIN NATIONAL SECURITY
2.9 ROLES OF INFORMATION AND COMMUNICATION TECHNOLOGY
2.10 PROBLEMS OF INFORMATION AND COMMUNICATION TECHNOLOGY AND NATIONAL SECURITY
CHAPTER THREE
RESEARCH METHODOLOGY
3.1 RESEARCH DESIGN
3.2 SAMPLE AND SAMPLING TECHNIQUES
3.2.1 SAMPLING TECHNIQUES
3.3 RESEARCH INSTRUMENT
3.4 METHOD OF DATA COLLECTION
3.5 METHOD OF DATA ANALYSIS
CHAPTER FOUR
DATA PRESENTATION AND ANALYSIS
HYPOTHESIS TESTING
CHAPTER FIVE
SUMMARY, RECOMMENDATION AND CONCLUSION
5.1 SUMMARY
5.2 RECOMMENDATIONS
5.3 CONCLUSION
APPENDIX