1. AN ASSESSMENT OF THE APPLICATION OF ALTERNATIVE DISPUTE RESOLUTION METHODS TO MARRIAGE DISPUTES
ABSTRACT: Marriage is a union entered into by two parties in every jurisdiction i. e, marriage is a universal occurrence. Although the legal process involved (either in formality or requirement) varies from one jurisdiction to another, marriage is often characterized by disputes... Read More
2. ASSESSMENT OF THE IMPACT OF LOCAL GOVERNMENT ON RURAL DEVELOPMENT IN SOBA AND ZARIA LOCAL GOVERNMENT AREAS KADUNA STATE
Background to the Study: The desire for creating local government anywhere in the world stems from the need to facilitate development at the grassroots level. The issue of rural development has been creating a lot of concern in most third world countries. There has been growing r... Read More
3. ATTITUDE OF HEALTH INFORMATION MANAGEMENT IN THE CONFIDENTIALITY OF PATIENT INFORMATION
Background of the study: In recent years, the proliferation of information and communication technologies (ICT) has spread its tentacles into almost every sector of society, one of which is the medical sector. In recent years, information and communication techno... Read More
4. COMPUTERIZED LAND INFORMATION SYSTEM
BACKGROUND OF THE STUDY: Land use, land valuation, is among the oldest questions in economic theory, (Shavell, 2004). Land is an essential input (factor of production) for agriculture, and agriculture is by far the most important economic activity in preindustrial societies. With... Read More
5. THE NIGERIAN PRESS AND ETHICS OF JOURNALISM PROFESSION
Background of the study: Truth is either nailed to a bleeding cross, or it dons a variegated cloak. That is the nexus between the ‘brown envelope’ syndrome and the cancer of corruption. Siyan Oyeweso (2009). Journalism practice wields such enormous powers and cal... Read More
6. THE IMPACT OF MARKETING STRATEGY ON THE PRODUCTIVITY OF AN ORGANIZATION: A CASE STUDY OF FIRST BANK NIGERIA PLC
CHAPTER ONE
INTRODUCTION
Background to the study: To achieve a set of organizational goals and objectives, companies conceptualize, design, and implement various strategies. These strategies can be corporate, business, or functional. Marketing strategies constitute one of the... Read More
7. A CRITICAL EXAMINATION OF THE ASSOCIATED CONSEQUENCES OF DIVORCE IN THE BENIN KINGDOM
CHAPTER ONE
INTRODUCTION
BACKGROUND TO THE STUDY: The family that emerges from a marriage has some basic functions which make it unique. Bilton, Bonnett, Jones, Sheard, Stanworth and Webster (2001) observed that in all societi... Read More
8. Customer Relationship Management and its Effect on Loyalty
Background of the Study
One of the basic elements of modern marketing&... Read More
9. DESIGN AND IMPLEMENTATION OF CHARITY MANAGEMENT SYSTEM (A SEMINAR PAPER)
CHAPTER ONE
INTRODUCTION
Overview
Charity is a benevolent act that provides assistance to individuals in need through financial aid and resources. Charity is c... Read More
10. CAUSES AND EFFECTS OF RAPE AND IT'S PSYCHOLOGICAL IMPACT ON THE VICTIM: A CASE STUDY OF OF IBADAN GARAGE IJEBU ODE OGUN STATE
CHAPTER ONE
INTRODUCTION
Background of the Study Read More
11. AN ASSESSMENT OF USER SATISFACTION WITH PUBLIC PRIVATE PARTNERSHIP (PPP) PROJECTS IN SELECTED UNIVERSITY TEACHING HOSPITALS
ABSTRACT
Government at all levels are forced to prioritise and restrict public expenditures due to budget deficits and the inefficient management of large infrastructure projects. Due to the shortage of resources for healthcare delivery leading to decline in the quality of care, there i... Read More
12. COMPROMISING RANDOM LINEAR NETWORK CODING AS A CIPHER
ABSTRACT
Due to its potential improvement on network throughput, network coding has attracted considerable research interests. Random Linear Network Coding (RLNC), as a branch of research on network coding, is proposed as a cipher to protect the confidentiality of... Read More
13. DESIGN AND IMPLEMENTATION OF NETWORK ACTIVITY MONITORING SYSYTEM. (A CASE STUDY OF ANAMBRA STATE FEDRAL INLAND REVENUE SERVICES, F.I.R.S)
INTRODUCTION
Attacks on computer by outside intruder are more publicized but the ones perpetrated by insiders are very common and often more damaging. Insiders represent the greatest threat to computer security because they understand their organization’s business and how their co... Read More
14. THE EFFECTIVENESS OF SHELTERS AND SUPPORT SERVICES FOR SURVIVORS OF GENDER-BASED VIOLENCE IN NIGERIA
THE EFFECTIVENESS OF SHELTERS AND SUPPORT SERVICES FOR SURVIVORS OF GENDER-BASED VIOLENCE IN NIGERIA
Chapter One: Introduction
Background of the Study
Gender-based violence (GBV) is a profound and pervasive issue in Nigeria, affectin... Read More
15. GENDER-BASED VIOLENCE IN THE WORKPLACE: ANALYZING THE EXPERIENCES OF FEMALE EMPLOYEES IN THE CORPORATE SECTOR
GENDER-BASED VIOLENCE IN THE WORKPLACE: ANALYZING THE EXPERIENCES OF FEMALE EMPLOYEES IN THE CORPORATE SECTOR.
Chapter One: Introduction
Background of the Study
Gender-based violence (GBV) in the workplace is a pervasive issue that a... Read More