Full Project – THE APPLICATION OF INFORMATION SYSTEMS IN THE PREVENTION OF POLLUTION IN THE MARITIME INDUSTRY

Full Project – THE APPLICATION OF INFORMATION SYSTEMS IN THE PREVENTION OF POLLUTION IN THE MARITIME INDUSTRY

Click here to Get this Complete Project Chapter 1-5

CHAPTER ONE

INTRODUCTION

·         Background of the Study

Countries with small populations and higher levels of development may cope with globalization better, but they cannot afford to opt out of the mainstream forces that are shaping the world. There is, however, no doubt that economic and socio-political discontentment leads to existential discontent for populations who feel that they are marginalized either as individuals in their own societies or as nations unable to cope with the economic crises (Saighal, 2003). ICT is spearheading the current stage of globalization, which is proceeding further with fragmentation of the social state, and national governance, with wider consequences for national, regional and international security matters. Hence, the resurgence of the phenomenon of maritime piracy in contemporary Africa, the consequence of which negatively impacts on the continent’s rubrics, fabrics and ramifications of security: economic, social, political, commercial, energy, environmental, humanitarian, investments, developmental, revenue, etc, is the stepchild of both local and global explanations, and dimensions which calls for urgent attention.

The development and application of risk assessment and management techniques to maritime security must take into account the complex regulatory and operational context in which the maritime industry operates. The purpose here is not to propose new security-risk assessment models, but rather to point out some of the deficiencies of the existing ones in the broader perspective of the supply chain approach to maritime security. More specifically, the paper introduces an initial security risk assessment and management framework capable of reflecting the logistics scope of transport networks. The focus is to shift the subject of maritime security from the current agenda of facility-security to an extended framework of supply chain security. The document also reviews existing approaches to measuring transport security compliance costs and funding schemes adopted by industry and governments in order to finance the costs of security regulations. While advocating the adoption of any particular security measure is not within the scope of this analysis, the paper nevertheless not only argues that the new international security regulatory framework is a challenge, but also an opportunity to be seized. Although the new security requirements impose an additional regulatory burden on all concerned parties, security-driven business practices and operational procedures have the potential of improving efficiency and trade competitiveness.

1.2   Statement of the Problem

Maritime security is, indeed, a quandary (Uadiale and Yonmo, 2010a). The disintegration of central government authority, the lack of maritime security has, therefore, become a grave problem. The Horn of Africa and the Gulf of Guinea are thus symbols of “the few cases in Africa where security onland have spilled over and affected maritime security severely”. The lack of maritime security in the region and the fact that it was not possible to enforce the law and maintain good order at sea, threatened maritime communication, maritime sovereignty and stimulated piracy. While much of the insecurity mid-wifed, piracy of the Somalia coast stems from the collapse of governance, and law and order in Somalia, in the Gulf of Guinea, the situation is somewhat different. Maritime piracy in the Gulf of Guinea is more directly politically driven. In Nigeria, politics onland directly result in offshore actions, causing the hub of insecurity onland in the Niger Delta region to spill into the Gulf of Guinea to promote bad order at sea. According to the maritime watchdog – the International Maritime Bureau (IMB), the waters of Nigeria are now the second most dangerous in the world, next to Somalia.The proliferation of piracy in the West African region has been of concern amongst government and the oil industry since 1999. With militant groups turning pirates in the Niger Delta, claiming that they are sabotaging the oil industry for political purposes in protest of the mismanagement of Nigeria’s oil wealth. However, these political grievances are increasingly taking on a criminal nature (Uadiale and Yonmo, 2010a).

1.3   Significance of the Study

Information Communication Technology (ICT) refers to several forms of information exchange between two or more devices like computers, mobile PDAs and hi-tech devices through which any of the several methods of interconnection, principally through the Internet can be initiated to perform a defined task. These technologies provide speedy, inexpensive, secure and convenient means of communication.

Therefore, in developing countries Nigeria precisely, the impact of ICT in the maritime sector for maritime operations and security cannot be over emphasized.It is as a result of this that this research study is determined to assess the impact of ICT on security of Maritime operations.

1.4   Objectives of the Study

The objective of this study is to assessthe application of information systems in the prevention of pollution in the maritime industry.

1.5   Research Questions

1.    How can information systems be used in the prevention of pollution in the maritime industry?

1.6   Research Hypotheses

Ho: Information systems cannot be used to prevent pollution in the maritime industry.

Hi: Information systems can be used to prevent pollution in the maritime industry.

1.7   Limitations of the Study

1.    Financial constraint- Insufficient fund tends to impede the efficiency of the researcher in sourcing for the relevant materials, literature or information and in the process of data collection (internet, questionnaire and interview).

2.    Time constraint- The researcher will simultaneously engage in this study with other academic work. This consequently will cut down on the time devoted for the research work.

1.8   Scope of the Study

The study focuses on the application of information systems in the prevention of pollution in the maritime industry with rivers port as a case study.

1.9   Definition of Terms

Maritime: This is connected with the sea, especially in rerlation to seaborne trade or naval matters.

Pollution: This refers to the presence in or introduction into the environment of a substance which has harmful or poisonous effects.

Information and Communications Technology: This refers to an umbrella term that includes any communication device or application, encompassing: radio, television, cellular phones, computer and network hardware and software, satellite systems and so on, as well as the various services and applications.

Get the Complete Project

This is a premium project material and the complete research project plus questionnaires and references can be gotten at an affordable rate of N3,000 for Nigerian clients and $15 for International clients.

Click here to Get this Complete Project Chapter 1-5

 

SEO Description: Full Project - THE APPLICATION OF INFORMATION SYSTEMS IN THE PREVENTION OF POLLUTION IN THE MARITIME INDUSTRY Click here to Get this Complete Project Chapter 1-

Click here to Get The Complete Research Project Chapter 1-5

RESEARCH PROJECT CONTENTS
CHAPTER ONE - INTRODUCTION
1.1 Background of the study
1.2 Statement of problem
1.3 Objective of the study
1.4 Research Hypotheses
1.5 Significance of the study
1.6 Scope and limitation of the study
1.7 Definition of terms
1.8 Organization of the study
CHAPETR TWO – LITERATURE REVIEW
2.1. Introduction
2.2. Conceptual Framework
2.3. Theoretical Framework
2.4 Empirical Review
CHAPETR THREE - RESEARCH METHODOLOGY
3.1 Research Design
3.2 Study Area
3.3 Population of the Study
3.4 Sample Size and Sampling Technique
3.5 Instrument for Data Collection
3.6 Validity of the Instrument
3.7 Reliability of the Instrument
3.8 Method of Data Collection
3.9 Method of Data Analysis
3.9 Method of Data Analysis
3.10 Ethical Considerations
CHAPTER FOUR - DATA PRESENTATION AND ANALYSIS
4.1. Introduction
4.2 Demographic Profiles of Respondents
4.2 Research Questions
4.3. Testing of Research Hypothesis
4.4 Discussion of Findings
CHAPTER FIVE – SUMMARY, CONCLUSION & RECOMMENDATIONS
5.1 Introduction
5.2 Summary
5.3 Conclusion
5.4 Recommendation
REFERENCES
APPENDIX


Frequently Asked Questions | Https://eduschooler.com

Frequently Asked Questions

How do I get my choice complete project on any topic?
Simply click on the Download button above and follow the procedure stated.
I have a fresh topic that is not on your website. How do I go about it?
Chat with us on WhatsApp or contact our Instant Help Desk for a custom research project on your topic.
How fast can I get this complete project on any project topic?
Within 15 minutes if you want this exact project topic without adjustment.
Is it a complete research project or just materials?
It is a Complete Research Project i.e Chapters 1-5, Abstract, Table of Contents, Full References, Questionnaires / Secondary Data.
What if I want to change the case study for this topic?
Chat with Our Instant Help Desk Now: +234 708 7083 227 and you will be responded to immediately.
How will I get my complete project?
Your Complete Project Material will be sent to your Email Address in Ms Word document format.
Can I get my Complete Project through WhatsApp?
Yes! We can send your Complete Research Project to your WhatsApp Number.
What if my Project Supervisor made some changes to a topic I picked from your website?
Call Our Instant Help Desk Now: +234 708 7083 227 and you will be responded to immediately.
Do you assist students with Assignment and Project Proposal?
Yes! Call Our Instant Help Desk Now: +234 708 7083 227 and you will be responded to immediately.
What if I do not have any project topic idea at all?
Smiles! We've Got You Covered. Chat with us on WhatsApp Now to Get Instant Help: +234 708 7083 227.
How can I trust this site?
We are genuine and duly registered with the Corporate Affairs Commission. This site runs on Secure Sockets Layer (SSL), ensuring all transactions are highly secure and safe.
Customer Testimonials | Https://eduschooler.com

Our Customers are Happy

Ademola A.

★★★★★

I was skeptical at first, but after placing my order, my full project arrived in my email in under 15 minutes! The process was smooth, clear, and professional. Truly amazing service!

Kwabena K.

★★★★★

I needed a custom project on a new topic. Https://eduschooler.com delivered within 3 days, and the quality was outstanding. They even guided me on how to defend it. Highly recommend!

Michael H.

★★★★★

Fast, reliable, and very professional. My research project was delivered on time, with no hidden charges. The team is trustworthy and supportive.

Fatou B.

★★★★★

I got my full project in minutes and my custom request within 3 days. Their communication is clear, and the material is top-notch. Excellent experience!

James O.

★★★★★

https://eduschooler.com is a lifesaver! My project was delivered exactly as requested. The team is friendly, professional, and highly responsive. Very satisfied!

Ngozi E.

★★★★★

I was worried about paying online, but the team reassured me and delivered my complete project instantly. Transparent and professional service!

Ama S.

★★★★★

I requested a custom topic project and received it in just 3 days. The guidance and quality were excellent. I recommend eduschooler.com to everyone!

Sarah W.

★★★★★

The service is dependable and efficient. My project arrived on time, and every step was transparent. Truly a professional service I trust.

Emmanuel T.

★★★★★

Fast and reliable. My full project was delivered in minutes, and the custom project in 3 days. Communication was excellent throughout.

Aisha N.

★★★★★

Extremely satisfied with the service. My project was delivered promptly, fully transparent, and of high quality. A trustworthy academic partner!

Leave a Reply