LECTURERS’ AND STUDENTS’ PERCEPTION OF SOCIAL MEDIA FOR TEACHING AND LEARNING DURING THE COVID-19 PANDEMIC: A CASE STUDY OF ACHIEVERS UNIVERSITY, OWO, NIGERIA

Authors

  • T. O. Omotehinwa
  • A. A. Adeniyi
  • T. S. Adenegan

DOI:

https://doi.org/10.33003/fjs-2021-0501-567

Keywords:

Social Media, Technology Acceptance Model (TAM), Online learning, Perceived Usefulness, Perceived Ease of Use, COVID-19

Abstract

This study examined the perception of lecturers and students of Achievers University, Owo, Nigeria, about the use of social media for teaching and learning during the COVID-19 pandemic. The study, was carried out on 123 lecturers and 487 students from the 4 existing colleges through 5-point Likert scale questionnaires administered online. Data collected were analyzed using t-test and ANOVA in addition to the descriptive statistics. The findings of this study show that, social media was perceived to be useful for teaching by lecturers while students have a negative perception about its usefulness and ease of use. The study recommends that lecturers must be exposed through seminars and conferences to the best practices for developing and delivering online courses to make online teaching very productive and enjoyable for both lecturers and students

References

Balaji, S., & Kumar, K. B. (2013). A New Intrusion Detection System in Data mMining & Fuzzy Logic. International Journal of Modern Engineering Research Vol. 3, Issue. 6, 3425-3428. ISSN: 2249-6645.

Crosby, G. V., Hester, L., & Niki, P. (2011). Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks. International Journal of Network Security, Vol.12, No.2., 107-117.

Dhopte, S., & Tarapore, N. (2012). Design of Intrusion Detection System using Fuzzy Class-Association Rule Mining based on Genetic Algorithm. International Journal of Computer Applications. Volume 53– No.14 , 20-27. ISSN: 0975 – 8887.

Hofmann, M., & Klinkenberg, R. (2014). Rapid Miner: Data Mining Use Cases and Business Analytics Applications. Boca Raton: CRC Press.

Holmes, G., Donkin, A., & Witten, I. (2002). WEKA: a machine learning workbench. IEEE Xplore. Brisbane: IEEE.

Jabez, J., & Muthukumar, B. (2015). Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection Approach. International Conference on Intelligent Computing, Communication & Convergence. Procedia Computer Science 48 (pp. 338 – 346 ). India: Elsevier B.V.

Liu, Y., & Zhu, L. (2019). A new intrusion detection and alarm correlation technology based on neural network. EURASIP Journal on Wireless Communications and Networking.

Nayak, U., & Rao, U. H. (2014). The InfoSec Handbook. An Introduction to Information Security. Apress. ISBN: 978-1-4302-6383-8.

Patil, U., Gunjal, R., Gadhe, A., Kulkarni, R., & Mandlik, S. (2016). Network Intrusion Detection & Prevention System using Fuzzy Logic and Genetic Algorithm. International Journal of Innovative Research in Science and Engineering. Vol 2(3), 276-283. ISSN: 2454-9665.

Quinlan, R. J. (1993). C4.5: programs for machine learning. San Francisco: Morgan Kaufmann Publishers Inc.

Published

2021-06-28

How to Cite

Omotehinwa, T. O., Adeniyi, A. A., & Adenegan, T. S. (2021). LECTURERS’ AND STUDENTS’ PERCEPTION OF SOCIAL MEDIA FOR TEACHING AND LEARNING DURING THE COVID-19 PANDEMIC: A CASE STUDY OF ACHIEVERS UNIVERSITY, OWO, NIGERIA . FUDMA JOURNAL OF SCIENCES, 5(1), 288 - 301. https://doi.org/10.33003/fjs-2021-0501-567