Cover Image

Causes of Failure and Breakdown of Personal Computers in Nigeria

Francis Aien-Akho. U. Imouokhome, Moru Kehinde Desmond, Veronica I. Osubor

Abstract


Breakdown of personal computers is a common problem experienced by many computer users in Nigeria.  Breakdown could be due to anomalies in the functioning of some hardware components, conflicts in the execution of software elements, and/or negligence on the part of users and unskilled computer maintenance personnel.  Failures or breakdowns impart differently on different users.  A thorough understanding of the causes of failures and maintenance steps that users can carry out on their systems to avoid or reduce breakdowns are discussed in this paper.  To identify major causes of breakdown, the survey method of data collection was adopted to elicit information from computer users who responded to questions contained in questionnaires administered to them.  It was discovered from the analysis of the data that virus infection, unqualified maintenance technicians and local socio-economic/environmental factors are the major causes of computer breakdown in Nigeria.

 


Full Text:

PDF

References


R. F. Kahhat and E. D. Williams, “The importance of personal computers in developing countries: Case study of Peru,” IEEE International Symposium on Sustainable Systems and Technology (ISSST '09), held at Tempe, AZ, USA on18-20 May, 2009

C.W. Johnson, Failure in Safety-Critical Systems: A Handbook of Accident and Incident Reporting, Glasgow University Press, Glasgow, Scotland, Oct. 2003, p. 52,

ISBN 0-85261-784-4.

R. Bakhshi, S. Kunche, and M. Pecht, “Intermittent Failures in Hardware and Software,”.Journal. Electronic Packaging, vol. 136, Mar. 2014, pp. 011014-1 — 1014-5, http://electronicpackaging.asmedigitalcollection.asme.org/ doi:10.1115/1.4026639.

A. Saad, A. Al Ghamdi, S. M. Hussaini, and A. K. Jilani, “Empirical Model using Expert System Techniques in Hardware Failure of a System during Backup of Data,” International Journal of Computer Science and Network Security, vol.13 no.2, Feb. 2013, pp. 53 – 59.

J. Liedtke, “Improving IPC by Kernel Design,” Proc.14thACM Symp. On Operating Systems Principles, pp.175–188. Dec., 1993, studyres.com/doc/4743492/the-performance-of-µ-kernel-based-systems.

H. Härtig, M. Hohmuth, J. Liedtke, S. Schönberg and J.Wolter, “The Performance of µ-Kernel-Based Systems,” Proc.16thACM Symp. Operating Systems Principles (SOSP’97), Oct 5-8, 1997, Saint-Malo, France. https://os.inf.tu-dresden.de/papers_ps/sosp97.pdf.

L. Singaravelu, C. Pu, H. Härtig, and C. Helmuth, “Reducing TCB Complexity for Security-sensitive Applications: Three Case Studies,” Proc. 1st ACM SIGOPS/EuroSys European Conf. on Computer Systems, April. 2006, pp.161–174, Leuven Belgium. dl.acm.org/citation.cfm?id=1217951.

F. P. Buchholz and C. Shields, “Providing Process Origin Information to Aid in Computer Forensic Investigations,” Journal of Computer Security, vol.12, no. 5, pp. 753-776, Sept. 2004 https://pdfs.semanticscholar.org/4cbe/681e892a6ee062c132c2587865bf2e7782c1.pdf

E. E. Ogheneovo, “Software Dysfunction: Why Do Software Fail?,” Journal of Computer and Communications, vol. 2, Mar. 2014, pp. 25-35. http://www.scirp.org/journal/jcc

http://dx.doi.org/10.4236/jcc.2014.26004

F.A. Egbokhare, “Causes of Software/Information Technology Project Failures in Nigerian Software Development Organizations,” African Journal of Computing & ICT, vol. 7, no. 2, June 2014, pp. 107-110. https://pdfs.semanticscholar.org/6d4f/317c129c4d5688bb6fd68e7cb98579a8ec69.pdf

R. Lemos, “Device Drivers Filled with Flaws, Threaten Security,” Security Focus, May 26, 2005. Available online: http://www.securityfocus.com/news/11189.

K. M.Whitney and C. B. Daniels, “The Root Cause of Failure in Complex IT Projects: Complexity Itself,” Procedia Computer Science vol. 20, 2013, pp. 325 – 330. doi: 10.1016/j.procs.2013.09.280

J. Larus, “Spending Moore’s Dividend,” Communications of the ACM (CACM), vol. 52, no. 5, pp. 62–69. May, 2009 https://www.microsoft.com/en-us/research/wp-content/uploads/2008/05/tr-2008-69.pdf

A. H. Karp, “Enforce POLA on Processes to Control Viruses,” Communications of the ACM (CACM), vol. 46, no. 12, Dec., 2003, pp. 27–29. https://cacm.acm.org/magazines/2003/12/6658-enforce-pola-on-processes-to-control-viruses/fulltext

A .Ozment, and S. E. Schechter, “Milk or Wine: Does Software Security Improve with Age?,” Proc.15thUSENIX Security Symp., July 3, 2006, pp.93–104. https://www.usenix.org/legacyurl/15th usenix-security-symposium-58

M. Wilson and D. Howcroft, “Reconceptualising failure: Social Shaping Meets IS Research,” European Journal of Information Systems, vol. 11, no. 4, 2002, pp. 236 – 250. DOI: 10.1057/palgrave.ejis.3000437.

S.S. Oyelere and L.S. Oyelere, “Users’ Perception of the Effects of Viruses on Computer systems – An Empirical Research,” African Journal of Computing & ICT, vol. 8, no.1, Mar. 2015, pp.121-130.

M.S. Yusuf, T.O. Onotehinwa, and E.O. Okon, “Productivity of Business Enterprises: Effect of Computer Virus Infection on Files,” International Journal of Computer Science and Mobile Computing, vol. 6, no. 2, Feb. 2017, pp. 179 -193 http://www.ijcsmc.com/past_issues/volume_6_issue_2

E. Pinheiro, W. D. Weberand, and L. A. Barroso, “Failure Trends in a Large Disk Drive Population,” Proceedings of the 5th USENIX Conference on File and Storage Technologies (FAST’07),” San Jose, CA, US. Feb.13-16, 2007, pp. 17–29.

H. U. Nwosu, C. C. Obieke, and A. J. Ameh, “Failure Analysis and Shock Protection of External Hard Disk Drive,” Nigerian Journal of Technology, vol. 35, no. 4, Oct. 2016, pp. 855-865. http://dx.doi.org/10.4314/njt.v35i4.21

B. Best, “The Effect of Heat on Processors: A Challenge To Computer Usage in Northern Nigeria Rural Colleges,” Journal of Global Research in Computer Science, vol. 6, no. 1, 2015, pp. 1-6 http://www.rroij.com/open-access/pdfdownload.php?download=open-access/the-effect-of-heat-on-processors-a-challenge-to-computer-usage-in-northern-nigeria-rural-colleges.pdf&aid=60526


Refbacks

  • There are currently no refbacks.


Copyright (c) 2018 University of Sindh Journal of Information and Communication Technology



ISSN-E: 2523-1235, ISSN-P: 2521-5582

 Copyright © University of Sindh, Jamshoro. 2017 All Rights Reserved.  
Printing and Publication by: Sindh University Press. 


Journal Office, Institute of Information and Communication Technology, 
University of Sindh, Jamshoro, Sindh, Pakistan. 76080