{"title":"Perception on Acceptability of Nigerian Females on Beaded Jewellery Empowerment for Entrepreneurial Development","authors":"T. Adebisi, Oluwafeyikemi Edith Bashorun, Shakirat Odunayo Abdulkadir, Banke Adebola Adepoju","doi":"10.29244/JCS.6.1.20-39","DOIUrl":null,"url":null,"abstract":"The study investigates the perception of acceptability of Nigerian females on beaded jewellery empowerment for entrepreneurial development. Four research questions with two null hypotheses were formulated and tested. Descriptive research of a survey type was adopted. 70 female students from fine and applied arts and 70 female adults from Ilorin metropolis, Nigeria were used. Proportional sampling technique was used to select the 140 participants. A self-structured questionnaire with six sections was used to seek information from them. Data collected were analyzed using frequency and percentage while the hypotheses were tested using chi-square at 0.05 level of significance. Based on the findings, the participants perceived that: beads are the major materials used, the skill might occupy a female’s time and generate income. Profits realized can be substantial for the producers and sellers. The six self -samples were accepted based on colour, design, texture and shape. It can be concluded that the skill might be acquired, used to curb female idleness and unemployment. Among the recommendations stated are: bead crafts should be included in the curriculum at all levels of study, and more aware of its acceptance on mass media and fashion shows for love of beads concerning culture, value and significance.","PeriodicalId":46074,"journal":{"name":"Journal of Computer Security","volume":null,"pages":null},"PeriodicalIF":0.9000,"publicationDate":"2021-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Computer Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.29244/JCS.6.1.20-39","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
The study investigates the perception of acceptability of Nigerian females on beaded jewellery empowerment for entrepreneurial development. Four research questions with two null hypotheses were formulated and tested. Descriptive research of a survey type was adopted. 70 female students from fine and applied arts and 70 female adults from Ilorin metropolis, Nigeria were used. Proportional sampling technique was used to select the 140 participants. A self-structured questionnaire with six sections was used to seek information from them. Data collected were analyzed using frequency and percentage while the hypotheses were tested using chi-square at 0.05 level of significance. Based on the findings, the participants perceived that: beads are the major materials used, the skill might occupy a female’s time and generate income. Profits realized can be substantial for the producers and sellers. The six self -samples were accepted based on colour, design, texture and shape. It can be concluded that the skill might be acquired, used to curb female idleness and unemployment. Among the recommendations stated are: bead crafts should be included in the curriculum at all levels of study, and more aware of its acceptance on mass media and fashion shows for love of beads concerning culture, value and significance.
期刊介绍:
The Journal of Computer Security presents research and development results of lasting significance in the theory, design, implementation, analysis, and application of secure computer systems and networks. It will also provide a forum for ideas about the meaning and implications of security and privacy, particularly those with important consequences for the technical community. The Journal provides an opportunity to publish articles of greater depth and length than is possible in the proceedings of various existing conferences, while addressing an audience of researchers in computer security who can be assumed to have a more specialized background than the readership of other archival publications.