This research work sought to perform an evaluation of how effective IT Service Operation plays out in service-based organizations in Ghana using Information Technology Infrastructure Library (ITIL) version 3 framework. The main objective was to…
Highly sensitive information pertaining to individuals and government institutions couple with their daily transactions are processed in an electronic format these days, making information security a critical part of e-Government applications and…
This dissertation provides a new substantive finding that evaluates the factors that influence the adoption of Biometric Technology by developing countries like Ghana, Social Security and National Insurance Trust (SSNIT). Even though there has been…
If financial institutions cannot detect incidents effectively, it cannot succeed to responding to incidents. This implies that the detection of incidents, is the most important aspect of incident response. A stochastic process with a first order…
Cloud computing is the computing model in which the computing resources such as software, hardware and data are delivered as a service through the internet with the aid of web browsers or light-weight desktop machine over the internet (Wink, 2012).…
This study investigates the impact of the automated information systems introduced (as a key strategy) by the Food Security Through Co-operatives in Northern Ghana (FOSTERING) Project in distressed credit unions in these three areas: Salaga, Chamba,…
Small and Medium Scale Enterprises (SMEs) have a great influence on the lives of people of our economy. They play vital roles such as revenue generation and creation of employment. Statistics proves that SMEs constitute over 60% of all businesses in…
An Integrated Financial Management Information System (IFMIS) has been deemed to be a perfect financial information system developed to improve and streamline public financial
management by computerizing government financial operations (Rodin-Brown,…
Social Engineering is the art of human hacking that made their targets do things that in their real senses will not do. The human factor is social is so huge that they normally use and insider to commit their malicious acts and they offers assailants…
The purpose of this study is to assess the maturity level of implementation of Information Security Governance (ISG) in mobile money firms in Ghana. Mobile Money Issuers in Ghana play an increasingly active role in our financial sector. This is to…