The patronage of e-payment systems has significantly increased over the years. In some parts of the world, it has become the most preferred medium of payment. As at 2015, seven out of eight transactions were done electronically in Europe (BUONAGUIDI,…
If financial institutions cannot detect incidents effectively, it cannot succeed to responding to incidents. This implies that the detection of incidents, is the most important aspect of incident response. A stochastic process with a first order…
Due to the rapid growth of computer system and Internet, network security became crucial issue for most organizations. Mostly organizations increase usage of different tools and methods to secure their network due to the increase of security threats.…
The use of information system in the maritime industry and most especially in Ghana Ports and Habours provides the organisation with a much-improved service as well as efficiency and effectiveness of personnel. The success derived from Information…
This research work sought to perform an evaluation of how effective IT Service Operation plays out in service-based organizations in Ghana using Information Technology Infrastructure Library (ITIL) version 3 framework. The main objective was to…
Cloud computing is the computing model in which the computing resources such as software, hardware and data are delivered as a service through the internet with the aid of web browsers or light-weight desktop machine over the internet (Wink, 2012).…
Small and Medium Scale Enterprises (SMEs) have a great influence on the lives of people of our economy. They play vital roles such as revenue generation and creation of employment. Statistics proves that SMEs constitute over 60% of all businesses in…
An Integrated Financial Management Information System (IFMIS) has been deemed to be a perfect financial information system developed to improve and streamline public financial
management by computerizing government financial operations (Rodin-Brown,…
Social Engineering is the art of human hacking that made their targets do things that in their real senses will not do. The human factor is social is so huge that they normally use and insider to commit their malicious acts and they offers assailants…
Information Security is a process of protecting the Confidentiality, Availability and Integrity of the information and information resources against unauthorized user. Educational institutions become increasingly dependent on information systems for…