<?xml version="1.0" encoding="UTF-8"?>
<itemContainer xmlns="http://omeka.org/schemas/omeka-xml/v5" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://omeka.org/schemas/omeka-xml/v5 http://omeka.org/schemas/omeka-xml/v5/omeka-xml-5-0.xsd" uri="https://repository.gctu.edu.gh/items/browse?output=omeka-xml&amp;page=301" accessDate="2026-05-10T18:47:13+00:00">
  <miscellaneousContainer>
    <pagination>
      <pageNumber>301</pageNumber>
      <perPage>10</perPage>
      <totalResults>3075</totalResults>
    </pagination>
  </miscellaneousContainer>
  <item itemId="80" public="1" featured="0">
    <fileContainer>
      <file fileId="79">
        <src>https://repository.gctu.edu.gh/files/original/f0dbe7ab7f0ff8b7345d8e1d374d0c25.pdf</src>
        <authentication>e11dfafde7f50948a32e980496b75448</authentication>
      </file>
    </fileContainer>
    <collection collectionId="16">
      <elementSetContainer>
        <elementSet elementSetId="1">
          <name>Dublin Core</name>
          <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
          <elementContainer>
            <element elementId="50">
              <name>Title</name>
              <description>A name given to the resource</description>
              <elementTextContainer>
                <elementText elementTextId="344">
                  <text>MSc Management Information Systems</text>
                </elementText>
              </elementTextContainer>
            </element>
          </elementContainer>
        </elementSet>
      </elementSetContainer>
    </collection>
    <itemType itemTypeId="1">
      <name>Text</name>
      <description>A resource consisting primarily of words for reading. Examples include books, letters, dissertations, poems, newspapers, articles, archives of mailing lists. Note that facsimiles or images of texts are still of the genre Text.</description>
    </itemType>
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="490">
                <text>Assessing the Level of Information Security Governance (Isg) In Mobile Money Issuers in Ghana &#13;
  &#13;
 &#13;
  &#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="39">
            <name>Creator</name>
            <description>An entity primarily responsible for making the resource</description>
            <elementTextContainer>
              <elementText elementTextId="491">
                <text>Kwame Boa-Amponsem</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="41">
            <name>Description</name>
            <description>An account of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="492">
                <text>The purpose of this study is to assess the maturity level of implementation of Information Security Governance (ISG) in mobile money firms in Ghana. Mobile Money Issuers in Ghana play an increasingly active role in our financial sector. This is to analyse whether mobile money firms have implemented acceptable levels of information security governance with regards to all aspects of their operations. A survey was conducted using a self-administered questionnaire to assess the degree of implementation of information security governance. The questionnaire was adopted from Information Technology Governance Institute‟s ISG guidelines for executive management and board of directors. All four mobile money firms in Accra-Ghana took part in the survey via email. Responses from the mobile money firms were collated. The results of the study showed that all mobile money issuers in Ghana have implemented most information security governance measures to an acceptable level and thus had a „good‟ rating in the maturity level of ISG implementation. Nevertheless, not all information security governance practices were well implemented by mobile money issuers. Relevant information security policies were not included in the contracts of third parties. Again, third parties and employees of these mobile money firms were not adequately informed and educated of their role in the firm‟s information security program. Finally, major business decisions made by the management of the mobile money firms did not consider information security issues.&#13;
This study provides lawmakers in Ghana with the necessary information to pass and enforce regulations that will further protect the personal data of consumers. The study also affords management in the various mobile money firms insight into their information security governance with the goal of improving their security governance.&#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="49">
            <name>Subject</name>
            <description>The topic of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="493">
                <text>MSc: Management Information Systems</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="45">
            <name>Publisher</name>
            <description>An entity responsible for making the resource available</description>
            <elementTextContainer>
              <elementText elementTextId="494">
                <text>Ghana Technology University College</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="40">
            <name>Date</name>
            <description>A point or period of time associated with an event in the lifecycle of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="495">
                <text>September 2016</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="37">
            <name>Contributor</name>
            <description>An entity responsible for making contributions to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="496">
                <text> Dr. Stephen Asunka</text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </item>
  <item itemId="79" public="1" featured="0">
    <fileContainer>
      <file fileId="78">
        <src>https://repository.gctu.edu.gh/files/original/89cde8fc112d33f86f2730dcfc8e5877.pdf</src>
        <authentication>83c53fcbb0e034916669073212b8bda5</authentication>
      </file>
    </fileContainer>
    <collection collectionId="16">
      <elementSetContainer>
        <elementSet elementSetId="1">
          <name>Dublin Core</name>
          <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
          <elementContainer>
            <element elementId="50">
              <name>Title</name>
              <description>A name given to the resource</description>
              <elementTextContainer>
                <elementText elementTextId="344">
                  <text>MSc Management Information Systems</text>
                </elementText>
              </elementTextContainer>
            </element>
          </elementContainer>
        </elementSet>
      </elementSetContainer>
    </collection>
    <itemType itemTypeId="1">
      <name>Text</name>
      <description>A resource consisting primarily of words for reading. Examples include books, letters, dissertations, poems, newspapers, articles, archives of mailing lists. Note that facsimiles or images of texts are still of the genre Text.</description>
    </itemType>
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="483">
                <text>Assessing the Impact of Social Engineering Risk on Information in Public  Tertiary Institutions in Ghana: A Case Study of Some Selected Technical Universities &#13;
 &#13;
 &#13;
  &#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="39">
            <name>Creator</name>
            <description>An entity primarily responsible for making the resource</description>
            <elementTextContainer>
              <elementText elementTextId="484">
                <text> Kwadwo Kyeremeh</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="41">
            <name>Description</name>
            <description>An account of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="485">
                <text>Social Engineering is the art of human hacking that made their targets do things that in their real senses will not do. The human factor is social is so huge that they normally use and insider to commit their malicious acts and they offers assailants a huge number of conceivable outcomes to reach through focused control and data to their coveted objective. An especially unsafe circumstance when the data of one individual is utilized to get to the computer systems of an organization. The abuser is effectively passed for a systems administrator or an IT director or network designer. Frequently the culprit is not even in coordinate contact with the casualty. Indeed, even the most traditionalist in the administration of sensitive data, individuals can fall into the trap of social designing. From one perspective, the "mechanical disregard" makes individuals helpless when they treat their sensitive information recklessly and distribute private data anyhow and is once in a while excessively sluggish, making it impossible to "tidy up" their online profile frequently. Then again, we as a whole are just human creatures continuously looking for acknowledgment, sweet talk, compliments, fellowship and so forth. Human temperance’s as accommodation and shortcomings as vanity are abused by social engineers to control their casualties. The greater part of the representatives of an organization trust that the most vital thing is to be a decent partner and solidarity with associates; which is regularly to the detriment of security in the long run. This examination depicts the effect of social engineering risk on information in the public tertiary institutions in Ghana. The investigation additionally talks about the findings and recommendations which can be utilized by the institutions to impede the risk of data spillage through social engineering.&#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="49">
            <name>Subject</name>
            <description>The topic of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="486">
                <text> Msc. Management Information System</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="45">
            <name>Publisher</name>
            <description>An entity responsible for making the resource available</description>
            <elementTextContainer>
              <elementText elementTextId="487">
                <text>Ghana Technology University College</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="40">
            <name>Date</name>
            <description>A point or period of time associated with an event in the lifecycle of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="488">
                <text>September 2017</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="37">
            <name>Contributor</name>
            <description>An entity responsible for making contributions to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="489">
                <text>Ing. Isaac Hanson </text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </item>
  <item itemId="78" public="1" featured="0">
    <fileContainer>
      <file fileId="77">
        <src>https://repository.gctu.edu.gh/files/original/765fd672b2349b69984d0058c152dd05.pdf</src>
        <authentication>d78228950f3532ac5ad3a4c4f72381f7</authentication>
      </file>
    </fileContainer>
    <collection collectionId="16">
      <elementSetContainer>
        <elementSet elementSetId="1">
          <name>Dublin Core</name>
          <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
          <elementContainer>
            <element elementId="50">
              <name>Title</name>
              <description>A name given to the resource</description>
              <elementTextContainer>
                <elementText elementTextId="344">
                  <text>MSc Management Information Systems</text>
                </elementText>
              </elementTextContainer>
            </element>
          </elementContainer>
        </elementSet>
      </elementSetContainer>
    </collection>
    <itemType itemTypeId="1">
      <name>Text</name>
      <description>A resource consisting primarily of words for reading. Examples include books, letters, dissertations, poems, newspapers, articles, archives of mailing lists. Note that facsimiles or images of texts are still of the genre Text.</description>
    </itemType>
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="476">
                <text> The Impact of Gifmis On Procurement Processes at the Ghana&#13;
Health Service&#13;
&#13;
  &#13;
&#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="39">
            <name>Creator</name>
            <description>An entity primarily responsible for making the resource</description>
            <elementTextContainer>
              <elementText elementTextId="477">
                <text> Kwabena Amponsah Afrani-Nyarko</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="41">
            <name>Description</name>
            <description>An account of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="478">
                <text>An Integrated Financial Management Information System (IFMIS) has been deemed to be a perfect financial information system developed to improve and streamline public financial&#13;
management by computerizing government financial operations (Rodin-Brown, 2008). In light of this, donors and international organizations such as the World Bank, USAID and the IMF played&#13;
vital roles in supporting developed countries through combinations of technical assistance, training, financial resources and procurement support projects. As such, the Ghanaian government is a huge institution that would benefit from a unified information system such as the Integrated Financial Management Information System, which supports high productivity, effective management as well as quality services offered to its citizenry. Ghana is expected to reap many benefits after the implementation of the GIFMIS including&#13;
transparent and accountable public financial management, accurate information on budgetary allocation, prompt payment processing, increased performance and efficient revenue collection. After Ghana adopted and launched IFMIS in the year 2009, this study seeks to investigate the effects of the Ghana Integrated Financial Management Information Systems (GIFMIS) on procurement processes at the Ghana Health Service as well as analyzing the factors that affected the implementation of GIFMIS at the Ghana Health Service. Existing literature was reviewed by the researcher to form the conceptual framework, findings, conclusions as well as the recommendations.&#13;
Descriptive survey research design was employed and structured questionnaire were used for the collection of data for a sample size of 60 made up of staff from the Planning Monitoring and&#13;
Evaluation, ICT, Accounts and Finance, Policy, and Procurement departments. The findings were presented in the form of frequency tables. The study revealed that procurement</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="49">
            <name>Subject</name>
            <description>The topic of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="479">
                <text>Msc. (Management Information&#13;
Systems)</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="45">
            <name>Publisher</name>
            <description>An entity responsible for making the resource available</description>
            <elementTextContainer>
              <elementText elementTextId="480">
                <text>Ghana Technology University College</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="40">
            <name>Date</name>
            <description>A point or period of time associated with an event in the lifecycle of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="481">
                <text>September 2017</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="37">
            <name>Contributor</name>
            <description>An entity responsible for making contributions to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="482">
                <text>Dr. Kwame Ofori Simpe</text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </item>
  <item itemId="77" public="1" featured="0">
    <fileContainer>
      <file fileId="76">
        <src>https://repository.gctu.edu.gh/files/original/8e2f50991f8578096ab7620549d5513c.pdf</src>
        <authentication>1bb1f17d9f0b412043401fb6d92e1849</authentication>
      </file>
    </fileContainer>
    <collection collectionId="16">
      <elementSetContainer>
        <elementSet elementSetId="1">
          <name>Dublin Core</name>
          <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
          <elementContainer>
            <element elementId="50">
              <name>Title</name>
              <description>A name given to the resource</description>
              <elementTextContainer>
                <elementText elementTextId="344">
                  <text>MSc Management Information Systems</text>
                </elementText>
              </elementTextContainer>
            </element>
          </elementContainer>
        </elementSet>
      </elementSetContainer>
    </collection>
    <itemType itemTypeId="1">
      <name>Text</name>
      <description>A resource consisting primarily of words for reading. Examples include books, letters, dissertations, poems, newspapers, articles, archives of mailing lists. Note that facsimiles or images of texts are still of the genre Text.</description>
    </itemType>
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="469">
                <text>The Impact Of E-Commerce On Local And Small Scale Enterprise In The Accra Metropolitan Assembly,Osu-Klottey District Accra &#13;
 &#13;
 &#13;
 &#13;
&#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="39">
            <name>Creator</name>
            <description>An entity primarily responsible for making the resource</description>
            <elementTextContainer>
              <elementText elementTextId="470">
                <text> Karimou Bola Hope</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="41">
            <name>Description</name>
            <description>An account of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="471">
                <text>Small and Medium Scale Enterprises (SMEs) have a great influence on the lives of people of our economy. They play vital roles such as revenue generation and creation of employment. Statistics proves that SMEs constitute over 60% of all businesses in developing countries. And probably the percentage is higher than the estimate when it comes to Ghana. Over the years, programmers and workshops are being organized to enhance development and expansion of small business enterprises by government and non-government organization (NGOs). So many business enterprises grow rapidly to a point and when there is a small change in the economy, and then it depresses them from their point. On the basis of the study conducted on the topic ““The impact of e-commerce on local businesses and small scale enterprises in the Accra Metropolitan Assembly, Osu-Klottey District Accra. The sample size was made up of hundred and sixty (160) SMEs within Accra. Respondents were provided with questionnaires to fill. The following general conclusions were made from the research conducted, it is evident that there are quite worrying state of the affairs relating to the use of e-commerce to improve business growth strategies of small scale enterprises within the metropolis. Generally, the respondents agreed that e-commerce helps to improve the survival status of local businesses. However, the usage is limited to mobile phone and internet leaving out chunk of the tools and their application or usage. It was recommended among other things that government and policy makers should collaborate with small-scale enterprises union to develop cheaper software’s to aid their businesses. The study also recommended that small-scale enterprises and their owners (management) should build a culture that is favorable to technology and innovation and seek how technology can give them competitive advantage</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="49">
            <name>Subject</name>
            <description>The topic of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="472">
                <text>Msc. Management Information Systems</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="45">
            <name>Publisher</name>
            <description>An entity responsible for making the resource available</description>
            <elementTextContainer>
              <elementText elementTextId="473">
                <text>Ghana Technology University College</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="40">
            <name>Date</name>
            <description>A point or period of time associated with an event in the lifecycle of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="474">
                <text>May, 2018</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="37">
            <name>Contributor</name>
            <description>An entity responsible for making contributions to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="475">
                <text>Dr. William Brown-Acquaye</text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </item>
  <item itemId="76" public="1" featured="0">
    <fileContainer>
      <file fileId="75">
        <src>https://repository.gctu.edu.gh/files/original/bb98da34bb64ddd393be862c3a3e7495.pdf</src>
        <authentication>06f2be0a9117240c73a8493578909a5a</authentication>
      </file>
    </fileContainer>
    <collection collectionId="16">
      <elementSetContainer>
        <elementSet elementSetId="1">
          <name>Dublin Core</name>
          <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
          <elementContainer>
            <element elementId="50">
              <name>Title</name>
              <description>A name given to the resource</description>
              <elementTextContainer>
                <elementText elementTextId="344">
                  <text>MSc Management Information Systems</text>
                </elementText>
              </elementTextContainer>
            </element>
          </elementContainer>
        </elementSet>
      </elementSetContainer>
    </collection>
    <itemType itemTypeId="1">
      <name>Text</name>
      <description>A resource consisting primarily of words for reading. Examples include books, letters, dissertations, poems, newspapers, articles, archives of mailing lists. Note that facsimiles or images of texts are still of the genre Text.</description>
    </itemType>
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="462">
                <text>The Impact of Automated Information Systems in the Revival of Distressed Credit Unions in Ghana by Fostering Project. &#13;
A Case Study of Salaga, Chamba, and Kpandai Credit Unions. &#13;
 &#13;
 &#13;
&#13;
 &#13;
&#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="39">
            <name>Creator</name>
            <description>An entity primarily responsible for making the resource</description>
            <elementTextContainer>
              <elementText elementTextId="463">
                <text>Joab Darkwa</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="41">
            <name>Description</name>
            <description>An account of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="464">
                <text>This study investigates the impact of the automated information systems introduced (as a key strategy) by the Food Security Through Co-operatives in Northern Ghana (FOSTERING) Project in distressed credit unions in these three areas: Salaga, Chamba, and Kpandai in the eastern corridor of northern Ghana. The feasibility studies undertaken by the project in 2012/13 revealed that most of the credit unions in the eight participating districts of the project in the eastern corridor were characterized by severe insolvency. However, due to the key role that the project wanted the credit unions (CUs) to play towards the attainment of its goal, the strategy to computerize the operations of the CUs was adopted for the project. The methodology involved a case study approach, with both qualitative and quantitative methods applied. The data collection methods were questionnaires involving the credit unions’ officials, and document review. The results of this study are in line with empirical studies that revealed the significant impact of AIS on institutional performance. The findings point to the fact that the automation of the CUs information systems has greatly enhanced the revival of the distressed credit unions. Again, the CUs have all attained the immediate and intermediate targets set by the project, and realized significant growth. The study concludes that the implementation of AIS in credit unions in Ghana can significantly affect and impact on them positively. Therefore, recommendations are given for CUA and CU leaders to channel much resources and focus on leveraging on the advancement of technology to the strategic development of credit unions and the CU movement in Ghana. Project donors or managers are urged to identify and anticipate the impact of AIS in credit unions in subsequent CU development projects.&#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="49">
            <name>Subject</name>
            <description>The topic of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="465">
                <text> Msc Management Information Systems</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="45">
            <name>Publisher</name>
            <description>An entity responsible for making the resource available</description>
            <elementTextContainer>
              <elementText elementTextId="466">
                <text>Ghana Technology University College</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="40">
            <name>Date</name>
            <description>A point or period of time associated with an event in the lifecycle of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="467">
                <text>May 2017</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="37">
            <name>Contributor</name>
            <description>An entity responsible for making contributions to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="468">
                <text> Dr. William Brown-Acquaye</text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </item>
  <item itemId="75" public="1" featured="0">
    <fileContainer>
      <file fileId="74">
        <src>https://repository.gctu.edu.gh/files/original/557d0b6a90d30d2e901834025f9db3a0.pdf</src>
        <authentication>7f63809b6ef384aa553859f8ffe8fd7a</authentication>
      </file>
    </fileContainer>
    <collection collectionId="16">
      <elementSetContainer>
        <elementSet elementSetId="1">
          <name>Dublin Core</name>
          <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
          <elementContainer>
            <element elementId="50">
              <name>Title</name>
              <description>A name given to the resource</description>
              <elementTextContainer>
                <elementText elementTextId="344">
                  <text>MSc Management Information Systems</text>
                </elementText>
              </elementTextContainer>
            </element>
          </elementContainer>
        </elementSet>
      </elementSetContainer>
    </collection>
    <itemType itemTypeId="1">
      <name>Text</name>
      <description>A resource consisting primarily of words for reading. Examples include books, letters, dissertations, poems, newspapers, articles, archives of mailing lists. Note that facsimiles or images of texts are still of the genre Text.</description>
    </itemType>
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="455">
                <text>Assessing The Information Systems Secrity Challenges In Cloud Computing: A Case Study Of Cocoa Marketing Company Ghana Limited Submitted  &#13;
&#13;
 &#13;
.&#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="39">
            <name>Creator</name>
            <description>An entity primarily responsible for making the resource</description>
            <elementTextContainer>
              <elementText elementTextId="456">
                <text> Jennifer Ashiokaa Bidema</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="41">
            <name>Description</name>
            <description>An account of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="457">
                <text>Cloud computing is the computing model in which the computing resources such as software, hardware and data are delivered as a service through the internet with the aid of web browsers or light-weight desktop machine over the internet (Wink, 2012). This computing model has taken over physical hardware infrastructure by cutting off the cost to procure huge local serv-ers for to augment business operations and storage. (Montero &amp; Llorente, 2012). The adop-tion of cloud as a service is affected by different security issues and challenges such as Tem-porary Denial of Service (TDOS) attacks, user identity theft, session hijacking issues and flashing attacks (Danish, 2011).&#13;
The research was conducted at the Cocoa Marketing Company Ghana Limited (CMC). For which employees were sampled through a purposive sampling technique. The data collection involved employee’s answers to questions posed to them in the questionnaires administered. The purpose of this study is to assess the information systems security challenges in cloud computing and bridge the research gap between the cloud security challenges, measures and the existing security threats. An assessment into existing cloud service models, security standards, currently adopted security measures and their degree of flawless protection has been done. The study helped in outlining the security challenges, issues and their solutions whereas the empirical study facilitated in acknowledging the concerns and perception of po-tential cloud users perceptions and challenges. The empirical method used in this research is questionnaires to validate the theoretical findings. According to findings of the study, most organizational departments like CMC relay on shared folders as part of their business operations a medium of sharing information. This pro-vides a better way for introducing cloud computing in such organizations. The study also stated that there are staffs in specific organizations assigned with the duty of data protection, so the perception on data security should not be an issue for such organizations.&#13;
Cloud computing or cloud as a service when adopted according to the study has the tendency to help organizations like CMC to gain competitive advantage in their area of business. How-ever the perception that cloud adoption will open the floodgates for intruders to compromise confidentiality, integrity and availability of data has become the major drawbacks hindering organizations mostly in Africa to adopt the use of cloud to enhance their ways of doing busi-ness. Based on the information gathered from the respondents it is clear that cloud computing is a possibility in CMC. However, management could be a hindering block to its implementa-tion since most of them are politically skewed to the government of the day. These security challenges and perceptions are highly beneficial to the adoption of cloud com-puting because it offers to organizations the knowledge into the potential security risks and challenges and provide some mitigation mechanism for organizations who will be willing to adopt the cloud as a service in the future.</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="49">
            <name>Subject</name>
            <description>The topic of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="458">
                <text> Msc In Management Information Systems </text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="45">
            <name>Publisher</name>
            <description>An entity responsible for making the resource available</description>
            <elementTextContainer>
              <elementText elementTextId="459">
                <text>Ghana Technology University College</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="40">
            <name>Date</name>
            <description>A point or period of time associated with an event in the lifecycle of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="460">
                <text>May, 2018</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="37">
            <name>Contributor</name>
            <description>An entity responsible for making contributions to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="461">
                <text>Dr. Stephen Asunka </text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </item>
  <item itemId="74" public="1" featured="0">
    <fileContainer>
      <file fileId="73">
        <src>https://repository.gctu.edu.gh/files/original/c5ba1ba14121b3042378de83ed0d47e7.pdf</src>
        <authentication>5e75e8391303f677dd76118bd80b13c1</authentication>
      </file>
    </fileContainer>
    <collection collectionId="16">
      <elementSetContainer>
        <elementSet elementSetId="1">
          <name>Dublin Core</name>
          <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
          <elementContainer>
            <element elementId="50">
              <name>Title</name>
              <description>A name given to the resource</description>
              <elementTextContainer>
                <elementText elementTextId="344">
                  <text>MSc Management Information Systems</text>
                </elementText>
              </elementTextContainer>
            </element>
          </elementContainer>
        </elementSet>
      </elementSetContainer>
    </collection>
    <itemType itemTypeId="1">
      <name>Text</name>
      <description>A resource consisting primarily of words for reading. Examples include books, letters, dissertations, poems, newspapers, articles, archives of mailing lists. Note that facsimiles or images of texts are still of the genre Text.</description>
    </itemType>
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="448">
                <text>Crime Predictive Model in Cybercrime Based On Social &#13;
And Economic Factors Using Bayesian And Markov Theories &#13;
(Case Study of Bank) &#13;
&#13;
  &#13;
 &#13;
 &#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="39">
            <name>Creator</name>
            <description>An entity primarily responsible for making the resource</description>
            <elementTextContainer>
              <elementText elementTextId="449">
                <text> Emeh Jennifer Afoma</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="41">
            <name>Description</name>
            <description>An account of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="450">
                <text>If financial institutions cannot detect incidents effectively, it cannot succeed to responding to incidents. This implies that the detection of incidents, is the most important aspect of incident response. A stochastic process with a first order dependence in discrete state and time is described as Markov chain, in the same way, Bayesian theory is a mathematical framework for reasoning and performing inference using probability. These two theories were used to predict cybercrime occurrence using centralized system in form of a model for Management Information Systems (MIS). The advancement of technology in banking has made banking business processes very convenient, but as the technology advances, cybercrimes of different nature emerges and equally at its peak. In as much as there are different measures already in place to combat these crimes, there still lies so many vulnerabilities which cannot be evitable in any information systems, especially the financial institutions, in other words prediction theory which tends to detect and predict any event can be used to combat this cybercrime activities.&#13;
The theory which was introduced by Markov in 1907 has been applied in many predictive models and at such has been able to describe various phenomena of the real world. In this research study, the application of Markov theory and Markov chain offered ideal conditions for determination of the next target of crime. Similarly, Bayesian inference also analysed the nature of cybercrime and the probability of its occurrence, moreover, it has been recommended that different factors which could possibly cause cybercrime like vulnerabilities of information system, should also be predicted using both theories.&#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="49">
            <name>Subject</name>
            <description>The topic of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="451">
                <text>MSc Management Information Systems </text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="45">
            <name>Publisher</name>
            <description>An entity responsible for making the resource available</description>
            <elementTextContainer>
              <elementText elementTextId="452">
                <text>&#13;
Ghana Technology University College&#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="40">
            <name>Date</name>
            <description>A point or period of time associated with an event in the lifecycle of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="453">
                <text>January, 2017</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="37">
            <name>Contributor</name>
            <description>An entity responsible for making contributions to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="454">
                <text>Dr. Kester Quist-Aphetsi </text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </item>
  <item itemId="73" public="1" featured="0">
    <fileContainer>
      <file fileId="72">
        <src>https://repository.gctu.edu.gh/files/original/2d351ca7a2045016c0dabc2018be9b55.pdf</src>
        <authentication>ba9eaab47f3da2d60df02a131742bc3e</authentication>
      </file>
    </fileContainer>
    <collection collectionId="16">
      <elementSetContainer>
        <elementSet elementSetId="1">
          <name>Dublin Core</name>
          <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
          <elementContainer>
            <element elementId="50">
              <name>Title</name>
              <description>A name given to the resource</description>
              <elementTextContainer>
                <elementText elementTextId="344">
                  <text>MSc Management Information Systems</text>
                </elementText>
              </elementTextContainer>
            </element>
          </elementContainer>
        </elementSet>
      </elementSetContainer>
    </collection>
    <itemType itemTypeId="1">
      <name>Text</name>
      <description>A resource consisting primarily of words for reading. Examples include books, letters, dissertations, poems, newspapers, articles, archives of mailing lists. Note that facsimiles or images of texts are still of the genre Text.</description>
    </itemType>
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="441">
                <text> Evaluating the Critical Success Factors Influencing the Adoption of Biometric Technologies by IT Managers in Developing Countries – Ghana &#13;
A Case Study of Social Security and National Insurance Trust (SSNIT) &#13;
&#13;
  &#13;
 &#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="39">
            <name>Creator</name>
            <description>An entity primarily responsible for making the resource</description>
            <elementTextContainer>
              <elementText elementTextId="442">
                <text>JACOB ENNIN </text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="41">
            <name>Description</name>
            <description>An account of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="443">
                <text>This dissertation provides a new substantive finding that evaluates the factors that influence the adoption of Biometric Technology by developing countries like Ghana, Social Security and National Insurance Trust (SSNIT). Even though there has been several studies emphazing on the significance of biometric technologies in hotels and financial sectors (Moresan, 2012; Pooe &amp; Labuschagne, 2011; Rabiu et al., 2016). Nonetheless, there is minimal empirical research with regards to the government agencies. Therefore, this dissertation focuses on factors impacting on the adoption of biometric technologies and benefits of these technologies (Yarbrough et al, 2007).&#13;
It is against this background that it behooves the researcher to focus on finding the elements influencing the adoption of biometric technologies by information technology managers in developing countries - Ghana. A case study of Social Security and National Insurance Trust (SSNIT)Keywords Biometric, technology, behooves, adoption, empirical, Social Security and National Insurance Trust (SSNIT), authentication, substantive finding.</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="49">
            <name>Subject</name>
            <description>The topic of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="444">
                <text>Msc Management Information System</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="40">
            <name>Date</name>
            <description>A point or period of time associated with an event in the lifecycle of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="445">
                <text>September 2017</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="45">
            <name>Publisher</name>
            <description>An entity responsible for making the resource available</description>
            <elementTextContainer>
              <elementText elementTextId="446">
                <text>Ghana Technology University College</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="37">
            <name>Contributor</name>
            <description>An entity responsible for making contributions to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="447">
                <text>Dr. William Brown - Acquah</text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </item>
  <item itemId="72" public="1" featured="0">
    <fileContainer>
      <file fileId="71">
        <src>https://repository.gctu.edu.gh/files/original/449b719bcc7a40778ee04e7fe6845960.pdf</src>
        <authentication>74d8399a54e3c374abde7a4e8b2b90ff</authentication>
      </file>
    </fileContainer>
    <collection collectionId="16">
      <elementSetContainer>
        <elementSet elementSetId="1">
          <name>Dublin Core</name>
          <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
          <elementContainer>
            <element elementId="50">
              <name>Title</name>
              <description>A name given to the resource</description>
              <elementTextContainer>
                <elementText elementTextId="344">
                  <text>MSc Management Information Systems</text>
                </elementText>
              </elementTextContainer>
            </element>
          </elementContainer>
        </elementSet>
      </elementSetContainer>
    </collection>
    <itemType itemTypeId="1">
      <name>Text</name>
      <description>A resource consisting primarily of words for reading. Examples include books, letters, dissertations, poems, newspapers, articles, archives of mailing lists. Note that facsimiles or images of texts are still of the genre Text.</description>
    </itemType>
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="434">
                <text>Information Security Policies: A Case Study of Ghana Cocoa Board &#13;
&#13;
&#13;
&#13;
&#13;
 &#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="39">
            <name>Creator</name>
            <description>An entity primarily responsible for making the resource</description>
            <elementTextContainer>
              <elementText elementTextId="435">
                <text>Ian Donkor-Kroti </text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="41">
            <name>Description</name>
            <description>An account of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="436">
                <text>Highly sensitive information pertaining to individuals and government institutions couple with their daily transactions are processed in an electronic format these days, making information security a critical part of e-Government applications and architectures. Information security measures should ideally span from authentication to authorization and from logical/physical access control to auditing of electronic transactions and log books. The lack of such measures compromises confidentiality, integrity, and availability of information. Most organizations are faced with developing information security systems and also committing their staffs to adhere to the set standards. This thesis aims at discussing and analyzing how information security policies are developed within Ghana Cocoa Board and also how employees appreciate and commit themselves to work with the set security policies. The thesis identified that most policies the administrators develop are not enforced well, also management do not really appreciate the development of these policies therefore top management does not help the Information systems department to enforce the policies. The work found out that security must be handled within COCOBOD with utmost care and diligence, therefore top management must be ready to help drive the culture down to the employees of the organization.&#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="49">
            <name>Subject</name>
            <description>The topic of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="437">
                <text> Msc in Management Information Systems</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="45">
            <name>Publisher</name>
            <description>An entity responsible for making the resource available</description>
            <elementTextContainer>
              <elementText elementTextId="438">
                <text>Ghana Technology University College</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="40">
            <name>Date</name>
            <description>A point or period of time associated with an event in the lifecycle of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="439">
                <text>May, 2018</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="37">
            <name>Contributor</name>
            <description>An entity responsible for making contributions to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="440">
                <text> Dr. Stephen Asunka </text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </item>
  <item itemId="71" public="1" featured="0">
    <fileContainer>
      <file fileId="70">
        <src>https://repository.gctu.edu.gh/files/original/a149a5ba9a238cf8b283fc3ecccfc60b.pdf</src>
        <authentication>a69ec2e235f3b95d8bf27c7c176bddcb</authentication>
      </file>
    </fileContainer>
    <collection collectionId="16">
      <elementSetContainer>
        <elementSet elementSetId="1">
          <name>Dublin Core</name>
          <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
          <elementContainer>
            <element elementId="50">
              <name>Title</name>
              <description>A name given to the resource</description>
              <elementTextContainer>
                <elementText elementTextId="344">
                  <text>MSc Management Information Systems</text>
                </elementText>
              </elementTextContainer>
            </element>
          </elementContainer>
        </elementSet>
      </elementSetContainer>
    </collection>
    <itemType itemTypeId="1">
      <name>Text</name>
      <description>A resource consisting primarily of words for reading. Examples include books, letters, dissertations, poems, newspapers, articles, archives of mailing lists. Note that facsimiles or images of texts are still of the genre Text.</description>
    </itemType>
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="427">
                <text>Evaluation of Effective IT Service &#13;
Operation In Service-Based &#13;
Organizations in Ghana Using ITIL V3 &#13;
Framework &#13;
 &#13;
 &#13;
&#13;
&#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="39">
            <name>Creator</name>
            <description>An entity primarily responsible for making the resource</description>
            <elementTextContainer>
              <elementText elementTextId="428">
                <text> FREDERICK AMUZU</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="41">
            <name>Description</name>
            <description>An account of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="429">
                <text>This research work sought to perform an evaluation of how effective IT Service Operation plays out in service-based organizations in Ghana using Information Technology Infrastructure Library (ITIL) version 3 framework. The main objective was to understand the maturity level of IT Service Operation adopted and the derived benefits among the service-based organizations in Ghana. The research results in the final analysis suggested that there is a positive correlation between the maturity level of ITIL v3 implemented and the derived benefits of IT Service Operations. Additionally, the effectiveness of IT Service Operation was evaluated and the results statistically showed that the effectiveness of the IT Service Operation was largely dependent on ITIL v3 processes adopted and the constitution of a Service Desk team that are highly skilled and well tooled to perform their functions within a monitored service level agreements</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="49">
            <name>Subject</name>
            <description>The topic of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="430">
                <text> Msc. Management Information System</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="45">
            <name>Publisher</name>
            <description>An entity responsible for making the resource available</description>
            <elementTextContainer>
              <elementText elementTextId="431">
                <text>Ghana Technology University college</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="40">
            <name>Date</name>
            <description>A point or period of time associated with an event in the lifecycle of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="432">
                <text>January 2017</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="37">
            <name>Contributor</name>
            <description>An entity responsible for making contributions to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="433">
                <text> DOMINIC K. LOUIS </text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </item>
</itemContainer>
