Social media has gained grounds in recent times becoming an integral part of human lives enabling communication, friendships, and opinions. The paradigm shift has brought about risk and threats especially to those cyber criminals who want to…
Information is of essence in today’s information age with ubiquity. Control systems are pivotal in any organisation with the quest to grow. Taking into account the numerous cases that have occasioned as a result of the poor control measures put in…
Due to the rapid growth of computer system and Internet, network security became crucial issue for most organizations. Mostly organizations increase usage of different tools and methods to secure their network due to the increase of security threats.…
In the banking industry, protecting consumers' financial security is without a doubt a major issue of concern especially in the modern world where the banking process has been digitalized and consumers exposed to numerous new issues. The introduction…
The use of information system in the maritime industry and most especially in Ghana Ports and Habours provides the organisation with a much-improved service as well as efficiency and effectiveness of personnel. The success derived from Information…
This research work sought to perform an evaluation of how effective IT Service Operation plays out in service-based organizations in Ghana using Information Technology Infrastructure Library (ITIL) version 3 framework. The main objective was to…
Highly sensitive information pertaining to individuals and government institutions couple with their daily transactions are processed in an electronic format these days, making information security a critical part of e-Government applications and…
This dissertation provides a new substantive finding that evaluates the factors that influence the adoption of Biometric Technology by developing countries like Ghana, Social Security and National Insurance Trust (SSNIT). Even though there has been…
If financial institutions cannot detect incidents effectively, it cannot succeed to responding to incidents. This implies that the detection of incidents, is the most important aspect of incident response. A stochastic process with a first order…
Cloud computing is the computing model in which the computing resources such as software, hardware and data are delivered as a service through the internet with the aid of web browsers or light-weight desktop machine over the internet (Wink, 2012).…