Browse Items (1587 total)

ERHABOR VERA.pdf
Social media has gained grounds in recent times becoming an integral part of human lives enabling communication, friendships, and opinions. The paradigm shift has brought about risk and threats especially to those cyber criminals who want to…

ERIC KWESI PARDEN.pdf
Information is of essence in today’s information age with ubiquity. Control systems are pivotal in any organisation with the quest to grow. Taking into account the numerous cases that have occasioned as a result of the poor control measures put in…

EUGENE EFAH ADANE.pdf
Due to the rapid growth of computer system and Internet, network security became crucial issue for most organizations. Mostly organizations increase usage of different tools and methods to secure their network due to the increase of security threats.…

EUGENE OKU.pdf
In the banking industry, protecting consumers' financial security is without a doubt a major issue of concern especially in the modern world where the banking process has been digitalized and consumers exposed to numerous new issues. The introduction…

FELIX ADUSEI TUFFOUR.pdf
The use of information system in the maritime industry and most especially in Ghana Ports and Habours provides the organisation with a much-improved service as well as efficiency and effectiveness of personnel. The success derived from Information…

FREDERRICK AMUZU.pdf
This research work sought to perform an evaluation of how effective IT Service Operation plays out in service-based organizations in Ghana using Information Technology Infrastructure Library (ITIL) version 3 framework. The main objective was to…

IAN DONKOR KROTI.pdf
Highly sensitive information pertaining to individuals and government institutions couple with their daily transactions are processed in an electronic format these days, making information security a critical part of e-Government applications and…

JACOB ENNIN.pdf
This dissertation provides a new substantive finding that evaluates the factors that influence the adoption of Biometric Technology by developing countries like Ghana, Social Security and National Insurance Trust (SSNIT). Even though there has been…

JENNIFER AFOMA.pdf
If financial institutions cannot detect incidents effectively, it cannot succeed to responding to incidents. This implies that the detection of incidents, is the most important aspect of incident response. A stochastic process with a first order…

JENNIFER BIDEMA.pdf
Cloud computing is the computing model in which the computing resources such as software, hardware and data are delivered as a service through the internet with the aid of web browsers or light-weight desktop machine over the internet (Wink, 2012).…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2