Browse Items (1587 total)

KWADWO KYEREMEH.pdf
Social Engineering is the art of human hacking that made their targets do things that in their real senses will not do. The human factor is social is so huge that they normally use and insider to commit their malicious acts and they offers assailants…

JOSEPH TUWOR NARTEY.pdf
The management of stakeholders in the telecommunication industry has not received much attention in Ghana. The purpose of the study was therefore to explore stakeholder management and its impact on telecommunication mast construction projects in…

JENNIFER BIDEMA.pdf
Cloud computing is the computing model in which the computing resources such as software, hardware and data are delivered as a service through the internet with the aid of web browsers or light-weight desktop machine over the internet (Wink, 2012).…

KWAME BOA AMPONSEM.pdf
The purpose of this study is to assess the maturity level of implementation of Information Security Governance (ISG) in mobile money firms in Ghana. Mobile Money Issuers in Ghana play an increasingly active role in our financial sector. This is to…

Baffour KWAKYE.pdf
The dissertation evaluated the impact of Ghana Alternative Exchange Market (“GAX”) on the financial performance of Small and Medium Enterprises (“SMEs”) in Ghana using Izwe Loans Limited (“Izwe Loans”) as the case under study. In assessing impact of…

EDWARD ADOFO-BOSOMPEM.pdf

Universal access to financial services is a critical component which drives development since it includes the vulnerable such as low-income household in the society to participate in the governance of the country (Iqbal and Sami, 2017). When people…

GRACE ARCHER.pdf
Building projects are usually multifaceted and highly diverse to deal with, in comparison to projects done in the previous years, current projects are more time restricting, giving rise to immense technical challenges, and rarely gives the impression…

ISAAC KINGSLEY EDZII.pdf
Human related mischances in high hazard businesses like Quality Control Organization (QCC) Restricted add up to a noteworthy monetary danger and acquire huge harms, causing over the top operational expenses and death toll. For instance, QCC utilizes…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2