Author: Richard Amanfu

1 2 3 12 20 / 226 POSTS
The CIO Diaries: Resilience Beyond Digital Transformation

The CIO Diaries: Resilience Beyond Digital Transformation

Information Systems (IS) become more and more complex as the number of solutions in the IS space keeps rising; each solution promising different but c [...]
Business processes reengineering to be driven by technology in the post covid-19 era

Business processes reengineering to be driven by technology in the post covid-19 era

...a do or die affair for businesses. Business processes of most companies are rigid and un-adaptive to technology. The company owners and manageme [...]
The Deception of Forwarded Messages and Links

The Deception of Forwarded Messages and Links

The value of data has led to increasing demand for it. Researchers and innovators need a lot of data of all kinds to bring about new products and serv [...]
Telecommuting Under Lockdown

Telecommuting Under Lockdown

Remote work also referred to as telecommuting (work from anywhere or teleworking) has been with us since the 1970s. Over the past, two to three decade [...]
January 28: Data Privacy Day

January 28: Data Privacy Day

Why is Data Privacy important? January 28 is Data Privacy Day which is “an international effort to create awareness about the importance of respect [...]
Institute of ICT Professionals Ghana (IIPGH) and Code for Afrika e.V., Germany, collaborate to promote coding among Ghanaian kids

Institute of ICT Professionals Ghana (IIPGH) and Code for Afrika e.V., Germany, collaborate to promote coding among Ghanaian kids

Learning to code is a basic literacy in the digital age, and it is important for kids to understand and be able to work with the technology around the [...]
Digital Design and Creative Coding Hub in Ghana

Digital Design and Creative Coding Hub in Ghana

The Institute of ICT Professionals Ghana (IIPGH) in partnership with Code it! from Germany is going to set up the "Digital Design and Creative Coding [...]
Open Data for Sustainable Development

Open Data for Sustainable Development

According to the open data handbook, Open data is data that anyone can access, use, or share. It is the idea that some data should be freely available [...]
Digital Education in Ghana

Digital Education in Ghana

Digital literacy as a fourth literacy has become necessary to talk about in education and eLearning. Although reading, writing, and mathematics are re [...]
The Offensive Approach to Ghana’s Voter Data Exposure

The Offensive Approach to Ghana’s Voter Data Exposure

A few days ago, the voter registration details of over 15 million Ghanaians were uploaded and circulated through various media platforms via google dr [...]
Data Initiatives Worth Exploring in Ghana Part 2

Data Initiatives Worth Exploring in Ghana Part 2

Part one of this article discussed data initiatives such as data commons, data exchanges and marketplaces, and open data platforms in dealing with the [...]
Data Initiatives Worth Exploring in Ghana Part 1

Data Initiatives Worth Exploring in Ghana Part 1

On the 12 November 2020, I had the rare privilege of being part of a panel discussion on the “opportunities and challenges for Responsible AI in Afric [...]
The Digital Series: Championing a Digital Culture

The Digital Series: Championing a Digital Culture

In a typical digital transformation effort, C-Level executives often overlook the importance of driving a digital culture. Leaders of di [...]
The CIO Diaries: Championing a Cybersecurity Culture

The CIO Diaries: Championing a Cybersecurity Culture

One of the priorities of the Chief Information (Security) Officer [CIO/CISO] is to drive employee cyber behavior. A single click of a ma [...]
The growing animus between Information Technology and Information Security

The growing animus between Information Technology and Information Security

Introduction The rapid need for Information Security (IS) in the operations of organizations has led to the formation of Information Security Depar [...]
The Sherrif Security Indicator

The Sherrif Security Indicator

As an Information Security Professional, I have taken a keen interest and followed closely the global reports of the Unisys Security Index (USI), for [...]
Information Security Governance: the cornerstone of effective information protection

Information Security Governance: the cornerstone of effective information protection

Information Security Governance (ISG) refers to the system through which an organization directs and controls its Information Security (InfoSec) activ [...]
Social Engineering; The Greatest Catalyst for Successful Cyber Attacks

Social Engineering; The Greatest Catalyst for Successful Cyber Attacks

Social Engineering (SE) is the process of deceiving an individual or a group of people to take a certain action(s) or disclose sensitive information i [...]
3 Areas Where We Must Harness the Transformative Power of Artificial Intelligence

3 Areas Where We Must Harness the Transformative Power of Artificial Intelligence

For most people, artificial intelligence (AI) is about robots; about some complex technology that is far away from them. This is true especially for p [...]
1 2 3 12 20 / 226 POSTS