Category: Articles

1 2 3 6 20 / 119 POSTS
Necessity brings innovation: ICT can help to overcome Corona virus challenges and grab the opportunity to innovate.

Necessity brings innovation: ICT can help to overcome Corona virus challenges and grab the opportunity to innovate.

Your current sales, customer contacts, and supplies may be affected badly by the current situation as it has become difficult to have personal physica [...]
Scam-baiting Case study: The Scammer in the refugee camp (Part 2)

Scam-baiting Case study: The Scammer in the refugee camp (Part 2)

At the end of Part 1, the bank requested for authentic documents. I contacted Wendy and she sent me the first three documents (Deposit Certificate, D [...]
Outbreak of Coronavirus – a threat to Cybersecurity

Outbreak of Coronavirus – a threat to Cybersecurity

Verify every information source. There is currently an overload of digitized information on COVID-19 outbreak purporting to be genuine and credible, a [...]
Scam-baiting Case study: The Scammer in the refugee camp (Part 1)

Scam-baiting Case study: The Scammer in the refugee camp (Part 1)

Scam baiting is a form of internet vigilantism, where the vigilante poses as a potential victim to the scammer in order to waste their time and resour [...]
Digital Literacy: an enabler to the successful implementation of the African Continental Free Trade Agreement (AfCFTA)

Digital Literacy: an enabler to the successful implementation of the African Continental Free Trade Agreement (AfCFTA)

We need to devise means of educating our retailers on enhancing their businesses with technology. For instance, equipping them with web browsing skill [...]
Facebook Will: What Will Happen To My Facebook Account After I Pass Away?

Facebook Will: What Will Happen To My Facebook Account After I Pass Away?

This particular post is about Facebook platform. That feature on Facebook is called “Memorialization“. In short, you are creating a Digital Will for y [...]
Latest WebApp Security Threats Part 2: How to Prevent Injection Attack

Latest WebApp Security Threats Part 2: How to Prevent Injection Attack

“With these tools [hacking tools] in your hand, you guys are powered to do anything but remember, with a gun in your hand, you can be security man, yo [...]
Latest WebApp Security Threats Part 1: How to Perform Injection Attack

Latest WebApp Security Threats Part 1: How to Perform Injection Attack

Injection attack in short, is trying to add (inject) a query (a test, a letter, a code, or anything imaginable) at the front end of a web application, [...]
Manage Your Privacy, Safeguard Your Personal Data

Manage Your Privacy, Safeguard Your Personal Data

The concept of privacy varies widely among countries, cultures and jurisdictions. It is shaped by public expectations and legal interpretations; as su [...]
Developing Web Applications for Everyone

Developing Web Applications for Everyone

Understanding the standards and guidelines elicited by W3C documentations is the first step for knowing and understanding how to write codes and devel [...]
Stay “Cyber Safe” As You Explore 2020!

Stay “Cyber Safe” As You Explore 2020!

Cyber-criminals can also create enticing offers on their Facebook walls asking users to “like” and “share”. In an attempt to do so, you will be asked [...]
Christmas Is Here Again! – Stay “Cyber Safe” As You Enjoy

Christmas Is Here Again! – Stay “Cyber Safe” As You Enjoy

Cyber-criminal can also use the WhatsApp platform to carry out their operations. WhatsApp users will be receiving messages offering “surprised” gift c [...]
Laying the Foundation for the Digital Future; a Digital Perspective

Laying the Foundation for the Digital Future; a Digital Perspective

In identifying and developing the right use cases, analytics or the ‘right’ analytics plays a crucial role in giving insights that decision makers wil [...]
Digital Gender Inequality: Challenges and Proposed Actions (Part 3)

Digital Gender Inequality: Challenges and Proposed Actions (Part 3)

Internet companies must assist women to use the internet safely by providing training that helps in identifying online threats and providing tools for [...]
Digital Gender Inequality: Challenges and Proposed Actions (Part 2)

Digital Gender Inequality: Challenges and Proposed Actions (Part 2)

According to GSMA, closing the mobile ownership and usage gender gap by 2023 will deliver an estimated 140 billion dollars for the mobile industry ove [...]
Digital Gender Inequality: Challenges and Proposed Actions (Part 1)

Digital Gender Inequality: Challenges and Proposed Actions (Part 1)

Though affordability is a barrier, lack of literacy and digital skills is probably the greatest challenge to reducing this digital gender gap. Readin [...]
E-Learning (2)

E-Learning (2)

There are many benefits to e-learning for both the learners and the organizations that encourage their staff to do so. For companies looking to train [...]
E-Learning (1)

E-Learning (1)

Actually, students can do better or retain more of what they learn if they have more power over the learning material or resource. This will also go a [...]
Cyber Security Awareness: Get Cyber Safe

Cyber Security Awareness: Get Cyber Safe

If you connect, you must protect. Whether it is your computer, smartphone, or other network devices, the best defense against threats and attacks is t [...]
Addressing The Challenges Associated With Providing Digital Skills For All – Part 2

Addressing The Challenges Associated With Providing Digital Skills For All – Part 2

To begin with, we need a National Digital Skills Development Strategy that will harness the strengths of relevant public, private and civil society or [...]
1 2 3 6 20 / 119 POSTS