Cyber-criminals can also create enticing offers on their Facebook walls asking users to “like” and “share”. In an attempt to do so, you will be asked for personal details which…
Category: Articles
ArticlesChristmas Is Here Again! - Stay “Cyber Safe” As You Enjoy
By Richard Kafui0Cyber-criminal can also use the WhatsApp platform to carry out their operations. WhatsApp users will be receiving messages offering “surprised” gift cards that appear to be sent from your phone…
ArticlesLaying the Foundation for the Digital Future; a Digital Perspective
By Richard Kafui0In identifying and developing the right use cases, analytics or the ‘right’ analytics plays a crucial role in giving insights that decision makers will need to embark on a digital…
ArticlesDigital Gender Inequality: Challenges and Proposed Actions (Part 3)
By Richard Kafui0Internet companies must assist women to use the internet safely by providing training that helps in identifying online threats and providing tools for controlling privacy and security settings. Additionally, applications…
ArticlesDigital Gender Inequality: Challenges and Proposed Actions (Part 2)
By Richard Kafui0According to GSMA, closing the mobile ownership and usage gender gap by 2023 will deliver an estimated 140 billion dollars for the mobile industry over five years.
ArticlesDigital Gender Inequality: Challenges and Proposed Actions (Part 1)
By Richard Kafui0Though affordability is a barrier, lack of literacy and digital skills is probably the greatest challenge to reducing this digital gender gap. Reading and writing skills are needed in order…
ArticlesE-Learning (2)
By Richard Kafui0There are many benefits to e-learning for both the learners and the organizations that encourage their staff to do so. For companies looking to train employees, online courses are an…

