The debate on digital literacy is hot. Frequent discussions in the media space and quotes from international development agencies claim that now, in the second decade of the 21st century,…
Category: Articles
ArticlesHow to Use Technology to Improve Student Engagement
By Richard Kafui0Student engagement in education is key. It helps to drive students to want to learn, participate in class, work effectively, improve cognitive and social skills and achieve the very best…
ArticlesKey Elements in Cybercrime Investigations: Part 2
By Richard Kafui0Overview When a computer incident occurs, the attacked organization responds with a set of predetermined actions. Applying digital forensics techniques and protocols and looking at the above sources of evidence…
ArticlesKey Elements in Cybercrime Investigations: Part 1
By Richard Kafui0Overview Digital forensics has been defined as the “process of identifying, preserving, analyzing and presenting digital evidence in a manner that is legally acceptable in any legal proceedings Computer related…
ArticlesCorporate Cybercrime Policies, Procedures and Investigations
By Richard Kafui0Overview of Cybercrime Computer related incidents or crimes are increasing in number and severity in recent times. Cybercrime has been defined as a crime in which a computer is the…
ArticlesComputer Forensics and Information Security: What are the differences?
By Richard Kafui0Overview The wide adoption of information technology and social media platforms is leading to increasing complex cybercrime, including corporate espionage, cyberwarfare, information warfare and sextortion. Newer means of communications technologies…
ArticlesCybersecurity and Information Security: Are they the same?
By Richard Kafui0Overview The field of Cybersecurity has become one of the most important and lucrative fields in ICT due to the rise of cybercrime rate the last decade. The terms cybersecurity,…

