Introduction In the world of software development, the question of who owns the source code is a significant and sometimes contentious issue. This controversy touches on various aspects of intellectual…
Tag: articles
Election 2024: Using Technology to Curb Political Disinformation and Misinformation on Social Media
By Richard Kafui0As Ghana approaches its 2024 general elections, the rise of political disinformation and misinformation, particularly on social media, poses significant threats to electoral integrity. To combat these issues, technology like…
Data Protection and Privacy in Elections: The Ghanaian Context
By Richard Kafui0The article discusses the significance of data protection and privacy in Ghana’s electoral processes, highlighting the risks posed by digital technologies. It emphasizes the need for robust legal frameworks, public…
Election 2024 - Political Micro-Targeting and Privacy Issues: The Case of Ghana
By Richard Kafui0The 2024 elections in Ghana will see the rise of political micro-targeting, leveraging personal data to influence voter behavior. While effective for campaigns, it raises privacy concerns, including lack of…
The Socio-Technical Challenges Threatening Cybersecurity in a Digital World
By Richard Kafui0The article emphasizes the critical role of human behavior in cybersecurity across various sectors as they undergo digital transformation. It identifies seven levels of cybersecurity, highlighting socio-technical challenges like employee…
The Sherrif Security Indicator v5.24
By Richard Kafui0The Sherrif Security Indicator (TSSI) survey, conducted to highlight cybersecurity concerns among Ghanaians, revealed that financial obligations and personal safety are the top worries for respondents. Mobile money fraud is…
Reclaiming Your Privacy: What to Do When Your Data Is Already Out There
By Richard Kafui0In Ghana, the digital age offers convenience but raises significant privacy concerns. Personal data collected during visitor registrations can lead to breaches and misuse, including fraud and identity theft. To…