Tag: articles

1 2 3 5 20 / 86 POSTS
E-Learning (1)

E-Learning (1)

Actually, students can do better or retain more of what they learn if they have more power over the learning material or resource. This will also go a [...]
Cyber Security Awareness: Get Cyber Safe

Cyber Security Awareness: Get Cyber Safe

If you connect, you must protect. Whether it is your computer, smartphone, or other network devices, the best defense against threats and attacks is t [...]
Addressing The Challenges Associated With Providing Digital Skills For All – Part 2

Addressing The Challenges Associated With Providing Digital Skills For All – Part 2

To begin with, we need a National Digital Skills Development Strategy that will harness the strengths of relevant public, private and civil society or [...]
Addressing the Challenges Associated with Providing Digital Skills for All.  Part 1

Addressing the Challenges Associated with Providing Digital Skills for All. Part 1

According to the 2019 International Finance Corporation (IFC) report entitled “Digital Skills in Sub-Saharan Africa: Spotlight on Ghana”, this revolut [...]
BEC/EAC: The Rapidly Evolving Cyber Crime

BEC/EAC: The Rapidly Evolving Cyber Crime

Business Email Compromise / Email Account Compromise (BEC/EAC) is a rapidly evolving internet fraud that targets both businesses and the general publi [...]
Discovering a Game Changer: Robotic Process Automation (RPA)

Discovering a Game Changer: Robotic Process Automation (RPA)

It suffices to say, Business Process Innovation (BPI) is at the heart of all transformational agenda, where automation, business intelligence, robots, [...]
Digital Transformation for Small and Medium Sized Business – Now Is the Time for the First Steps.

Digital Transformation for Small and Medium Sized Business – Now Is the Time for the First Steps.

The first and proven step to guide these transformations is education on the possibilities, benefits and applicability of IT in businesses. An objecti [...]
Cancerous Nature of Telecom Masts on the Environment – A Myth or Reality? – Part2

Cancerous Nature of Telecom Masts on the Environment – A Myth or Reality? – Part2

Adherence to the above basic principles and requirements will enable us enjoy a sound, safety and healthy environment, while telecom services remain i [...]
Cancerous Nature of Telecom Masts on the Environment – A Myth or Reality?

Cancerous Nature of Telecom Masts on the Environment – A Myth or Reality?

It is worth noting that the masts alone do not enable telecommunication services. The telecommunications infrastructure includes components such as ma [...]
Adopting Smart Services, A Case Study of Dubai’s Smart Police Stations (SPS)

Adopting Smart Services, A Case Study of Dubai’s Smart Police Stations (SPS)

Even if we (Ghana) would not implement a smart police station, we should look at developing a home-grown concept or system which can be used by the ma [...]
Founding a technology-based venture in Ghana – An application of Effectuation Logic

Founding a technology-based venture in Ghana – An application of Effectuation Logic

It is quite encouraging to observe the developments taking place in the technology sector in Ghana. Entrepreneurs are obtaining some forms of supports [...]
Winning the Competition with Data Science and Machine Learning

Winning the Competition with Data Science and Machine Learning

Introduction Patterns are inherent in everything we can see, feel, touch and taste. The reverse is also true for the things that are incorporeal t [...]
Telecom Towers:  The health and safety implications

Telecom Towers: The health and safety implications

Introduction Telecommunication has become a major drive for socio-economic growth, globally. The utilization of the opportunities that come with i [...]
African Continental Free Trade Area (Afcfta) – An Exposition of the Proposed Digital Payment System

African Continental Free Trade Area (Afcfta) – An Exposition of the Proposed Digital Payment System

Africa and Ghanaians were thrilled with the news of the operationalization of the African Continental Free Trade Area (AfCFTA) agreement on the 7th o [...]
Social Networking, In the Eye of the Hacker, Attacker and the Cyber Criminal (4)

Social Networking, In the Eye of the Hacker, Attacker and the Cyber Criminal (4)

Sharing Online Content It is great to share a link to a website and grab your friend’s & contact’s attention. But you never know that hackers [...]
Social Networking, In the Eyes of the Hacker, Attacker and the Cyber Criminal (3)

Social Networking, In the Eyes of the Hacker, Attacker and the Cyber Criminal (3)

In this third part of the series on Social Media security and privacy, I would like to further expose the reader to other unsuspecting pieces of info [...]
Social Networking, In the Eyes of the Hacker, Attacker and the Cyber Criminal – Part 2

Social Networking, In the Eyes of the Hacker, Attacker and the Cyber Criminal – Part 2

In the part two of this article, we take a look at the ways in which different types of information provided on social media sites are exploited by a [...]
IT Business Continuity

IT Business Continuity

Introduction Business Continuity (BC) is the capability of an organization to continue the delivery of products/services at acceptable predefined [...]
How to stay up to date in the fast-moving world of information technology

How to stay up to date in the fast-moving world of information technology

It does not really matter who you are - an IT professional, a CTO hiring an IT-service manager, or a businessman looking for a contractor to build a [...]
Ghana’s New Upper Primary Computing Curriculum: Will it deliver 21st Century Skills?

Ghana’s New Upper Primary Computing Curriculum: Will it deliver 21st Century Skills?

Lately, one of the phrases you hear when the Vice President speaks is “digitization of the economy”.  A digital economy presents opportunities i [...]
1 2 3 5 20 / 86 POSTS