Skip to content
Search for:
Professional Bodies License No.: PB 94
INSTITUTE OF ICT PROFESSIONALS GHANA
CONTACT USinfo@iipgh.org
AddressOKSART Place, 2nd Floor, Ring Road Central – Circle
DONATE
  • Home
  • About Us
    • OUR INSTITUTE
    • Institute Structure
  • Membership
    • Online Registration
    • Good Standing Members
    • Verify Membership
  • ACADEMY
    • Coding Education for Ghana Program
      • The Coding Program
      • The Coding Caravan
      • Digital Design and Creative Coding
    • Downloads
      • Coding Brochure
      • Coding Program FAQ
      • Coding Caravan brochure
  • Media & Gallery
    Gallery
    Articles
    OUR VIDEOS
    PUBLIC AWARENESS
    OUR EVENT
    NEWS FEED
    Gallery
    gallery15
    confslide4
    confslide13
    gallery8
    gallery1
    Object
    gallery2
    Object
    VIEW MORE
  • Services
    • Consulting Service
    • Public Education / Capacity Building
      • Cyber Security Awareness
      • Tech Entrepreneurs Forum
      • Tech Job Fair
      • Industry Academia Tech Dialogue
      • The Coding Caravan
      • National Teaching Council
      • Women In Tech
        • Women Led Program
  • Contacts Us
Search for:
Page 46
Homepage
/
articles
/
articles
/
Page 46

Tag: articles

Digital Transformation in Schools – Closing The Gap in A Step by Step ApproachArticles

Digital Transformation in Schools – Closing The Gap in A Step by Step Approach

24 February, 2019
By Richard Kafui021st Century, articles, Diana van der Stelt, Digital Transformation, ICT

The debate on digital literacy is hot. Frequent discussions in the media space and quotes from international development agencies claim that now, in the second decade of the 21st century,…

Learn more
Share:
Facebook
Twitter
Google+
LinkedIn
How to Use Technology to Improve Student EngagementArticles

How to Use Technology to Improve Student Engagement

17 February, 2019
By Richard Kafui0articles, Peter Ayittah, Student Engagement, Technology

Student engagement in education is key. It helps to drive students to want to learn, participate in class, work effectively, improve cognitive and social skills and achieve the very best…

Learn more
Share:
Facebook
Twitter
Google+
LinkedIn
Key Elements in Cybercrime Investigations: Part 2Articles

Key Elements in Cybercrime Investigations: Part 2

10 February, 2019
By Richard Kafui0articles, Cybercrime Investigations, Sam O. Aduafo, Stephen Hasford

Overview When a computer incident occurs, the attacked organization responds with a set of predetermined actions. Applying digital forensics techniques and protocols and looking at the above sources of evidence…

Learn more
Share:
Facebook
Twitter
Google+
LinkedIn
Key Elements in Cybercrime Investigations: Part 1Articles

Key Elements in Cybercrime Investigations: Part 1

03 February, 2019
By Richard Kafui0articles, Cybercrime Investigations, Sam O. Aduafo, Stephen Hasford

Overview Digital forensics has been defined as the “process of identifying, preserving, analyzing and presenting digital evidence in a manner that is legally acceptable in any legal proceedings Computer related…

Learn more
Share:
Facebook
Twitter
Google+
LinkedIn
Corporate Cybercrime Policies, Procedures and InvestigationsArticles

Corporate Cybercrime Policies, Procedures and Investigations

28 January, 2019
By Richard Kafui0articles, Corporate Cybercrime Policies, Procedures and Investigations, Sam O. Aduafo, Stephen Hasford

Overview of Cybercrime Computer related incidents or crimes are increasing in number and severity in recent times. Cybercrime has been defined as a crime in which a computer is the…

Learn more
Share:
Facebook
Twitter
Google+
LinkedIn
Computer Forensics and Information Security: What are the differences?Articles

Computer Forensics and Information Security: What are the differences?

20 January, 2019
By Richard Kafui0articles, Computer Forensics

Overview The wide adoption of information technology and social media platforms is leading to increasing complex cybercrime, including corporate espionage, cyberwarfare, information warfare and sextortion. Newer means of communications technologies…

Learn more
Share:
Facebook
Twitter
Google+
LinkedIn
Cybersecurity and Information Security: Are they the same?Articles

Cybersecurity and Information Security: Are they the same?

13 January, 2019
By Richard Kafui0articles, Cyber Security, ICT, Information Security

Overview The field of Cybersecurity has become one of the most important and lucrative fields in ICT due to the rise of cybercrime rate the last decade. The terms cybersecurity,…

Learn more
Share:
Facebook
Twitter
Google+
LinkedIn

Posts pagination

PREV 1 … 45 46 47 … 54 NEXT
© 2025 INSTITUTE OF ICT PROFESSIONALS GHANA. All Rights Reserved. Privacy Policy || Professional Bodies License No.: PB 94