…. a forgotten critical success factor in Project Management INTRODUCTION Information Security (InfoSec) in Project Management (PM) refers to the protection of confidentiality, integrity and availability of project information. Scope,…
Tag: articles

Cloud Computing
By Richard Kafui0…Costs and Data Protection Concerns INTRODUCTION For over 10 years now, organizations have been taking their IT services to the cloud. Specialized IT companies take care of software or hosting.…

How USSD Code is Breaking Grounds in Ghana – Part 2
By Richard Kafui0INTRODUCTION The first part of this article was published last week in which I touched on the usefulness of USSD, its advantages, unique features and why it is currently one…

How USSD Code is Breaking Grounds in Ghana – Part 1
By Richard Kafui0INTRODUCTION USSD stands for Unstructured Supplementary Service Data. This is a technology unique to GSM (Global System for Mobile Communication). It is a capability built into the GSM standard phones…

The Privacy of Our Personal Data
By Richard Kafui0INTRODUCTION The issue of data protection is very critical in this era of mass data breaches, especially with the ubiquitous nature of technology advancement. How do credit bureaus, health facilities,…

The Use of Data Analysis to Predict Crime
By Richard Kafui0A working model for the Ghana Police Service Information and Communication Technology (ICT) can be applied in many fields including crime fighting and prediction. In Ghana, the Ghana Police Service…

Securing Our Payment Cards
By Richard Kafui0Payment Cards (Cards) are special cards issued by financial institutions (FIs) to customers to enable them access funds in either their bank or credit accounts, make payments by electronic fund…