<?xml version="1.0" encoding="UTF-8"?>
<itemContainer xmlns="http://omeka.org/schemas/omeka-xml/v5" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://omeka.org/schemas/omeka-xml/v5 http://omeka.org/schemas/omeka-xml/v5/omeka-xml-5-0.xsd" uri="https://www.repository.gctu.edu.gh/items/browse?collection=16&amp;output=omeka-xml&amp;page=3" accessDate="2026-04-23T16:14:12+00:00">
  <miscellaneousContainer>
    <pagination>
      <pageNumber>3</pageNumber>
      <perPage>10</perPage>
      <totalResults>35</totalResults>
    </pagination>
  </miscellaneousContainer>
  <item itemId="75" public="1" featured="0">
    <fileContainer>
      <file fileId="74">
        <src>https://www.repository.gctu.edu.gh/files/original/557d0b6a90d30d2e901834025f9db3a0.pdf</src>
        <authentication>7f63809b6ef384aa553859f8ffe8fd7a</authentication>
      </file>
    </fileContainer>
    <collection collectionId="16">
      <elementSetContainer>
        <elementSet elementSetId="1">
          <name>Dublin Core</name>
          <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
          <elementContainer>
            <element elementId="50">
              <name>Title</name>
              <description>A name given to the resource</description>
              <elementTextContainer>
                <elementText elementTextId="344">
                  <text>MSc Management Information Systems</text>
                </elementText>
              </elementTextContainer>
            </element>
          </elementContainer>
        </elementSet>
      </elementSetContainer>
    </collection>
    <itemType itemTypeId="1">
      <name>Text</name>
      <description>A resource consisting primarily of words for reading. Examples include books, letters, dissertations, poems, newspapers, articles, archives of mailing lists. Note that facsimiles or images of texts are still of the genre Text.</description>
    </itemType>
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="455">
                <text>Assessing The Information Systems Secrity Challenges In Cloud Computing: A Case Study Of Cocoa Marketing Company Ghana Limited Submitted  &#13;
&#13;
 &#13;
.&#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="39">
            <name>Creator</name>
            <description>An entity primarily responsible for making the resource</description>
            <elementTextContainer>
              <elementText elementTextId="456">
                <text> Jennifer Ashiokaa Bidema</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="41">
            <name>Description</name>
            <description>An account of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="457">
                <text>Cloud computing is the computing model in which the computing resources such as software, hardware and data are delivered as a service through the internet with the aid of web browsers or light-weight desktop machine over the internet (Wink, 2012). This computing model has taken over physical hardware infrastructure by cutting off the cost to procure huge local serv-ers for to augment business operations and storage. (Montero &amp; Llorente, 2012). The adop-tion of cloud as a service is affected by different security issues and challenges such as Tem-porary Denial of Service (TDOS) attacks, user identity theft, session hijacking issues and flashing attacks (Danish, 2011).&#13;
The research was conducted at the Cocoa Marketing Company Ghana Limited (CMC). For which employees were sampled through a purposive sampling technique. The data collection involved employee’s answers to questions posed to them in the questionnaires administered. The purpose of this study is to assess the information systems security challenges in cloud computing and bridge the research gap between the cloud security challenges, measures and the existing security threats. An assessment into existing cloud service models, security standards, currently adopted security measures and their degree of flawless protection has been done. The study helped in outlining the security challenges, issues and their solutions whereas the empirical study facilitated in acknowledging the concerns and perception of po-tential cloud users perceptions and challenges. The empirical method used in this research is questionnaires to validate the theoretical findings. According to findings of the study, most organizational departments like CMC relay on shared folders as part of their business operations a medium of sharing information. This pro-vides a better way for introducing cloud computing in such organizations. The study also stated that there are staffs in specific organizations assigned with the duty of data protection, so the perception on data security should not be an issue for such organizations.&#13;
Cloud computing or cloud as a service when adopted according to the study has the tendency to help organizations like CMC to gain competitive advantage in their area of business. How-ever the perception that cloud adoption will open the floodgates for intruders to compromise confidentiality, integrity and availability of data has become the major drawbacks hindering organizations mostly in Africa to adopt the use of cloud to enhance their ways of doing busi-ness. Based on the information gathered from the respondents it is clear that cloud computing is a possibility in CMC. However, management could be a hindering block to its implementa-tion since most of them are politically skewed to the government of the day. These security challenges and perceptions are highly beneficial to the adoption of cloud com-puting because it offers to organizations the knowledge into the potential security risks and challenges and provide some mitigation mechanism for organizations who will be willing to adopt the cloud as a service in the future.</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="49">
            <name>Subject</name>
            <description>The topic of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="458">
                <text> Msc In Management Information Systems </text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="45">
            <name>Publisher</name>
            <description>An entity responsible for making the resource available</description>
            <elementTextContainer>
              <elementText elementTextId="459">
                <text>Ghana Technology University College</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="40">
            <name>Date</name>
            <description>A point or period of time associated with an event in the lifecycle of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="460">
                <text>May, 2018</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="37">
            <name>Contributor</name>
            <description>An entity responsible for making contributions to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="461">
                <text>Dr. Stephen Asunka </text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </item>
  <item itemId="74" public="1" featured="0">
    <fileContainer>
      <file fileId="73">
        <src>https://www.repository.gctu.edu.gh/files/original/c5ba1ba14121b3042378de83ed0d47e7.pdf</src>
        <authentication>5e75e8391303f677dd76118bd80b13c1</authentication>
      </file>
    </fileContainer>
    <collection collectionId="16">
      <elementSetContainer>
        <elementSet elementSetId="1">
          <name>Dublin Core</name>
          <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
          <elementContainer>
            <element elementId="50">
              <name>Title</name>
              <description>A name given to the resource</description>
              <elementTextContainer>
                <elementText elementTextId="344">
                  <text>MSc Management Information Systems</text>
                </elementText>
              </elementTextContainer>
            </element>
          </elementContainer>
        </elementSet>
      </elementSetContainer>
    </collection>
    <itemType itemTypeId="1">
      <name>Text</name>
      <description>A resource consisting primarily of words for reading. Examples include books, letters, dissertations, poems, newspapers, articles, archives of mailing lists. Note that facsimiles or images of texts are still of the genre Text.</description>
    </itemType>
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="448">
                <text>Crime Predictive Model in Cybercrime Based On Social &#13;
And Economic Factors Using Bayesian And Markov Theories &#13;
(Case Study of Bank) &#13;
&#13;
  &#13;
 &#13;
 &#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="39">
            <name>Creator</name>
            <description>An entity primarily responsible for making the resource</description>
            <elementTextContainer>
              <elementText elementTextId="449">
                <text> Emeh Jennifer Afoma</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="41">
            <name>Description</name>
            <description>An account of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="450">
                <text>If financial institutions cannot detect incidents effectively, it cannot succeed to responding to incidents. This implies that the detection of incidents, is the most important aspect of incident response. A stochastic process with a first order dependence in discrete state and time is described as Markov chain, in the same way, Bayesian theory is a mathematical framework for reasoning and performing inference using probability. These two theories were used to predict cybercrime occurrence using centralized system in form of a model for Management Information Systems (MIS). The advancement of technology in banking has made banking business processes very convenient, but as the technology advances, cybercrimes of different nature emerges and equally at its peak. In as much as there are different measures already in place to combat these crimes, there still lies so many vulnerabilities which cannot be evitable in any information systems, especially the financial institutions, in other words prediction theory which tends to detect and predict any event can be used to combat this cybercrime activities.&#13;
The theory which was introduced by Markov in 1907 has been applied in many predictive models and at such has been able to describe various phenomena of the real world. In this research study, the application of Markov theory and Markov chain offered ideal conditions for determination of the next target of crime. Similarly, Bayesian inference also analysed the nature of cybercrime and the probability of its occurrence, moreover, it has been recommended that different factors which could possibly cause cybercrime like vulnerabilities of information system, should also be predicted using both theories.&#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="49">
            <name>Subject</name>
            <description>The topic of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="451">
                <text>MSc Management Information Systems </text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="45">
            <name>Publisher</name>
            <description>An entity responsible for making the resource available</description>
            <elementTextContainer>
              <elementText elementTextId="452">
                <text>&#13;
Ghana Technology University College&#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="40">
            <name>Date</name>
            <description>A point or period of time associated with an event in the lifecycle of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="453">
                <text>January, 2017</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="37">
            <name>Contributor</name>
            <description>An entity responsible for making contributions to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="454">
                <text>Dr. Kester Quist-Aphetsi </text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </item>
  <item itemId="73" public="1" featured="0">
    <fileContainer>
      <file fileId="72">
        <src>https://www.repository.gctu.edu.gh/files/original/2d351ca7a2045016c0dabc2018be9b55.pdf</src>
        <authentication>ba9eaab47f3da2d60df02a131742bc3e</authentication>
      </file>
    </fileContainer>
    <collection collectionId="16">
      <elementSetContainer>
        <elementSet elementSetId="1">
          <name>Dublin Core</name>
          <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
          <elementContainer>
            <element elementId="50">
              <name>Title</name>
              <description>A name given to the resource</description>
              <elementTextContainer>
                <elementText elementTextId="344">
                  <text>MSc Management Information Systems</text>
                </elementText>
              </elementTextContainer>
            </element>
          </elementContainer>
        </elementSet>
      </elementSetContainer>
    </collection>
    <itemType itemTypeId="1">
      <name>Text</name>
      <description>A resource consisting primarily of words for reading. Examples include books, letters, dissertations, poems, newspapers, articles, archives of mailing lists. Note that facsimiles or images of texts are still of the genre Text.</description>
    </itemType>
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="441">
                <text> Evaluating the Critical Success Factors Influencing the Adoption of Biometric Technologies by IT Managers in Developing Countries – Ghana &#13;
A Case Study of Social Security and National Insurance Trust (SSNIT) &#13;
&#13;
  &#13;
 &#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="39">
            <name>Creator</name>
            <description>An entity primarily responsible for making the resource</description>
            <elementTextContainer>
              <elementText elementTextId="442">
                <text>JACOB ENNIN </text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="41">
            <name>Description</name>
            <description>An account of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="443">
                <text>This dissertation provides a new substantive finding that evaluates the factors that influence the adoption of Biometric Technology by developing countries like Ghana, Social Security and National Insurance Trust (SSNIT). Even though there has been several studies emphazing on the significance of biometric technologies in hotels and financial sectors (Moresan, 2012; Pooe &amp; Labuschagne, 2011; Rabiu et al., 2016). Nonetheless, there is minimal empirical research with regards to the government agencies. Therefore, this dissertation focuses on factors impacting on the adoption of biometric technologies and benefits of these technologies (Yarbrough et al, 2007).&#13;
It is against this background that it behooves the researcher to focus on finding the elements influencing the adoption of biometric technologies by information technology managers in developing countries - Ghana. A case study of Social Security and National Insurance Trust (SSNIT)Keywords Biometric, technology, behooves, adoption, empirical, Social Security and National Insurance Trust (SSNIT), authentication, substantive finding.</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="49">
            <name>Subject</name>
            <description>The topic of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="444">
                <text>Msc Management Information System</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="40">
            <name>Date</name>
            <description>A point or period of time associated with an event in the lifecycle of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="445">
                <text>September 2017</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="45">
            <name>Publisher</name>
            <description>An entity responsible for making the resource available</description>
            <elementTextContainer>
              <elementText elementTextId="446">
                <text>Ghana Technology University College</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="37">
            <name>Contributor</name>
            <description>An entity responsible for making contributions to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="447">
                <text>Dr. William Brown - Acquah</text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </item>
  <item itemId="72" public="1" featured="0">
    <fileContainer>
      <file fileId="71">
        <src>https://www.repository.gctu.edu.gh/files/original/449b719bcc7a40778ee04e7fe6845960.pdf</src>
        <authentication>74d8399a54e3c374abde7a4e8b2b90ff</authentication>
      </file>
    </fileContainer>
    <collection collectionId="16">
      <elementSetContainer>
        <elementSet elementSetId="1">
          <name>Dublin Core</name>
          <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
          <elementContainer>
            <element elementId="50">
              <name>Title</name>
              <description>A name given to the resource</description>
              <elementTextContainer>
                <elementText elementTextId="344">
                  <text>MSc Management Information Systems</text>
                </elementText>
              </elementTextContainer>
            </element>
          </elementContainer>
        </elementSet>
      </elementSetContainer>
    </collection>
    <itemType itemTypeId="1">
      <name>Text</name>
      <description>A resource consisting primarily of words for reading. Examples include books, letters, dissertations, poems, newspapers, articles, archives of mailing lists. Note that facsimiles or images of texts are still of the genre Text.</description>
    </itemType>
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="434">
                <text>Information Security Policies: A Case Study of Ghana Cocoa Board &#13;
&#13;
&#13;
&#13;
&#13;
 &#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="39">
            <name>Creator</name>
            <description>An entity primarily responsible for making the resource</description>
            <elementTextContainer>
              <elementText elementTextId="435">
                <text>Ian Donkor-Kroti </text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="41">
            <name>Description</name>
            <description>An account of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="436">
                <text>Highly sensitive information pertaining to individuals and government institutions couple with their daily transactions are processed in an electronic format these days, making information security a critical part of e-Government applications and architectures. Information security measures should ideally span from authentication to authorization and from logical/physical access control to auditing of electronic transactions and log books. The lack of such measures compromises confidentiality, integrity, and availability of information. Most organizations are faced with developing information security systems and also committing their staffs to adhere to the set standards. This thesis aims at discussing and analyzing how information security policies are developed within Ghana Cocoa Board and also how employees appreciate and commit themselves to work with the set security policies. The thesis identified that most policies the administrators develop are not enforced well, also management do not really appreciate the development of these policies therefore top management does not help the Information systems department to enforce the policies. The work found out that security must be handled within COCOBOD with utmost care and diligence, therefore top management must be ready to help drive the culture down to the employees of the organization.&#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="49">
            <name>Subject</name>
            <description>The topic of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="437">
                <text> Msc in Management Information Systems</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="45">
            <name>Publisher</name>
            <description>An entity responsible for making the resource available</description>
            <elementTextContainer>
              <elementText elementTextId="438">
                <text>Ghana Technology University College</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="40">
            <name>Date</name>
            <description>A point or period of time associated with an event in the lifecycle of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="439">
                <text>May, 2018</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="37">
            <name>Contributor</name>
            <description>An entity responsible for making contributions to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="440">
                <text> Dr. Stephen Asunka </text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </item>
  <item itemId="71" public="1" featured="0">
    <fileContainer>
      <file fileId="70">
        <src>https://www.repository.gctu.edu.gh/files/original/a149a5ba9a238cf8b283fc3ecccfc60b.pdf</src>
        <authentication>a69ec2e235f3b95d8bf27c7c176bddcb</authentication>
      </file>
    </fileContainer>
    <collection collectionId="16">
      <elementSetContainer>
        <elementSet elementSetId="1">
          <name>Dublin Core</name>
          <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
          <elementContainer>
            <element elementId="50">
              <name>Title</name>
              <description>A name given to the resource</description>
              <elementTextContainer>
                <elementText elementTextId="344">
                  <text>MSc Management Information Systems</text>
                </elementText>
              </elementTextContainer>
            </element>
          </elementContainer>
        </elementSet>
      </elementSetContainer>
    </collection>
    <itemType itemTypeId="1">
      <name>Text</name>
      <description>A resource consisting primarily of words for reading. Examples include books, letters, dissertations, poems, newspapers, articles, archives of mailing lists. Note that facsimiles or images of texts are still of the genre Text.</description>
    </itemType>
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="427">
                <text>Evaluation of Effective IT Service &#13;
Operation In Service-Based &#13;
Organizations in Ghana Using ITIL V3 &#13;
Framework &#13;
 &#13;
 &#13;
&#13;
&#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="39">
            <name>Creator</name>
            <description>An entity primarily responsible for making the resource</description>
            <elementTextContainer>
              <elementText elementTextId="428">
                <text> FREDERICK AMUZU</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="41">
            <name>Description</name>
            <description>An account of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="429">
                <text>This research work sought to perform an evaluation of how effective IT Service Operation plays out in service-based organizations in Ghana using Information Technology Infrastructure Library (ITIL) version 3 framework. The main objective was to understand the maturity level of IT Service Operation adopted and the derived benefits among the service-based organizations in Ghana. The research results in the final analysis suggested that there is a positive correlation between the maturity level of ITIL v3 implemented and the derived benefits of IT Service Operations. Additionally, the effectiveness of IT Service Operation was evaluated and the results statistically showed that the effectiveness of the IT Service Operation was largely dependent on ITIL v3 processes adopted and the constitution of a Service Desk team that are highly skilled and well tooled to perform their functions within a monitored service level agreements</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="49">
            <name>Subject</name>
            <description>The topic of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="430">
                <text> Msc. Management Information System</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="45">
            <name>Publisher</name>
            <description>An entity responsible for making the resource available</description>
            <elementTextContainer>
              <elementText elementTextId="431">
                <text>Ghana Technology University college</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="40">
            <name>Date</name>
            <description>A point or period of time associated with an event in the lifecycle of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="432">
                <text>January 2017</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="37">
            <name>Contributor</name>
            <description>An entity responsible for making contributions to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="433">
                <text> DOMINIC K. LOUIS </text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </item>
  <item itemId="70" public="1" featured="0">
    <fileContainer>
      <file fileId="69">
        <src>https://www.repository.gctu.edu.gh/files/original/3aa7bdcfd98d7922917ab5d5e19649c0.pdf</src>
        <authentication>ce1daa3ea4dc3463bde10fc15e83e05a</authentication>
      </file>
    </fileContainer>
    <collection collectionId="16">
      <elementSetContainer>
        <elementSet elementSetId="1">
          <name>Dublin Core</name>
          <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
          <elementContainer>
            <element elementId="50">
              <name>Title</name>
              <description>A name given to the resource</description>
              <elementTextContainer>
                <elementText elementTextId="344">
                  <text>MSc Management Information Systems</text>
                </elementText>
              </elementTextContainer>
            </element>
          </elementContainer>
        </elementSet>
      </elementSetContainer>
    </collection>
    <itemType itemTypeId="1">
      <name>Text</name>
      <description>A resource consisting primarily of words for reading. Examples include books, letters, dissertations, poems, newspapers, articles, archives of mailing lists. Note that facsimiles or images of texts are still of the genre Text.</description>
    </itemType>
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="420">
                <text>An Assessment of Information System Implementation Success on Port Operations at Ghana Ports and Habours&#13;
&#13;
&#13;
&#13;
&#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="39">
            <name>Creator</name>
            <description>An entity primarily responsible for making the resource</description>
            <elementTextContainer>
              <elementText elementTextId="421">
                <text> Felix Adusei Tuffour</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="41">
            <name>Description</name>
            <description>An account of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="422">
                <text>The use of information system in the maritime industry and most especially in Ghana Ports and Habours provides the organisation with a much-improved service as well as efficiency and effectiveness of personnel. The success derived from Information System (IS) implementation is very important and so is the criteria and parameters for measuring or assessing such success. Several implementations of IS is on-going without any reference to an impact assessment of previously implemented one. As a result, most of these implementations are suffering from unresolved challenges of pervious systems. This study however, used an existing model for IS success for evaluating an information system’s success (ISS) at the Port of Tema by applying the DeLone &amp; McLean update IS success model (D&amp;M). The proposed model was adopted to demonstrate how its elements could be applied in evaluating IS implementations and also to support the decision makers in evaluating and developing the information systems. The study adopted a mixed method approach which includes both qualitative and quantitative approaches. 150 questionnaires were administered to collect primary data from port operational staff of GPHA and secondary data of organisation reports were also obtained for analysis. The results indicated that perceived usefulness, ease of use, accuracy, timeliness, reliability, user support significantly affected the use and user satisfaction of an information. It further indicated that an increase in these variables will result in positive outcome from the information system implementation. The proposed model used better explains the interrelation between the constructs and the interrelationship that exit among the construct has a strong statistical significance influence on GPHA employee usage intention.&#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="49">
            <name>Subject</name>
            <description>The topic of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="423">
                <text>Msc. Management Information Systems</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="45">
            <name>Publisher</name>
            <description>An entity responsible for making the resource available</description>
            <elementTextContainer>
              <elementText elementTextId="424">
                <text>Ghana Technology University College</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="40">
            <name>Date</name>
            <description>A point or period of time associated with an event in the lifecycle of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="425">
                <text>MAY 2018</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="37">
            <name>Contributor</name>
            <description>An entity responsible for making contributions to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="426">
                <text> Dr. Ezer Osei Yeboah-Boateng</text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </item>
  <item itemId="69" public="1" featured="0">
    <fileContainer>
      <file fileId="68">
        <src>https://www.repository.gctu.edu.gh/files/original/7af81c30e457d39b99c174d7292bd399.pdf</src>
        <authentication>1296782c4e8455214be7ef93b6044f11</authentication>
      </file>
    </fileContainer>
    <collection collectionId="16">
      <elementSetContainer>
        <elementSet elementSetId="1">
          <name>Dublin Core</name>
          <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
          <elementContainer>
            <element elementId="50">
              <name>Title</name>
              <description>A name given to the resource</description>
              <elementTextContainer>
                <elementText elementTextId="344">
                  <text>MSc Management Information Systems</text>
                </elementText>
              </elementTextContainer>
            </element>
          </elementContainer>
        </elementSet>
      </elementSetContainer>
    </collection>
    <itemType itemTypeId="1">
      <name>Text</name>
      <description>A resource consisting primarily of words for reading. Examples include books, letters, dissertations, poems, newspapers, articles, archives of mailing lists. Note that facsimiles or images of texts are still of the genre Text.</description>
    </itemType>
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="411">
                <text>Assessing Payment Card Industry Data Security Standard Compliance and ‘Europay, Mastercard, Visa’ Adoption amongst Universal Banks in Ghana and it’s Relationship with Fraud. &#13;
&#13;
 &#13;
&#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="39">
            <name>Creator</name>
            <description>An entity primarily responsible for making the resource</description>
            <elementTextContainer>
              <elementText elementTextId="412">
                <text>Eugene Oku</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="41">
            <name>Description</name>
            <description>An account of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="413">
                <text>In the banking industry, protecting consumers' financial security is without a doubt a major issue of concern especially in the modern world where the banking process has been digitalized and consumers exposed to numerous new issues. The introduction of the payment card system in the 1950’s created a new channel through which fraudsters can exploit. With the rise in card payment fraud cases, ‘Europay, MasterCard and Visa’&#13;
(EMV) technology was created in 1994 by the major players in the industry to secure card present transactions. This was followed by the release of the first version of the Payment Card Industry Data Security Standards (PCI DSS) somewhere in 2010 to protect cardholder data. Thus, this study was designed to understand the impact of PCI DSS and EMV standards in Ghanaian banking industry and its relationship on payment card&#13;
frauds. The sampling technique employed in the study was random sampling technique. Questionnaires were administered to staff and customers of 10 selected universal banks to&#13;
gather primary data from the targeted participants which were analysed with Statistical Package for Social Sciences (SPSS). In all 50 staff of universal banks (i.e. 5 from each bank) and 100 customers (i.e. 10 from each bank) participated in this research.&#13;
The study revealed that Adequate funding, training and forums, change in organizational culture were most critical success factors in order to ensure a successful and continuous&#13;
PCI DSS compliance and EMV adoption. It was also discovered that cost of implementation, lack of management commitment and support and uncooperativeness of key stakeholders were the major challenging issues for banks seeking to adopt PCI DSS&#13;
and EMV. The study also revealed that, most of the banks have made some efforts to protect he cardholder data of their customers and was further deduced that the higher the&#13;
compliance level of PCI DSS and EMV the lower the occurrence of card payment fraud. To conclude, it was shown that customers are more loyal when steps are being taken in their best interest.</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="49">
            <name>Subject</name>
            <description>The topic of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="414">
                <text>Msc. Management Information Systems.</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="45">
            <name>Publisher</name>
            <description>An entity responsible for making the resource available</description>
            <elementTextContainer>
              <elementText elementTextId="415">
                <text>Ghana Technology University College</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="40">
            <name>Date</name>
            <description>A point or period of time associated with an event in the lifecycle of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="416">
                <text>January, 2018</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="37">
            <name>Contributor</name>
            <description>An entity responsible for making contributions to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="417">
                <text>Dr. Stephen Asunka</text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </item>
  <item itemId="68" public="1" featured="0">
    <fileContainer>
      <file fileId="67">
        <src>https://www.repository.gctu.edu.gh/files/original/e82a975ef339e407f1c53794874b1848.pdf</src>
        <authentication>bac8b9c59cc6a19c30c2886d7ffa5da9</authentication>
      </file>
    </fileContainer>
    <collection collectionId="16">
      <elementSetContainer>
        <elementSet elementSetId="1">
          <name>Dublin Core</name>
          <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
          <elementContainer>
            <element elementId="50">
              <name>Title</name>
              <description>A name given to the resource</description>
              <elementTextContainer>
                <elementText elementTextId="344">
                  <text>MSc Management Information Systems</text>
                </elementText>
              </elementTextContainer>
            </element>
          </elementContainer>
        </elementSet>
      </elementSetContainer>
    </collection>
    <itemType itemTypeId="1">
      <name>Text</name>
      <description>A resource consisting primarily of words for reading. Examples include books, letters, dissertations, poems, newspapers, articles, archives of mailing lists. Note that facsimiles or images of texts are still of the genre Text.</description>
    </itemType>
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="405">
                <text>Design Of Hybrid Neural Network Intrusion Detection Systems&#13;
&#13;
&#13;
&#13;
&#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="39">
            <name>Creator</name>
            <description>An entity primarily responsible for making the resource</description>
            <elementTextContainer>
              <elementText elementTextId="406">
                <text> Eugene Efah Adane</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="41">
            <name>Description</name>
            <description>An account of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="407">
                <text>Due to the rapid growth of computer system and Internet, network security became crucial issue for most organizations. Mostly organizations increase usage of different tools and methods to secure their network due to the increase of security threats. Many methods have been developed to secure computer networks and communication over the Internet. However, none of the existing methods developed by different researches have an accuracy of detecting attacks with high detection rate and low false alarm rate. The other thing is most deal with single detection approach with high number of features which is challenging and time consuming to implement.&#13;
Also it will examine only either previously known attacks or unknown attacks. This thesis work is devoted to solve those problems using intrusion detection system architecture that is based on neural network, signatures and dimension reduction that can promptly detect and classify attacks, whether they are known or never seen before. The proposed hybrid intrusion detection system combines signature based and anomaly based techniques. Signature based open source which uses pattern search for attack detection and the anomaly based system is developed using machine learning technique. We implemented dimension reduction using dataset NSL-KDD and train the system using the well-known artificial neural network algorithm in the area of intrusion detection. The evaluation of performance and implementation of the proposed hybrid intrusion detection system are made with Java programming language using NetBeans. The results obtained by the implementation and evaluation are measured in comparison with other works&#13;
done using single detection approach. The result shows that the output is encouraging and further refinement of the work can produce more robust and reliable intrusion detection system.&#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="49">
            <name>Subject</name>
            <description>The topic of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="408">
                <text>Msc Management Information System</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="40">
            <name>Date</name>
            <description>A point or period of time associated with an event in the lifecycle of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="409">
                <text> 15 -09 -2017</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="37">
            <name>Contributor</name>
            <description>An entity responsible for making contributions to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="410">
                <text> ING Isaac Hanson</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="45">
            <name>Publisher</name>
            <description>An entity responsible for making the resource available</description>
            <elementTextContainer>
              <elementText elementTextId="418">
                <text>Ghana Technology University College</text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </item>
  <item itemId="67" public="1" featured="0">
    <fileContainer>
      <file fileId="66">
        <src>https://www.repository.gctu.edu.gh/files/original/6ef9032c8b64ed03678bb997a7b9f8a6.pdf</src>
        <authentication>d708aabee6ef3dd1a92b9421cbd78787</authentication>
      </file>
    </fileContainer>
    <collection collectionId="16">
      <elementSetContainer>
        <elementSet elementSetId="1">
          <name>Dublin Core</name>
          <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
          <elementContainer>
            <element elementId="50">
              <name>Title</name>
              <description>A name given to the resource</description>
              <elementTextContainer>
                <elementText elementTextId="344">
                  <text>MSc Management Information Systems</text>
                </elementText>
              </elementTextContainer>
            </element>
          </elementContainer>
        </elementSet>
      </elementSetContainer>
    </collection>
    <itemType itemTypeId="1">
      <name>Text</name>
      <description>A resource consisting primarily of words for reading. Examples include books, letters, dissertations, poems, newspapers, articles, archives of mailing lists. Note that facsimiles or images of texts are still of the genre Text.</description>
    </itemType>
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="398">
                <text> Evaluating The Internal Threats of an Organisation’s Information Security: A Case Study Of Xpress Gas Limited &#13;
 &#13;
 &#13;
 &#13;
 &#13;
&#13;
&#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="39">
            <name>Creator</name>
            <description>An entity primarily responsible for making the resource</description>
            <elementTextContainer>
              <elementText elementTextId="399">
                <text>Eric Kwesi Parden</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="41">
            <name>Description</name>
            <description>An account of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="400">
                <text>Information is of essence in today’s information age with ubiquity. Control systems are pivotal in any organisation with the quest to grow. Taking into account the numerous cases that have occasioned as a result of the poor control measures put in place to check the system. Advancement in information technologies such as the Internet has called for organisations to protect their information to ensure its confidentiality, integrity, and availability. Information security of every organisation is of essence especially an organisation to remain competitive. Organisations know the value information has regarding the reputation of the entity which can lead to loss of client’s confidence, financial loss, goodwill and trust, loss of potential sales and legal issues. The researcher used both the random sampling and purposive sampling techniques to select the study subjects. The purpose of this research is to evaluate the internal threats within an organisation’s information security; the case of Xpress Gas Ltd. The researcher uses purposive sampling technique because only staff members who directly connect to the logistics side of the information system. The researcher adopts this technique in order to acquire the relevant information. The study population are those employees who are directly dealing with the logistics aspects of the Company constituting the sample size of 200. Data collated from respondents is analyse using a Statistical Package for Social Science version 20 and Microsoft Excel is employ in analysing the data and present the data in table form using Microsoft Word. The findings showed that there are internal threats within Xpress Gas Ltd as majority of the respondents 84.5% threats found within Xpress Gas Ltd are more of internal threats related such as human error or failure, deliberate acts of information extortion, deliberate acts of espionage or trespass, deliberate acts of sabotage or vandalism, deliberate acts of theft, and deliberate software attacks.</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="49">
            <name>Subject</name>
            <description>The topic of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="401">
                <text>Msc. Management Information Systems </text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="45">
            <name>Publisher</name>
            <description>An entity responsible for making the resource available</description>
            <elementTextContainer>
              <elementText elementTextId="402">
                <text>Ghana Technology University College</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="40">
            <name>Date</name>
            <description>A point or period of time associated with an event in the lifecycle of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="403">
                <text>May 2017 </text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="37">
            <name>Contributor</name>
            <description>An entity responsible for making contributions to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="404">
                <text>Dr. Stephen Asunka </text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </item>
  <item itemId="66" public="1" featured="0">
    <fileContainer>
      <file fileId="65">
        <src>https://www.repository.gctu.edu.gh/files/original/f9f7870a2a52439e30f690dba14e7084.pdf</src>
        <authentication>f0e1376f57895e3c553b343a7c7b23a2</authentication>
      </file>
    </fileContainer>
    <collection collectionId="16">
      <elementSetContainer>
        <elementSet elementSetId="1">
          <name>Dublin Core</name>
          <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
          <elementContainer>
            <element elementId="50">
              <name>Title</name>
              <description>A name given to the resource</description>
              <elementTextContainer>
                <elementText elementTextId="344">
                  <text>MSc Management Information Systems</text>
                </elementText>
              </elementTextContainer>
            </element>
          </elementContainer>
        </elementSet>
      </elementSetContainer>
    </collection>
    <itemType itemTypeId="1">
      <name>Text</name>
      <description>A resource consisting primarily of words for reading. Examples include books, letters, dissertations, poems, newspapers, articles, archives of mailing lists. Note that facsimiles or images of texts are still of the genre Text.</description>
    </itemType>
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="392">
                <text>  An Assessment of the Extent of Vulnerabilities in Social Media &#13;
 &#13;
 &#13;
&#13;
 &#13;
  &#13;
&#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="39">
            <name>Creator</name>
            <description>An entity primarily responsible for making the resource</description>
            <elementTextContainer>
              <elementText elementTextId="393">
                <text>Vera Azonim Erhabor</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="41">
            <name>Description</name>
            <description>An account of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="394">
                <text>Social media has gained grounds in recent times becoming an integral part of human lives enabling communication, friendships, and opinions. The paradigm shift has brought about risk and threats especially to those cyber criminals who want to capitalize on the unwariness or ignorance of the users and to exploit the vulnerabilities identified. This study sought to assess the vulnerabilities in social media with regards to the possible strategies to mitigate the threats. The perception is that users of these social media believe that they have internet security suite install to safeguard their devices against threats including social engineering threats. The study employed the qualitative research design i.e. gleaning through reports and literature and the questionnaires approach through interview to evaluate the vulnerabilities that come with the use of social media. The study area consisted of users of the social media platforms such as Facebook, WhatsApp, Instagram, Twitter etc. in the central business district of Accra. A study size of 120 social media users was drawn. The research used both the random sampling and purposive sampling techniques to select the study subjects. The results show that 64% of the users surveyed are between 20 to 40 years. From the results, majority of the respondents representing 46.7% use Facebook. Majority of the respondents representing 76% said they are secured and protected using social media little do they know they are not protected in anyway. It is also recommended that advances technologies be used in the blockage of social media at work places. Monitoring is also keen and is recommended in order to curb the rate of usage of social media. The recommendation is that awareness creation and training of staff members on the vulnerabilities or threats on social media. The theories employed in this study, is the Personal Behavior Theory that explains users’ Personal traits and their attitudes on social media.&#13;
&#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="49">
            <name>Subject</name>
            <description>The topic of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="395">
                <text>Msc Management Information Systems</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="40">
            <name>Date</name>
            <description>A point or period of time associated with an event in the lifecycle of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="396">
                <text>September, 2017</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="37">
            <name>Contributor</name>
            <description>An entity responsible for making contributions to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="397">
                <text> Dr. Ezer Osei Yeboah-Boateng</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="45">
            <name>Publisher</name>
            <description>An entity responsible for making the resource available</description>
            <elementTextContainer>
              <elementText elementTextId="419">
                <text>Ghana Technology University College</text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </item>
</itemContainer>
