<?xml version="1.0" encoding="UTF-8"?>
<itemContainer xmlns="http://omeka.org/schemas/omeka-xml/v5" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://omeka.org/schemas/omeka-xml/v5 http://omeka.org/schemas/omeka-xml/v5/omeka-xml-5-0.xsd" uri="https://www.repository.gctu.edu.gh/items/browse?collection=16&amp;output=omeka-xml&amp;sort_field=Dublin+Core%2CCreator" accessDate="2026-04-23T02:27:27+00:00">
  <miscellaneousContainer>
    <pagination>
      <pageNumber>1</pageNumber>
      <perPage>10</perPage>
      <totalResults>35</totalResults>
    </pagination>
  </miscellaneousContainer>
  <item itemId="63" public="1" featured="0">
    <fileContainer>
      <file fileId="62">
        <src>https://www.repository.gctu.edu.gh/files/original/9d6d027d9193ff1bcaa362a402fb5d46.pdf</src>
        <authentication>0d23b817e0fe39fcad1e2186d019ebf5</authentication>
      </file>
    </fileContainer>
    <collection collectionId="16">
      <elementSetContainer>
        <elementSet elementSetId="1">
          <name>Dublin Core</name>
          <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
          <elementContainer>
            <element elementId="50">
              <name>Title</name>
              <description>A name given to the resource</description>
              <elementTextContainer>
                <elementText elementTextId="344">
                  <text>MSc Management Information Systems</text>
                </elementText>
              </elementTextContainer>
            </element>
          </elementContainer>
        </elementSet>
      </elementSetContainer>
    </collection>
    <itemType itemTypeId="1">
      <name>Text</name>
      <description>A resource consisting primarily of words for reading. Examples include books, letters, dissertations, poems, newspapers, articles, archives of mailing lists. Note that facsimiles or images of texts are still of the genre Text.</description>
    </itemType>
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="367">
                <text> Analysis of Security Issues In Electronic &#13;
Payment Systems in Ghana &#13;
&#13;
 &#13;
&#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="39">
            <name>Creator</name>
            <description>An entity primarily responsible for making the resource</description>
            <elementTextContainer>
              <elementText elementTextId="368">
                <text> Ellis Senyo Cudjoe Dzakpasu </text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="41">
            <name>Description</name>
            <description>An account of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="369">
                <text>The patronage of e-payment systems has significantly increased over the years. In some parts of the world, it has become the most preferred medium of payment. As at 2015, seven out of eight transactions were done electronically in Europe (BUONAGUIDI, 2017). E-payment systems have become essential over time and has necessitated the development of stringent controls to ensure that they are safe to use. Due to the several types of e-payment systems (mobile money, card payment, ACH1) being used in Ghana, the research was narrowed down to card payments give focus to the research in order to make relevant analysis. To make a significant argument on the subject matter, this research employed the use of questionnaires and interviews. Questionnaires were developed for users or consumers of e-payment systems whiles interviews were developed for e-payment vendors (bank). Forty people responded to the research and gave their views on the subject matter whiles five banks represented the banking/vendor space. The inclusion of both card users and vendors in the research gave a 360 analysis of the card payment system. Consumer and producer views were obtained and analyzed provide a holistic view.&#13;
The results of the research showed that 80% of banks in Ghana were not certified in card payment security(PCIDSS2). This means that although majority of banks are issuing out cards and card payment systems (POS and web acquirers), there is no proof that they(banks) have a secured infrastructure to support card payment systems. The results also showed that only 53% of users practice acceptable ways of using cards.&#13;
In conclusion this research showed that although some users are aware of basic card security, there is still a lot of work to be done by card payment vendors (banks) to ensure the security of card payment systems in Ghana. The requirements of this certification(PCIDSS) are stringent&#13;
and will ensure that the accompanying risk of being a provider of card payment systems are mitigated appropriately.</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="49">
            <name>Subject</name>
            <description>The topic of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="370">
                <text> MSc Management Information System</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="45">
            <name>Publisher</name>
            <description>An entity responsible for making the resource available</description>
            <elementTextContainer>
              <elementText elementTextId="371">
                <text>Ghana Technology University College</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="40">
            <name>Date</name>
            <description>A point or period of time associated with an event in the lifecycle of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="372">
                <text> January, 2018</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="37">
            <name>Contributor</name>
            <description>An entity responsible for making contributions to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="373">
                <text> Isaac Hanson&#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </item>
  <item itemId="74" public="1" featured="0">
    <fileContainer>
      <file fileId="73">
        <src>https://www.repository.gctu.edu.gh/files/original/c5ba1ba14121b3042378de83ed0d47e7.pdf</src>
        <authentication>5e75e8391303f677dd76118bd80b13c1</authentication>
      </file>
    </fileContainer>
    <collection collectionId="16">
      <elementSetContainer>
        <elementSet elementSetId="1">
          <name>Dublin Core</name>
          <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
          <elementContainer>
            <element elementId="50">
              <name>Title</name>
              <description>A name given to the resource</description>
              <elementTextContainer>
                <elementText elementTextId="344">
                  <text>MSc Management Information Systems</text>
                </elementText>
              </elementTextContainer>
            </element>
          </elementContainer>
        </elementSet>
      </elementSetContainer>
    </collection>
    <itemType itemTypeId="1">
      <name>Text</name>
      <description>A resource consisting primarily of words for reading. Examples include books, letters, dissertations, poems, newspapers, articles, archives of mailing lists. Note that facsimiles or images of texts are still of the genre Text.</description>
    </itemType>
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="448">
                <text>Crime Predictive Model in Cybercrime Based On Social &#13;
And Economic Factors Using Bayesian And Markov Theories &#13;
(Case Study of Bank) &#13;
&#13;
  &#13;
 &#13;
 &#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="39">
            <name>Creator</name>
            <description>An entity primarily responsible for making the resource</description>
            <elementTextContainer>
              <elementText elementTextId="449">
                <text> Emeh Jennifer Afoma</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="41">
            <name>Description</name>
            <description>An account of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="450">
                <text>If financial institutions cannot detect incidents effectively, it cannot succeed to responding to incidents. This implies that the detection of incidents, is the most important aspect of incident response. A stochastic process with a first order dependence in discrete state and time is described as Markov chain, in the same way, Bayesian theory is a mathematical framework for reasoning and performing inference using probability. These two theories were used to predict cybercrime occurrence using centralized system in form of a model for Management Information Systems (MIS). The advancement of technology in banking has made banking business processes very convenient, but as the technology advances, cybercrimes of different nature emerges and equally at its peak. In as much as there are different measures already in place to combat these crimes, there still lies so many vulnerabilities which cannot be evitable in any information systems, especially the financial institutions, in other words prediction theory which tends to detect and predict any event can be used to combat this cybercrime activities.&#13;
The theory which was introduced by Markov in 1907 has been applied in many predictive models and at such has been able to describe various phenomena of the real world. In this research study, the application of Markov theory and Markov chain offered ideal conditions for determination of the next target of crime. Similarly, Bayesian inference also analysed the nature of cybercrime and the probability of its occurrence, moreover, it has been recommended that different factors which could possibly cause cybercrime like vulnerabilities of information system, should also be predicted using both theories.&#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="49">
            <name>Subject</name>
            <description>The topic of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="451">
                <text>MSc Management Information Systems </text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="45">
            <name>Publisher</name>
            <description>An entity responsible for making the resource available</description>
            <elementTextContainer>
              <elementText elementTextId="452">
                <text>&#13;
Ghana Technology University College&#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="40">
            <name>Date</name>
            <description>A point or period of time associated with an event in the lifecycle of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="453">
                <text>January, 2017</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="37">
            <name>Contributor</name>
            <description>An entity responsible for making contributions to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="454">
                <text>Dr. Kester Quist-Aphetsi </text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </item>
  <item itemId="68" public="1" featured="0">
    <fileContainer>
      <file fileId="67">
        <src>https://www.repository.gctu.edu.gh/files/original/e82a975ef339e407f1c53794874b1848.pdf</src>
        <authentication>bac8b9c59cc6a19c30c2886d7ffa5da9</authentication>
      </file>
    </fileContainer>
    <collection collectionId="16">
      <elementSetContainer>
        <elementSet elementSetId="1">
          <name>Dublin Core</name>
          <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
          <elementContainer>
            <element elementId="50">
              <name>Title</name>
              <description>A name given to the resource</description>
              <elementTextContainer>
                <elementText elementTextId="344">
                  <text>MSc Management Information Systems</text>
                </elementText>
              </elementTextContainer>
            </element>
          </elementContainer>
        </elementSet>
      </elementSetContainer>
    </collection>
    <itemType itemTypeId="1">
      <name>Text</name>
      <description>A resource consisting primarily of words for reading. Examples include books, letters, dissertations, poems, newspapers, articles, archives of mailing lists. Note that facsimiles or images of texts are still of the genre Text.</description>
    </itemType>
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="405">
                <text>Design Of Hybrid Neural Network Intrusion Detection Systems&#13;
&#13;
&#13;
&#13;
&#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="39">
            <name>Creator</name>
            <description>An entity primarily responsible for making the resource</description>
            <elementTextContainer>
              <elementText elementTextId="406">
                <text> Eugene Efah Adane</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="41">
            <name>Description</name>
            <description>An account of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="407">
                <text>Due to the rapid growth of computer system and Internet, network security became crucial issue for most organizations. Mostly organizations increase usage of different tools and methods to secure their network due to the increase of security threats. Many methods have been developed to secure computer networks and communication over the Internet. However, none of the existing methods developed by different researches have an accuracy of detecting attacks with high detection rate and low false alarm rate. The other thing is most deal with single detection approach with high number of features which is challenging and time consuming to implement.&#13;
Also it will examine only either previously known attacks or unknown attacks. This thesis work is devoted to solve those problems using intrusion detection system architecture that is based on neural network, signatures and dimension reduction that can promptly detect and classify attacks, whether they are known or never seen before. The proposed hybrid intrusion detection system combines signature based and anomaly based techniques. Signature based open source which uses pattern search for attack detection and the anomaly based system is developed using machine learning technique. We implemented dimension reduction using dataset NSL-KDD and train the system using the well-known artificial neural network algorithm in the area of intrusion detection. The evaluation of performance and implementation of the proposed hybrid intrusion detection system are made with Java programming language using NetBeans. The results obtained by the implementation and evaluation are measured in comparison with other works&#13;
done using single detection approach. The result shows that the output is encouraging and further refinement of the work can produce more robust and reliable intrusion detection system.&#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="49">
            <name>Subject</name>
            <description>The topic of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="408">
                <text>Msc Management Information System</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="40">
            <name>Date</name>
            <description>A point or period of time associated with an event in the lifecycle of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="409">
                <text> 15 -09 -2017</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="37">
            <name>Contributor</name>
            <description>An entity responsible for making contributions to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="410">
                <text> ING Isaac Hanson</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="45">
            <name>Publisher</name>
            <description>An entity responsible for making the resource available</description>
            <elementTextContainer>
              <elementText elementTextId="418">
                <text>Ghana Technology University College</text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </item>
  <item itemId="70" public="1" featured="0">
    <fileContainer>
      <file fileId="69">
        <src>https://www.repository.gctu.edu.gh/files/original/3aa7bdcfd98d7922917ab5d5e19649c0.pdf</src>
        <authentication>ce1daa3ea4dc3463bde10fc15e83e05a</authentication>
      </file>
    </fileContainer>
    <collection collectionId="16">
      <elementSetContainer>
        <elementSet elementSetId="1">
          <name>Dublin Core</name>
          <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
          <elementContainer>
            <element elementId="50">
              <name>Title</name>
              <description>A name given to the resource</description>
              <elementTextContainer>
                <elementText elementTextId="344">
                  <text>MSc Management Information Systems</text>
                </elementText>
              </elementTextContainer>
            </element>
          </elementContainer>
        </elementSet>
      </elementSetContainer>
    </collection>
    <itemType itemTypeId="1">
      <name>Text</name>
      <description>A resource consisting primarily of words for reading. Examples include books, letters, dissertations, poems, newspapers, articles, archives of mailing lists. Note that facsimiles or images of texts are still of the genre Text.</description>
    </itemType>
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="420">
                <text>An Assessment of Information System Implementation Success on Port Operations at Ghana Ports and Habours&#13;
&#13;
&#13;
&#13;
&#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="39">
            <name>Creator</name>
            <description>An entity primarily responsible for making the resource</description>
            <elementTextContainer>
              <elementText elementTextId="421">
                <text> Felix Adusei Tuffour</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="41">
            <name>Description</name>
            <description>An account of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="422">
                <text>The use of information system in the maritime industry and most especially in Ghana Ports and Habours provides the organisation with a much-improved service as well as efficiency and effectiveness of personnel. The success derived from Information System (IS) implementation is very important and so is the criteria and parameters for measuring or assessing such success. Several implementations of IS is on-going without any reference to an impact assessment of previously implemented one. As a result, most of these implementations are suffering from unresolved challenges of pervious systems. This study however, used an existing model for IS success for evaluating an information system’s success (ISS) at the Port of Tema by applying the DeLone &amp; McLean update IS success model (D&amp;M). The proposed model was adopted to demonstrate how its elements could be applied in evaluating IS implementations and also to support the decision makers in evaluating and developing the information systems. The study adopted a mixed method approach which includes both qualitative and quantitative approaches. 150 questionnaires were administered to collect primary data from port operational staff of GPHA and secondary data of organisation reports were also obtained for analysis. The results indicated that perceived usefulness, ease of use, accuracy, timeliness, reliability, user support significantly affected the use and user satisfaction of an information. It further indicated that an increase in these variables will result in positive outcome from the information system implementation. The proposed model used better explains the interrelation between the constructs and the interrelationship that exit among the construct has a strong statistical significance influence on GPHA employee usage intention.&#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="49">
            <name>Subject</name>
            <description>The topic of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="423">
                <text>Msc. Management Information Systems</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="45">
            <name>Publisher</name>
            <description>An entity responsible for making the resource available</description>
            <elementTextContainer>
              <elementText elementTextId="424">
                <text>Ghana Technology University College</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="40">
            <name>Date</name>
            <description>A point or period of time associated with an event in the lifecycle of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="425">
                <text>MAY 2018</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="37">
            <name>Contributor</name>
            <description>An entity responsible for making contributions to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="426">
                <text> Dr. Ezer Osei Yeboah-Boateng</text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </item>
  <item itemId="71" public="1" featured="0">
    <fileContainer>
      <file fileId="70">
        <src>https://www.repository.gctu.edu.gh/files/original/a149a5ba9a238cf8b283fc3ecccfc60b.pdf</src>
        <authentication>a69ec2e235f3b95d8bf27c7c176bddcb</authentication>
      </file>
    </fileContainer>
    <collection collectionId="16">
      <elementSetContainer>
        <elementSet elementSetId="1">
          <name>Dublin Core</name>
          <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
          <elementContainer>
            <element elementId="50">
              <name>Title</name>
              <description>A name given to the resource</description>
              <elementTextContainer>
                <elementText elementTextId="344">
                  <text>MSc Management Information Systems</text>
                </elementText>
              </elementTextContainer>
            </element>
          </elementContainer>
        </elementSet>
      </elementSetContainer>
    </collection>
    <itemType itemTypeId="1">
      <name>Text</name>
      <description>A resource consisting primarily of words for reading. Examples include books, letters, dissertations, poems, newspapers, articles, archives of mailing lists. Note that facsimiles or images of texts are still of the genre Text.</description>
    </itemType>
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="427">
                <text>Evaluation of Effective IT Service &#13;
Operation In Service-Based &#13;
Organizations in Ghana Using ITIL V3 &#13;
Framework &#13;
 &#13;
 &#13;
&#13;
&#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="39">
            <name>Creator</name>
            <description>An entity primarily responsible for making the resource</description>
            <elementTextContainer>
              <elementText elementTextId="428">
                <text> FREDERICK AMUZU</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="41">
            <name>Description</name>
            <description>An account of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="429">
                <text>This research work sought to perform an evaluation of how effective IT Service Operation plays out in service-based organizations in Ghana using Information Technology Infrastructure Library (ITIL) version 3 framework. The main objective was to understand the maturity level of IT Service Operation adopted and the derived benefits among the service-based organizations in Ghana. The research results in the final analysis suggested that there is a positive correlation between the maturity level of ITIL v3 implemented and the derived benefits of IT Service Operations. Additionally, the effectiveness of IT Service Operation was evaluated and the results statistically showed that the effectiveness of the IT Service Operation was largely dependent on ITIL v3 processes adopted and the constitution of a Service Desk team that are highly skilled and well tooled to perform their functions within a monitored service level agreements</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="49">
            <name>Subject</name>
            <description>The topic of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="430">
                <text> Msc. Management Information System</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="45">
            <name>Publisher</name>
            <description>An entity responsible for making the resource available</description>
            <elementTextContainer>
              <elementText elementTextId="431">
                <text>Ghana Technology University college</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="40">
            <name>Date</name>
            <description>A point or period of time associated with an event in the lifecycle of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="432">
                <text>January 2017</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="37">
            <name>Contributor</name>
            <description>An entity responsible for making contributions to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="433">
                <text> DOMINIC K. LOUIS </text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </item>
  <item itemId="75" public="1" featured="0">
    <fileContainer>
      <file fileId="74">
        <src>https://www.repository.gctu.edu.gh/files/original/557d0b6a90d30d2e901834025f9db3a0.pdf</src>
        <authentication>7f63809b6ef384aa553859f8ffe8fd7a</authentication>
      </file>
    </fileContainer>
    <collection collectionId="16">
      <elementSetContainer>
        <elementSet elementSetId="1">
          <name>Dublin Core</name>
          <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
          <elementContainer>
            <element elementId="50">
              <name>Title</name>
              <description>A name given to the resource</description>
              <elementTextContainer>
                <elementText elementTextId="344">
                  <text>MSc Management Information Systems</text>
                </elementText>
              </elementTextContainer>
            </element>
          </elementContainer>
        </elementSet>
      </elementSetContainer>
    </collection>
    <itemType itemTypeId="1">
      <name>Text</name>
      <description>A resource consisting primarily of words for reading. Examples include books, letters, dissertations, poems, newspapers, articles, archives of mailing lists. Note that facsimiles or images of texts are still of the genre Text.</description>
    </itemType>
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="455">
                <text>Assessing The Information Systems Secrity Challenges In Cloud Computing: A Case Study Of Cocoa Marketing Company Ghana Limited Submitted  &#13;
&#13;
 &#13;
.&#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="39">
            <name>Creator</name>
            <description>An entity primarily responsible for making the resource</description>
            <elementTextContainer>
              <elementText elementTextId="456">
                <text> Jennifer Ashiokaa Bidema</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="41">
            <name>Description</name>
            <description>An account of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="457">
                <text>Cloud computing is the computing model in which the computing resources such as software, hardware and data are delivered as a service through the internet with the aid of web browsers or light-weight desktop machine over the internet (Wink, 2012). This computing model has taken over physical hardware infrastructure by cutting off the cost to procure huge local serv-ers for to augment business operations and storage. (Montero &amp; Llorente, 2012). The adop-tion of cloud as a service is affected by different security issues and challenges such as Tem-porary Denial of Service (TDOS) attacks, user identity theft, session hijacking issues and flashing attacks (Danish, 2011).&#13;
The research was conducted at the Cocoa Marketing Company Ghana Limited (CMC). For which employees were sampled through a purposive sampling technique. The data collection involved employee’s answers to questions posed to them in the questionnaires administered. The purpose of this study is to assess the information systems security challenges in cloud computing and bridge the research gap between the cloud security challenges, measures and the existing security threats. An assessment into existing cloud service models, security standards, currently adopted security measures and their degree of flawless protection has been done. The study helped in outlining the security challenges, issues and their solutions whereas the empirical study facilitated in acknowledging the concerns and perception of po-tential cloud users perceptions and challenges. The empirical method used in this research is questionnaires to validate the theoretical findings. According to findings of the study, most organizational departments like CMC relay on shared folders as part of their business operations a medium of sharing information. This pro-vides a better way for introducing cloud computing in such organizations. The study also stated that there are staffs in specific organizations assigned with the duty of data protection, so the perception on data security should not be an issue for such organizations.&#13;
Cloud computing or cloud as a service when adopted according to the study has the tendency to help organizations like CMC to gain competitive advantage in their area of business. How-ever the perception that cloud adoption will open the floodgates for intruders to compromise confidentiality, integrity and availability of data has become the major drawbacks hindering organizations mostly in Africa to adopt the use of cloud to enhance their ways of doing busi-ness. Based on the information gathered from the respondents it is clear that cloud computing is a possibility in CMC. However, management could be a hindering block to its implementa-tion since most of them are politically skewed to the government of the day. These security challenges and perceptions are highly beneficial to the adoption of cloud com-puting because it offers to organizations the knowledge into the potential security risks and challenges and provide some mitigation mechanism for organizations who will be willing to adopt the cloud as a service in the future.</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="49">
            <name>Subject</name>
            <description>The topic of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="458">
                <text> Msc In Management Information Systems </text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="45">
            <name>Publisher</name>
            <description>An entity responsible for making the resource available</description>
            <elementTextContainer>
              <elementText elementTextId="459">
                <text>Ghana Technology University College</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="40">
            <name>Date</name>
            <description>A point or period of time associated with an event in the lifecycle of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="460">
                <text>May, 2018</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="37">
            <name>Contributor</name>
            <description>An entity responsible for making contributions to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="461">
                <text>Dr. Stephen Asunka </text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </item>
  <item itemId="77" public="1" featured="0">
    <fileContainer>
      <file fileId="76">
        <src>https://www.repository.gctu.edu.gh/files/original/8e2f50991f8578096ab7620549d5513c.pdf</src>
        <authentication>1bb1f17d9f0b412043401fb6d92e1849</authentication>
      </file>
    </fileContainer>
    <collection collectionId="16">
      <elementSetContainer>
        <elementSet elementSetId="1">
          <name>Dublin Core</name>
          <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
          <elementContainer>
            <element elementId="50">
              <name>Title</name>
              <description>A name given to the resource</description>
              <elementTextContainer>
                <elementText elementTextId="344">
                  <text>MSc Management Information Systems</text>
                </elementText>
              </elementTextContainer>
            </element>
          </elementContainer>
        </elementSet>
      </elementSetContainer>
    </collection>
    <itemType itemTypeId="1">
      <name>Text</name>
      <description>A resource consisting primarily of words for reading. Examples include books, letters, dissertations, poems, newspapers, articles, archives of mailing lists. Note that facsimiles or images of texts are still of the genre Text.</description>
    </itemType>
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="469">
                <text>The Impact Of E-Commerce On Local And Small Scale Enterprise In The Accra Metropolitan Assembly,Osu-Klottey District Accra &#13;
 &#13;
 &#13;
 &#13;
&#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="39">
            <name>Creator</name>
            <description>An entity primarily responsible for making the resource</description>
            <elementTextContainer>
              <elementText elementTextId="470">
                <text> Karimou Bola Hope</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="41">
            <name>Description</name>
            <description>An account of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="471">
                <text>Small and Medium Scale Enterprises (SMEs) have a great influence on the lives of people of our economy. They play vital roles such as revenue generation and creation of employment. Statistics proves that SMEs constitute over 60% of all businesses in developing countries. And probably the percentage is higher than the estimate when it comes to Ghana. Over the years, programmers and workshops are being organized to enhance development and expansion of small business enterprises by government and non-government organization (NGOs). So many business enterprises grow rapidly to a point and when there is a small change in the economy, and then it depresses them from their point. On the basis of the study conducted on the topic ““The impact of e-commerce on local businesses and small scale enterprises in the Accra Metropolitan Assembly, Osu-Klottey District Accra. The sample size was made up of hundred and sixty (160) SMEs within Accra. Respondents were provided with questionnaires to fill. The following general conclusions were made from the research conducted, it is evident that there are quite worrying state of the affairs relating to the use of e-commerce to improve business growth strategies of small scale enterprises within the metropolis. Generally, the respondents agreed that e-commerce helps to improve the survival status of local businesses. However, the usage is limited to mobile phone and internet leaving out chunk of the tools and their application or usage. It was recommended among other things that government and policy makers should collaborate with small-scale enterprises union to develop cheaper software’s to aid their businesses. The study also recommended that small-scale enterprises and their owners (management) should build a culture that is favorable to technology and innovation and seek how technology can give them competitive advantage</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="49">
            <name>Subject</name>
            <description>The topic of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="472">
                <text>Msc. Management Information Systems</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="45">
            <name>Publisher</name>
            <description>An entity responsible for making the resource available</description>
            <elementTextContainer>
              <elementText elementTextId="473">
                <text>Ghana Technology University College</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="40">
            <name>Date</name>
            <description>A point or period of time associated with an event in the lifecycle of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="474">
                <text>May, 2018</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="37">
            <name>Contributor</name>
            <description>An entity responsible for making contributions to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="475">
                <text>Dr. William Brown-Acquaye</text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </item>
  <item itemId="78" public="1" featured="0">
    <fileContainer>
      <file fileId="77">
        <src>https://www.repository.gctu.edu.gh/files/original/765fd672b2349b69984d0058c152dd05.pdf</src>
        <authentication>d78228950f3532ac5ad3a4c4f72381f7</authentication>
      </file>
    </fileContainer>
    <collection collectionId="16">
      <elementSetContainer>
        <elementSet elementSetId="1">
          <name>Dublin Core</name>
          <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
          <elementContainer>
            <element elementId="50">
              <name>Title</name>
              <description>A name given to the resource</description>
              <elementTextContainer>
                <elementText elementTextId="344">
                  <text>MSc Management Information Systems</text>
                </elementText>
              </elementTextContainer>
            </element>
          </elementContainer>
        </elementSet>
      </elementSetContainer>
    </collection>
    <itemType itemTypeId="1">
      <name>Text</name>
      <description>A resource consisting primarily of words for reading. Examples include books, letters, dissertations, poems, newspapers, articles, archives of mailing lists. Note that facsimiles or images of texts are still of the genre Text.</description>
    </itemType>
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="476">
                <text> The Impact of Gifmis On Procurement Processes at the Ghana&#13;
Health Service&#13;
&#13;
  &#13;
&#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="39">
            <name>Creator</name>
            <description>An entity primarily responsible for making the resource</description>
            <elementTextContainer>
              <elementText elementTextId="477">
                <text> Kwabena Amponsah Afrani-Nyarko</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="41">
            <name>Description</name>
            <description>An account of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="478">
                <text>An Integrated Financial Management Information System (IFMIS) has been deemed to be a perfect financial information system developed to improve and streamline public financial&#13;
management by computerizing government financial operations (Rodin-Brown, 2008). In light of this, donors and international organizations such as the World Bank, USAID and the IMF played&#13;
vital roles in supporting developed countries through combinations of technical assistance, training, financial resources and procurement support projects. As such, the Ghanaian government is a huge institution that would benefit from a unified information system such as the Integrated Financial Management Information System, which supports high productivity, effective management as well as quality services offered to its citizenry. Ghana is expected to reap many benefits after the implementation of the GIFMIS including&#13;
transparent and accountable public financial management, accurate information on budgetary allocation, prompt payment processing, increased performance and efficient revenue collection. After Ghana adopted and launched IFMIS in the year 2009, this study seeks to investigate the effects of the Ghana Integrated Financial Management Information Systems (GIFMIS) on procurement processes at the Ghana Health Service as well as analyzing the factors that affected the implementation of GIFMIS at the Ghana Health Service. Existing literature was reviewed by the researcher to form the conceptual framework, findings, conclusions as well as the recommendations.&#13;
Descriptive survey research design was employed and structured questionnaire were used for the collection of data for a sample size of 60 made up of staff from the Planning Monitoring and&#13;
Evaluation, ICT, Accounts and Finance, Policy, and Procurement departments. The findings were presented in the form of frequency tables. The study revealed that procurement</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="49">
            <name>Subject</name>
            <description>The topic of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="479">
                <text>Msc. (Management Information&#13;
Systems)</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="45">
            <name>Publisher</name>
            <description>An entity responsible for making the resource available</description>
            <elementTextContainer>
              <elementText elementTextId="480">
                <text>Ghana Technology University College</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="40">
            <name>Date</name>
            <description>A point or period of time associated with an event in the lifecycle of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="481">
                <text>September 2017</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="37">
            <name>Contributor</name>
            <description>An entity responsible for making contributions to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="482">
                <text>Dr. Kwame Ofori Simpe</text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </item>
  <item itemId="79" public="1" featured="0">
    <fileContainer>
      <file fileId="78">
        <src>https://www.repository.gctu.edu.gh/files/original/89cde8fc112d33f86f2730dcfc8e5877.pdf</src>
        <authentication>83c53fcbb0e034916669073212b8bda5</authentication>
      </file>
    </fileContainer>
    <collection collectionId="16">
      <elementSetContainer>
        <elementSet elementSetId="1">
          <name>Dublin Core</name>
          <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
          <elementContainer>
            <element elementId="50">
              <name>Title</name>
              <description>A name given to the resource</description>
              <elementTextContainer>
                <elementText elementTextId="344">
                  <text>MSc Management Information Systems</text>
                </elementText>
              </elementTextContainer>
            </element>
          </elementContainer>
        </elementSet>
      </elementSetContainer>
    </collection>
    <itemType itemTypeId="1">
      <name>Text</name>
      <description>A resource consisting primarily of words for reading. Examples include books, letters, dissertations, poems, newspapers, articles, archives of mailing lists. Note that facsimiles or images of texts are still of the genre Text.</description>
    </itemType>
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="483">
                <text>Assessing the Impact of Social Engineering Risk on Information in Public  Tertiary Institutions in Ghana: A Case Study of Some Selected Technical Universities &#13;
 &#13;
 &#13;
  &#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="39">
            <name>Creator</name>
            <description>An entity primarily responsible for making the resource</description>
            <elementTextContainer>
              <elementText elementTextId="484">
                <text> Kwadwo Kyeremeh</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="41">
            <name>Description</name>
            <description>An account of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="485">
                <text>Social Engineering is the art of human hacking that made their targets do things that in their real senses will not do. The human factor is social is so huge that they normally use and insider to commit their malicious acts and they offers assailants a huge number of conceivable outcomes to reach through focused control and data to their coveted objective. An especially unsafe circumstance when the data of one individual is utilized to get to the computer systems of an organization. The abuser is effectively passed for a systems administrator or an IT director or network designer. Frequently the culprit is not even in coordinate contact with the casualty. Indeed, even the most traditionalist in the administration of sensitive data, individuals can fall into the trap of social designing. From one perspective, the "mechanical disregard" makes individuals helpless when they treat their sensitive information recklessly and distribute private data anyhow and is once in a while excessively sluggish, making it impossible to "tidy up" their online profile frequently. Then again, we as a whole are just human creatures continuously looking for acknowledgment, sweet talk, compliments, fellowship and so forth. Human temperance’s as accommodation and shortcomings as vanity are abused by social engineers to control their casualties. The greater part of the representatives of an organization trust that the most vital thing is to be a decent partner and solidarity with associates; which is regularly to the detriment of security in the long run. This examination depicts the effect of social engineering risk on information in the public tertiary institutions in Ghana. The investigation additionally talks about the findings and recommendations which can be utilized by the institutions to impede the risk of data spillage through social engineering.&#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="49">
            <name>Subject</name>
            <description>The topic of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="486">
                <text> Msc. Management Information System</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="45">
            <name>Publisher</name>
            <description>An entity responsible for making the resource available</description>
            <elementTextContainer>
              <elementText elementTextId="487">
                <text>Ghana Technology University College</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="40">
            <name>Date</name>
            <description>A point or period of time associated with an event in the lifecycle of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="488">
                <text>September 2017</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="37">
            <name>Contributor</name>
            <description>An entity responsible for making contributions to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="489">
                <text>Ing. Isaac Hanson </text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </item>
  <item itemId="81" public="1" featured="0">
    <fileContainer>
      <file fileId="80">
        <src>https://www.repository.gctu.edu.gh/files/original/9d5eff3e5bacd67daa5f63b67876ec27.pdf</src>
        <authentication>cc4b41410eebd7fa732be5134b131d1c</authentication>
      </file>
    </fileContainer>
    <collection collectionId="16">
      <elementSetContainer>
        <elementSet elementSetId="1">
          <name>Dublin Core</name>
          <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
          <elementContainer>
            <element elementId="50">
              <name>Title</name>
              <description>A name given to the resource</description>
              <elementTextContainer>
                <elementText elementTextId="344">
                  <text>MSc Management Information Systems</text>
                </elementText>
              </elementTextContainer>
            </element>
          </elementContainer>
        </elementSet>
      </elementSetContainer>
    </collection>
    <itemType itemTypeId="1">
      <name>Text</name>
      <description>A resource consisting primarily of words for reading. Examples include books, letters, dissertations, poems, newspapers, articles, archives of mailing lists. Note that facsimiles or images of texts are still of the genre Text.</description>
    </itemType>
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="497">
                <text>Assessing The Impact of Information Security Awareness on Organization’s Operations towards Mitigating Vulnerabilities in Federal College of Education (Technical), Gusau-Nigeria &#13;
A Case Study of Federal Colege Of Education [Technical] Gusau Zamfara State Nigeria &#13;
 &#13;
 &#13;
&#13;
&#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="39">
            <name>Creator</name>
            <description>An entity primarily responsible for making the resource</description>
            <elementTextContainer>
              <elementText elementTextId="498">
                <text> Lawali Yau</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="41">
            <name>Description</name>
            <description>An account of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="499">
                <text>Information Security is a process of protecting the Confidentiality, Availability and Integrity of the information and information resources against unauthorized user. Educational institutions become increasingly dependent on information systems for strategic planning and operations, preservations and access. But due to the openness nature of educational institution the information asset and resources of the educational institution becomes the prime target of cyber attackers. Most institutions and organizations provide technology-based solution to the security vulnerabilities within their domain. But according to the literature, success in the information security could only be achieved when organizations invest both on technical and socio-organizational solutions. The technical aspect addresses the technology-based solutions, while the socio-organizational resources address the employee compliance with security policies and management. This research project investigates the socio-organizational resources in the tertiary institutions in North-West Nigeria. The research specifically investigates the influence of employee awareness towards providing security measures in the institutions. The research adopted the TAM principle to address whether awareness of information security policy, management, and breaches influence employee attitude towards mitigating security vulnerabilities in the institutions. The result indicated that, there is a high significant influence of ISPA, ISMA, and ISBA on employee attitudes towards providing security measures in the institution. The result also indicated that, 60-80 percent of the respondents intend to be applying security measures to mitigate security vulnerabilities in the institutions.</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="49">
            <name>Subject</name>
            <description>The topic of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="500">
                <text>MSc Management Information Systems</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="45">
            <name>Publisher</name>
            <description>An entity responsible for making the resource available</description>
            <elementTextContainer>
              <elementText elementTextId="501">
                <text>Ghana Technology University College</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="40">
            <name>Date</name>
            <description>A point or period of time associated with an event in the lifecycle of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="502">
                <text>May, 2017</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="37">
            <name>Contributor</name>
            <description>An entity responsible for making contributions to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="503">
                <text> Dr. William Brown Aqauye </text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </item>
</itemContainer>
