<?xml version="1.0" encoding="UTF-8"?>
<itemContainer xmlns="http://omeka.org/schemas/omeka-xml/v5" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://omeka.org/schemas/omeka-xml/v5 http://omeka.org/schemas/omeka-xml/v5/omeka-xml-5-0.xsd" uri="https://www.repository.gctu.edu.gh/items/browse?collection=16&amp;output=omeka-xml&amp;sort_field=Dublin+Core%2CTitle" accessDate="2026-04-23T03:44:12+00:00">
  <miscellaneousContainer>
    <pagination>
      <pageNumber>1</pageNumber>
      <perPage>10</perPage>
      <totalResults>35</totalResults>
    </pagination>
  </miscellaneousContainer>
  <item itemId="66" public="1" featured="0">
    <fileContainer>
      <file fileId="65">
        <src>https://www.repository.gctu.edu.gh/files/original/f9f7870a2a52439e30f690dba14e7084.pdf</src>
        <authentication>f0e1376f57895e3c553b343a7c7b23a2</authentication>
      </file>
    </fileContainer>
    <collection collectionId="16">
      <elementSetContainer>
        <elementSet elementSetId="1">
          <name>Dublin Core</name>
          <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
          <elementContainer>
            <element elementId="50">
              <name>Title</name>
              <description>A name given to the resource</description>
              <elementTextContainer>
                <elementText elementTextId="344">
                  <text>MSc Management Information Systems</text>
                </elementText>
              </elementTextContainer>
            </element>
          </elementContainer>
        </elementSet>
      </elementSetContainer>
    </collection>
    <itemType itemTypeId="1">
      <name>Text</name>
      <description>A resource consisting primarily of words for reading. Examples include books, letters, dissertations, poems, newspapers, articles, archives of mailing lists. Note that facsimiles or images of texts are still of the genre Text.</description>
    </itemType>
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="392">
                <text>  An Assessment of the Extent of Vulnerabilities in Social Media &#13;
 &#13;
 &#13;
&#13;
 &#13;
  &#13;
&#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="39">
            <name>Creator</name>
            <description>An entity primarily responsible for making the resource</description>
            <elementTextContainer>
              <elementText elementTextId="393">
                <text>Vera Azonim Erhabor</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="41">
            <name>Description</name>
            <description>An account of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="394">
                <text>Social media has gained grounds in recent times becoming an integral part of human lives enabling communication, friendships, and opinions. The paradigm shift has brought about risk and threats especially to those cyber criminals who want to capitalize on the unwariness or ignorance of the users and to exploit the vulnerabilities identified. This study sought to assess the vulnerabilities in social media with regards to the possible strategies to mitigate the threats. The perception is that users of these social media believe that they have internet security suite install to safeguard their devices against threats including social engineering threats. The study employed the qualitative research design i.e. gleaning through reports and literature and the questionnaires approach through interview to evaluate the vulnerabilities that come with the use of social media. The study area consisted of users of the social media platforms such as Facebook, WhatsApp, Instagram, Twitter etc. in the central business district of Accra. A study size of 120 social media users was drawn. The research used both the random sampling and purposive sampling techniques to select the study subjects. The results show that 64% of the users surveyed are between 20 to 40 years. From the results, majority of the respondents representing 46.7% use Facebook. Majority of the respondents representing 76% said they are secured and protected using social media little do they know they are not protected in anyway. It is also recommended that advances technologies be used in the blockage of social media at work places. Monitoring is also keen and is recommended in order to curb the rate of usage of social media. The recommendation is that awareness creation and training of staff members on the vulnerabilities or threats on social media. The theories employed in this study, is the Personal Behavior Theory that explains users’ Personal traits and their attitudes on social media.&#13;
&#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="49">
            <name>Subject</name>
            <description>The topic of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="395">
                <text>Msc Management Information Systems</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="40">
            <name>Date</name>
            <description>A point or period of time associated with an event in the lifecycle of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="396">
                <text>September, 2017</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="37">
            <name>Contributor</name>
            <description>An entity responsible for making contributions to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="397">
                <text> Dr. Ezer Osei Yeboah-Boateng</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="45">
            <name>Publisher</name>
            <description>An entity responsible for making the resource available</description>
            <elementTextContainer>
              <elementText elementTextId="419">
                <text>Ghana Technology University College</text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </item>
  <item itemId="63" public="1" featured="0">
    <fileContainer>
      <file fileId="62">
        <src>https://www.repository.gctu.edu.gh/files/original/9d6d027d9193ff1bcaa362a402fb5d46.pdf</src>
        <authentication>0d23b817e0fe39fcad1e2186d019ebf5</authentication>
      </file>
    </fileContainer>
    <collection collectionId="16">
      <elementSetContainer>
        <elementSet elementSetId="1">
          <name>Dublin Core</name>
          <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
          <elementContainer>
            <element elementId="50">
              <name>Title</name>
              <description>A name given to the resource</description>
              <elementTextContainer>
                <elementText elementTextId="344">
                  <text>MSc Management Information Systems</text>
                </elementText>
              </elementTextContainer>
            </element>
          </elementContainer>
        </elementSet>
      </elementSetContainer>
    </collection>
    <itemType itemTypeId="1">
      <name>Text</name>
      <description>A resource consisting primarily of words for reading. Examples include books, letters, dissertations, poems, newspapers, articles, archives of mailing lists. Note that facsimiles or images of texts are still of the genre Text.</description>
    </itemType>
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="367">
                <text> Analysis of Security Issues In Electronic &#13;
Payment Systems in Ghana &#13;
&#13;
 &#13;
&#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="39">
            <name>Creator</name>
            <description>An entity primarily responsible for making the resource</description>
            <elementTextContainer>
              <elementText elementTextId="368">
                <text> Ellis Senyo Cudjoe Dzakpasu </text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="41">
            <name>Description</name>
            <description>An account of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="369">
                <text>The patronage of e-payment systems has significantly increased over the years. In some parts of the world, it has become the most preferred medium of payment. As at 2015, seven out of eight transactions were done electronically in Europe (BUONAGUIDI, 2017). E-payment systems have become essential over time and has necessitated the development of stringent controls to ensure that they are safe to use. Due to the several types of e-payment systems (mobile money, card payment, ACH1) being used in Ghana, the research was narrowed down to card payments give focus to the research in order to make relevant analysis. To make a significant argument on the subject matter, this research employed the use of questionnaires and interviews. Questionnaires were developed for users or consumers of e-payment systems whiles interviews were developed for e-payment vendors (bank). Forty people responded to the research and gave their views on the subject matter whiles five banks represented the banking/vendor space. The inclusion of both card users and vendors in the research gave a 360 analysis of the card payment system. Consumer and producer views were obtained and analyzed provide a holistic view.&#13;
The results of the research showed that 80% of banks in Ghana were not certified in card payment security(PCIDSS2). This means that although majority of banks are issuing out cards and card payment systems (POS and web acquirers), there is no proof that they(banks) have a secured infrastructure to support card payment systems. The results also showed that only 53% of users practice acceptable ways of using cards.&#13;
In conclusion this research showed that although some users are aware of basic card security, there is still a lot of work to be done by card payment vendors (banks) to ensure the security of card payment systems in Ghana. The requirements of this certification(PCIDSS) are stringent&#13;
and will ensure that the accompanying risk of being a provider of card payment systems are mitigated appropriately.</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="49">
            <name>Subject</name>
            <description>The topic of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="370">
                <text> MSc Management Information System</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="45">
            <name>Publisher</name>
            <description>An entity responsible for making the resource available</description>
            <elementTextContainer>
              <elementText elementTextId="371">
                <text>Ghana Technology University College</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="40">
            <name>Date</name>
            <description>A point or period of time associated with an event in the lifecycle of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="372">
                <text> January, 2018</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="37">
            <name>Contributor</name>
            <description>An entity responsible for making contributions to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="373">
                <text> Isaac Hanson&#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </item>
  <item itemId="90" public="1" featured="0">
    <fileContainer>
      <file fileId="89">
        <src>https://www.repository.gctu.edu.gh/files/original/94f758a751847f27fbff717cb4f13d39.pdf</src>
        <authentication>ed7918b92965c53b7cd57072dc8ba1ae</authentication>
      </file>
    </fileContainer>
    <collection collectionId="16">
      <elementSetContainer>
        <elementSet elementSetId="1">
          <name>Dublin Core</name>
          <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
          <elementContainer>
            <element elementId="50">
              <name>Title</name>
              <description>A name given to the resource</description>
              <elementTextContainer>
                <elementText elementTextId="344">
                  <text>MSc Management Information Systems</text>
                </elementText>
              </elementTextContainer>
            </element>
          </elementContainer>
        </elementSet>
      </elementSetContainer>
    </collection>
    <itemType itemTypeId="1">
      <name>Text</name>
      <description>A resource consisting primarily of words for reading. Examples include books, letters, dissertations, poems, newspapers, articles, archives of mailing lists. Note that facsimiles or images of texts are still of the genre Text.</description>
    </itemType>
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="560">
                <text> Assessing the Impact of Big: Data on the Growth of Smes Industry in Ghana &#13;
 &#13;
&#13;
 &#13;
 &#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="39">
            <name>Creator</name>
            <description>An entity primarily responsible for making the resource</description>
            <elementTextContainer>
              <elementText elementTextId="561">
                <text> Prince Paa Kwesi Essandoh</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="41">
            <name>Description</name>
            <description>An account of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="562">
                <text>Small and medium-sized enterprises (SMEs) are non-subsidiary, independent firms which employ fewer than a given number of employees and these numbers differs from one country to the other. Notably, Small-and Medium-sized businesses (SMEs) often lack the resources to invest significantly on technology needed to leverage big data. Therefore SMEs can take advantage of cloud computing techniques to avail the advantages of big data without significant investments in technology and manpower. Big data have been regarded as a strategic approach for organizations to enhance their effectiveness through technology adoptions and implementation. This study seeks to find out how the concept of big data can impact on the growth of the SME sector in Ghana. The researcher employed a mixed methodology approach in undertaking this study. Both simple random and purposive sampling techniques would be used to select the two SME entrepreneurs who use big data for their operations; purposive sampling was used because the respondents might offer biased responses based on their position and expertise. The study found out that that perceived advantages, ease of use and compatibility of big data technologies have wide-scale impacts on SMEs’ current adoption level and future usage plan. However, interestingly, perceived costs of implementing big data revealed a more diverse picture. It was shown that big firms would not view costs as a major adoption barrier in the future, while most small businesses are still currently concerned about the implementation and maintenance costs. The study recommended that in the future this research should be examined in a few chosen or specific industries to test for generalisability, particularly among those with different business models</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="49">
            <name>Subject</name>
            <description>The topic of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="563">
                <text> Msc. Management Information Systems</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="45">
            <name>Publisher</name>
            <description>An entity responsible for making the resource available</description>
            <elementTextContainer>
              <elementText elementTextId="564">
                <text>Ghana Technology University College</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="40">
            <name>Date</name>
            <description>A point or period of time associated with an event in the lifecycle of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="565">
                <text>September 2017</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="37">
            <name>Contributor</name>
            <description>An entity responsible for making contributions to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="566">
                <text>Dr. Ezer Osei Yeboah-Boateng</text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </item>
  <item itemId="73" public="1" featured="0">
    <fileContainer>
      <file fileId="72">
        <src>https://www.repository.gctu.edu.gh/files/original/2d351ca7a2045016c0dabc2018be9b55.pdf</src>
        <authentication>ba9eaab47f3da2d60df02a131742bc3e</authentication>
      </file>
    </fileContainer>
    <collection collectionId="16">
      <elementSetContainer>
        <elementSet elementSetId="1">
          <name>Dublin Core</name>
          <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
          <elementContainer>
            <element elementId="50">
              <name>Title</name>
              <description>A name given to the resource</description>
              <elementTextContainer>
                <elementText elementTextId="344">
                  <text>MSc Management Information Systems</text>
                </elementText>
              </elementTextContainer>
            </element>
          </elementContainer>
        </elementSet>
      </elementSetContainer>
    </collection>
    <itemType itemTypeId="1">
      <name>Text</name>
      <description>A resource consisting primarily of words for reading. Examples include books, letters, dissertations, poems, newspapers, articles, archives of mailing lists. Note that facsimiles or images of texts are still of the genre Text.</description>
    </itemType>
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="441">
                <text> Evaluating the Critical Success Factors Influencing the Adoption of Biometric Technologies by IT Managers in Developing Countries – Ghana &#13;
A Case Study of Social Security and National Insurance Trust (SSNIT) &#13;
&#13;
  &#13;
 &#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="39">
            <name>Creator</name>
            <description>An entity primarily responsible for making the resource</description>
            <elementTextContainer>
              <elementText elementTextId="442">
                <text>JACOB ENNIN </text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="41">
            <name>Description</name>
            <description>An account of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="443">
                <text>This dissertation provides a new substantive finding that evaluates the factors that influence the adoption of Biometric Technology by developing countries like Ghana, Social Security and National Insurance Trust (SSNIT). Even though there has been several studies emphazing on the significance of biometric technologies in hotels and financial sectors (Moresan, 2012; Pooe &amp; Labuschagne, 2011; Rabiu et al., 2016). Nonetheless, there is minimal empirical research with regards to the government agencies. Therefore, this dissertation focuses on factors impacting on the adoption of biometric technologies and benefits of these technologies (Yarbrough et al, 2007).&#13;
It is against this background that it behooves the researcher to focus on finding the elements influencing the adoption of biometric technologies by information technology managers in developing countries - Ghana. A case study of Social Security and National Insurance Trust (SSNIT)Keywords Biometric, technology, behooves, adoption, empirical, Social Security and National Insurance Trust (SSNIT), authentication, substantive finding.</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="49">
            <name>Subject</name>
            <description>The topic of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="444">
                <text>Msc Management Information System</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="40">
            <name>Date</name>
            <description>A point or period of time associated with an event in the lifecycle of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="445">
                <text>September 2017</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="45">
            <name>Publisher</name>
            <description>An entity responsible for making the resource available</description>
            <elementTextContainer>
              <elementText elementTextId="446">
                <text>Ghana Technology University College</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="37">
            <name>Contributor</name>
            <description>An entity responsible for making contributions to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="447">
                <text>Dr. William Brown - Acquah</text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </item>
  <item itemId="67" public="1" featured="0">
    <fileContainer>
      <file fileId="66">
        <src>https://www.repository.gctu.edu.gh/files/original/6ef9032c8b64ed03678bb997a7b9f8a6.pdf</src>
        <authentication>d708aabee6ef3dd1a92b9421cbd78787</authentication>
      </file>
    </fileContainer>
    <collection collectionId="16">
      <elementSetContainer>
        <elementSet elementSetId="1">
          <name>Dublin Core</name>
          <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
          <elementContainer>
            <element elementId="50">
              <name>Title</name>
              <description>A name given to the resource</description>
              <elementTextContainer>
                <elementText elementTextId="344">
                  <text>MSc Management Information Systems</text>
                </elementText>
              </elementTextContainer>
            </element>
          </elementContainer>
        </elementSet>
      </elementSetContainer>
    </collection>
    <itemType itemTypeId="1">
      <name>Text</name>
      <description>A resource consisting primarily of words for reading. Examples include books, letters, dissertations, poems, newspapers, articles, archives of mailing lists. Note that facsimiles or images of texts are still of the genre Text.</description>
    </itemType>
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="398">
                <text> Evaluating The Internal Threats of an Organisation’s Information Security: A Case Study Of Xpress Gas Limited &#13;
 &#13;
 &#13;
 &#13;
 &#13;
&#13;
&#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="39">
            <name>Creator</name>
            <description>An entity primarily responsible for making the resource</description>
            <elementTextContainer>
              <elementText elementTextId="399">
                <text>Eric Kwesi Parden</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="41">
            <name>Description</name>
            <description>An account of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="400">
                <text>Information is of essence in today’s information age with ubiquity. Control systems are pivotal in any organisation with the quest to grow. Taking into account the numerous cases that have occasioned as a result of the poor control measures put in place to check the system. Advancement in information technologies such as the Internet has called for organisations to protect their information to ensure its confidentiality, integrity, and availability. Information security of every organisation is of essence especially an organisation to remain competitive. Organisations know the value information has regarding the reputation of the entity which can lead to loss of client’s confidence, financial loss, goodwill and trust, loss of potential sales and legal issues. The researcher used both the random sampling and purposive sampling techniques to select the study subjects. The purpose of this research is to evaluate the internal threats within an organisation’s information security; the case of Xpress Gas Ltd. The researcher uses purposive sampling technique because only staff members who directly connect to the logistics side of the information system. The researcher adopts this technique in order to acquire the relevant information. The study population are those employees who are directly dealing with the logistics aspects of the Company constituting the sample size of 200. Data collated from respondents is analyse using a Statistical Package for Social Science version 20 and Microsoft Excel is employ in analysing the data and present the data in table form using Microsoft Word. The findings showed that there are internal threats within Xpress Gas Ltd as majority of the respondents 84.5% threats found within Xpress Gas Ltd are more of internal threats related such as human error or failure, deliberate acts of information extortion, deliberate acts of espionage or trespass, deliberate acts of sabotage or vandalism, deliberate acts of theft, and deliberate software attacks.</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="49">
            <name>Subject</name>
            <description>The topic of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="401">
                <text>Msc. Management Information Systems </text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="45">
            <name>Publisher</name>
            <description>An entity responsible for making the resource available</description>
            <elementTextContainer>
              <elementText elementTextId="402">
                <text>Ghana Technology University College</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="40">
            <name>Date</name>
            <description>A point or period of time associated with an event in the lifecycle of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="403">
                <text>May 2017 </text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="37">
            <name>Contributor</name>
            <description>An entity responsible for making contributions to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="404">
                <text>Dr. Stephen Asunka </text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </item>
  <item itemId="78" public="1" featured="0">
    <fileContainer>
      <file fileId="77">
        <src>https://www.repository.gctu.edu.gh/files/original/765fd672b2349b69984d0058c152dd05.pdf</src>
        <authentication>d78228950f3532ac5ad3a4c4f72381f7</authentication>
      </file>
    </fileContainer>
    <collection collectionId="16">
      <elementSetContainer>
        <elementSet elementSetId="1">
          <name>Dublin Core</name>
          <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
          <elementContainer>
            <element elementId="50">
              <name>Title</name>
              <description>A name given to the resource</description>
              <elementTextContainer>
                <elementText elementTextId="344">
                  <text>MSc Management Information Systems</text>
                </elementText>
              </elementTextContainer>
            </element>
          </elementContainer>
        </elementSet>
      </elementSetContainer>
    </collection>
    <itemType itemTypeId="1">
      <name>Text</name>
      <description>A resource consisting primarily of words for reading. Examples include books, letters, dissertations, poems, newspapers, articles, archives of mailing lists. Note that facsimiles or images of texts are still of the genre Text.</description>
    </itemType>
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="476">
                <text> The Impact of Gifmis On Procurement Processes at the Ghana&#13;
Health Service&#13;
&#13;
  &#13;
&#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="39">
            <name>Creator</name>
            <description>An entity primarily responsible for making the resource</description>
            <elementTextContainer>
              <elementText elementTextId="477">
                <text> Kwabena Amponsah Afrani-Nyarko</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="41">
            <name>Description</name>
            <description>An account of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="478">
                <text>An Integrated Financial Management Information System (IFMIS) has been deemed to be a perfect financial information system developed to improve and streamline public financial&#13;
management by computerizing government financial operations (Rodin-Brown, 2008). In light of this, donors and international organizations such as the World Bank, USAID and the IMF played&#13;
vital roles in supporting developed countries through combinations of technical assistance, training, financial resources and procurement support projects. As such, the Ghanaian government is a huge institution that would benefit from a unified information system such as the Integrated Financial Management Information System, which supports high productivity, effective management as well as quality services offered to its citizenry. Ghana is expected to reap many benefits after the implementation of the GIFMIS including&#13;
transparent and accountable public financial management, accurate information on budgetary allocation, prompt payment processing, increased performance and efficient revenue collection. After Ghana adopted and launched IFMIS in the year 2009, this study seeks to investigate the effects of the Ghana Integrated Financial Management Information Systems (GIFMIS) on procurement processes at the Ghana Health Service as well as analyzing the factors that affected the implementation of GIFMIS at the Ghana Health Service. Existing literature was reviewed by the researcher to form the conceptual framework, findings, conclusions as well as the recommendations.&#13;
Descriptive survey research design was employed and structured questionnaire were used for the collection of data for a sample size of 60 made up of staff from the Planning Monitoring and&#13;
Evaluation, ICT, Accounts and Finance, Policy, and Procurement departments. The findings were presented in the form of frequency tables. The study revealed that procurement</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="49">
            <name>Subject</name>
            <description>The topic of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="479">
                <text>Msc. (Management Information&#13;
Systems)</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="45">
            <name>Publisher</name>
            <description>An entity responsible for making the resource available</description>
            <elementTextContainer>
              <elementText elementTextId="480">
                <text>Ghana Technology University College</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="40">
            <name>Date</name>
            <description>A point or period of time associated with an event in the lifecycle of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="481">
                <text>September 2017</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="37">
            <name>Contributor</name>
            <description>An entity responsible for making contributions to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="482">
                <text>Dr. Kwame Ofori Simpe</text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </item>
  <item itemId="82" public="1" featured="0">
    <fileContainer>
      <file fileId="81">
        <src>https://www.repository.gctu.edu.gh/files/original/514004d12df3078d876f8830b54572d9.pdf</src>
        <authentication>81aabe833d1166d38acd3fa470be3cdf</authentication>
      </file>
    </fileContainer>
    <collection collectionId="16">
      <elementSetContainer>
        <elementSet elementSetId="1">
          <name>Dublin Core</name>
          <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
          <elementContainer>
            <element elementId="50">
              <name>Title</name>
              <description>A name given to the resource</description>
              <elementTextContainer>
                <elementText elementTextId="344">
                  <text>MSc Management Information Systems</text>
                </elementText>
              </elementTextContainer>
            </element>
          </elementContainer>
        </elementSet>
      </elementSetContainer>
    </collection>
    <itemType itemTypeId="1">
      <name>Text</name>
      <description>A resource consisting primarily of words for reading. Examples include books, letters, dissertations, poems, newspapers, articles, archives of mailing lists. Note that facsimiles or images of texts are still of the genre Text.</description>
    </itemType>
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="504">
                <text> Using Capability Maturity Model to Assess the Effectiveness of Information Security Controls in an Organization &#13;
 &#13;
&#13;
 &#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="39">
            <name>Creator</name>
            <description>An entity primarily responsible for making the resource</description>
            <elementTextContainer>
              <elementText elementTextId="505">
                <text> Lewis Kwaku Duah </text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="41">
            <name>Description</name>
            <description>An account of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="506">
                <text>Many organizations have deployed various systems to facilitate the operations of their businesses, largely due to the benefits derived from the use of information technology. In spite of the numerous benefits derived from the use of information technology, its use brings about increased risks and/or threats to business processes. There is therefore the important task of protecting these systems from abuse and exploitation by both internal and external factors. To achieve this, organizations deploy and institute various controls to mitigate identified and inherent risks. In spite of these implemented controls, organizations have lost huge amounts of funds, resources and trade secrets with its attendant loss in reputation from compromises in their systems. These compromises could have been averted and cost to the organization minimized or eliminated with continuous auditing by internal and external entities which would have highlighted the areas of weakness to enable the organization address them. The study was to provide organizations with an avenue to assess the effectiveness of implemented information security controls using the capability maturity model. A conceptual audit framework was also developed from which audit test cases can be created to test the implemented controls.&#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="49">
            <name>Subject</name>
            <description>The topic of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="507">
                <text>MSc Management In Information Systems</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="45">
            <name>Publisher</name>
            <description>An entity responsible for making the resource available</description>
            <elementTextContainer>
              <elementText elementTextId="508">
                <text>Ghana Technology University College</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="40">
            <name>Date</name>
            <description>A point or period of time associated with an event in the lifecycle of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="509">
                <text>January 2017</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="37">
            <name>Contributor</name>
            <description>An entity responsible for making contributions to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="510">
                <text> Dominic K. Louis </text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </item>
  <item itemId="64" public="1" featured="0">
    <fileContainer>
      <file fileId="63">
        <src>https://www.repository.gctu.edu.gh/files/original/0e5e074451ee7514a2fe0d174d5099ff.pdf</src>
        <authentication>def9bca12917ae3ae29d4b050c9b5a43</authentication>
      </file>
    </fileContainer>
    <collection collectionId="16">
      <elementSetContainer>
        <elementSet elementSetId="1">
          <name>Dublin Core</name>
          <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
          <elementContainer>
            <element elementId="50">
              <name>Title</name>
              <description>A name given to the resource</description>
              <elementTextContainer>
                <elementText elementTextId="344">
                  <text>MSc Management Information Systems</text>
                </elementText>
              </elementTextContainer>
            </element>
          </elementContainer>
        </elementSet>
      </elementSetContainer>
    </collection>
    <itemType itemTypeId="1">
      <name>Text</name>
      <description>A resource consisting primarily of words for reading. Examples include books, letters, dissertations, poems, newspapers, articles, archives of mailing lists. Note that facsimiles or images of texts are still of the genre Text.</description>
    </itemType>
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="378">
                <text>“Implications of Cloud Computing On Non-Governmental Organizations”  “…Issues Of Data Sharing And Security”. &#13;
 &#13;
 &#13;
 &#13;
.&#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="39">
            <name>Creator</name>
            <description>An entity primarily responsible for making the resource</description>
            <elementTextContainer>
              <elementText elementTextId="379">
                <text>Bakaweri Batowise Emmanuel</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="49">
            <name>Subject</name>
            <description>The topic of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="380">
                <text> MSc. Management Information Systems</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="45">
            <name>Publisher</name>
            <description>An entity responsible for making the resource available</description>
            <elementTextContainer>
              <elementText elementTextId="381">
                <text>Ghana Technology University College</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="40">
            <name>Date</name>
            <description>A point or period of time associated with an event in the lifecycle of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="382">
                <text>May 2017</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="37">
            <name>Contributor</name>
            <description>An entity responsible for making contributions to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="383">
                <text>Dr. Ezer Osie Yeboah-Boateng</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="41">
            <name>Description</name>
            <description>An account of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="384">
                <text>Non-governmental organizations operating within the Ghanaian community continue to play a pivotal role in addressing the disparity between rural and urban areas. The activities of these organizations are multifaceted and seen in the various projects or programs that they undertake. Globally the use of information technology tools and applications presents various added benefits to any organization that choose to apply and effectively utilize these tools. At a time when the global call for open data and collaboration between such organizations is highest, NGOs continue to deploy high capital expensive IT infrastructures to meet this purpose as well as the technological needs of their organizations. In addition to these high setup costs, organizations constantly have to monitor, repair and guard these computing systems from security and data breeches. Today cloud computing has been hyped as a feature technology that is being adopted by SMEs and larger corporate organizations as a major enabler of business functions. Although this new paradigm is considered to be in its developmental stages, the recorded benefits have invariable challenged the traditional aspects of computing services among enterprises. This study seeks to encourage the adoption and utilization of cloud technologies for business operations and data sharing among NGOs. More specifically, the study sought to investigate the levels of adoption and utilization of cloud services among various NGOs, benefits and risks that implementers of this technology are likely to encounter in its implementation as well as industry’s practices for mitigating these risks. The results of the study showed that although most individuals alluded to being familiar with the concept of cloud computing, the levels of adoption and utilization of the technology among the larger NGO community was found to be low. From perusal of literary sources, it was also established that cloud adopters spend less on IT architectures that suit their business needs through rapid and easy provisioning of these service, flexibility in scaling up or down IT resources, disaster recovery, data security as well as increased productivity through collaboration. Cloud computing’s risks pertinent to data security, confidentiality, availability; service level agreements, segregation and reliability were also recognized. In conclusion, the study recommends further sensitization and education about cloud computing’s benefits to encourage its adoption and use by NGOs. Likely adopters of this technology are also advised to ensure the development of good holistic service level agreements to prevent legal issues that may arise from implementing cloud and for a smooth cloud experience.</text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </item>
  <item itemId="70" public="1" featured="0">
    <fileContainer>
      <file fileId="69">
        <src>https://www.repository.gctu.edu.gh/files/original/3aa7bdcfd98d7922917ab5d5e19649c0.pdf</src>
        <authentication>ce1daa3ea4dc3463bde10fc15e83e05a</authentication>
      </file>
    </fileContainer>
    <collection collectionId="16">
      <elementSetContainer>
        <elementSet elementSetId="1">
          <name>Dublin Core</name>
          <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
          <elementContainer>
            <element elementId="50">
              <name>Title</name>
              <description>A name given to the resource</description>
              <elementTextContainer>
                <elementText elementTextId="344">
                  <text>MSc Management Information Systems</text>
                </elementText>
              </elementTextContainer>
            </element>
          </elementContainer>
        </elementSet>
      </elementSetContainer>
    </collection>
    <itemType itemTypeId="1">
      <name>Text</name>
      <description>A resource consisting primarily of words for reading. Examples include books, letters, dissertations, poems, newspapers, articles, archives of mailing lists. Note that facsimiles or images of texts are still of the genre Text.</description>
    </itemType>
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="420">
                <text>An Assessment of Information System Implementation Success on Port Operations at Ghana Ports and Habours&#13;
&#13;
&#13;
&#13;
&#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="39">
            <name>Creator</name>
            <description>An entity primarily responsible for making the resource</description>
            <elementTextContainer>
              <elementText elementTextId="421">
                <text> Felix Adusei Tuffour</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="41">
            <name>Description</name>
            <description>An account of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="422">
                <text>The use of information system in the maritime industry and most especially in Ghana Ports and Habours provides the organisation with a much-improved service as well as efficiency and effectiveness of personnel. The success derived from Information System (IS) implementation is very important and so is the criteria and parameters for measuring or assessing such success. Several implementations of IS is on-going without any reference to an impact assessment of previously implemented one. As a result, most of these implementations are suffering from unresolved challenges of pervious systems. This study however, used an existing model for IS success for evaluating an information system’s success (ISS) at the Port of Tema by applying the DeLone &amp; McLean update IS success model (D&amp;M). The proposed model was adopted to demonstrate how its elements could be applied in evaluating IS implementations and also to support the decision makers in evaluating and developing the information systems. The study adopted a mixed method approach which includes both qualitative and quantitative approaches. 150 questionnaires were administered to collect primary data from port operational staff of GPHA and secondary data of organisation reports were also obtained for analysis. The results indicated that perceived usefulness, ease of use, accuracy, timeliness, reliability, user support significantly affected the use and user satisfaction of an information. It further indicated that an increase in these variables will result in positive outcome from the information system implementation. The proposed model used better explains the interrelation between the constructs and the interrelationship that exit among the construct has a strong statistical significance influence on GPHA employee usage intention.&#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="49">
            <name>Subject</name>
            <description>The topic of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="423">
                <text>Msc. Management Information Systems</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="45">
            <name>Publisher</name>
            <description>An entity responsible for making the resource available</description>
            <elementTextContainer>
              <elementText elementTextId="424">
                <text>Ghana Technology University College</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="40">
            <name>Date</name>
            <description>A point or period of time associated with an event in the lifecycle of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="425">
                <text>MAY 2018</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="37">
            <name>Contributor</name>
            <description>An entity responsible for making contributions to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="426">
                <text> Dr. Ezer Osei Yeboah-Boateng</text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </item>
  <item itemId="83" public="1" featured="0">
    <fileContainer>
      <file fileId="82">
        <src>https://www.repository.gctu.edu.gh/files/original/514a28f03bf0f681de8d06222a7811f6.pdf</src>
        <authentication>3c2364f8a9acd3a587589b49080f8072</authentication>
      </file>
    </fileContainer>
    <collection collectionId="16">
      <elementSetContainer>
        <elementSet elementSetId="1">
          <name>Dublin Core</name>
          <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
          <elementContainer>
            <element elementId="50">
              <name>Title</name>
              <description>A name given to the resource</description>
              <elementTextContainer>
                <elementText elementTextId="344">
                  <text>MSc Management Information Systems</text>
                </elementText>
              </elementTextContainer>
            </element>
          </elementContainer>
        </elementSet>
      </elementSetContainer>
    </collection>
    <itemType itemTypeId="1">
      <name>Text</name>
      <description>A resource consisting primarily of words for reading. Examples include books, letters, dissertations, poems, newspapers, articles, archives of mailing lists. Note that facsimiles or images of texts are still of the genre Text.</description>
    </itemType>
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="511">
                <text>An Assessment of Security Issues In Cloud Computing &#13;
(Factors Affecting Its Adoption in Ghanaian Banks) &#13;
 &#13;
 &#13;
 &#13;
&#13;
&#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="39">
            <name>Creator</name>
            <description>An entity primarily responsible for making the resource</description>
            <elementTextContainer>
              <elementText elementTextId="512">
                <text>Lois Nartey </text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="41">
            <name>Description</name>
            <description>An account of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="513">
                <text>Cloud computing services and other cloud related technologies have enhanced the capabilities, infrastructure and scalability of various IT needs of enterprises globally. The concept of cloud services is to enable enterprises to cut spending on setting up various IT infrastructures and instead focus its investments on core business needs. A research model was developed to investigate the vulnerabilities associated with confidentiality of cloud computing, how it has improved business processes in the banking industry and how the various security solutions are impacting of cloud computing technology.The study focused on three (3) major factors i.e.&#13;
I. vulnerabilities of cloud based systems,&#13;
II. security solutions for the technology and&#13;
III. the potential business benefits of applying cloud applications in banking. The Unified Theory of Acceptance and Use of Technology Model (UTAUT), the perceived ease of use (PEOU) and perceived usefulness (PU) were used as the research framework which formed the basis for conducting a survey to gather data on cloud computing technology. A questionnaire based survey was carried out and thirty-three (33) out of the expected fifty (50) feedbacks were received from various respondents. The results however asserted that despite the growth and security solutions of cloud computing, banking institutions are not adopting and using the technology as a core banking systems due to the perceived vulnerabilities which pose security threats to sensitive banking data and clients information. The various findings of this study and research recommendations are detailed in the following reports Keywords: cloud computing, Security, Confidentiality, Privacy, solution, bank</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="49">
            <name>Subject</name>
            <description>The topic of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="514">
                <text>Msc. Management Information Systems</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="45">
            <name>Publisher</name>
            <description>An entity responsible for making the resource available</description>
            <elementTextContainer>
              <elementText elementTextId="515">
                <text>Ghana Technology University College</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="40">
            <name>Date</name>
            <description>A point or period of time associated with an event in the lifecycle of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="516">
                <text>May 2018</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="37">
            <name>Contributor</name>
            <description>An entity responsible for making contributions to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="517">
                <text> Dr. Ezer Osei Yeboah-Boateng </text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </item>
</itemContainer>
