<?xml version="1.0" encoding="UTF-8"?>
<itemContainer xmlns="http://omeka.org/schemas/omeka-xml/v5" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://omeka.org/schemas/omeka-xml/v5 http://omeka.org/schemas/omeka-xml/v5/omeka-xml-5-0.xsd" uri="https://www.repository.gctu.edu.gh/items/browse?collection=16&amp;output=omeka-xml&amp;sort_field=added" accessDate="2026-04-23T05:08:48+00:00">
  <miscellaneousContainer>
    <pagination>
      <pageNumber>1</pageNumber>
      <perPage>10</perPage>
      <totalResults>35</totalResults>
    </pagination>
  </miscellaneousContainer>
  <item itemId="61" public="1" featured="0">
    <fileContainer>
      <file fileId="60">
        <src>https://www.repository.gctu.edu.gh/files/original/d59de7ce3f453e7fb5269137c6a13998.pdf</src>
        <authentication>fb3b49dbc56cc81b08814c51f97985fb</authentication>
      </file>
    </fileContainer>
    <collection collectionId="16">
      <elementSetContainer>
        <elementSet elementSetId="1">
          <name>Dublin Core</name>
          <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
          <elementContainer>
            <element elementId="50">
              <name>Title</name>
              <description>A name given to the resource</description>
              <elementTextContainer>
                <elementText elementTextId="344">
                  <text>MSc Management Information Systems</text>
                </elementText>
              </elementTextContainer>
            </element>
          </elementContainer>
        </elementSet>
      </elementSetContainer>
    </collection>
    <itemType itemTypeId="1">
      <name>Text</name>
      <description>A resource consisting primarily of words for reading. Examples include books, letters, dissertations, poems, newspapers, articles, archives of mailing lists. Note that facsimiles or images of texts are still of the genre Text.</description>
    </itemType>
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="353">
                <text>Mobile Money Sustainability by Service Providers in Ghana: Challenges and Benefits   &#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="39">
            <name>Creator</name>
            <description>An entity primarily responsible for making the resource</description>
            <elementTextContainer>
              <elementText elementTextId="354">
                <text>Dennis Nii Adjei Annang</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="41">
            <name>Description</name>
            <description>An account of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="355">
                <text>The study intended to investigate the sustainability of mobile money in Ghana, which is currently making waves in Ghana. The problem addressed in this research was how mobile money systems are sustained amidst challenges and setbacks to the system. The methods employed to solve the problem was a quantitative approach through the use of a descriptive research design, specifically cross-sectional correlational survey design. From the research results, the study revealed that respondents have knowledge on the sustainability of mobile money, and education is key to make the sustainability of mobile money in Ghana a reality.&#13;
The study also revealed key strategies that are being employed to sustain mobile money and also the practical steps that are in place to make sure the sustainability strategies are realistic. The study further revealed some perceived and real-time challenges that are associated with the sustainability of mobile money in Ghana. An interesting discovery was also made, in terms of Ghana lacking a mobile money sustainability model; thus, three models were developed in this study based on the results and findings obtained at the end of this study.</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="49">
            <name>Subject</name>
            <description>The topic of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="356">
                <text> MSc. Management Information Systems</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="45">
            <name>Publisher</name>
            <description>An entity responsible for making the resource available</description>
            <elementTextContainer>
              <elementText elementTextId="357">
                <text>Ghana Technology University College&#13;
&#13;
&#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="40">
            <name>Date</name>
            <description>A point or period of time associated with an event in the lifecycle of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="358">
                <text>June, 2016</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="37">
            <name>Contributor</name>
            <description>An entity responsible for making contributions to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="359">
                <text>Dr. Daniel M. O. Adjin</text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </item>
  <item itemId="62" public="1" featured="0">
    <fileContainer>
      <file fileId="61">
        <src>https://www.repository.gctu.edu.gh/files/original/2604f4a7527a929c4aa56df128d0dc69.pdf</src>
        <authentication>56f300ee6e23e014ee216b94ce65761e</authentication>
      </file>
    </fileContainer>
    <collection collectionId="16">
      <elementSetContainer>
        <elementSet elementSetId="1">
          <name>Dublin Core</name>
          <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
          <elementContainer>
            <element elementId="50">
              <name>Title</name>
              <description>A name given to the resource</description>
              <elementTextContainer>
                <elementText elementTextId="344">
                  <text>MSc Management Information Systems</text>
                </elementText>
              </elementTextContainer>
            </element>
          </elementContainer>
        </elementSet>
      </elementSetContainer>
    </collection>
    <itemType itemTypeId="1">
      <name>Text</name>
      <description>A resource consisting primarily of words for reading. Examples include books, letters, dissertations, poems, newspapers, articles, archives of mailing lists. Note that facsimiles or images of texts are still of the genre Text.</description>
    </itemType>
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="360">
                <text>Evaluating the Effect of Technology on Small and Medium Enterprises (SMEs) In Ghana: Case Study of SMEs in the Accra Metropolis&#13;
 &#13;
&#13;
&#13;
&#13;
&#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="39">
            <name>Creator</name>
            <description>An entity primarily responsible for making the resource</description>
            <elementTextContainer>
              <elementText elementTextId="361">
                <text>Edwin Nii Mensah Abordo</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="41">
            <name>Description</name>
            <description>An account of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="362">
                <text>Small and Medium Enterprises (SMEs) play a crucial role in building the economies of developing and developed countries. In Ghana, about 90% of businesses are SMEs and contribute immensely in the generation of employment, income and economic growth. Due to its&#13;
tremendous contributions, it becomes necessary to identify the various factors that improve the business operations of such enterprises. One of such identified drivers is technology. Hence, the study is to evaluate the effect of technology on SMEs in the Accra Metropolis. This study is to: assess the present state of technology adoption in SMEs; evaluate the effects of technology in the growth of SMEs and to critically analyze the challenges SMEs encounter in using technology.&#13;
The descriptive survey research design was adopted for this study. Also, the mixed method research approach was used to provide width and depth to the study. In all, fifty-four (73%) questionnaires were successfully received and four interviews were conducted. The qualitative data were analyzed using explanation-building, pattern matching and content analysis while SPSS and Microsoft Excel were used to analyze the quantitative data. The analyzed results were&#13;
presented in descriptive and graphical representations like charts, tables and percentages.&#13;
The study found out that smart phones, desktop computers, laptops and mobile money platforms were the most patronized forms of technology used by SMEs. It also revealed that technology was very beneficial in reducing the cost of business transactions, improving business&#13;
communications and increasing productivity. However, the study identifies that cost of software and equipment as well as unavailability of ICT experts were major challenges that SMEs encountered in adopting technology.&#13;
Based on the findings, the researcher recommended that flexible loans be provided to SMEs to encourage them purchase the necessary technologies for their businesses. Also, NBSSI in collaboration with NGOs could organize trainings to help operators acquire basic ICT skills and&#13;
also to increase the awareness of the benefits of using technology.</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="49">
            <name>Subject</name>
            <description>The topic of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="363">
                <text>&#13;
MSc. Management Information System</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="45">
            <name>Publisher</name>
            <description>An entity responsible for making the resource available</description>
            <elementTextContainer>
              <elementText elementTextId="364">
                <text>Ghana Technology University Library</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="40">
            <name>Date</name>
            <description>A point or period of time associated with an event in the lifecycle of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="365">
                <text>January 2018</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="37">
            <name>Contributor</name>
            <description>An entity responsible for making contributions to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="366">
                <text> Ing. Isaac Hanson</text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </item>
  <item itemId="63" public="1" featured="0">
    <fileContainer>
      <file fileId="62">
        <src>https://www.repository.gctu.edu.gh/files/original/9d6d027d9193ff1bcaa362a402fb5d46.pdf</src>
        <authentication>0d23b817e0fe39fcad1e2186d019ebf5</authentication>
      </file>
    </fileContainer>
    <collection collectionId="16">
      <elementSetContainer>
        <elementSet elementSetId="1">
          <name>Dublin Core</name>
          <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
          <elementContainer>
            <element elementId="50">
              <name>Title</name>
              <description>A name given to the resource</description>
              <elementTextContainer>
                <elementText elementTextId="344">
                  <text>MSc Management Information Systems</text>
                </elementText>
              </elementTextContainer>
            </element>
          </elementContainer>
        </elementSet>
      </elementSetContainer>
    </collection>
    <itemType itemTypeId="1">
      <name>Text</name>
      <description>A resource consisting primarily of words for reading. Examples include books, letters, dissertations, poems, newspapers, articles, archives of mailing lists. Note that facsimiles or images of texts are still of the genre Text.</description>
    </itemType>
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="367">
                <text> Analysis of Security Issues In Electronic &#13;
Payment Systems in Ghana &#13;
&#13;
 &#13;
&#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="39">
            <name>Creator</name>
            <description>An entity primarily responsible for making the resource</description>
            <elementTextContainer>
              <elementText elementTextId="368">
                <text> Ellis Senyo Cudjoe Dzakpasu </text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="41">
            <name>Description</name>
            <description>An account of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="369">
                <text>The patronage of e-payment systems has significantly increased over the years. In some parts of the world, it has become the most preferred medium of payment. As at 2015, seven out of eight transactions were done electronically in Europe (BUONAGUIDI, 2017). E-payment systems have become essential over time and has necessitated the development of stringent controls to ensure that they are safe to use. Due to the several types of e-payment systems (mobile money, card payment, ACH1) being used in Ghana, the research was narrowed down to card payments give focus to the research in order to make relevant analysis. To make a significant argument on the subject matter, this research employed the use of questionnaires and interviews. Questionnaires were developed for users or consumers of e-payment systems whiles interviews were developed for e-payment vendors (bank). Forty people responded to the research and gave their views on the subject matter whiles five banks represented the banking/vendor space. The inclusion of both card users and vendors in the research gave a 360 analysis of the card payment system. Consumer and producer views were obtained and analyzed provide a holistic view.&#13;
The results of the research showed that 80% of banks in Ghana were not certified in card payment security(PCIDSS2). This means that although majority of banks are issuing out cards and card payment systems (POS and web acquirers), there is no proof that they(banks) have a secured infrastructure to support card payment systems. The results also showed that only 53% of users practice acceptable ways of using cards.&#13;
In conclusion this research showed that although some users are aware of basic card security, there is still a lot of work to be done by card payment vendors (banks) to ensure the security of card payment systems in Ghana. The requirements of this certification(PCIDSS) are stringent&#13;
and will ensure that the accompanying risk of being a provider of card payment systems are mitigated appropriately.</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="49">
            <name>Subject</name>
            <description>The topic of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="370">
                <text> MSc Management Information System</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="45">
            <name>Publisher</name>
            <description>An entity responsible for making the resource available</description>
            <elementTextContainer>
              <elementText elementTextId="371">
                <text>Ghana Technology University College</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="40">
            <name>Date</name>
            <description>A point or period of time associated with an event in the lifecycle of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="372">
                <text> January, 2018</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="37">
            <name>Contributor</name>
            <description>An entity responsible for making contributions to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="373">
                <text> Isaac Hanson&#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </item>
  <item itemId="64" public="1" featured="0">
    <fileContainer>
      <file fileId="63">
        <src>https://www.repository.gctu.edu.gh/files/original/0e5e074451ee7514a2fe0d174d5099ff.pdf</src>
        <authentication>def9bca12917ae3ae29d4b050c9b5a43</authentication>
      </file>
    </fileContainer>
    <collection collectionId="16">
      <elementSetContainer>
        <elementSet elementSetId="1">
          <name>Dublin Core</name>
          <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
          <elementContainer>
            <element elementId="50">
              <name>Title</name>
              <description>A name given to the resource</description>
              <elementTextContainer>
                <elementText elementTextId="344">
                  <text>MSc Management Information Systems</text>
                </elementText>
              </elementTextContainer>
            </element>
          </elementContainer>
        </elementSet>
      </elementSetContainer>
    </collection>
    <itemType itemTypeId="1">
      <name>Text</name>
      <description>A resource consisting primarily of words for reading. Examples include books, letters, dissertations, poems, newspapers, articles, archives of mailing lists. Note that facsimiles or images of texts are still of the genre Text.</description>
    </itemType>
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="378">
                <text>“Implications of Cloud Computing On Non-Governmental Organizations”  “…Issues Of Data Sharing And Security”. &#13;
 &#13;
 &#13;
 &#13;
.&#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="39">
            <name>Creator</name>
            <description>An entity primarily responsible for making the resource</description>
            <elementTextContainer>
              <elementText elementTextId="379">
                <text>Bakaweri Batowise Emmanuel</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="49">
            <name>Subject</name>
            <description>The topic of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="380">
                <text> MSc. Management Information Systems</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="45">
            <name>Publisher</name>
            <description>An entity responsible for making the resource available</description>
            <elementTextContainer>
              <elementText elementTextId="381">
                <text>Ghana Technology University College</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="40">
            <name>Date</name>
            <description>A point or period of time associated with an event in the lifecycle of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="382">
                <text>May 2017</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="37">
            <name>Contributor</name>
            <description>An entity responsible for making contributions to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="383">
                <text>Dr. Ezer Osie Yeboah-Boateng</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="41">
            <name>Description</name>
            <description>An account of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="384">
                <text>Non-governmental organizations operating within the Ghanaian community continue to play a pivotal role in addressing the disparity between rural and urban areas. The activities of these organizations are multifaceted and seen in the various projects or programs that they undertake. Globally the use of information technology tools and applications presents various added benefits to any organization that choose to apply and effectively utilize these tools. At a time when the global call for open data and collaboration between such organizations is highest, NGOs continue to deploy high capital expensive IT infrastructures to meet this purpose as well as the technological needs of their organizations. In addition to these high setup costs, organizations constantly have to monitor, repair and guard these computing systems from security and data breeches. Today cloud computing has been hyped as a feature technology that is being adopted by SMEs and larger corporate organizations as a major enabler of business functions. Although this new paradigm is considered to be in its developmental stages, the recorded benefits have invariable challenged the traditional aspects of computing services among enterprises. This study seeks to encourage the adoption and utilization of cloud technologies for business operations and data sharing among NGOs. More specifically, the study sought to investigate the levels of adoption and utilization of cloud services among various NGOs, benefits and risks that implementers of this technology are likely to encounter in its implementation as well as industry’s practices for mitigating these risks. The results of the study showed that although most individuals alluded to being familiar with the concept of cloud computing, the levels of adoption and utilization of the technology among the larger NGO community was found to be low. From perusal of literary sources, it was also established that cloud adopters spend less on IT architectures that suit their business needs through rapid and easy provisioning of these service, flexibility in scaling up or down IT resources, disaster recovery, data security as well as increased productivity through collaboration. Cloud computing’s risks pertinent to data security, confidentiality, availability; service level agreements, segregation and reliability were also recognized. In conclusion, the study recommends further sensitization and education about cloud computing’s benefits to encourage its adoption and use by NGOs. Likely adopters of this technology are also advised to ensure the development of good holistic service level agreements to prevent legal issues that may arise from implementing cloud and for a smooth cloud experience.</text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </item>
  <item itemId="65" public="1" featured="0">
    <fileContainer>
      <file fileId="64">
        <src>https://www.repository.gctu.edu.gh/files/original/21eae1401d7c18394c63b1bd87aef360.pdf</src>
        <authentication>3e84c00c692ae1c53080f32cd26ce6f4</authentication>
      </file>
    </fileContainer>
    <collection collectionId="16">
      <elementSetContainer>
        <elementSet elementSetId="1">
          <name>Dublin Core</name>
          <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
          <elementContainer>
            <element elementId="50">
              <name>Title</name>
              <description>A name given to the resource</description>
              <elementTextContainer>
                <elementText elementTextId="344">
                  <text>MSc Management Information Systems</text>
                </elementText>
              </elementTextContainer>
            </element>
          </elementContainer>
        </elementSet>
      </elementSetContainer>
    </collection>
    <itemType itemTypeId="1">
      <name>Text</name>
      <description>A resource consisting primarily of words for reading. Examples include books, letters, dissertations, poems, newspapers, articles, archives of mailing lists. Note that facsimiles or images of texts are still of the genre Text.</description>
    </itemType>
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="385">
                <text>Critical Analysis of Information Security Systems in the Banking Industry in Ghana: &#13;
A case study of GN Bank &#13;
  &#13;
 &#13;
&#13;
 &#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="39">
            <name>Creator</name>
            <description>An entity primarily responsible for making the resource</description>
            <elementTextContainer>
              <elementText elementTextId="386">
                <text>Emmanuel Kobla Nornyibey</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="41">
            <name>Description</name>
            <description>An account of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="387">
                <text>The study focuses on GN Bank as a case study – analyzing the information systems and network infrastructure of the bank. This study analyses the term “information security” and its application in industry particularly the banking industry. Various benefits offered by Information security to the banking industry and challenges encountered are all analyzed in this paper. Issues relating to information security are discussed generally.&#13;
The key functions of this study are directed at assessing vulnerabilities in GN Bank’s information systems and infrastructure; and to explore what investments are made in technical personnel, end users and infrastructure. The study adopts a qualitative approach to exploring information security as far as GN Bank information systems are concerned.&#13;
In order to determine the security posture of GN Bank and make recommendations where applicable, a penetration test is conducted over the bank’s network infrastructure, findings are made and discussed. An interview with the Information security department is also conducted and a summary of the results presented.One key recommendation in this paper is that information security being a business related issue requires much consideration and allocation of sufficient budget not only for acquiring systems but for training technical persons and end users.&#13;
&#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="49">
            <name>Subject</name>
            <description>The topic of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="388">
                <text> MSc. in Management Information Systems</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="45">
            <name>Publisher</name>
            <description>An entity responsible for making the resource available</description>
            <elementTextContainer>
              <elementText elementTextId="389">
                <text>Ghana Technology University College</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="40">
            <name>Date</name>
            <description>A point or period of time associated with an event in the lifecycle of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="390">
                <text>MAY 2018</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="37">
            <name>Contributor</name>
            <description>An entity responsible for making contributions to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="391">
                <text> Dr. Ebenezer Malcalm</text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </item>
  <item itemId="66" public="1" featured="0">
    <fileContainer>
      <file fileId="65">
        <src>https://www.repository.gctu.edu.gh/files/original/f9f7870a2a52439e30f690dba14e7084.pdf</src>
        <authentication>f0e1376f57895e3c553b343a7c7b23a2</authentication>
      </file>
    </fileContainer>
    <collection collectionId="16">
      <elementSetContainer>
        <elementSet elementSetId="1">
          <name>Dublin Core</name>
          <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
          <elementContainer>
            <element elementId="50">
              <name>Title</name>
              <description>A name given to the resource</description>
              <elementTextContainer>
                <elementText elementTextId="344">
                  <text>MSc Management Information Systems</text>
                </elementText>
              </elementTextContainer>
            </element>
          </elementContainer>
        </elementSet>
      </elementSetContainer>
    </collection>
    <itemType itemTypeId="1">
      <name>Text</name>
      <description>A resource consisting primarily of words for reading. Examples include books, letters, dissertations, poems, newspapers, articles, archives of mailing lists. Note that facsimiles or images of texts are still of the genre Text.</description>
    </itemType>
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="392">
                <text>  An Assessment of the Extent of Vulnerabilities in Social Media &#13;
 &#13;
 &#13;
&#13;
 &#13;
  &#13;
&#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="39">
            <name>Creator</name>
            <description>An entity primarily responsible for making the resource</description>
            <elementTextContainer>
              <elementText elementTextId="393">
                <text>Vera Azonim Erhabor</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="41">
            <name>Description</name>
            <description>An account of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="394">
                <text>Social media has gained grounds in recent times becoming an integral part of human lives enabling communication, friendships, and opinions. The paradigm shift has brought about risk and threats especially to those cyber criminals who want to capitalize on the unwariness or ignorance of the users and to exploit the vulnerabilities identified. This study sought to assess the vulnerabilities in social media with regards to the possible strategies to mitigate the threats. The perception is that users of these social media believe that they have internet security suite install to safeguard their devices against threats including social engineering threats. The study employed the qualitative research design i.e. gleaning through reports and literature and the questionnaires approach through interview to evaluate the vulnerabilities that come with the use of social media. The study area consisted of users of the social media platforms such as Facebook, WhatsApp, Instagram, Twitter etc. in the central business district of Accra. A study size of 120 social media users was drawn. The research used both the random sampling and purposive sampling techniques to select the study subjects. The results show that 64% of the users surveyed are between 20 to 40 years. From the results, majority of the respondents representing 46.7% use Facebook. Majority of the respondents representing 76% said they are secured and protected using social media little do they know they are not protected in anyway. It is also recommended that advances technologies be used in the blockage of social media at work places. Monitoring is also keen and is recommended in order to curb the rate of usage of social media. The recommendation is that awareness creation and training of staff members on the vulnerabilities or threats on social media. The theories employed in this study, is the Personal Behavior Theory that explains users’ Personal traits and their attitudes on social media.&#13;
&#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="49">
            <name>Subject</name>
            <description>The topic of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="395">
                <text>Msc Management Information Systems</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="40">
            <name>Date</name>
            <description>A point or period of time associated with an event in the lifecycle of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="396">
                <text>September, 2017</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="37">
            <name>Contributor</name>
            <description>An entity responsible for making contributions to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="397">
                <text> Dr. Ezer Osei Yeboah-Boateng</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="45">
            <name>Publisher</name>
            <description>An entity responsible for making the resource available</description>
            <elementTextContainer>
              <elementText elementTextId="419">
                <text>Ghana Technology University College</text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </item>
  <item itemId="67" public="1" featured="0">
    <fileContainer>
      <file fileId="66">
        <src>https://www.repository.gctu.edu.gh/files/original/6ef9032c8b64ed03678bb997a7b9f8a6.pdf</src>
        <authentication>d708aabee6ef3dd1a92b9421cbd78787</authentication>
      </file>
    </fileContainer>
    <collection collectionId="16">
      <elementSetContainer>
        <elementSet elementSetId="1">
          <name>Dublin Core</name>
          <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
          <elementContainer>
            <element elementId="50">
              <name>Title</name>
              <description>A name given to the resource</description>
              <elementTextContainer>
                <elementText elementTextId="344">
                  <text>MSc Management Information Systems</text>
                </elementText>
              </elementTextContainer>
            </element>
          </elementContainer>
        </elementSet>
      </elementSetContainer>
    </collection>
    <itemType itemTypeId="1">
      <name>Text</name>
      <description>A resource consisting primarily of words for reading. Examples include books, letters, dissertations, poems, newspapers, articles, archives of mailing lists. Note that facsimiles or images of texts are still of the genre Text.</description>
    </itemType>
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="398">
                <text> Evaluating The Internal Threats of an Organisation’s Information Security: A Case Study Of Xpress Gas Limited &#13;
 &#13;
 &#13;
 &#13;
 &#13;
&#13;
&#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="39">
            <name>Creator</name>
            <description>An entity primarily responsible for making the resource</description>
            <elementTextContainer>
              <elementText elementTextId="399">
                <text>Eric Kwesi Parden</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="41">
            <name>Description</name>
            <description>An account of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="400">
                <text>Information is of essence in today’s information age with ubiquity. Control systems are pivotal in any organisation with the quest to grow. Taking into account the numerous cases that have occasioned as a result of the poor control measures put in place to check the system. Advancement in information technologies such as the Internet has called for organisations to protect their information to ensure its confidentiality, integrity, and availability. Information security of every organisation is of essence especially an organisation to remain competitive. Organisations know the value information has regarding the reputation of the entity which can lead to loss of client’s confidence, financial loss, goodwill and trust, loss of potential sales and legal issues. The researcher used both the random sampling and purposive sampling techniques to select the study subjects. The purpose of this research is to evaluate the internal threats within an organisation’s information security; the case of Xpress Gas Ltd. The researcher uses purposive sampling technique because only staff members who directly connect to the logistics side of the information system. The researcher adopts this technique in order to acquire the relevant information. The study population are those employees who are directly dealing with the logistics aspects of the Company constituting the sample size of 200. Data collated from respondents is analyse using a Statistical Package for Social Science version 20 and Microsoft Excel is employ in analysing the data and present the data in table form using Microsoft Word. The findings showed that there are internal threats within Xpress Gas Ltd as majority of the respondents 84.5% threats found within Xpress Gas Ltd are more of internal threats related such as human error or failure, deliberate acts of information extortion, deliberate acts of espionage or trespass, deliberate acts of sabotage or vandalism, deliberate acts of theft, and deliberate software attacks.</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="49">
            <name>Subject</name>
            <description>The topic of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="401">
                <text>Msc. Management Information Systems </text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="45">
            <name>Publisher</name>
            <description>An entity responsible for making the resource available</description>
            <elementTextContainer>
              <elementText elementTextId="402">
                <text>Ghana Technology University College</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="40">
            <name>Date</name>
            <description>A point or period of time associated with an event in the lifecycle of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="403">
                <text>May 2017 </text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="37">
            <name>Contributor</name>
            <description>An entity responsible for making contributions to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="404">
                <text>Dr. Stephen Asunka </text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </item>
  <item itemId="68" public="1" featured="0">
    <fileContainer>
      <file fileId="67">
        <src>https://www.repository.gctu.edu.gh/files/original/e82a975ef339e407f1c53794874b1848.pdf</src>
        <authentication>bac8b9c59cc6a19c30c2886d7ffa5da9</authentication>
      </file>
    </fileContainer>
    <collection collectionId="16">
      <elementSetContainer>
        <elementSet elementSetId="1">
          <name>Dublin Core</name>
          <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
          <elementContainer>
            <element elementId="50">
              <name>Title</name>
              <description>A name given to the resource</description>
              <elementTextContainer>
                <elementText elementTextId="344">
                  <text>MSc Management Information Systems</text>
                </elementText>
              </elementTextContainer>
            </element>
          </elementContainer>
        </elementSet>
      </elementSetContainer>
    </collection>
    <itemType itemTypeId="1">
      <name>Text</name>
      <description>A resource consisting primarily of words for reading. Examples include books, letters, dissertations, poems, newspapers, articles, archives of mailing lists. Note that facsimiles or images of texts are still of the genre Text.</description>
    </itemType>
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="405">
                <text>Design Of Hybrid Neural Network Intrusion Detection Systems&#13;
&#13;
&#13;
&#13;
&#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="39">
            <name>Creator</name>
            <description>An entity primarily responsible for making the resource</description>
            <elementTextContainer>
              <elementText elementTextId="406">
                <text> Eugene Efah Adane</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="41">
            <name>Description</name>
            <description>An account of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="407">
                <text>Due to the rapid growth of computer system and Internet, network security became crucial issue for most organizations. Mostly organizations increase usage of different tools and methods to secure their network due to the increase of security threats. Many methods have been developed to secure computer networks and communication over the Internet. However, none of the existing methods developed by different researches have an accuracy of detecting attacks with high detection rate and low false alarm rate. The other thing is most deal with single detection approach with high number of features which is challenging and time consuming to implement.&#13;
Also it will examine only either previously known attacks or unknown attacks. This thesis work is devoted to solve those problems using intrusion detection system architecture that is based on neural network, signatures and dimension reduction that can promptly detect and classify attacks, whether they are known or never seen before. The proposed hybrid intrusion detection system combines signature based and anomaly based techniques. Signature based open source which uses pattern search for attack detection and the anomaly based system is developed using machine learning technique. We implemented dimension reduction using dataset NSL-KDD and train the system using the well-known artificial neural network algorithm in the area of intrusion detection. The evaluation of performance and implementation of the proposed hybrid intrusion detection system are made with Java programming language using NetBeans. The results obtained by the implementation and evaluation are measured in comparison with other works&#13;
done using single detection approach. The result shows that the output is encouraging and further refinement of the work can produce more robust and reliable intrusion detection system.&#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="49">
            <name>Subject</name>
            <description>The topic of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="408">
                <text>Msc Management Information System</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="40">
            <name>Date</name>
            <description>A point or period of time associated with an event in the lifecycle of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="409">
                <text> 15 -09 -2017</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="37">
            <name>Contributor</name>
            <description>An entity responsible for making contributions to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="410">
                <text> ING Isaac Hanson</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="45">
            <name>Publisher</name>
            <description>An entity responsible for making the resource available</description>
            <elementTextContainer>
              <elementText elementTextId="418">
                <text>Ghana Technology University College</text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </item>
  <item itemId="69" public="1" featured="0">
    <fileContainer>
      <file fileId="68">
        <src>https://www.repository.gctu.edu.gh/files/original/7af81c30e457d39b99c174d7292bd399.pdf</src>
        <authentication>1296782c4e8455214be7ef93b6044f11</authentication>
      </file>
    </fileContainer>
    <collection collectionId="16">
      <elementSetContainer>
        <elementSet elementSetId="1">
          <name>Dublin Core</name>
          <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
          <elementContainer>
            <element elementId="50">
              <name>Title</name>
              <description>A name given to the resource</description>
              <elementTextContainer>
                <elementText elementTextId="344">
                  <text>MSc Management Information Systems</text>
                </elementText>
              </elementTextContainer>
            </element>
          </elementContainer>
        </elementSet>
      </elementSetContainer>
    </collection>
    <itemType itemTypeId="1">
      <name>Text</name>
      <description>A resource consisting primarily of words for reading. Examples include books, letters, dissertations, poems, newspapers, articles, archives of mailing lists. Note that facsimiles or images of texts are still of the genre Text.</description>
    </itemType>
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="411">
                <text>Assessing Payment Card Industry Data Security Standard Compliance and ‘Europay, Mastercard, Visa’ Adoption amongst Universal Banks in Ghana and it’s Relationship with Fraud. &#13;
&#13;
 &#13;
&#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="39">
            <name>Creator</name>
            <description>An entity primarily responsible for making the resource</description>
            <elementTextContainer>
              <elementText elementTextId="412">
                <text>Eugene Oku</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="41">
            <name>Description</name>
            <description>An account of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="413">
                <text>In the banking industry, protecting consumers' financial security is without a doubt a major issue of concern especially in the modern world where the banking process has been digitalized and consumers exposed to numerous new issues. The introduction of the payment card system in the 1950’s created a new channel through which fraudsters can exploit. With the rise in card payment fraud cases, ‘Europay, MasterCard and Visa’&#13;
(EMV) technology was created in 1994 by the major players in the industry to secure card present transactions. This was followed by the release of the first version of the Payment Card Industry Data Security Standards (PCI DSS) somewhere in 2010 to protect cardholder data. Thus, this study was designed to understand the impact of PCI DSS and EMV standards in Ghanaian banking industry and its relationship on payment card&#13;
frauds. The sampling technique employed in the study was random sampling technique. Questionnaires were administered to staff and customers of 10 selected universal banks to&#13;
gather primary data from the targeted participants which were analysed with Statistical Package for Social Sciences (SPSS). In all 50 staff of universal banks (i.e. 5 from each bank) and 100 customers (i.e. 10 from each bank) participated in this research.&#13;
The study revealed that Adequate funding, training and forums, change in organizational culture were most critical success factors in order to ensure a successful and continuous&#13;
PCI DSS compliance and EMV adoption. It was also discovered that cost of implementation, lack of management commitment and support and uncooperativeness of key stakeholders were the major challenging issues for banks seeking to adopt PCI DSS&#13;
and EMV. The study also revealed that, most of the banks have made some efforts to protect he cardholder data of their customers and was further deduced that the higher the&#13;
compliance level of PCI DSS and EMV the lower the occurrence of card payment fraud. To conclude, it was shown that customers are more loyal when steps are being taken in their best interest.</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="49">
            <name>Subject</name>
            <description>The topic of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="414">
                <text>Msc. Management Information Systems.</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="45">
            <name>Publisher</name>
            <description>An entity responsible for making the resource available</description>
            <elementTextContainer>
              <elementText elementTextId="415">
                <text>Ghana Technology University College</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="40">
            <name>Date</name>
            <description>A point or period of time associated with an event in the lifecycle of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="416">
                <text>January, 2018</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="37">
            <name>Contributor</name>
            <description>An entity responsible for making contributions to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="417">
                <text>Dr. Stephen Asunka</text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </item>
  <item itemId="70" public="1" featured="0">
    <fileContainer>
      <file fileId="69">
        <src>https://www.repository.gctu.edu.gh/files/original/3aa7bdcfd98d7922917ab5d5e19649c0.pdf</src>
        <authentication>ce1daa3ea4dc3463bde10fc15e83e05a</authentication>
      </file>
    </fileContainer>
    <collection collectionId="16">
      <elementSetContainer>
        <elementSet elementSetId="1">
          <name>Dublin Core</name>
          <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
          <elementContainer>
            <element elementId="50">
              <name>Title</name>
              <description>A name given to the resource</description>
              <elementTextContainer>
                <elementText elementTextId="344">
                  <text>MSc Management Information Systems</text>
                </elementText>
              </elementTextContainer>
            </element>
          </elementContainer>
        </elementSet>
      </elementSetContainer>
    </collection>
    <itemType itemTypeId="1">
      <name>Text</name>
      <description>A resource consisting primarily of words for reading. Examples include books, letters, dissertations, poems, newspapers, articles, archives of mailing lists. Note that facsimiles or images of texts are still of the genre Text.</description>
    </itemType>
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="420">
                <text>An Assessment of Information System Implementation Success on Port Operations at Ghana Ports and Habours&#13;
&#13;
&#13;
&#13;
&#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="39">
            <name>Creator</name>
            <description>An entity primarily responsible for making the resource</description>
            <elementTextContainer>
              <elementText elementTextId="421">
                <text> Felix Adusei Tuffour</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="41">
            <name>Description</name>
            <description>An account of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="422">
                <text>The use of information system in the maritime industry and most especially in Ghana Ports and Habours provides the organisation with a much-improved service as well as efficiency and effectiveness of personnel. The success derived from Information System (IS) implementation is very important and so is the criteria and parameters for measuring or assessing such success. Several implementations of IS is on-going without any reference to an impact assessment of previously implemented one. As a result, most of these implementations are suffering from unresolved challenges of pervious systems. This study however, used an existing model for IS success for evaluating an information system’s success (ISS) at the Port of Tema by applying the DeLone &amp; McLean update IS success model (D&amp;M). The proposed model was adopted to demonstrate how its elements could be applied in evaluating IS implementations and also to support the decision makers in evaluating and developing the information systems. The study adopted a mixed method approach which includes both qualitative and quantitative approaches. 150 questionnaires were administered to collect primary data from port operational staff of GPHA and secondary data of organisation reports were also obtained for analysis. The results indicated that perceived usefulness, ease of use, accuracy, timeliness, reliability, user support significantly affected the use and user satisfaction of an information. It further indicated that an increase in these variables will result in positive outcome from the information system implementation. The proposed model used better explains the interrelation between the constructs and the interrelationship that exit among the construct has a strong statistical significance influence on GPHA employee usage intention.&#13;
</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="49">
            <name>Subject</name>
            <description>The topic of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="423">
                <text>Msc. Management Information Systems</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="45">
            <name>Publisher</name>
            <description>An entity responsible for making the resource available</description>
            <elementTextContainer>
              <elementText elementTextId="424">
                <text>Ghana Technology University College</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="40">
            <name>Date</name>
            <description>A point or period of time associated with an event in the lifecycle of the resource</description>
            <elementTextContainer>
              <elementText elementTextId="425">
                <text>MAY 2018</text>
              </elementText>
            </elementTextContainer>
          </element>
          <element elementId="37">
            <name>Contributor</name>
            <description>An entity responsible for making contributions to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="426">
                <text> Dr. Ezer Osei Yeboah-Boateng</text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </item>
</itemContainer>
