This paper seeks to analyze the information flow between the Bourse Régionale des Valeurs Mobilières (BRVM) and Environmental, Social, and Governance (ESG) stocks, focusing on the time and frequency domains. By studying these aspects, we aim to gain…
Key shifts in the nature and characteristics of technology have led to evolutions in social media usage. For the first time in history, the internet is being accessed from more mobile devices than desktop computers. This revolution is especially felt…
Sustainable development policies of the Black Sea Region is vital to European Union given increasing environmental disturbances by dynamic and heterogenous factors across the enclave beginning from 1990s. This study assesses long run asymmetric…
Purpose – The purpose of this paper is to examine how corporate social responsibility is incorporated
into marketing strategy for a leading telecommunications firm (MTN) in Ghana. The paper examines the
corporate social responsibility practices of…
Periods of crisis prompt investors to look out for means of making returns even in uncertain market conditions. Investors are using stocks selected on an environmental, social, and governance (ESG) basis to mitigate the unavoidable risks of investing…
Due to growing global competition, the mining industry has suffered significant share of losses and the mining industry in Ghana is no exception. Lean operations and maintenance is a widely accepted and adopted approach across many industries and…
The usage of digital marketing has significantly changed how firms, businesses, and marketers engage with their buyers. Digital platforms such as Facebook, Google, YouTube, Twitter, Instagram, and many others are utilized in an attempt to offer…
Mobile money service is a major retail financial service provided by telecommunication firms and formal banking institutions in many countries in Sub-Saharan Africa. The increased patronage of mobile money services demands that telecommunication…
Globally, banks are deploying reliant data protection technologies to secure business continuity. However, information security attackers leverage on employees seldom predisposition to compromise firms' assets. The study therefore examines…