Entity

Time filter

Source Type


Asunka S.,Ghana Technology University College
International Journal of Web-Based Learning and Teaching Technologies | Year: 2012

This study adopted a participatory action research (PAR) approach to identify and address the various cultural factors that contribute in hindering faculty adoption and use of a Learning Management System (LMS) for online collaborative learning (OCL) at a private university in Ghana. This followed a realization that an LMS that the university deployed for OCL purposes, and had been available for over five years, remained largely unused by faculty members despite that they have been trained, motivated and appropriately resourced to do so. With a preliminary investigation revealing the possible role of cultural factors, this study drew on some aspects of Hofstede's cultural dimensions theory to develop and conceptualize a research framework, and subsequently engaged 10 faculty members in a semester-long action study. Findings show that by collectively identifying the cultural underpinnings, and conscientiously working on them, faculty members can ultimately change their attitudes (as well as those of their other colleagues) significantly, and be better predisposed to using online collaborative tools and resources for OCL. Copyright © 2012, IGI Global. Source


Anto S.K.,Ghana Technology University College
International Journal of Applied Linguistics and English Literature | Year: 2014

The task of this study is primarily to investigate the differences between English and Mo/Deg nominal group (NG) qualifiers to identify any similarities within the NG qualification structures of these languages. In otherwise, the study finds answers to the questions: “What are the qualifying elements within the Mo/Deg and English NGs?” and “What are the differences and similarities between the Mo/Deg NG qualification and that of English?” Using homogeneous sampling, the study purposefully sampled thirty (30) educated Mos/Dega (speakers of the Mo/Deg language). Short simple English sentences containing NG qualifiers designed by the researcher were given to them to translate into Mo/Deg. This was to see how the qualifiers are used in the language. Also, some of these sentences were given to some members of the staff of the Mo/Deg project of GILLBT to translate into Mo/Deg for further correct use of the qualifiers in the Mo/Deg language. The translated versions were then collected as data and analysed based on the Systemic Grammar principles of the NG structure. The results showed that the adjectival groups (AdjG), the clause, the numerals, and the determiners (pre-central, central, and post-central) occur at the qualifier position in Mo/Deg, whereas in English, it is the prepositional groups (PG), the adjectival groups (AdjG) (under some conditions), and the clause, which occupy the qualifier slot. However, it was also found out that the common linguistic units which occur in both languages as qualifiers are the adjectival groups and the clause. © Australian International Academic Centre, Australia. Source


Ameme B.K.,Ghana Technology University College
Journal of Internet Banking and Commerce | Year: 2015

Whilst most banks introduced internet banking services for the benefit of their customers, the adoption and use of the service had been very low. Strategies to increase the adoption and use of internet banking services eventually lead to the banks’ goal of maximizing profit. It is therefore essential for banks to understand the factors that affect the adoption of internet banking services. The purpose of this paper is to determine demographic factors that influence the adoption of internet banking services in a bid to improving the situation. Due to the limitations in accessing the population of developing economies, a sample of one bank was selected from a developing nation, Ghana. Ghana was strategically chosen due to the high internet penetration rate. Out of 506,203 customers of the chosen bank, only 32,337 customers who subscribed to the internet banking services were used for data analysis. 31, 886 representing 98.61% of internet banking customers were resident in Ghana whilst the remaining 451 representing 1.39% were non-residents, suggesting that the data for analysis represented the behavior of Ghanaians as citizens of developing economies, though the restriction to just one bank may limit the generalization of the findings. Chi-square techniques were employed in the study, using historical data of over eight years. The findings of the study revealed that demographic factors such as gender do not have significant effect on customers in adopting and using internet banking services. The study further concluded that there is a strong correlation between employment status, educational level and customer adoption and usage of internet banking services in Ghana. These findings will help banks to develop appropriate strategies in attracting and retaining their customers, through the design of specific marketing campaigns geared towards certain category of internet banking customers who are likely to adopt and use internet banking services. © 2015 Ameme BK. Source


Kester Q.-A.,Ghana Technology University College | Danquah P.,Pentecost University College
Proceedings of the 2012 IEEE 4th International Conference on Adaptive Science and Technology, ICAST 2012 | Year: 2012

This paper sets out to contribute to the general body of knowledge in the area of cryptography application and to support classification of secret information by developing a cipher algorithm to produce the ciphertext and also to decrypt ciphertext The algorithm ultimately makes it possible for the public keys to serve as a key for encryption and decryption as well as for authentication. © 2012 IEEE. Source


Kester Q.-A.,Ghana Technology University College
Proceedings of the 2012 IEEE 4th International Conference on Adaptive Science and Technology, ICAST 2012 | Year: 2012

Cryptography provides the platform and concepts for which cryptosystems are being developed. Pubkc Key Cryptosystems assure privacy as well as integrity of the transactions between two parties. This paper proposes a new system of Public-Key Exchange by using matrix and a scahr to achieve the shared secrete key. The algorithm used was proven using a mathematical example. © 2012 IEEE. Source

Discover hidden collaborations