Pentecost University College
Accra, Ghana

The Pentecost University College is a private university located at Sowutuom in the Greater Accra Region of Ghana. It is one of the new universities in Ghana and was granted accreditation by the National Accreditation Board in 1994. It was established in March 2003 by the Church of Pentecost in Ghana. The chairman of the Church of Pentecost is also the Chancellor of the university. Wikipedia.

Time filter
Source Type

Yaokumah W.,Pentecost University College | Kumah P.,Ghana Education Service | Okai E.S.A.,Pentecost University College
International Journal of e-Business Research | Year: 2017

This study investigated customers' preferences of payment systems and the influence of demography on the attitude of customers towards e-payment services. Survey responses were received from 558 bank customers. The t-test and the analysis of variance were employed to examine the differences in perception of security, ICT literacy, customer satisfaction, and the use of e-payment services based on customers' age, gender, and the level of education. The findings revealed no significant differences between the male and female customers in the use of e-payment services. However, the male customers had higher ICT skills, yet perceived e-payment services less secured. Moreover, there were no significant differences in satisfaction and e-payment use, though, customers with higher level of education felt less secured using the services. Also, whereas the older customers were more satisfied with e-payment services, the younger customers had more ICT skills and use the services much more. These findings are necessary for formulating strategies for marketing e-payment services. © 2017 IGI Global.

Kester Q.-A.,Ghana Technology University College | Danquah P.,Pentecost University College
Proceedings of the 2012 IEEE 4th International Conference on Adaptive Science and Technology, ICAST 2012 | Year: 2012

This paper sets out to contribute to the general body of knowledge in the area of cryptography application and to support classification of secret information by developing a cipher algorithm to produce the ciphertext and also to decrypt ciphertext The algorithm ultimately makes it possible for the public keys to serve as a key for encryption and decryption as well as for authentication. © 2012 IEEE.

Buabeng-Andoh C.,Pentecost University College
International Journal of Information and Communication Technology Education | Year: 2015

The purpose of this study was to investigate students' pedagogical use of Information and Communication Technology (ICT) and the soft and hard factors that influence their use. The participants were 3380 randomly selected students from 24 public and private schools. A quantitative method was used in this study with Likert five-point scale questionnaires to collect data. The study revealed that students' pedagogical use of ICT was low. Most students reported that they were competent in the use of smart phones for educational purposes. The study found that soft and hard factors are interrelated and play a crucial part in students' pedagogical use of ICT. It was interesting to note that ICT competence, access to computers, and the programs students were enrolled in had impact on the results. Copyright © 2015, IGI Global.

Yaokumah W.,Pentecost University College | Brown S.,University of Business and Technology
Proceedings - 2014 Annual Global Online Conference on Information and Computer Technology, GOCICT 2014 | Year: 2014

This paper aimed at determining the extent to which information security governance (ISG) focus areas impact risk management. A total of 81 valid questionnaires were collected and processed using multiple linear regression and frequency analyses. The results showed that 92.7% of the variances in risk management were explained by the resource management, information security and business strategic alignment, value delivery, and performance measurement. Resource management and strategic alignment made significant positive contribution to risk management. Among the most applied attributes within the ISG focus areas, the organizations appreciably implemented policies that address risk management and non-compliance to security risk. However, risk assessment was not frequently and exhaustively performed and security personnel were not adequately trained. The study contributed to the literature by empirically determining the impact of ISG focus areas on risk management, provided organizational leaders better understanding of ISG focus areas, and suggested improvement to ISG practices. © 2014 IEEE.

Yaokumah W.,Pentecost University College | Brown S.,University of Business and Technology | Dawson A.A.,Ghana Institute of Management and Public Administration
Journal of Information Technology Research | Year: 2016

This study develops a model, based on the controls present in ISO/IEC 27002 framework, to integrate the role of technical and administrative security controls. The model provides better understanding of how security policy can influence security compliance and the pathway through which this effect is generated. Data were collected from 223 IT security and management professionals. Using Partial Least Square Structural Equation Modelling (PLS-SEM) and testing hypotheses, the study finds that information security policy has significant indirect influence on information security compliance. The effect of security policy is fully mediated by security roles and responsibilities, operations security activities, and security monitoring and review activities. Security policy strongly influences operations security activities and has the greatest effect on security roles and responsibilities. Among the three mediating variables, monitoring and reviews has the most significant influence on security compliance. Conversely, the impact of security policy on compliance is not significant. Copyright © 2016, IGI Global.

Yaokumah W.,Pentecost University College | Brown S.,University of Business and Technology | Adjei P.O.-M.,Pentecost University College
International Journal of Information Systems in the Service Sector | Year: 2015

The purpose of this preliminary study was to determine the status of IT governance in universities in a developing country, Ghana, by assessing the drivers and barriers to pursuing formal ITG, measuring the extent to which universities align IT goals with academic and business objectives and determining ITG maturity level. Using a survey questionnaire and applying frequency analysis and T-test of independent samples, the results showed that 60.6% of the institutions surveyed were at the non-existent and initial stages of IT governance while only 6% were at the managed and optimized stages. The study also found that the factors contributing towards the drivers for formal IT governance include cost reduction and increased effciencies, and promoting an institution-wide view of IT. However, the barriers were also identifed which included lack of participation, inadequate funding, and top-down leadership-driven institutional culture. Universities can use these fndings to improve formal IT governance practices and to benchmark future performance. Copyright © 2015, IGI Global.

Buabeng-Andoh C.,Pentecost University College
International Journal of Information and Learning Technology | Year: 2015

Purpose – The purpose of this paper is to investigate secondary school teachers’ perspectives on ICT usage in secondary schools in Ghana. Design/methodology/approach – A total of 376 teachers from 24 public and private schools from four regions in Ghana participated in this study. Survey and focus group interviews were used for data collection. Descriptive statistics and independent sample t-tests were used to analyze the findings. Findings – The result indicated that teachers’ perceived ICT usage, perceived access to ICT, perceived ICT training and perceived ICT competence were low. Furthermore, the analysis showed that male teachers’ perceived confidence in the use of ICT was higher than female teachers. On the other hand, the perceived administrative support for female teachers was more than that for male teachers. Finally, this study discovered that there was no significant difference in public and private school teachers’ access to ICT, administrative support, self-efficacy, competencies and training. Originality/value – This contributes to the literature on the perceptions and use of teachers’ ICT in secondary schools. The results provide insights into factors that teachers perceived as obstacles to integration of ICT into their teaching, particularly in developing nations. The study shows that teachers’ perceived ICT competencies and ICT training do not depend on the type of school the teacher is employed to teacher. © 2015, Emerald Group Publishing Limited.

Pentecost University College | Entity website

Pentecost University College | Entity website

International Student Office International Student Office Welcome to the ISO The office is established to provide care and support for its partners who bring a variety and richness to the Universitys culture which enhances PUCs image in the local and global higher educational terrain.The office also promotes and coordinates all University external relations, staff and student exchange programmes and international students welfare among others ...

Pentecost University College | Entity website

Sessions/Schools At Pentecost University College, students find flexibility and convenience in a dynamic learning environment. Lessons are arranged in sessions (we call schools) to fit around your life ...

Loading Pentecost University College collaborators
Loading Pentecost University College collaborators