Modern Technology Tools As A Panacea For Credible Elections In Developing Countries | | Researchjournali's Journal Of Information Technology | Apr,2015
Technology has significantly influenced all aspects of our existence. Modern technology has derived its power from the explosion area information science. Information and Communication Technology tools has done credibly well in all facet of endeavour. One of such areas is on the governance of citizenry. For people to choose leaders
The Integration Level Of Ict At The Hohoe Municipal Hospital In The Volta Region Of Ghana | | Researchjournali's Journal Of Information Technology | Feb,2015
The ultimate aim of this research was to investigate the integration level of ICT into healthcare delivery at the Hohoe Municipal Hospital in the Volta Region of Ghana. This research was carried out using 60 clinicians and 90 patients. The following key areas were looked at: available technological tools, the
The Development And Evaluation Of A Location-based Service Mobile Computing Application As A Tool For Enhancing Visitor Experiences And Census Research In A Game Reserve | | Researchjournali's Journal Of Information Technology | Feb,2015
Undertaking a census on rare and elusive wild animals is challenging and normally contains bias. Near real-time census data, for example, knowing where rhinos drink and sleep, would be of immense value as this would be the locations where a poacher will most likely find them during the day. Over
Information Needs, Sources Of Information And Challenges To The Use Of Icts In Developing Countries: An Implication For A Sustainable Green Economy | | Researchjournali's Journal Of Information Technology | Feb,2015
The study assessed the information needs of farmers, sources of information and ICTs challenges. Challenges such as lack of income, lack of ICT infrastructure, gender inequalities, lack of skills and education, lack of awareness of benefits and inappropriate policies and regulations were identified as affecting the use of ICTs for
Main Challenges Hampering Cloud Computing Adoption By Business Organizations | | Researchjournali's Journal Of Information Technology | Jan,2015
Cloud computing is a concept of IT models and services which offer ubiquitous, convenient on demand, network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction. This concept consists of various deployment models and
Five Tier Data Warehouse Architecture For South African Government | | Researchjournali's Journal Of Information Technology | Sep,2014
Due to ever demanding decisions that needs to be made right on time technologies that enhance decision making have evolved. These technologies have evolved to integrate heterogeneous information sources for analysis purposes. Transactional databases (Information sources) are progressively becoming autonomous and they change their content rapidly due to continuous transactions
Stimulating Ict Entrepreneurship In Ghana, The Long Way Forward | | Researchjournali's Journal Of Information Technology | Sep,2014
Information and Communication Technologies (ICTs) are credited with the potential to accelerate development in developing countries. ICT has thus become the strategic foundation for policy making in the twenty first century. This study therefore examines the extent of ICT entrepreneurship in Ghana by identifying the facilitating factors and challenges of
Patient Record Management Information System | | Researchjournali's Journal Of Information Technology | May,2014
There are some patient record management information systems (PRMISs) in existence, but they are not readily usable nor are their designs available for improvement. The main objective of this research was, therefore, to design and develop a PRMIS that would automate patient information management and give certain direct benefit, whilst
Breach Data Capture And Reporting Application | | Researchjournali's Journal Of Information Technology | May,2014
It is necessary to learn from past breach experiences to provide wisdom to implement apt security measures. There are some existing breach data capture and reporting systems, but their designs are not readily available for appreciation and improvement. The focus of this research is, therefore, to design and create a