eduglopedia.org

Summary

This a rigorous 2-year programme which equips participants with the know-how in aligning information and communication technology tools with business processes to solve contemporary challenges. Courses taught include Systems Analysis and Design, Electronic Business, Management Informatics, Decision Analysis, Contemporary Application Development, Database Systems, and Legal and Social Implications of Informatics among others. In the second year, in addition to courses in Management Information Systems and other areas, students also write a two-semester long essay under supervision. The MBA programme is also available during the weekend for busy workers who cannot enrol for the regular MBA programme. It is structured the same way as the regular MBA programme however lectures are on Fridays from 6:00pm – 9:00pm and Saturdays from 7:30am – 8:30pm. 

Admission Requirements
The requirement is a good first degree (at least a Second Class Lower) from a recognised university with at least three (3) years relevant work experience. There is one admission in August every year. An entrance examination or interview may be conducted.

Highlights

  • MBA, Regular and Week End, Ghana
Schedule Part-time and full-time
Duration 2 Years
Scholarships available No

Courses

Lecture
 

This course provides the student with a practical approach to systems analysis and design using a blend of traditional developments and current technologies. The course deals with fundamental concepts and issues essential to an analysis and understanding of the information requirements problem of enterprises for application systems development.

 

 

 318
Lecture

This course aims at exposing students to the ethical, social, and political issues raised by using information systems in organisations and society. It will explore the principles which guide decisions about ethical dilemmas and challenges to protection of individual privacy, intellectual property, data protection, and computer usage.

 265
Lecture

the expertise of addressing the complex issues that lie at the intersection of business and technology. Students will be trained to lead their future organisations in developing and executing technology strategies and managing the change associated with technology adoption. Second, the course will explore the theoretical concepts and practical aspects of knowledge and organisational learning in organisations. Technology leadership is primarily supported by strategies to manage knowledge in organisations

 380
Lecture

The course will provide a comprehensive understanding of the strategic value of information technology to the organisation, and the strategic use of information technology to provide competitive advantage to an enterprise. The students will be introduced to strategic information systems planning and how the implications new technologies have on their employees and the organisation as a whole. Through real-world case studies, they will evaluate the internal (e.g., processes, political and organisational culture) and external (e.g., laws, global concerns, and cultural issues) environments that organisations compete in and plan accordingly. 

 268
Lecture

This course will introduce the process for the management of information security, and creating a solid enterprise-wide information security policy and practice. This course will provide students the managerial-level understanding of information security and practice. Readings, demos, lectures, case studies and real world events will be discussed with the intent of bridging theory with practice, law and ethics. The case studies will also offer the opportunity to evaluate the socio-cultural and socio-technical challenges of managing internet security in developing economies and in transnational transactions. The course topics includes: introduction to information security and architecture, network and distributed systems security, web security, network threats, vulnerabilities and risks, encryption and virtual private network, e-mails security, web services security, risk on internet, database security, wireless security, detection of the attack, incident response, and security improvement.

 

 

Additional topics covered include an overview of computer crimes, types of security breaches (computer and human), information warfare, mobile phone security, cyber terrorism and protection of critical infrastructures. The student will have an in-depth understanding of the steps required to build and maintain an information security department, and the depth of technical understanding to be able to communicate effectively with information security teams.

 285
Lecture

The course is intended to provide students with a practical hands-on experience in developing software for real-life requirements problem. Students will therefore be introduced to software-development techniques used to create medium-scale interactive application systems. The focus will be on the use of object-oriented and procedural software engineering methodologies in data definition and measurement, abstract data type construction and use in developing screen editors, reports and other IS applications using data structure including indexed files, and use of libraries to create well-designed graphical user interfaces.

 268
Lecture

The course aims to develop a critical appreciation of research work in Information Systems and of the methodologies employed in that research. It would also provide the skills appropriate to the successful design and conduct of an applied research project on a relevant Information Systems topic.

 

 

Topics to be treated include: The research process; study of methodologies appropriate to the conduct of research in various aspects of information systems; inquiry into emerging issues in information systems; information systems research frameworks; the appropriate use of statistical data analysis in information systems research projects; qualitative and quantitative research in information systems; the design of information systems research proposals; and the use of research software tools. The student will engage in a mini-research project to obtain a first-hand experience in applying the theories and methods taught in the course.

 301
Lecture

The course will explore the role of the Internet and related technologies in sharing business information, conducting transactions and maintaining relationships. It provides an understanding of how electronic business has affected all aspects of the corporate world.

 

This course consists of two components: a theoretical component to provide a conceptual basis for electronic commerce applications, and experiential learning through case study of e-business adoption and usage in firms in both developing and developed economies. The students will learn the tools and techniques to analyse, design, implement and manage the use of electronic commerce between businesses, consumers and government. The students will develop an understanding of the roles of people, infrastructure, business processes and technologies to develop successful electronic e-business applications and how e-business can accommodate the increased rate of change created by social, economic, political and technical developments. 

 

 

Topics to be discussed include electronic business models, Internet marketing, marketing on the web, e-commerce hardware and software, Web 2.0, social networking and virtual communities, payment systems for electronic commerce  and  the environment of electronic commerce: legal, ethical, and tax issues.

 255
Lecture

The course addresses data needs of functions such as marketing, finance, and production.

Students will be equipped with advanced skills needed to design, develop and use database, data warehousing and data mining systems for effective decision support.  Topics to be covered include: data integration, data quality, data schemes, data and system security, privacy-enhancing technologies and digital asset protection.

 

This course provides students with the key concepts and tools to turn raw data into information and knowledge repositories useful for business intelligence. The course will explore how to use statistical and modern data mining techniques in studying interrelationships between technology and health, education and governance. Problems considered will include such standard marketing research activities as customer segmentation and customer preference as well as more recent issues in measuring service quality, evaluating health data and citizen perspectives on governance and policy issues.

 

 

Students will also be equipped with skills to use Microsoft Excel and SPSS applications alongside the theoretical concepts to solve real-world case scenarios. 

 229

Ratings

Overall ratings for Master of Business Administration
 
Comments
 
Feedback