Segui
Paul Danquah
Paul Danquah
IT Professional
Email verificata su itcouncil.net - Home page
Titolo
Citata da
Citata da
Anno
Action speaks louder than words-understanding cyber criminal behavior using criminological theories
F Wada, O Longe, P Danquah
The Journal of Internet Banking and Commerce 17 (1), 1-12, 2012
322012
An empirical test of the space transition theory of cyber criminality: The case of Ghana and beyond
P Danquah, OB Longe
African Journal of Computing & ICTs 4 (2), 37-48, 2011
322011
Cyber deception and theft: An ethnographic study on cyber criminality from a ghanaian perspective
P Danquah, OB Longe
Journal of Information Technology Impact 11 (3), 169-182, 2011
312011
Security operations center: a framework for automated triage, containment and escalation
P Danquah
Journal of Information Security 11 (4), 225-240, 2020
122020
Public key infrastructure: an enhanced validation framework
P Danquah, H Kwabena-Adade
Journal of Information Security 11 (4), 241-260, 2020
92020
Deindividuation, Anonymity and Unethical Behavior in Cyber Space – Explorations in the Valley of Digital Temptations
OLDUE Paul Danquah
COMPUTING AND INFORMATION SYSTEMS JOURNAL 16 (1), 46-55, 2012
7*2012
A novel cryptographic key technique
QADP Kester
Adaptive Science & Technology (ICAST), 2012 IEEE 4th International …, 2012
62012
A maximum entropy classification scheme for phishing detection using parsimonious features
EO Asani, A Omotosho, PA Danquah, JA Ayoola, PO Ayegba, OB Longe
TELKOMNIKA (Telecommunication Computing Electronics and Control) 19 (5 …, 2021
42021
Towards a theory for explaining socially-engineered cyber deception and theft
P Danquah, OB Longe, JD Lartey, PE Tobbin
Modern Theories and Practices for Cyber Ethics and Security Compliance, 44-58, 2020
42020
An Experimental Assessment of LiFi Data Communication
V Gordon, P Danquah
Ghana Journal of Science 61 (1), 73-87, 2020
32020
Just Another Harmless Click of the Mouse? An Empirical Evidence of Deviant Cyber Space Behaviour Using an Online Trap
P Danquah, F Totimeh
African Journal of Computing & ICT 5 (3), 2012
32012
Predicting cyber-attack using cyber situational awareness: the case of independent power producers (IPPs)
HM Akwetey, P Danquah
arXiv preprint arXiv:2202.01778, 2022
22022
INFORMATION SECURITY PRACTICES AND IT DISASTER RECOVERY READINESS: AN ASSESSMENT OF GHANAIAN GOVERNMENT MINISTRIES.
P Danquah, S Bekoe, F Prikutse
Information Technologist 16 (2), 2019
22019
Enhanced Security Assessment Method for USSD Based Mobile Applications
P Danquah, QA Kester
2019 International Conference on Computer, Data Science and Applications …, 2019
22019
Beyond E-Mail Headers: An Ethnography Based Model for Counteracting Socially Engineered Cyber Deception
P Danquah, OD Ogunsanwo, OB Longe
African Journal of Computing & ICT 6 (5), 9-26, 2013
22013
A Critical Assessment of Information Technology Disaster Recovery Strategies in Ghanaian Banks
ASBAC Danquah P.
Pentvars Journal 7 (No. 1,2 &3), 58-75, 2013
22013
Critical infrastructure cybersecurity challenges: Iot in perspective
HM Akwetey, P Danquah, I Asampana
arXiv preprint arXiv:2202.12970, 2022
12022
An empirical assessment of information security best practices and information technology disaster recovery readiness in Ghanaian micro-finance sector
P Danquah, S Bekoe, V Gordon
International Journal of Business Continuity and Risk Management 12 (1), 42-61, 2022
12022
Assessing the usefulness of the e-Agriculture programme in Ghana using the Technology Acceptance Model
S Bekoe, DA Ayoung, P Danquah
Ghana Journal of Agricultural Science 58 (2), 39-55, 2023
2023
Internet fraud: The influence of Identity Flexibility and Dissociative Anonymity
P Danquah, JA Kani, D Bibi
East African Journal of Information Technology 5 (1), 39-52, 2022
2022
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20