An empirical test of the space transition theory of cyber criminality: The case of Ghana and beyond P Danquah, OB Longe African Journal of Computing & ICTs 4 (2), 37-48, 2011 | 33 | 2011 |
Action speaks louder than words-understanding cyber criminal behavior using criminological theories F Wada, O Longe, P Danquah The Journal of Internet Banking and Commerce 17 (1), 1-12, 2012 | 32 | 2012 |
Cyber deception and theft: An ethnographic study on cyber criminality from a ghanaian perspective P Danquah, OB Longe Journal of Information Technology Impact 11 (3), 169-182, 2011 | 31 | 2011 |
Security operations center: a framework for automated triage, containment and escalation P Danquah Journal of Information Security 11 (4), 225-240, 2020 | 14 | 2020 |
Public key infrastructure: an enhanced validation framework P Danquah, H Kwabena-Adade Journal of Information Security 11 (4), 241-260, 2020 | 9 | 2020 |
Deindividuation, Anonymity and Unethical Behavior in Cyber Space – Explorations in the Valley of Digital Temptations OLDUE Paul Danquah COMPUTING AND INFORMATION SYSTEMS JOURNAL 16 (1), 46-55, 2012 | 7* | 2012 |
A novel cryptographic key technique QADP Kester Adaptive Science & Technology (ICAST), 2012 IEEE 4th International …, 2012 | 6 | 2012 |
A maximum entropy classification scheme for phishing detection using parsimonious features EO Asani, A Omotosho, PA Danquah, JA Ayoola, PO Ayegba, OB Longe TELKOMNIKA (Telecommunication Computing Electronics and Control) 19 (5 …, 2021 | 5 | 2021 |
Towards a theory for explaining socially-engineered cyber deception and theft P Danquah, OB Longe, JD Lartey, PE Tobbin Modern Theories and Practices for Cyber Ethics and Security Compliance, 44-58, 2020 | 4 | 2020 |
An Experimental Assessment of LiFi Data Communication V Gordon, P Danquah Ghana Journal of Science 61 (1), 73-87, 2020 | 3 | 2020 |
Just Another Harmless Click of the Mouse? An Empirical Evidence of Deviant Cyber Space Behaviour Using an Online Trap P Danquah, F Totimeh African Journal of Computing & ICT 5 (3), 2012 | 3 | 2012 |
Predicting cyber-attack using cyber situational awareness: the case of independent power producers (IPPs) HM Akwetey, P Danquah arXiv preprint arXiv:2202.01778, 2022 | 2 | 2022 |
INFORMATION SECURITY PRACTICES AND IT DISASTER RECOVERY READINESS: AN ASSESSMENT OF GHANAIAN GOVERNMENT MINISTRIES. P Danquah, S Bekoe, F Prikutse Information Technologist 16 (2), 2019 | 2 | 2019 |
Enhanced Security Assessment Method for USSD Based Mobile Applications P Danquah, QA Kester 2019 International Conference on Computer, Data Science and Applications …, 2019 | 2 | 2019 |
Beyond E-Mail Headers: An Ethnography Based Model for Counteracting Socially Engineered Cyber Deception P Danquah, OD Ogunsanwo, OB Longe African Journal of Computing & ICT 6 (5), 9-26, 2013 | 2 | 2013 |
A Critical Assessment of Information Technology Disaster Recovery Strategies in Ghanaian Banks ASBAC Danquah P. Pentvars Journal 7 (No. 1,2 &3), 58-75, 2013 | 2 | 2013 |
Critical infrastructure cybersecurity challenges: Iot in perspective HM Akwetey, P Danquah, I Asampana arXiv preprint arXiv:2202.12970, 2022 | 1 | 2022 |
An empirical assessment of information security best practices and information technology disaster recovery readiness in Ghanaian micro-finance sector P Danquah, S Bekoe, V Gordon International Journal of Business Continuity and Risk Management 12 (1), 42-61, 2022 | 1 | 2022 |
Edge Impulse vs TensorFlow: A Comparative Analysis of TinyML Platforms for Maize Leaf Disease Identification EAE Arthur, FA Wulnye, DAN Gookyi, KOBO Agyekum, P Danquah, ... 2024 Conference on Information Communications Technology and Society (ICTAS …, 2024 | | 2024 |
Assessing the usefulness of the e-Agriculture programme in Ghana using the Technology Acceptance Model S Bekoe, DA Ayoung, P Danquah Ghana Journal of Agricultural Science 58 (2), 39-55, 2023 | | 2023 |