Personal information

Activities

Works (50 of 62)

Items per page:
Page 1 of 2

Exploring the Application of Generative AI in Human Resource Management

2024-07-26 | Book chapter
Contributors: Peace Kumah; Ivonne Kuma Nketia; Winfred Yaokumah; Kwame Okwabi Asante-Offei
Source: check_circle
Crossref

A Comprehensive Review of Internet-of-Things (IoT) Botnet Detection Techniques

2024-06-30 | Book chapter
Contributors: Ivonne Kuma Nketia; Winfred Yaokumah; Justice Kwame Appati
Source: check_circle
Crossref

Determinants of Continual Use of Mobile Banking Applications

2024-02-07 | Book chapter
Contributors: Ibrahim Issahaku; Eric Kuada; Peace Kumah; Winfred Yaokumah
Source: check_circle
Crossref

Deep Residual Variational Autoencoder for Image Super-Resolution

2023 | Book chapter
Contributors: Justice Kwame Appati; Pius Gyamenah; Ebenezer Owusu; Winfred Yaokumah
Source: check_circle
Crossref

Measuring Throughput and Latency of Machine Learning Techniques for Intrusion Detection

2023-11-27 | Book chapter
Contributors: Winfred Yaokumah; Charity Y. M. Baidoo; Ebenezer Owusu
Source: check_circle
Crossref

Profile Clone Detection on Online Social Network Platforms

2023-11-09 | Book chapter
Contributors: Anthony Doe Eklah; Winfred Yaokumah; Justice Kwame Appati
Source: check_circle
Crossref

Supervised Machine Learning Methods for Cyber Threat Detection Using Genetic Algorithm

2023-09-15 | Book chapter
Contributors: Daniel K. Gasu; Winfred Yaokumah; Justice Kwame Appati
Source: check_circle
Crossref

Critical success factors of strategic information systems planning: a Delphi approach

Kybernetes
2023-05-19 | Journal article
Contributors: Winfred Yaokumah; Boasiako B. Omane-Antwi; Kwame Okwabi Asante-Offei
Source: check_circle
Crossref

Estimating Overhead Performance of Supervised Machine Learning Algorithms for Intrusion Detection

International Journal of Information Technologies and Systems Approach
2023-02-03 | Journal article
Contributors: Charity Yaa Mansa Baidoo; Winfred Yaokumah; Ebenezer Owusu
Source: check_circle
Crossref

Conceptualizing the Domain and an Empirical Analysis of Operations Security Management

2022 | Book chapter
Contributors: Winfred Yaokumah
Source: check_circle
Crossref

Cyber Security Competency Model Based on Learning Theories and Learning Continuum Hierarchy

2022 | Book chapter
Contributors: Winfred Yaokumah
Source: check_circle
Crossref

Cyber Security Competency Model Based on Learning Theories and Learning Continuum Hierarchy

2022 | Book chapter
Contributors: Winfred Yaokumah
Source: check_circle
Crossref

Facial Based Age Estimation Among Dark Skinned Hominid Species

2022 | Book chapter
Contributors: Berlinda Asiedu; Justice Kwame Appati; Winfred Yaokumah
Source: check_circle
Crossref

Gender Differences in Preferences and Proclivities for ICT Tools and Online Services

2022 | Book chapter
Contributors: Winfred Yaokumah; Fred Totimeh; Peace Kumah
Source: check_circle
Crossref

Identifying HRM Practices for Improving Information Security Performance

2022 | Book chapter
Contributors: Peace Kumah; Winfred Yaokumah; Charles Buabeng-Andoh
Source: check_circle
Crossref

Identifying HRM Practices for Improving Information Security Performance

2022 | Book chapter
Contributors: Peace Kumah; Winfred Yaokumah; Charles Buabeng-Andoh
Source: check_circle
Crossref

Network and Data Transfer Security Management in Higher Educational Institutions

2022 | Book chapter
Contributors: Winfred Yaokumah; Alex Ansah Dawson
Source: check_circle
Crossref

Primary Mobile Image Analysis of Human Intestinal Worm Detection

International Journal of System Dynamics Applications
2022-11-03 | Journal article
Contributors: Justice Kwame Appati; Winfred Yaokumah; Ebenezer Owusu; Paul Nii Tackie Ammah
Source: check_circle
Crossref

Evaluating the Impact of Cryptographic Algorithms on Network Performance

International Journal of Cloud Applications and Computing
2022-09-30 | Journal article
Contributors: Samuel Asare; Winfred Yaokumah; Ernest Barfo Boadi Gyebi; Jamal-Deen Abdulai
Source: check_circle
Crossref

Design of Authenticated and Trusted Academic Certification Using Blockchain Technology

International Journal of Software Innovation
2022-06-27 | Journal article
Contributors: Joseph Ofori-Mensah; Winfred Yaokumah; Ebenezer Agyemang Sakyi
Source: check_circle
Crossref

A Systematic Review of Fingerprint Recognition System Development

International Journal of Software Science and Computational Intelligence
2022-05-20 | Journal article
Contributors: Justice Kwame Appati; Prince Kofi Nartey; Winfred Yaokumah; Jamal-Deen Abdulai
Source: check_circle
Crossref

The Use of Machine Learning Algorithms in the Classification of Sound

International Journal of Service Science, Management, Engineering, and Technology
2022-04-08 | Journal article
Contributors: Akon O. Ekpezu; Ferdinand Katsriku; Winfred Yaokumah; Isaac Wiafe
Source: check_circle
Crossref

Evaluation of Data Imbalance Algorithms on the Prediction of Credit Card Fraud

International Journal of Intelligent Information Technologies
2021-10-22 | Journal article
Contributors: Godlove Otoo; Justice Kwame Appati; Winfred Yaokumah; Michael Agbo Tettey Soli; Stephane Jnr Nwolley; Julius Yaw Ludu
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

Modelling and Evaluation of Network Intrusion Detection Systems Using Machine Learning Techniques

International Journal of Intelligent Information Technologies
2021-10-22 | Journal article
Contributors: Richard Nunoo Clottey; Winfred Yaokumah; Justice Kwame Appati
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

Machine Learning Methods for Detecting Internet-of-Things (IoT) Malware

International Journal of Cognitive Informatics and Natural Intelligence
2021-10-01 | Journal article
Contributors: Winfred Yaokumah; Justice Kwame Appati; Daniel Kumah
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

Scrambling Keypad for Secure Pin Entry to Defeat Shoulder Surfing and Inference Attacks

International Journal of Security and Privacy in Pervasive Computing
2021-07 | Journal article
Contributors: Samuel Selassie Yakohene; Winfred Yaokumah; Ernest Barfo Boadi Gyebi
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

Cyber-Identity Theft and Fintech Services

Journal of Information Technology Research
2021-07-01 | Journal article
Contributors: Kwame Okwabi Asante-Offei; Winfred Yaokumah
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

EMIS Success Modeling Using Information Systems Quality Factors

International Journal of Information Systems in the Service Sector
2021-07-01 | Journal article
Contributors: Lily Asiedu Danso; Joseph Kwame Adjei; Winfred Yaokumah
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

Development and Psychometric Analysis of Cyber Ethics Instrument (CEI)

International Journal of Technoethics
2021-01-01 | Journal article | Author
Part of ISSN: 1947-3451
Contributors: Winfred Yaokumah
Source: check_circle
IGI Global
grade
Preferred source (of 2)‎

Network Intrusion Detection in Internet of Things (IoT)

International Journal of Smart Security Technologies
2021-01-01 | Journal article | Author
Part of ISSN: 2640-4079
Contributors: Winfred Yaokumah; Richard N. Clottey; Prof. Justice Kwame Appati
Source: check_circle
IGI Global
grade
Preferred source (of 2)‎

Exploring the Impact of Security Policy on Compliance

2020-11-27 | Book chapter
Contributors: Winfred Yaokumah; Peace Kumah
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

Students' Intentions on Cyber Ethics Issues

Modern Theories and Practices for Cyber Ethics and Security Compliance
2020-04-10 | Book chapter | Author
Part of ISBN: 9781799831495
Contributors: Isaac Wiafe; Winfred Yaokumah; Felicia A. Kissi
Source: check_circle
IGI Global
grade
Preferred source (of 2)‎

Taxonomy of Cyber Threats to Application Security and Applicable Defenses

Modern Theories and Practices for Cyber Ethics and Security Compliance
2020-04-10 | Book chapter | Author
Part of ISBN: 9781799831495
Contributors: Winfred Yaokumah; Ferdinard Katsriku; Jamal-Deen Abdulai; Kwame O. Asante-Offei
Source: check_circle
IGI Global
grade
Preferred source (of 2)‎

Predicting and Explaining Cyber Ethics with Ethical Theories

International Journal of Cyber Warfare and Terrorism
2020-04-01 | Journal article | Author
Part of ISSN: 1947-3435
Contributors: Winfred Yaokumah
Source: check_circle
IGI Global
grade
Preferred source (of 2)‎

Analysis of Machine Learning Techniques for Anomaly-Based Intrusion Detection

International Journal of Distributed Artificial Intelligence
2020-01-01 | Journal article | Author
Part of ISSN: 2637-7888
Contributors: Winfred Yaokumah; Isaac Wiafe
Source: check_circle
IGI Global
grade
Preferred source (of 2)‎

Integrated Financial Management Information System Project Implementation in Ghana Government Ministries

International Journal of Information Technology Project Management
2020-01-01 | Journal article | Author
Part of ISSN: 1938-0232
Contributors: Winfred Yaokumah; Emelia Biney
Source: check_circle
IGI Global
grade
Preferred source (of 2)‎

A conceptual model and empirical assessment of HR security risk management

Information and Computer Security
2019 | Journal article
EID:

2-s2.0-85067071350

Contributors: Kumah, P.; Yaokumah, W.; Okai, E.S.A.
Source: Self-asserted source
Winfred Yaokumah via Scopus - Elsevier

Demographic Influences on E-Payment Services

2019 | Book chapter
Contributors: Winfred Yaokumah; Peace Kumah; Eric Saviour Aryee Okai
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

Examining the Contributing Factors for Cloud Computing Adoption in a Developing Country

2019 | Book chapter
Contributors: Winfred Yaokumah; Rebecca Adwoa Amponsah
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

Investigating students’ intentions to use ICT: A comparison of theoretical models

Education and Information Technologies
2019 | Journal article
EID:

2-s2.0-85052660951

Contributors: Buabeng-Andoh, C.; Yaokumah, W.; Tarhini, A.
Source: Self-asserted source
Winfred Yaokumah via Scopus - Elsevier

SETA and security behavior: Mediating role of employee relations, monitoring, and accountability

Journal of Global Information Management
2019 | Journal article
EID:

2-s2.0-85063957955

Contributors: Yaokumah, W.; Walker, D.O.; Kumah, P.
Source: Self-asserted source
Winfred Yaokumah via Scopus - Elsevier
grade
Preferred source (of 2)‎

Network and Data Transfer Security Management in Higher Educational Institutions

Network Security and Its Impact on Business Strategy
2019-02-15 | Book chapter | Author
Part of ISBN: 9781522584551
Contributors: Winfred Yaokumah; Alex Ansah Dawson
Source: check_circle
IGI Global
grade
Preferred source (of 2)‎

Demographic influences on E-payment services

Gender and Diversity: Concepts, Methodologies, Tools, and Applications
2018 | Book
EID:

2-s2.0-85059732687

Contributors: Yaokumah, W.; Kumah, P.; Okai, E.S.A.
Source: Self-asserted source
Winfred Yaokumah via Scopus - Elsevier

Identifying HRM practices for improving information security performance: An importance-performance map analysis

International Journal of Human Capital and Information Technology Professionals
2018 | Journal article
EID:

2-s2.0-85052672206

Contributors: Kumah, P.; Yaokumah, W.; Buabeng-Andoh, C.
Source: Self-asserted source
Winfred Yaokumah via Scopus - Elsevier
grade
Preferred source (of 3)‎

Inter-organizational study of access control security measures

International Journal of Technology and Human Interaction
2018 | Journal article
EID:

2-s2.0-85033407121

Contributors: Yaokumah, W.; Okai, E.S.A.
Source: Self-asserted source
Winfred Yaokumah via Scopus - Elsevier
grade
Preferred source (of 3)‎

Gender Differences in Preferences and Proclivities for ICT Tools and Online Services

Gender Gaps and the Social Inclusion Movement in ICT
2018-12-14 | Book chapter | Author
Part of ISBN: 9781522570684
Contributors: Winfred Yaokumah; Fred Totimeh; Peace Kumah
Source: check_circle
IGI Global
grade
Preferred source (of 2)‎

Cyber Security Competency Model Based on Learning Theories and Learning Continuum Hierarchy

Global Cyber Security Labor Shortage and International Business Risk
2018-10-05 | Book chapter | Author
Part of ISBN: 9781522559276
Contributors: Winfred Yaokumah
Source: check_circle
IGI Global
grade
Preferred source (of 2)‎

Conceptualizing the Domain and an Empirical Analysis of Operations Security Management

Handbook of Research on Technology Integration in the Global World
2018-07-27 | Book chapter | Author
Part of ISBN: 9781522563679
Contributors: Winfred Yaokumah
Source: check_circle
IGI Global
grade
Preferred source (of 2)‎

Exploring the Impact of Security Policy on Compliance

Global Implications of Emerging Technology Trends
2018-01-05 | Book chapter | Author
Part of ISBN: 9781522549444
Contributors: Winfred Yaokumah; Peace Kumah
Source: check_circle
IGI Global
grade
Preferred source (of 2)‎

Demographic influences on E-payment services

International Journal of e-Business Research
2017 | Journal article
EID:

2-s2.0-84993995652

Contributors: Yaokumah, W.; Kumah, P.; Okai, E.S.A.
Source: Self-asserted source
Winfred Yaokumah via Scopus - Elsevier
grade
Preferred source (of 3)‎
Items per page:
Page 1 of 2

Peer review (38 reviews for 4 publications/grants)

Review activity for IGI Global Book Chapter Peer Reviews (3)
Review activity for International journal of human capital and information technology professionals. (6)
Review activity for International journal of technology diffusion. (28)
Review activity for Kybernetes. (1)