Winfred Yaokumah

Orcid: 0000-0001-7756-1832

According to our database1, Winfred Yaokumah authored at least 29 papers between 2013 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Critical success factors of strategic information systems planning: a Delphi approach.
Kybernetes, 2023

Estimating Overhead Performance of Supervised Machine Learning Algorithms for Intrusion Detection.
Int. J. Inf. Technol. Syst. Approach, 2023

2022
The Use of Machine Learning Algorithms in the Classification of Sound: A Systematic Review.
Int. J. Serv. Sci. Manag. Eng. Technol., 2022

A Systematic Review of Fingerprint Recognition System Development.
Int. J. Softw. Sci. Comput. Intell., 2022

Design of Authenticated and Trusted Academic Certification Using Blockchain Technology.
Int. J. Softw. Innov., 2022

Evaluating the Impact of Cryptographic Algorithms on Network Performance.
Int. J. Cloud Appl. Comput., 2022

2021
Cyber-Identity Theft and Fintech Services.
J. Inf. Technol. Res., 2021

Development and Psychometric Analysis of Cyber Ethics Instrument (CEI).
Int. J. Technoethics, 2021

Scrambling Keypad for Secure Pin Entry to Defeat Shoulder Surfing and Inference Attacks.
Int. J. Secur. Priv. Pervasive Comput., 2021

EMIS Success Modeling Using Information Systems Quality Factors.
Int. J. Inf. Syst. Serv. Sect., 2021

Evaluation of Data Imbalance Algorithms on the Prediction of Credit Card Fraud.
Int. J. Intell. Inf. Technol., 2021

Modelling and Evaluation of Network Intrusion Detection Systems Using Machine Learning Techniques.
Int. J. Intell. Inf. Technol., 2021

Machine Learning Methods for Detecting Internet-of-Things (IoT) Malware.
Int. J. Cogn. Informatics Nat. Intell., 2021

2020
The role of norms in information security policy compliance.
Inf. Comput. Secur., 2020

Predicting and Explaining Cyber Ethics with Ethical Theories.
Int. J. Cyber Warf. Terror., 2020

2019
SETA and Security Behavior: Mediating Role of Employee Relations, Monitoring, and Accountability.
J. Glob. Inf. Manag., 2019

A conceptual model and empirical assessment of HR security risk management.
Inf. Comput. Secur., 2019

Investigating students' intentions to use ICT: A comparison of theoretical models.
Educ. Inf. Technol., 2019

2018
Inter-Organizational Study of Access Control Security Measures.
Int. J. Technol. Hum. Interact., 2018

Identifying HRM Practices for Improving Information Security Performance: An Importance-Performance Map Analysis.
Int. J. Hum. Cap. Inf. Technol. Prof., 2018

2017
Modelling the Impact of Administrative Access Controls on Technical Access Control Measures.
Inf. Resour. Manag. J., 2017

Examining the Contributing Factors for Cloud Computing Adoption in a Developing Country.
Int. J. Enterp. Inf. Syst., 2017

Demographic Influences on E-Payment Services.
Int. J. E Bus. Res., 2017

2016
Towards Modelling the Impact of Security Policy on Compliance.
J. Inf. Technol. Res., 2016

Investigation into the State-of-Practice of Operations Security Management Based on ISO/IEC 27002.
Int. J. Technol. Diffusion, 2016

The Influence of Students' Characteristics on Mobile Device Security Measures.
Int. J. Inf. Syst. Soc. Chang., 2016

2015
Information Technology Governance Barriers, Drivers, IT/Business Alignment, and Maturity in Ghanaian Universities.
Int. J. Inf. Syst. Serv. Sect., 2015

2014
Information security governance implementation within Ghanaian industry sectors: An empirical study.
Inf. Manag. Comput. Secur., 2014

2013
Evaluating the Effectiveness of Information Security Governance Practices in Developing Nations: A Case of Ghana.
Int. J. IT Bus. Alignment Gov., 2013


  Loading...