Dr Paul Asante Danquah has over 18 years’ experience in the field of Information Technology with specialization in Information Security.

He holds a BSc in Computing, MSc in Information Security and a PhD in IT (Specialized in Cybercrime) from the University of Greenwich, UK, Anglia Ruskin University, UK and Open University Malaysia respectively.

Dr. Paul Danquah has worked in various capacities over the years; these range from Programmer with Soft Company Limted(now Soft Tribe), Network Engineer at Africa Online Ghana and Net Africa Ghana Limited(now Discoverytel Ltd), IT Manager at Ghana Institute of Management and Public Administration(GIMPA), Deputy Director of IT at University of Professional Studies Accra(UPSA) and Lecturer at various Universities in Ghana. Dr. Paul Danquah is founder and currently the Technical Director of IT Council Limited.

He has various industry certifications which include Certified Ethical Hacker(CEH), Data Center Infrastructure Expert(DCIE), Cisco Certified Network Professional (CCNP) and Microsoft Certified Systems Engineer(MCSE). He loves to solve problems, research, lecture and train.


1. Danquah, P. (2017), Towards an Information Technology Based Supply Chain Management System for Ghanaian Oil Marketing Companies, Pentvars Business Journal Vol. 11 No.2 July to Dec 2017. pp. 70 -82,
2. Danquah, P. (2017), Countering Cyber Trespass; A proposed Framework, Advances in Multidisciplinary & Scientific (AIMS) Research Journal, Vol 3 No. 3, September 2017, pp41-50
3. Agblewornu V. & Danquah P, New Dimensions of Intelligent Authentication Systems, International Journal of Business Innovation and Technology (IJBIT), Volume 2, No. 1, July 2015, pp.1-14
4. Danquah P. , Aryeetey S. & Buabeng-Andoh C.(2013), A Critical Assessment of Information Technology Disaster Recovery Strategies in Ghanaian Banks – Pentvars Journal – January -September, 2013. Vol. 7 No. 1,2 &3 pp. 58-75
5. Danquah P., Longe O. & Totimeh F. (2012), Just another Harmless Click of the Mouse-An Empirical Evidence of Deviant Cyber Space Behaviour Using an Online Trap, African Journal of Computing and ICT, Vol 5 No3 May 2012, pp. 49-56.
6. Longe O.B., Danquah P. & Ebem D.U. (2012), De-Individuation, Anonymity and Unethical Behaviour in Cyberspace – Explorations in the Valley of Digital Temptations, Computing Information Systems Journal, Vol. 16, Issue 1, pp.46-55
7. Wada F., Longe O. & Danquah P. (2012), Action Speaks Louder Than Words – Understanding Cyber Criminal Behavior Using Criminological Theories, Journal of Internet Banking and Commerce, April 2012, vol. 17, no. 1. pp.1-12
8. Danquah P. & Longe O. (2011), Cyber Deception and Theft – An Ethnographic Study on Cyber Criminality from a Ghanaian Perspective, Journal of Information Technology Impact,Vol. 11, No. 3, pp. 169-182.
9. Danquah P. & Tobbin P. (2011), The Impact of Information Security Breaches on Banking Information Systems from the 2000 to 2009, Pentvars Business Journal Vol. 5.3 July to Sept 2011. pp. 63-76.
10. Danquah P. & Longe O.B. (2011), An Empirical Test Of The Space Transition Theory of Cyber Criminality: The Case of Ghana and beyond, African Journal of Computing and ICT, September 2011. pp.38-48.
11. Danquah P. (2009), Segmenting Networks for better security, manageability and scalability: The Case of Pentecost University College – Pentvars Journal – July/September, 2009. Vol. 7 pp. 75-86.

Presentation of Papers
1. Danquah P. & Longe, O.B (2013). Towards a Framework For Evaluating Behavioral Patterns of Cyber Criminals. Proceedings of the iSTEAMS International Multidisciplinary Conference, Conference Centre, University of Ibadan, Ibadan, Nigeria pp 217 – 226
2. Kester, Q.-A. & Danquah P., (2012), A novel cryptographic key technique, Adaptive Science & Technology (ICAST), 2012 IEEE 4th International Conference, Page(s):70 – 73. Accessible at http://ieeexplore.ieee.org/xpl/
3. Longe O.B. & Danquah P. (2012),Mitigating Socially Engineered Cyber Deception and Theft, An Ethnographic Approach, International Federation for Information Processing Working Group 9.4 Volume 22, No. 3, pages 2-8