Dr. Paul Danquah
dpx017@hcuc.edu.gh
Heritage Christian College Campus. Amasaman behind stadium junction

Paul Danquah, PhD

Dean, School of Applied Science and Technology

Education

  • PhD., Information Technolgy (Specialized in Cybercrime), Open University, Malaysia
  • MSc., Information Security, Anglia Ruskin University, UK
  • BSc., Computing, University of Greenwich, UK

Certification

  • ISO 27001 Lead Implementer
  • Certified Ethical Hacker (CEH)
  • Certified EC-Council Instructor (CEI)
  • Data Center Infrastructure Expert (DCIE)
  • Cisco Certified Network Professional (CCNP)
  • Microsoft Certified Systems Engineer (MCSE)

Refereed Journal Papers

  • Danquah, P. (2020), Security Operations Center: A Framework for Automated Triage, Containment and Escalation, Journal of Information Security Vol.11 No.4, DOI: 10.4236/jis.2020.114015
  • Danquah, P.A. (2020), Malware and Anti-Malware Baseline: An Inductive Study of Ghanaian Microfinance Companies, The Information Technologist, Volume 17, Issue No. 1, Pages 127-139
  • Gordon, V. and Danquah, P. (2020), An Experimental Assessment of LiFi Data Communication, Ghana Journal of Science, Volume 61, Issue 1, Pages 73 - 87. https://dx.doi.org/10.4314/gjs.v61i1.6
  • Danquah, P. & Kwabena-Adade, H. (2020), Public Key Infrastructure: An Enhanced Validation Framework, Journal of Information Security Vol.11 No.4, DOI: 10.4236/jis.2020.114016
  • Danquah, P.(2019), Route Redistribution: Beyond Inherent Metrics, International Journal of Computer Networking, Wireless and Mobile Communications (IJCNWMC), Vol. 9, Issue 2, pp. 7–14
  • Danquah, P., Bekoe, S. and Prikutse, F.(2019), Information Security Practices and IT Disaster Recovery Readiness: An Assessment of Ghanaian Government Ministries, Information Technologist Journal, Vol 16 No 2, pp.97 - 111
  • Danquah, P., Bibi, D & Dzahene-Quarshie, B. (2019), A Forecourt Operations Management System for Oil Marketing Companies: The Ghanaian Context, Computing, Information Systems, Development Informatics & Allied Research Journal, Vol. 10 No. 4, pp.23-40
  • Lartey, J.D., Danquah, P.A. & Amezi, J.A. (2019), An Empirical Evaluation of Information Technology related Disaster Recovery Readiness in Ghanaian Universities, Computing, Information Systems & Development Informatics Journal , Vol. 10 No. 3, pp.65-76
  • Danquah P., Gordon V & Peh B. (2018), A simulated comparison of performance beyond inherent metrics for Open Shortest Path First (OSPF) and Exterior Gateway Routing Protocol (EIGRP), Digital Innovations and Contemporary Research in Science, Engineering and Technology, Vol 6 No. 4, pp.35 -48
  • Danquah, P., Lartey J. D. & Kani J.A (2018), Beyond Inherent Routing Metrics: A Simulated Comparison of Routing Information Protocol (RIP) and Enhanced Interior Gateway Routing Protocols (EIGRP), Advances in Multidisciplinary & Scientific (AIMS) Research Journal, Vol 4 No. 2, pp. 35-46
  • Danquah, P. (2017), Towards an Information Technology Based Supply Chain Management System for Ghanaian Oil Marketing Companies, Pentvars Business Journal Vol. 11 No.2 . pp. 70 -82,
  • Danquah, P., Adedara, O & Longe, O.B. (2017), Countering Cyber Trespass; A proposed Framework, Advances in Multidisciplinary & Scientific (AIMS) Research Journal, Vol 3 No. 3, pp. 41-50
  • Agblewornu V. & Danquah P. (2015), New Dimensions of Intelligent Authentication Systems, International Journal of Business Innovation and Technology (IJBIT), Volume 2, No. 1, pp.1-14
  • Danquah P. , Aryeetey S. & Buabeng-Andoh C.(2013), A Critical Assessment of Information Technology Disaster Recovery Strategies in Ghanaian Banks – Pentvars Journal Vol. 7 No. 1,2 &3 pp. 58-75
  • Danquah P., Longe O. & Totimeh F. (2012), Just another Harmless Click of the Mouse-An Empirical Evidence of Deviant Cyber Space Behaviour Using an Online Trap, African Journal of Computing and ICT, Vol 5 No3 pp. 49-56.
  • Longe O.B.,Danquah P. & Ebem D.U. (2012), De-Individuation, Anonymity and Unethical Behaviour in Cyberspace – Explorations in the Valley of Digital Temptations, Computing Information Systems Journal, Vol. 16, Issue 1, pp.46-55
  • Wada F., Longe O. & Danquah P. (2012), Action Speaks Louder Than Words - Understanding Cyber Criminal Behavior Using Criminological Theories, Journal of Internet Banking and Commerce, vol. 17, no. 1. pp.1-12
  • Danquah P. & Longe O. (2011), Cyber Deception and Theft – An Ethnographic Study on Cyber Criminality from a Ghanaian Perspective, Journal of Information Technology Impact,Vol. 11, No. 3, pp. 169-182.
  • Danquah P. & Tobbin P. (2011), The Impact of Information Security Breaches on Banking Information Systems from the 2000 to 2009, Pentvars Business Journal Vol. 5.3 pp. 63-76.
  • Danquah P. & Longe O.B. (2011), An Empirical Test Of The Space Transition Theory of Cyber Criminality: The Case of Ghana and beyond, African Journal of Computing and ICT pp.38-48.
  • Danquah P. (2009), Segmenting Networks for better security, manageability and scalability: The Case of Pentecost University College – Pentvars Journal – 2009. Vol. 7 pp. 75-86.

Book Chapter

  • Danquah, P., Longe, O.B., Lartey, J.D. & Tobbin, P.E. (2020), Towards a Theory for Explaining Socially-Engineered Cyber Deception and Theft, Modern Theories and Practices for Cyber Ethics and Security Compliance, IGI Global, pp.44-58

Refereed Conference Papers

  • Danquah P. (2019), A Baseline of Malware Infections and Anti-Malware Deployment in Ghanaian Government Ministries, Proceedings of the 20th iSTEAMS Multidisciplinary Trans-Atlantic GoingGlobal Conference KEAN University, New Jersey, USA
  • Danquah P. (2019), An Empirical Exploration of Web Applications' Vulnerability Assessment: A Case Study Approach. Proceedings of the 15th iSTEAMS Research Nexus Conference Chrisland University, Abeokuta, Nigeria, pp. 1-10
  • Danquah P. & Longe, O.B (2013). Towards a Framework For Evaluating Behavioral Patterns of Cyber Criminals. Proceedings of the iSTEAMS International Multidisciplinary Conference, Conference Centre, University of Ibadan, Ibadan, Nigeria pp 217 – 226
  • Kester, Q.-A. & Danquah P., (2012), A novel cryptographic key technique, Adaptive Science & Technology (ICAST), 2012 IEEE 4th International Conference, Page(s):70 – 73. Accessible at http://ieeexplore.ieee.org/xpl/
  • Longe O.B. & Danquah P. (2012),Mitigating Socially Engineered Cyber Deception and Theft, An Ethnographic Approach, International Federation for Information Processing Working Group 9.4 Volume 22, No. 3, pages 2-8