Winfred Yaokumah

Winfred Yaokumah is a researcher and senior faculty at the Department of Computer Science of the University of Ghana. He has published several articles in highly rated journals including Information and Computer Security, Information Resources Management Journal, IEEE Xplore, International Journal of Human Capital and Information Technology, International Journal of Human Capital and Information Technology Professionals, International Journal of Technology and Human Interaction, International Journal of e-Business Research, International Journal of Enterprise Information Systems, Journal of Information Technology Research, International Journal of Information Systems in the Service Sector, and Education and Information Technologies. His research interest includes cyber security, cyber ethics, network security, and information systems security and governance. He serves as a member of the International Review Board for the International Journal of Technology Diffusion.

Publications

Measuring Throughput and Latency of Machine Learning Techniques for Intrusion Detection
Winfred Yaokumah, Charity Y. M. Baidoo, Ebenezer Owusu. © 2024. 23 pages.
When evaluating the effectiveness of machine learning algorithms for intrusion detection, it is insufficient to only focus on their performance metrics. One must also focus on...
Determinants of Continual Use of Mobile Banking Applications: An Integrated Theoretical Perspective
Ibrahim Issahaku, Eric Kuada, Peace Kumah, Winfred Yaokumah. © 2024. 23 pages.
This study explores the factors that contribute to the continual use of mobile banking apps by integrating design aesthetics, information quality, and perceived privacy with the...
Estimating Overhead Performance of Supervised Machine Learning Algorithms for Intrusion Detection
Charity Yaa Mansa Baidoo, Winfred Yaokumah, Ebenezer Owusu. © 2023. 19 pages.
Estimating the energy and memory consumption of machine learning(ML) models for intrusion detection ensures efficient allocation of system resources. This study investigates the...
Supervised Machine Learning Methods for Cyber Threat Detection Using Genetic Algorithm
Daniel K. Gasu, Winfred Yaokumah, Justice Kwame Appati. © 2023. 24 pages.
Security threats continue to pose enormous challenges to network and applications security, particularly with the emerging IoT technologies and cloud computing services. Current...
Profile Clone Detection on Online Social Network Platforms
Anthony Doe Eklah, Winfred Yaokumah, Justice Kwame Appati. © 2023. 27 pages.
Successful profile cloning attacks have far-reaching consequences for the victims. People whose profiles are cloned suffer defamation, mistrust, loss of job, interdiction, public...
Cyber Security Competency Model Based on Learning Theories and Learning Continuum Hierarchy
Winfred Yaokumah. © 2022. 18 pages.
There is an urgent need for transformative changes in cyber security awareness and training programs to produce individuals and the workforce that can deal with business risks...
Identifying HRM Practices for Improving Information Security Performance: An Importance-Performance Map Analysis
Peace Kumah, Winfred Yaokumah, Charles Buabeng-Andoh. © 2022. 23 pages.
This article focuses on identifying key human resource management (HRM) practices necessary for improving information security performance from the perspective of IT...
Network and Data Transfer Security Management in Higher Educational Institutions
Winfred Yaokumah, Alex Ansah Dawson. © 2022. 19 pages.
This chapter explored communications security through the use of an empirical survey to assess the extent of network and data transfer security management in Ghanaian higher...
Conceptualizing the Domain and an Empirical Analysis of Operations Security Management
Winfred Yaokumah. © 2022. 28 pages.
Operations security management integrates the activities of all the information systems security controls. It ensures that the entire computing environment is adequately secured....
Cyber Security Competency Model Based on Learning Theories and Learning Continuum Hierarchy
Winfred Yaokumah. © 2022. 18 pages.
There is an urgent need for transformative changes in cyber security awareness and training programs to produce individuals and the workforce that can deal with business risks...
Identifying HRM Practices for Improving Information Security Performance: An Importance-Performance Map Analysis
Peace Kumah, Winfred Yaokumah, Charles Buabeng-Andoh. © 2022. 23 pages.
This article focuses on identifying key human resource management (HRM) practices necessary for improving information security performance from the perspective of IT...
Gender Differences in Preferences and Proclivities for ICT Tools and Online Services
Winfred Yaokumah, Fred Totimeh, Peace Kumah. © 2022. 18 pages.
Gender essentialism is often used to excuse gender-based biases in the use of ICT tools and online services encouraging gender inequalities in opportunities for both males and...
The Use of Machine Learning Algorithms in the Classification of Sound: A Systematic Review
Akon O. Ekpezu, Ferdinand Katsriku, Winfred Yaokumah, Isaac Wiafe. © 2022. 28 pages.
This study is a systematic review of literature on the classification of sounds in three domains - Bioacoustics, Biomedical acoustics, and Ecoacoustics. Specifically, 68...
A Systematic Review of Fingerprint Recognition System Development
Justice Kwame Appati, Prince Kofi Nartey, Winfred Yaokumah, Jamal-Deen Abdulai. © 2022. 17 pages.
Biometric authentication is gaining ground in security-related issues in business, corporate management, and other settings. A considerable amount of research has been conducted...
Primary Mobile Image Analysis of Human Intestinal Worm Detection
Justice Kwame Appati, Winfred Yaokumah, Ebenezer Owusu, Paul Nii Tackie Ammah. © 2022. 16 pages.
One among a lot of public health concerns in rural and tropical areas is the human intestinal parasite. Traditionally, diagnosis of these parasites is by visual analysis of stool...
Design of Authenticated and Trusted Academic Certification Using Blockchain Technology
Joseph Ofori-Mensah, Winfred Yaokumah, Ebenezer Agyemang Sakyi. © 2022. 19 pages.
It is more expensive to handle forged certificates rather than take stringent measures to prevent such occurrences. Forged certificates can lead to loss of integrity and...
Evaluating the Impact of Cryptographic Algorithms on Network Performance
Samuel Asare, Winfred Yaokumah, Ernest Barfo Boadi Gyebi, Jamal-Deen Abdulai. © 2022. 15 pages.
Cryptographic algorithms enable secure data communication over public insecure networks. Though they enhance network security, complex cryptographic operations consume...
Development and Psychometric Analysis of Cyber Ethics Instrument (CEI)
Winfred Yaokumah. © 2021. 21 pages.
This study developed and validated the psychometric properties of a new instrument, cyber ethics instrument (CEI), for assessing cyber ethics. Items related to cyber ethics were...
Exploring the Impact of Security Policy on Compliance
Winfred Yaokumah, Peace Kumah. © 2021. 19 pages.
Extant studies on compliance with security policies have largely ignored the impact of monitoring, security operations, and roles and responsibilities on employees'...
Network Intrusion Detection in Internet of Things (IoT): A Systematic Review
Winfred Yaokumah, Richard Nunoo Clottey, Justice Kwame Appati. © 2021. 17 pages.
The open nature of the internet of things network makes it vulnerable to cyber-attacks. Intrusion detection systems aid in detecting and preventing such attacks. This paper...
EMIS Success Modeling Using Information Systems Quality Factors
Lily Asiedu Danso, Joseph Kwame Adjei, Winfred Yaokumah. © 2021. 17 pages.
This study validates the DeLone and McLean information systems (IS) success model in the context of education management information system (EMIS). It develops a model to examine...
Cyber-Identity Theft and Fintech Services: Technology Threat Avoidance Perspective
Kwame Okwabi Asante-Offei, Winfred Yaokumah. © 2021. 19 pages.
The fear of identity theft has been considered as an impediment to the rapid utilization of financial technology (FinTech) services. Based on the technology threat avoidance...
Scrambling Keypad for Secure Pin Entry to Defeat Shoulder Surfing and Inference Attacks
Samuel Selassie Yakohene, Winfred Yaokumah, Ernest Barfo Boadi Gyebi. © 2021. 22 pages.
Personal identification number (PIN) is a common user authentication method widely used especially for automated teller machines and point-of-sales devices. The user's PIN...
Machine Learning Methods for Detecting Internet-of-Things (IoT) Malware
Winfred Yaokumah, Justice Kwame Appati, Daniel Kumah. © 2021. 18 pages.
This study aims to analyze the performance of machine learning models for detecting Internet of Things malware utilizing a recent IoT dataset. Experiments on the IoT dataset were...
Evaluation of Data Imbalance Algorithms on the Prediction of Credit Card Fraud
Godlove Otoo, Justice Kwame Appati, Winfred Yaokumah, Michael Agbo Tettey Soli, Stephane Jnr Nwolley, Julius Yaw Ludu. © 2021. 26 pages.
Credit card fraud has been on the rise for some years now after the introduction of card payment systems. To curb this menace, computational methods have been proposed....
Modelling and Evaluation of Network Intrusion Detection Systems Using Machine Learning Techniques
Richard Nunoo Clottey, Winfred Yaokumah, Justice Kwame Appati. © 2021. 19 pages.
This study aims at modelling and evaluating the performance of machine learning techniques on a recent network intrusion dataset. Five machine learning algorithms, which include...
Modern Theories and Practices for Cyber Ethics and Security Compliance
Winfred Yaokumah, Muttukrishnan Rajarajan, Jamal-Deen Abdulai, Isaac Wiafe, Ferdinand Apietu Katsriku. © 2020. 302 pages.
In today’s globalized world, businesses and governments rely heavily on technology for storing and protecting essential information and data. Despite the benefits that computing...
Integrated Financial Management Information System Project Implementation in Ghana Government Ministries
Winfred Yaokumah, Emelia Biney. © 2020. 15 pages.
This study investigates the factors impeding successful implementation of integrated financial management information system (IFMIS) project in Ghana. When successfully...
Predicting and Explaining Cyber Ethics with Ethical Theories
Winfred Yaokumah. © 2020. 18 pages.
People face multiple decisions that have ethical dimensions and are often unable to resolve appropriately those ethical dilemmas in the use of the cyberspace. Individuals find it...
Taxonomy of Cyber Threats to Application Security and Applicable Defenses
Winfred Yaokumah, Ferdinard Katsriku, Jamal-Deen Abdulai, Kwame Okwabi Asante-Offei. © 2020. 26 pages.
Application security measures are the controls within software systems that protect information assets from security attacks. Cyber attacks are largely carried out through...
Students' Intentions on Cyber Ethics Issues
Isaac Wiafe, Winfred Yaokumah, Felicia Amanfo Kissi. © 2020. 17 pages.
Cyber ethical decisions have grave moral, legal, and social consequences on individuals, organizations, and societies at large. This chapter examines the extent of cyber...
Analysis of Machine Learning Techniques for Anomaly-Based Intrusion Detection
Winfred Yaokumah, Isaac Wiafe. © 2020. 19 pages.
Determining the machine learning (ML) technique that performs best on new datasets is an important factor in the design of effective anomaly-based intrusion detection systems....
Conceptualizing the Domain and an Empirical Analysis of Operations Security Management
Winfred Yaokumah. © 2019. 27 pages.
Operations security management integrates the activities of all the information systems security controls. It ensures that the entire computing environment is adequately secured....
Demographic Influences on E-Payment Services
Winfred Yaokumah, Peace Kumah, Eric Saviour Aryee Okai. © 2019. 23 pages.
This study investigated customers' preferences of payment systems and the influence of demography on the attitude of customers towards e-payment services. Survey responses...
Cyber Security Competency Model Based on Learning Theories and Learning Continuum Hierarchy
Winfred Yaokumah. © 2019. 17 pages.
There is an urgent need for transformative changes in cyber security awareness and training programs to produce individuals and the workforce that can deal with business risks...
Demographic Influences on E-Payment Services
Winfred Yaokumah, Peace Kumah, Eric Saviour Aryee Okai. © 2019. 23 pages.
This study investigated customers' preferences of payment systems and the influence of demography on the attitude of customers towards e-payment services. Survey responses...
Gender Differences in Preferences and Proclivities for ICT Tools and Online Services
Winfred Yaokumah, Fred Totimeh, Peace Kumah. © 2019. 17 pages.
Gender essentialism is often used to excuse gender-based biases in the use of ICT tools and online services encouraging gender inequalities in opportunities for both males and...
Examining the Contributing Factors for Cloud Computing Adoption in a Developing Country
Winfred Yaokumah, Rebecca Adwoa Amponsah. © 2019. 23 pages.
The growth in cloud computing adoption is phenomenal in organizations worldwide due mainly to its potential to increase productivity and enhance efficiency in business...
Network and Data Transfer Security Management in Higher Educational Institutions
Winfred Yaokumah, Alex Ansah Dawson. © 2019. 19 pages.
This chapter explored communications security through the use of an empirical survey to assess the extent of network and data transfer security management in Ghanaian higher...
Inter-Organizational Study of Access Control Security Measures
Winfred Yaokumah, Eric Saviour Aryee Okai. © 2018. 20 pages.
This study assesses the level of implementation and management of access control security measures among organizations. A survey was conducted and 233 responses were received...
Exploring the Impact of Security Policy on Compliance
Winfred Yaokumah, Peace Kumah. © 2018. 19 pages.
Extant studies on compliance with security policies have largely ignored the impact of monitoring, security operations, and roles and responsibilities on employees'...
Identifying HRM Practices for Improving Information Security Performance: An Importance-Performance Map Analysis
Peace Kumah, Winfred Yaokumah, Charles Buabeng-Andoh. © 2018. 21 pages.
This article focuses on identifying key human resource management (HRM) practices necessary for improving information security performance from the perspective of IT...
Demographic Influences on E-Payment Services
Winfred Yaokumah, Peace Kumah, Eric Saviour Aryee Okai. © 2017. 22 pages.
This study investigated customers' preferences of payment systems and the influence of demography on the attitude of customers towards e-payment services. Survey responses...
Modelling the Impact of Administrative Access Controls on Technical Access Control Measures
Winfred Yaokumah. © 2017. 18 pages.
Almost all computing systems and applications in organizations include some form of access control mechanisms. Managing secure access to computing resources is an important but a...
Investigation into the State-of-Practice of Operations Security Management Based on ISO/IEC 27002
Winfred Yaokumah. © 2016. 20 pages.
This study assessed information security management in organizations through a questionnaire based on the ISO/IEC 27002, with special focus on operations security. A survey with...
The Influence of Students' Characteristics on Mobile Device Security Measures
Winfred Yaokumah. © 2016. 23 pages.
This study aimed at investigating the influence of students' characteristics (majors, maturity, and gender) on mobile device security practices in the context of a developing...
Towards Modelling the Impact of Security Policy on Compliance
Winfred Yaokumah, Steven Brown, Alex Ansah Dawson. © 2016. 16 pages.
This study develops a model, based on the controls present in ISO/IEC 27002 framework, to integrate the role of technical and administrative security controls. The model provides...
Evaluating the Effectiveness of Information Security Governance Practices in Developing Nations: A Case of Ghana
Winfred Yaokumah. © 2015. 17 pages.
The purpose of this empirical study is to evaluate the extent to which information security governance domain practices: strategic alignment, value delivery, resource management...
Information Technology Governance Barriers, Drivers, IT/Business Alignment, and Maturity in Ghanaian Universities
Winfred Yaokumah, Steven Brown, Philip Okang-Mensah Adjei. © 2015. 18 pages.
The purpose of this preliminary study was to determine the status of IT governance in universities in a developing country, Ghana, by assessing the drivers and barriers to...
Evaluating the Effectiveness of Information Security Governance Practices in Developing Nations: A Case of Ghana
Winfred Yaokumah. © 2013. 17 pages.
The purpose of this empirical study is to evaluate the extent to which information security governance domain practices: strategic alignment, value delivery, resource management...