Impact of cybercrime and trust on the use of e-commerce technologies: An application of the theory of planned behavior. R Apau, FN Koranteng International Journal of Cyber Criminology 13 (2), 2019 | 99 | 2019 |
Understanding trust on social networking sites among tertiary students: An empirical study in Ghana FN Koranteng, I Wiafe, FA Katsriku, R Apau Applied Computing and Informatics 19 (3/4), 209-225, 2023 | 49 | 2023 |
Cyber-crime and its effects on E-commerce technologies R Apau, FN Koranteng, SA Gyamfi Journal of Information 5 (1), 39-59, 2019 | 34 | 2019 |
An overview of the digital forensic investigation infrastructure of Ghana R Apau, FN Koranteng Forensic Science International: Synergy 2, 299-309, 2020 | 25 | 2020 |
Design of image steganography based on RSA algorithm and LSB insertion for android smartphones R Apau, C Adomako International Journal of Computer Applications 164 (1), 0975-8887, 2017 | 24 | 2017 |
An empirical evaluation of cashless systems implementation in Ghana R Apau, E Obeng, AN Darko International Journal of Business, Economics and Management 6 (3), 159-173, 2019 | 14 | 2019 |
Youth and Violent Extremism Online: Countering Terrorists Exploitation and Use of the Internet R Apau African Journal on Terrorism 7 (1), 16-23, 2018 | 12 | 2018 |
Enhancing Data Security using Video Steganography, RSA and Huffman Code Algorithms with LSB Insertion R Apau, JB Hayfron-Acquah, F Twum International Journal of Computer Applications 143 (4), 28-36, 2016 | 12 | 2016 |
Drones in the digital transformation of healthcare delivery in Africa S Anim-Yeboah, R Apau, M Preko Digital Innovations, Business and Society in Africa: New Frontiers and a …, 2022 | 9 | 2022 |
Terrorism, Violent Extremism and Insurgency in the Sahel Region: An Assessment R Apau, A Banunle African Journal on Terrorism 8 (1), 1-20, 2019 | 9 | 2019 |
Evaluating the Effectiveness of Deterrence Theory in Information Security Compliance: New Insights From a Developing Country. FN Koranteng, R Apau, J Opoku-Ware, AO Ekpezu Modern Theories and Practices for Cyber Ethics and Security Compliance, 140-151, 2020 | 8 | 2020 |
A Multilayered Secure Image Steganography Technique for Resisting Regular-Singular Steganalysis Attacks Using Elliptic Curve Cryptography and Genetic Algorithm R Apau, JB Hayfron-Acquah, M Asante, F Twum International Conference on ICT for Sustainable Development, 427-439, 2023 | 4 | 2023 |
Predicting Engagement on Collaborative Learning Systems: Perceptions of Postgraduate Students SA Gyamfi, FN Koranteng, R Apau, K Ansong-Gyimah Proceedings of the 2020 9th International Conference on Educational and …, 2020 | 4 | 2020 |
Data hiding in audio signals using elliptic curve cryptography, huffman code algorithm and low-bit encoding R Apau, SA Gyamfi International Journal of Computer Applications 180, 24-34, 2018 | 4 | 2018 |
Environmental and Natural Resources Consequences of Armed Conflicts and Violent Extremism in Sahelian Countries in Africa A Banunle, R Apau African Journal on Terrorism 8 (1), 73-91, 2019 | 3 | 2019 |
Antecedents of social commerce adoption in developing countries: An empirical study FN Koranteng, R Boateng, R Apau Research anthology on e-commerce adoption, models, and applications for …, 2021 | 2 | 2021 |
A Modified High Capacity Video Steganography Technique Based On Spatial Domain Method, Asymmetric Cryptography and Huffman Code Algorithms R Apau, JB Hayfron-Acquah, F Twum Communications on Applied Electronics 5 (10), 53-60, 2016 | 1 | 2016 |
Image steganography techniques for resisting statistical steganalysis attacks: A systematic literature review R Apau, M Asante, F Twum, J Ben Hayfron-Acquah, KO Peasah Plos one 19 (9), e0308807, 2024 | | 2024 |
A Secure and High Embedding Capacity Image Steganography Scheme Using Image Enhancement Technique, Compression, and Genetic Algorithm R Apau, F Twum, M Asante, JB Hayfron-Acquah Proceedings of Ninth International Congress on Information and Communication …, 2024 | | 2024 |