1. Ali, R., Jamil, M. K., Alali, A. S., Ali, J., & Afzal, G. (2023). A robust S box design using cyclic groups and image encryption. IEEE Access, 11, 135880–135890.
2. Amenu-Tekaa, K. S. (2022). Examining the survival strategies of banks in Ghana in the post-2017 banking crisis. Research Journal of Finance and Accounting, 13(2), 47–58.
3. Arner, D. W., Barberis, J., & Buckley, R. P. (2016b). The evolution of Fintech: A new post-crisis paradigm? Georgetown Journal of International Law, 47(4), 1271–1319.
4. Arner, D. W., Barberis, J. N., & Buckey, R. P. (2016a). FinTech, RegTech, and the reconceptualization of financial regulation. Northwestern Journal of International Law & Business, 37(3), 371–413.
5. Awad, N. F., & Krishnan, M. S. (2006). The personalization privacy paradox: An empirical evaluation of information transparency and the willingness to be profiled online for personalization. MIS Quarterly, 13–28.