All Stories

  1. Determinants of Continual Use of Mobile Banking Applications
  2. Measuring Throughput and Latency of Machine Learning Techniques for Intrusion Detection
  3. Profile Clone Detection on Online Social Network Platforms
  4. Supervised Machine Learning Methods for Cyber Threat Detection Using Genetic Algorithm
  5. Estimating Overhead Performance of Supervised Machine Learning Algorithms for Intrusion Detection
  6. Deep Residual Variational Autoencoder for Image Super-Resolution
  7. Primary Mobile Image Analysis of Human Intestinal Worm Detection
  8. Evaluating the Impact of Cryptographic Algorithms on Network Performance
  9. Design of Authenticated and Trusted Academic Certification Using Blockchain Technology
  10. A Systematic Review of Fingerprint Recognition System Development
  11. The Use of Machine Learning Algorithms in the Classification of Sound
  12. Critical success factors of strategic information systems planning: a Delphi approach
  13. Conceptualizing the Domain and an Empirical Analysis of Operations Security Management
  14. Cyber Security Competency Model Based on Learning Theories and Learning Continuum Hierarchy
  15. Cyber Security Competency Model Based on Learning Theories and Learning Continuum Hierarchy
  16. Facial Based Age Estimation Among Dark Skinned Hominid Species
  17. Gender Differences in Preferences and Proclivities for ICT Tools and Online Services
  18. Identifying HRM Practices for Improving Information Security Performance
  19. Identifying HRM Practices for Improving Information Security Performance
  20. Network and Data Transfer Security Management in Higher Educational Institutions
  21. Evaluation of Data Imbalance Algorithms on the Prediction of Credit Card Fraud
  22. Modelling and Evaluation of Network Intrusion Detection Systems Using Machine Learning Techniques
  23. Machine Learning Methods for Detecting Internet-of-Things (IoT) Malware
  24. Cyber-Identity Theft and Fintech Services
  25. EMIS Success Modeling Using Information Systems Quality Factors
  26. Scrambling Keypad for Secure Pin Entry to Defeat Shoulder Surfing and Inference Attacks
  27. Development and Psychometric Analysis of Cyber Ethics Instrument (CEI)
  28. Network Intrusion Detection in Internet of Things (IoT)
  29. Exploring the Impact of Security Policy on Compliance
  30. Predicting and Explaining Cyber Ethics with Ethical Theories
  31. Students' Intentions on Cyber Ethics Issues
  32. Taxonomy of Cyber Threats to Application Security and Applicable Defenses
  33. Analysis of Machine Learning Techniques for Anomaly-Based Intrusion Detection
  34. Integrated Financial Management Information System Project Implementation in Ghana Government Ministries
  35. A conceptual model and empirical assessment of HR security risk management
  36. SETA and Security Behavior
  37. Network and Data Transfer Security Management in Higher Educational Institutions
  38. Demographic Influences on E-Payment Services
  39. Examining the Contributing Factors for Cloud Computing Adoption in a Developing Country
  40. Gender Differences in Preferences and Proclivities for ICT Tools and Online Services
  41. Cyber Security Competency Model Based on Learning Theories and Learning Continuum Hierarchy
  42. Conceptualizing the Domain and an Empirical Analysis of Operations Security Management
  43. Identifying HRM Practices for Improving Information Security Performance
  44. Investigating students’ intentions to use ICT: A comparison of theoretical models
  45. Exploring the Impact of Security Policy on Compliance
  46. Inter-Organizational Study of Access Control Security Measures
  47. Modelling the Impact of Administrative Access Controls on Technical Access Control Measures
  48. Demographic Influences on E-Payment Services
  49. Examining the Contributing Factors for Cloud Computing Adoption in a Developing Country
  50. The Influence of Students' Characteristics on Mobile Device Security Measures
  51. Towards Modelling the Impact of Security Policy on Compliance
  52. Investigation into the State-of-Practice of Operations Security Management Based on ISO/IEC 27002
  53. Accessibility, Quality and Performance of Government Portals and Ministry Web Sites: A View Using Diagnostic Tools
  54. Information Technology Governance Barriers, Drivers, IT/Business Alignment, and Maturity in Ghanaian Universities
  55. Evaluating the Effectiveness of Information Security Governance Practices in Developing Nations
  56. An Empirical Study into Information Security Governance Focus Areas and their Effects on Risk Management
  57. Information security governance
  58. Evaluating the Effectiveness of Information Security Governance Practices in Developing Nations