All Stories

  1. A Comprehensive Review of Techniques for Detecting and Preventing Card-Not-Present (CNP) Fraud
  2. Enhancing Textual Password Authentication Using Typing Rhythm
  3. Exploring the Application of Generative AI in Human Resource Management
  4. A Comprehensive Review of Internet-of-Things (IoT) Botnet Detection Techniques
  5. Determinants of Continual Use of Mobile Banking Applications
  6. Measuring Throughput and Latency of Machine Learning Techniques for Intrusion Detection
  7. Profile Clone Detection on Online Social Network Platforms
  8. Supervised Machine Learning Methods for Cyber Threat Detection Using Genetic Algorithm
  9. Estimating Overhead Performance of Supervised Machine Learning Algorithms for Intrusion Detection
  10. Deep Residual Variational Autoencoder for Image Super-Resolution
  11. Primary Mobile Image Analysis of Human Intestinal Worm Detection
  12. Evaluating the Impact of Cryptographic Algorithms on Network Performance
  13. Design of Authenticated and Trusted Academic Certification Using Blockchain Technology
  14. A Systematic Review of Fingerprint Recognition System Development
  15. The Use of Machine Learning Algorithms in the Classification of Sound
  16. Critical success factors of strategic information systems planning: a Delphi approach
  17. Conceptualizing the Domain and an Empirical Analysis of Operations Security Management
  18. Cyber Security Competency Model Based on Learning Theories and Learning Continuum Hierarchy
  19. Cyber Security Competency Model Based on Learning Theories and Learning Continuum Hierarchy
  20. Facial Based Age Estimation Among Dark Skinned Hominid Species
  21. Gender Differences in Preferences and Proclivities for ICT Tools and Online Services
  22. Identifying HRM Practices for Improving Information Security Performance
  23. Identifying HRM Practices for Improving Information Security Performance
  24. Network and Data Transfer Security Management in Higher Educational Institutions
  25. SETA and Security Behavior
  26. Evaluation of Data Imbalance Algorithms on the Prediction of Credit Card Fraud
  27. Modelling and Evaluation of Network Intrusion Detection Systems Using Machine Learning Techniques
  28. Machine Learning Methods for Detecting Internet-of-Things (IoT) Malware
  29. Cyber-Identity Theft and Fintech Services
  30. EMIS Success Modeling Using Information Systems Quality Factors
  31. Scrambling Keypad for Secure Pin Entry to Defeat Shoulder Surfing and Inference Attacks
  32. Development and Psychometric Analysis of Cyber Ethics Instrument (CEI)
  33. Network Intrusion Detection in Internet of Things (IoT)
  34. Exploring the Impact of Security Policy on Compliance
  35. Predicting and Explaining Cyber Ethics with Ethical Theories
  36. Students' Intentions on Cyber Ethics Issues
  37. Taxonomy of Cyber Threats to Application Security and Applicable Defenses
  38. Analysis of Machine Learning Techniques for Anomaly-Based Intrusion Detection
  39. Integrated Financial Management Information System Project Implementation in Ghana Government Ministries
  40. A conceptual model and empirical assessment of HR security risk management
  41. SETA and Security Behavior
  42. Network and Data Transfer Security Management in Higher Educational Institutions
  43. Demographic Influences on E-Payment Services
  44. Examining the Contributing Factors for Cloud Computing Adoption in a Developing Country
  45. Gender Differences in Preferences and Proclivities for ICT Tools and Online Services
  46. Cyber Security Competency Model Based on Learning Theories and Learning Continuum Hierarchy
  47. Conceptualizing the Domain and an Empirical Analysis of Operations Security Management
  48. Identifying HRM Practices for Improving Information Security Performance
  49. Investigating students’ intentions to use ICT: A comparison of theoretical models
  50. Exploring the Impact of Security Policy on Compliance
  51. Inter-Organizational Study of Access Control Security Measures
  52. Modelling the Impact of Administrative Access Controls on Technical Access Control Measures
  53. A Contextual Model Towards Understanding Information Technology Governance: Principles, Structure & Mechanisms
  54. Demographic Influences on E-Payment Services
  55. Examining the Contributing Factors for Cloud Computing Adoption in a Developing Country
  56. The Influence of Students' Characteristics on Mobile Device Security Measures
  57. Towards Modelling the Impact of Security Policy on Compliance
  58. Investigation into the State-of-Practice of Operations Security Management Based on ISO/IEC 27002
  59. Accessibility, Quality and Performance of Government Portals and Ministry Web Sites: A View Using Diagnostic Tools
  60. Information Technology Governance Barriers, Drivers, IT/Business Alignment, and Maturity in Ghanaian Universities
  61. Evaluating the Effectiveness of Information Security Governance Practices in Developing Nations
  62. An Empirical Study into Information Security Governance Focus Areas and their Effects on Risk Management
  63. Information security governance
  64. Evaluating the Effectiveness of Information Security Governance Practices in Developing Nations
  65. Demographic Influences on E-Payment Services