All Stories

  1. Supervised Machine Learning Methods for Cyber Threat Detection Using Genetic Algorithm
  2. Estimating Overhead Performance of Supervised Machine Learning Algorithms for Intrusion Detection
  3. Deep Residual Variational Autoencoder for Image Super-Resolution
  4. Primary Mobile Image Analysis of Human Intestinal Worm Detection
  5. Evaluating the Impact of Cryptographic Algorithms on Network Performance
  6. Design of Authenticated and Trusted Academic Certification Using Blockchain Technology
  7. A Systematic Review of Fingerprint Recognition System Development
  8. The Use of Machine Learning Algorithms in the Classification of Sound
  9. Critical success factors of strategic information systems planning: a Delphi approach
  10. Conceptualizing the Domain and an Empirical Analysis of Operations Security Management
  11. Cyber Security Competency Model Based on Learning Theories and Learning Continuum Hierarchy
  12. Cyber Security Competency Model Based on Learning Theories and Learning Continuum Hierarchy
  13. Facial Based Age Estimation Among Dark Skinned Hominid Species
  14. Gender Differences in Preferences and Proclivities for ICT Tools and Online Services
  15. Identifying HRM Practices for Improving Information Security Performance
  16. Identifying HRM Practices for Improving Information Security Performance
  17. Network and Data Transfer Security Management in Higher Educational Institutions
  18. Evaluation of Data Imbalance Algorithms on the Prediction of Credit Card Fraud
  19. Modelling and Evaluation of Network Intrusion Detection Systems Using Machine Learning Techniques
  20. Machine Learning Methods for Detecting Internet-of-Things (IoT) Malware
  21. Cyber-Identity Theft and Fintech Services
  22. EMIS Success Modeling Using Information Systems Quality Factors
  23. Scrambling Keypad for Secure Pin Entry to Defeat Shoulder Surfing and Inference Attacks
  24. Development and Psychometric Analysis of Cyber Ethics Instrument (CEI)
  25. Network Intrusion Detection in Internet of Things (IoT)
  26. Exploring the Impact of Security Policy on Compliance
  27. Predicting and Explaining Cyber Ethics with Ethical Theories
  28. Students' Intentions on Cyber Ethics Issues
  29. Taxonomy of Cyber Threats to Application Security and Applicable Defenses
  30. Analysis of Machine Learning Techniques for Anomaly-Based Intrusion Detection
  31. Integrated Financial Management Information System Project Implementation in Ghana Government Ministries
  32. A conceptual model and empirical assessment of HR security risk management
  33. SETA and Security Behavior
  34. Network and Data Transfer Security Management in Higher Educational Institutions
  35. Demographic Influences on E-Payment Services
  36. Examining the Contributing Factors for Cloud Computing Adoption in a Developing Country
  37. Gender Differences in Preferences and Proclivities for ICT Tools and Online Services
  38. Cyber Security Competency Model Based on Learning Theories and Learning Continuum Hierarchy
  39. Conceptualizing the Domain and an Empirical Analysis of Operations Security Management
  40. Identifying HRM Practices for Improving Information Security Performance
  41. Investigating students’ intentions to use ICT: A comparison of theoretical models
  42. Exploring the Impact of Security Policy on Compliance
  43. Inter-Organizational Study of Access Control Security Measures
  44. Modelling the Impact of Administrative Access Controls on Technical Access Control Measures
  45. Demographic Influences on E-Payment Services
  46. Examining the Contributing Factors for Cloud Computing Adoption in a Developing Country
  47. The Influence of Students' Characteristics on Mobile Device Security Measures
  48. Towards Modelling the Impact of Security Policy on Compliance
  49. Investigation into the State-of-Practice of Operations Security Management Based on ISO/IEC 27002
  50. Accessibility, Quality and Performance of Government Portals and Ministry Web Sites: A View Using Diagnostic Tools
  51. Information Technology Governance Barriers, Drivers, IT/Business Alignment, and Maturity in Ghanaian Universities
  52. Evaluating the Effectiveness of Information Security Governance Practices in Developing Nations
  53. An Empirical Study into Information Security Governance Focus Areas and their Effects on Risk Management
  54. Information security governance
  55. Evaluating the Effectiveness of Information Security Governance Practices in Developing Nations