All Stories

  1. A Comprehensive Review of Techniques for Detecting and Preventing Card-Not-Present (CNP) Fraud
  2. Enhancing Textual Password Authentication Using Typing Rhythm
  3. Exploring the Application of Generative AI in Human Resource Management
  4. A Comprehensive Review of Internet-of-Things (IoT) Botnet Detection Techniques
  5. Determinants of Continual Use of Mobile Banking Applications
  6. Measuring Throughput and Latency of Machine Learning Techniques for Intrusion Detection
  7. Profile Clone Detection on Online Social Network Platforms
  8. Supervised Machine Learning Methods for Cyber Threat Detection Using Genetic Algorithm
  9. Estimating Overhead Performance of Supervised Machine Learning Algorithms for Intrusion Detection
  10. Deep Residual Variational Autoencoder for Image Super-Resolution
  11. Primary Mobile Image Analysis of Human Intestinal Worm Detection
  12. Evaluating the Impact of Cryptographic Algorithms on Network Performance
  13. Design of Authenticated and Trusted Academic Certification Using Blockchain Technology
  14. A Systematic Review of Fingerprint Recognition System Development
  15. The Use of Machine Learning Algorithms in the Classification of Sound
  16. Critical success factors of strategic information systems planning: a Delphi approach
  17. Conceptualizing the Domain and an Empirical Analysis of Operations Security Management
  18. Cyber Security Competency Model Based on Learning Theories and Learning Continuum Hierarchy
  19. Cyber Security Competency Model Based on Learning Theories and Learning Continuum Hierarchy
  20. Facial Based Age Estimation Among Dark Skinned Hominid Species
  21. Gender Differences in Preferences and Proclivities for ICT Tools and Online Services
  22. Identifying HRM Practices for Improving Information Security Performance
  23. Identifying HRM Practices for Improving Information Security Performance
  24. Network and Data Transfer Security Management in Higher Educational Institutions
  25. Evaluation of Data Imbalance Algorithms on the Prediction of Credit Card Fraud
  26. Modelling and Evaluation of Network Intrusion Detection Systems Using Machine Learning Techniques
  27. Machine Learning Methods for Detecting Internet-of-Things (IoT) Malware
  28. Cyber-Identity Theft and Fintech Services
  29. EMIS Success Modeling Using Information Systems Quality Factors
  30. Scrambling Keypad for Secure Pin Entry to Defeat Shoulder Surfing and Inference Attacks
  31. Development and Psychometric Analysis of Cyber Ethics Instrument (CEI)
  32. Network Intrusion Detection in Internet of Things (IoT)
  33. Exploring the Impact of Security Policy on Compliance
  34. Predicting and Explaining Cyber Ethics with Ethical Theories
  35. Students' Intentions on Cyber Ethics Issues
  36. Taxonomy of Cyber Threats to Application Security and Applicable Defenses
  37. Analysis of Machine Learning Techniques for Anomaly-Based Intrusion Detection
  38. Integrated Financial Management Information System Project Implementation in Ghana Government Ministries
  39. A conceptual model and empirical assessment of HR security risk management
  40. SETA and Security Behavior
  41. Network and Data Transfer Security Management in Higher Educational Institutions
  42. Demographic Influences on E-Payment Services
  43. Examining the Contributing Factors for Cloud Computing Adoption in a Developing Country
  44. Gender Differences in Preferences and Proclivities for ICT Tools and Online Services
  45. Cyber Security Competency Model Based on Learning Theories and Learning Continuum Hierarchy
  46. Conceptualizing the Domain and an Empirical Analysis of Operations Security Management
  47. Identifying HRM Practices for Improving Information Security Performance
  48. Investigating students’ intentions to use ICT: A comparison of theoretical models
  49. Exploring the Impact of Security Policy on Compliance
  50. Inter-Organizational Study of Access Control Security Measures
  51. Modelling the Impact of Administrative Access Controls on Technical Access Control Measures
  52. Demographic Influences on E-Payment Services
  53. Examining the Contributing Factors for Cloud Computing Adoption in a Developing Country
  54. The Influence of Students' Characteristics on Mobile Device Security Measures
  55. Towards Modelling the Impact of Security Policy on Compliance
  56. Investigation into the State-of-Practice of Operations Security Management Based on ISO/IEC 27002
  57. Accessibility, Quality and Performance of Government Portals and Ministry Web Sites: A View Using Diagnostic Tools
  58. Information Technology Governance Barriers, Drivers, IT/Business Alignment, and Maturity in Ghanaian Universities
  59. Evaluating the Effectiveness of Information Security Governance Practices in Developing Nations
  60. An Empirical Study into Information Security Governance Focus Areas and their Effects on Risk Management
  61. Information security governance
  62. Evaluating the Effectiveness of Information Security Governance Practices in Developing Nations