Journal articles on the topic 'Computer security – Zambia – Management Case studies'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 40 journal articles for your research on the topic 'Computer security – Zambia – Management Case studies.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Koskosas, Ioannis. "Communicating information systems goals: A case in internet banking security." Computer Science and Information Systems 6, no. 1 (2009): 71–92. http://dx.doi.org/10.2298/csis0901071k.
Full textO'Donnell, Jonathan, Margaret Jackson, Marita Shelly, and Julian Ligertwood. "Australian Case Studies in Mobile Commerce." Journal of Theoretical and Applied Electronic Commerce Research 2, no. 2 (August 1, 2007): 1–18. http://dx.doi.org/10.3390/jtaer2020010.
Full textAlzamil, Zakarya A. "Information security practice in Saudi Arabia: case study on Saudi organizations." Information & Computer Security 26, no. 5 (November 12, 2018): 568–83. http://dx.doi.org/10.1108/ics-01-2018-0006.
Full textLine, Maria Bartnes, and Eirik Albrechtsen. "Examining the suitability of industrial safety management approaches for information security incident management." Information & Computer Security 24, no. 1 (March 14, 2016): 20–37. http://dx.doi.org/10.1108/ics-01-2015-0003.
Full textFormby, William A., and Vergil L. Williams. "Assessing Security Manpower Needs for Industrial Sites." Industrial Management & Data Systems 85, no. 11/12 (November 1, 1985): 3–5. http://dx.doi.org/10.1108/eb057418.
Full textAkinsanya, Opeoluwa Ore, Maria Papadaki, and Lingfen Sun. "Towards a maturity model for health-care cloud security (M2HCS)." Information & Computer Security 28, no. 3 (December 16, 2019): 321–45. http://dx.doi.org/10.1108/ics-05-2019-0060.
Full textRasouli, Mohammad R., Rik Eshuis, Paul W. P. J. Grefen, Jos J. M. Trienekens, and Rob J. Kusters. "Information Governance in Dynamic Networked Business Process Management." International Journal of Cooperative Information Systems 25, no. 04 (December 2016): 1740004. http://dx.doi.org/10.1142/s0218843017400044.
Full textPham, Hiep-Cong, Jamal El-Den, and Joan Richardson. "Stress-based security compliance model – an exploratory study." Information & Computer Security 24, no. 4 (October 10, 2016): 326–47. http://dx.doi.org/10.1108/ics-10-2014-0067.
Full textRabii, Anass, Saliha Assoul, Khadija Ouazzani Touhami, and Ounsa Roudies. "Information and cyber security maturity models: a systematic literature review." Information & Computer Security 28, no. 4 (June 6, 2020): 627–44. http://dx.doi.org/10.1108/ics-03-2019-0039.
Full textAnjaria, Kushal, and Arun Mishra. "Relating Wiener’s cybernetics aspects and a situation awareness model implementation for information security risk management." Kybernetes 47, no. 1 (January 8, 2018): 58–79. http://dx.doi.org/10.1108/k-06-2017-0226.
Full textAgate, Vincenzo, Alessandra De Paola, Giuseppe Lo Re, and Marco Morana. "A Simulation Software for the Evaluation of Vulnerabilities in Reputation Management Systems." ACM Transactions on Computer Systems 37, no. 1-4 (June 2021): 1–30. http://dx.doi.org/10.1145/3458510.
Full textKotenko, Igor, and Elena Doynikova. "Selection of countermeasures against network attacks based on dynamical calculation of security metrics." Journal of Defense Modeling and Simulation: Applications, Methodology, Technology 15, no. 2 (March 8, 2017): 181–204. http://dx.doi.org/10.1177/1548512917690278.
Full textCampanile, Lelio, Marco Gribaudo, Mauro Iacono, Fiammetta Marulli, and Michele Mastroianni. "Computer Network Simulation with ns-3: A Systematic Literature Review." Electronics 9, no. 2 (February 5, 2020): 272. http://dx.doi.org/10.3390/electronics9020272.
Full textFu, Chao, Qing Lv, and Reza G. Badrnejad. "Fog computing in health management processing systems." Kybernetes 49, no. 12 (January 4, 2020): 2893–917. http://dx.doi.org/10.1108/k-09-2019-0621.
Full textYu, Xiaoying, and Qi Liao. "User password repetitive patterns analysis and visualization." Information & Computer Security 24, no. 1 (March 14, 2016): 93–115. http://dx.doi.org/10.1108/ics-06-2015-0026.
Full textCoppola, Pierluigi, Luigi dell’Olio, and Fulvio Silvestri. "Random-Parameters Behavioral Models to Investigate Determinants of Perceived Safety in Railway Stations." Journal of Advanced Transportation 2021 (August 24, 2021): 1–11. http://dx.doi.org/10.1155/2021/5530591.
Full textDiamantopoulou, Vasiliki, and Haralambos Mouratidis. "Practical evaluation of a reference architecture for the management of privacy level agreements." Information & Computer Security 27, no. 5 (November 11, 2019): 711–30. http://dx.doi.org/10.1108/ics-04-2019-0052.
Full textA. Rabaa'i, Ahmad, and Xiaodi Zhu. "Understanding the Determinants of Wearable Payment Adoption: An Empirical Study." Interdisciplinary Journal of Information, Knowledge, and Management 16 (2021): 173–211. http://dx.doi.org/10.28945/4746.
Full textStewart, Harrison, and Jan Jürjens. "Data security and consumer trust in FinTech innovation in Germany." Information & Computer Security 26, no. 1 (March 12, 2018): 109–28. http://dx.doi.org/10.1108/ics-06-2017-0039.
Full textRomuald Iwańkowicz, Remigiusz, and Wlodzimierz Rosochacki. "Clustering risk assessment method for shipbuilding industry." Industrial Management & Data Systems 114, no. 9 (October 7, 2014): 1499–518. http://dx.doi.org/10.1108/imds-06-2014-0193.
Full textMathrani, Sanjay, and Xusheng Lai. "Big Data Analytic Framework for Organizational Leverage." Applied Sciences 11, no. 5 (March 6, 2021): 2340. http://dx.doi.org/10.3390/app11052340.
Full textKassen, Maxat. "Politicization of e-voting rejection: reflections from Kazakhstan." Transforming Government: People, Process and Policy 14, no. 2 (May 4, 2020): 305–30. http://dx.doi.org/10.1108/tg-11-2019-0106.
Full textWong, Wai Peng, Hwee Chin Tan, Kim Hua Tan, and Ming-Lang Tseng. "Human factors in information leakage: mitigation strategies for information sharing integrity." Industrial Management & Data Systems 119, no. 6 (July 8, 2019): 1242–67. http://dx.doi.org/10.1108/imds-12-2018-0546.
Full textDorin, Alan. "Simulating Bee Pollination for Horticultural Applications." Proceedings 36, no. 1 (April 7, 2020): 178. http://dx.doi.org/10.3390/proceedings2019036178.
Full textAslam, Usman, Muhammad Arfeen, Wahbeeah Mohti, and Ubaid ur Rahman. "Organizational cynicism and its impact on privatization (evidence from federal government agency of Pakistan)." Transforming Government: People, Process and Policy 9, no. 4 (October 19, 2015): 401–25. http://dx.doi.org/10.1108/tg-11-2014-0054.
Full textKariuki, Paul, Lizzy O Ofusori, Prabhakar Rontala Subramanniam, Moses Okpeku, and Maria L Goyayi. "Challenges in Contact Tracing by Mining Mobile Phone Location Data for COVID-19: Implications for Public Governance in South Africa." Interdisciplinary Journal of Information, Knowledge, and Management 16 (2021): 101–24. http://dx.doi.org/10.28945/4736.
Full textYakubu, Bashir Ishaku, Shua’ib Musa Hassan, and Sallau Osisiemo Asiribo. "AN ASSESSMENT OF SPATIAL VARIATION OF LAND SURFACE CHARACTERISTICS OF MINNA, NIGER STATE NIGERIA FOR SUSTAINABLE URBANIZATION USING GEOSPATIAL TECHNIQUES." Geosfera Indonesia 3, no. 2 (August 28, 2018): 27. http://dx.doi.org/10.19184/geosi.v3i2.7934.
Full textJeon, Soohyun, Insoo Son, and Jinyoung Han. "Exploring the role of intrinsic motivation in ISSP compliance: enterprise digital rights management system case." Information Technology & People ahead-of-print, ahead-of-print (May 11, 2020). http://dx.doi.org/10.1108/itp-05-2018-0256.
Full textPham, Hiep Cong, Duy Dang Pham, Linda Brennan, and Joan Richardson. "Information Security and People: A Conundrum for Compliance." Australasian Journal of Information Systems 21 (January 18, 2017). http://dx.doi.org/10.3127/ajis.v21i0.1321.
Full textIrannezhad, Elnaz, and Renuka Mahadevan. "Is blockchain tourism’s new hope?" Journal of Hospitality and Tourism Technology ahead-of-print, ahead-of-print (December 11, 2020). http://dx.doi.org/10.1108/jhtt-02-2019-0039.
Full textAl Khoufi, Emad. "Adu, K.K. and Adjei, E. (2018). The phenomenon of data loss and cyber security issues in Ghana. Foresight, 20(2), 150–61. Ahmed, M.T.U., Bhuiya, N.I. and Rahman, M.M. (2017). A secure enterprise architecture focused on security and technology-transformation (SEAST), The 12th International Conference for Internet Technology and Secured Transactions, (ICITST-2017), Cambridge, UK, 11–4/12/2017. Alanazi, S.T., Anbar, M., Ebad, S.A., Karuppayah, S. and Al-Ani, H.A. (2020). Theory-based model and prediction analysis of information security compliance behavior in the Saudi healthcare sector. Symmetry, 12(9), 1544. DOI: 10.3390/sym12091544 Alateyah, S.A., Crowder, R.M. and Wills, G.B. (2013). Identified factors affecting the citizen’s intention to adopt e-government in Saudi Arabia. World Academy of Science, Engineering and Technology, 7(8), 904–12. Antonino, P., Duszynski, S., Jung, C. and Rudolph, M. (2010). Indicator-based architecture-level security evaluation in a service-oriented environment. In: The Fourth European Conference on Software Architecture: Copenhagen, Denmark, 23–26/08/2010. DOI: 10.1145/1842752.1842795. Chaturvedi, M., Gupta, M. and Bhattacharya, J. (2008). Cyber Security Infrastructure in India: A Study, Emerging Technologies in E-Government. Available at: http://www.csi-sigegov.org/emerging_pdf/9_70-84.pdf (Accessed on 15/11/2020). Dalol, M.H. (2018). Effectiveness of Accounting Information Systems in Light of Development of IT Infrastructure and Information Security. Master’s Dissertation, The Islamic University of Gaza, Gaza, Palestine. Dooley, K. (2001). Designing Large Scale LANs: Help for Network Designers. USA: O'Reilly Media. Ebad, S. (2018a) An exploratory study of ICT projects failure in emerging markets. Journal of Global Information Technology Management, 21(2), 139–60. DOI: 10.1080/1097198X.2018.1462071. Ebad, S. (2018b). The influencing causes of software unavailability: A case study from industry. Software Practice and Experience, 48(5), 1056–76. DOI: 10.1002/spe.2569. Hashizume, K., Rosado, D.G., Fernández-Medina, E. and Fernandez, E.B. (2013). An analysis of security issues for cloud computing. Journal of Internet Services and Applications, 4(5), n/a. DOI: 10.1186/1869-0238-4-5. Kirby, L. (2015). Beyond Cyber Security: Protecting Your IT Infrastructure. Available at https://uptimeinstitute.com/images/Documents/ProtectingYourITInfrastructure.pdf (accessed on 15/11/2020). Lethbridge, T.C., Sim, S.E. and Singer, J. (2005). Studying software engineers: Data collection techniques for software field studies. Empirical Software Engineering, 10(3), 311–41. Marrone, M. and Kolbe, L.M. (2011). Impact of IT service management frameworks on the IT organization. Business and Information Systems Engineering, 3(1), 5–18. Mastelic, T. and Brandic, I. (2013). TimeCap: Methodology for comparing IT infrastructures based on time and capacity metrics. In: The IEEE 6th International Conference on Cloud Computing, 131–8, Santa Clara, CA, USA, 28/06–03/07/2013. Mimura, M. and Suga, Y. (2019). Filtering malicious JavaScript code with Doc2Vec on an imbalanced dataset. In: The 14th Asia Joint Conference on Information Security (AsiaJCIS), Kobe, Japan, 24–31/08/2019. Pearlson, K.E., Saunders, C.S. and Galletta, D.F. (2019). Managing and Using Information Systems. 5th edition, USA: Wiley. Popp, K. and Meyer, R. (2011). Profit from Software Ecosystems Models, Ecosystems and Partnerships in the Software Industry. Norderstedt, Germany: Books on Demand. Priem, R. (2020). Distributed ledger technology for securities clearing and settlement: Benefits, risks, and regulatory implications. Financial Innovation, 6(11), n/a. DOI: 10.1186/s40854-019-0169-6. Rabii, L. and Abdelaziz, D. (2015). Comparison of e-readiness composite indicators, The 15th International Conference on Intelligent Systems Design and Applications (ISDA), Marrakech, Morocco, 14–16/12/2015. Sanchez-Nielsen, E., Padron-Ferrer, A. and Marreo-Estevez, F. (2011). A multi-agent system for incident management solutions on IT infrastructures. In: The 14th Conference of the Spanish Association for Artificial Intelligence (CAEPIA 2011), La Laguna, Spain, 07–11/11/2011. Schoenfisch, J, Meilicke, C., Stülpnagel, J.V. and Ortmann, J (2018). Root cause analysis in IT infrastructures using ontologies and abduction in Markov logic networks. Information Systems, 74(2), 103–16. Shang, S. and Seddon, P.B. (2000). A comprehensive framework for classifying the benefits of ERP systems. In: The 2000 American Conference of Information Systems, Long Beach, California, 10–13/08/2000. Shoffner, M., Owen, P., Mostafa, J., Lamm, B., Wang, X., Schmitt, C.P. and Ahalt S.C. (2013). The secure medical research workspace: An IT infrastructure to enable secure research on clinical data. Clinical and Translational Science, 6 (3), 222–5. Shrivastava, A.K. (2015). The impact assessment of IT Infrastructure on information security: a survey report. In: International Conference on Information Security and Privacy (ICISP2015), Nagpur, India, 11–12/12/2015. Sommerville, I. (2015). Software Engineering. 10th edition, UK: Pearson. Sousa, K.J. and Oz, E. (2015). Management Information Systems. 7th edition, USA: Cengage Learning. Teymourlouei, H., and Harris, V. (2019). Effective methods to monitor IT infrastructure security for small business. In: The 2019 International Conference on Computational Science and Computational Intelligence (CSCI), Las Vegas, NV, USA, 5–7/12/2019. Topper, J. (2018). Compliance is not security. Computer Fraud and Security, 2018(3), 5–8. DOI: 10.1016/S1361-3723(18)30022-8. Wohlin, C., Runeson, P., Host, M., Ohlsson, M.C., Regnell, B. and Wesslen, A. (2012). Experimentation in Software Engineering. Germany: Springer. Yasasin, E., Prester, J., Wagner, G. and Schryen, G. (2020). Forecasting IT security vulnerabilities –an empirical analysis. Computers and Security, 88(n/a), n/a. DOI: 10.1016/j.cose.2019.101610. Zambon, E., Etalle, S., Wieringa, R.J. and Hartel, P. (2010). Model-based qualitative risk assessment for availability of IT infrastructures. Software and Systems Modeling, 10(4), 553–80." Basic and Applied Sciences - Scientific Journal of King Faisal University 22, no. 1 (2021). http://dx.doi.org/10.37575/b/med/0038.
Full textChesher, Chris. "Mining Robotics and Media Change." M/C Journal 16, no. 2 (March 8, 2013). http://dx.doi.org/10.5204/mcj.626.
Full textArnold, Bruce, and Margalit Levin. "Ambient Anomie in the Virtualised Landscape? Autonomy, Surveillance and Flows in the 2020 Streetscape." M/C Journal 13, no. 2 (May 3, 2010). http://dx.doi.org/10.5204/mcj.221.
Full textLaforteza, Elaine M. "Prosthetics and the Chronically Ill Body: Living with Type 1 Diabetes and an Insulin Pump." M/C Journal 22, no. 5 (October 9, 2019). http://dx.doi.org/10.5204/mcj.1592.
Full textLee, Ashlin. "In the Shadow of Platforms." M/C Journal 24, no. 2 (April 27, 2021). http://dx.doi.org/10.5204/mcj.2750.
Full textBurns, Alex. "Select Issues with New Media Theories of Citizen Journalism." M/C Journal 10, no. 6 (April 1, 2008). http://dx.doi.org/10.5204/mcj.2723.
Full textBurns, Alex. "Select Issues with New Media Theories of Citizen Journalism." M/C Journal 11, no. 1 (June 1, 2008). http://dx.doi.org/10.5204/mcj.30.
Full textCinque, Toija. "A Study in Anxiety of the Dark." M/C Journal 24, no. 2 (April 27, 2021). http://dx.doi.org/10.5204/mcj.2759.
Full textWishart, Alison. "Make It So: Harnessing Technology to Provide Professional Development to Regional Museum Workers." M/C Journal 22, no. 3 (June 19, 2019). http://dx.doi.org/10.5204/mcj.1519.
Full textMudie, Ella. "Unbuilding the City: Writing Demolition." M/C Journal 20, no. 2 (April 26, 2017). http://dx.doi.org/10.5204/mcj.1219.
Full text