Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Date
Availability
1-6 of 6
Keywords: Information security
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
Beyond passwords: A review of the hidden risks in two-factor authentication
Available to Purchase
Journal of Systems and Information Technology (2026) 28 (2): 173–202.
Published: 14 October 2025
...Pengcheng Wang; Maheshwar Boodraj; Richard Baskerville Purpose This paper aims to investigate the hidden risks that result from implementing two-factor authentication, a widely adopted technique for enhancing information security. Two-factor authentication systems can provide an effective solution...
Journal Articles
Collective information structure model for Information Security Risk Assessment (ISRA)
Available to Purchase
Journal of Systems and Information Technology (2015) 17 (2): 193–219.
Published: 11 May 2015
...Palaniappan Shamala; Rabiah Ahmad; Ali Hussein Zolait; Shahrin bin Sahib Purpose – Information security has become an essential entity for organizations across the globe to eliminate the possible risks in their organizations by conducting information security risk assessment (ISRA). However...
Journal Articles
Human factor and information security in higher education
Available to PurchaseEfthymia Metalidou, Catherine Marinagi, Panagiotis Trivellas, Niclas Eberhagen, Georgios Giannakopoulos, Christos Skourlas
Journal of Systems and Information Technology (2014) 16 (3): 210–221.
Published: 05 August 2014
... the human factors that affect information security. The sample is consisted of 103 employees that use computers at work. Pearson correlation analysis between lack of awareness and nine (9) computer security risks is performed. Findings – Examining the association of lack of awareness...
Journal Articles
An innovative information hiding technique utilizing cumulative peak histogram regions
Available to Purchase
Journal of Systems and Information Technology (2012) 14 (4): 336–352.
Published: 09 November 2012
...@yu.edu.jo © Emerald Group Publishing Limited 2012 Programming and algorithm theory Information management Data security Data encapsulation Steganography Information hiding Watermarking Information security Information hiding is a technique used to hide secret information within...
Journal Articles
An innovative information hiding technique utilizing cumulative peak histogram regions
Available to Purchase
Journal of Systems and Information Technology (2012) 14 (3): 246–263.
Published: 10 August 2012
.... Faruq A. Al‐Omari can be contacted at: fomari@yu.edu.jo © Emerald Group Publishing Limited 2012 Information technology Data encapsulation Information security Steganography Information hiding Watermarking Information hiding is a technique used to hide secret information within...
Journal Articles
Assessment of information security maturity: An exploration study of Malaysian public service organizations
Available to Purchase
Journal of Systems and Information Technology (2012) 14 (1): 23–57.
Published: 17 March 2012
...Suhazimah Dzazali; Ali Hussein Zolait Purpose The purpose of this paper is to examine the basis factors involved in the information security management systems of Malaysian public service (MPS) organizations. Therefore, it proposes an empirical analysis which was conducted to identify...
