Skip to Main Content
Keywords: Information security
Close
Follow your search
Access your saved searches in your account

Would you like to receive an alert when new items match your search?
Close Modal
Sort by
Journal Articles
Journal of Systems and Information Technology (2026) 28 (2): 173–202.
Published: 14 October 2025
...Pengcheng Wang; Maheshwar Boodraj; Richard Baskerville Purpose This paper aims to investigate the hidden risks that result from implementing two-factor authentication, a widely adopted technique for enhancing information security. Two-factor authentication systems can provide an effective solution...
Journal Articles
Journal of Systems and Information Technology (2015) 17 (2): 193–219.
Published: 11 May 2015
...Palaniappan Shamala; Rabiah Ahmad; Ali Hussein Zolait; Shahrin bin Sahib Purpose – Information security has become an essential entity for organizations across the globe to eliminate the possible risks in their organizations by conducting information security risk assessment (ISRA). However...
Journal Articles
Journal of Systems and Information Technology (2014) 16 (3): 210–221.
Published: 05 August 2014
... the human factors that affect information security. The sample is consisted of 103 employees that use computers at work. Pearson correlation analysis between lack of awareness and nine (9) computer security risks is performed. Findings – Examining the association of lack of awareness...
Journal Articles
Journal of Systems and Information Technology (2012) 14 (4): 336–352.
Published: 09 November 2012
...@yu.edu.jo © Emerald Group Publishing Limited 2012 Programming and algorithm theory Information management Data security Data encapsulation Steganography Information hiding Watermarking Information security Information hiding is a technique used to hide secret information within...
Journal Articles
Journal of Systems and Information Technology (2012) 14 (3): 246–263.
Published: 10 August 2012
.... Faruq A. Al‐Omari can be contacted at: fomari@yu.edu.jo © Emerald Group Publishing Limited 2012 Information technology Data encapsulation Information security Steganography Information hiding Watermarking Information hiding is a technique used to hide secret information within...
Journal Articles

or Create an Account

Close Modal
Close Modal