Volume 9 (2021)
Issue 1
Pages | Title | Author(s) | Papers |
714 - 721 | Best Practices Used by Businesses to Maintain Good Cyber Hygiene During Covid19 Pandemic DOI: 10.20533/jitst.2046.3723.2021.0086 |
Tabisa Ncubukezi, Laban Mwansa |
![]() |
722 - 725 | Behavioral Factors That Influence Employees to Comply With Information Security Policies DOI: 10.20533/jitst.2046.3723.2021.0087 |
Golan Carmi, Dan Bouhnik |
![]() |
726 - 729 | Monte Carlo Simulation Approach to Network Access Control DOI: 10.20533/jitst.2046.3723.2021.0088 |
Patricia Yetunde Omole-Matthew, Gabriel Junior Arome, Aderonke Favour-Berthy Thompson, Boniface Kayode Alese |
![]() |
730 - 734 | The Appropriation of Fear as a Context by Cybersecurity DOI: 10.20533/jitst.2046.3723.2021.0089 |
Anthony Caldwell |
![]() |
735 - 740 | Secure Storage and Sharing of COVID-19 Data in Health Facilities using AES-Cryptography and Audio Steganography DOI: 10.20533/jitst.2046.3723.2021.0090 |
Gabriel Junior Arome |
![]() |
741 - 746 | Oversampling Techniques in Machine Learning Detection of Credit Card Fraud DOI: 10.20533/jitst.2046.3723.2021.0091 |
Charlie Obimbo, Davleen Mand, Simarjeet Singh |
![]() |
747 - 755 | A Cost-benefit Analysis of Information Security Mitigation Methods for ORVIs DOI: 10.20533/jitst.2046.3723.2021.0092 |
Jake Street, Funminiyi Olajide |
![]() |