Issue 1

Pages Title Author(s) Papers
714 - 721 Best Practices Used by Businesses to Maintain Good Cyber Hygiene During Covid19 Pandemic

DOI: 10.20533/jitst.2046.3723.2021.0086
Tabisa Ncubukezi, Laban Mwansa Download Paper
722 - 725 Behavioral Factors That Influence Employees to Comply With Information Security Policies

DOI: 10.20533/jitst.2046.3723.2021.0087
Golan Carmi, Dan Bouhnik Download Paper
726 - 729 Monte Carlo Simulation Approach to Network Access Control

DOI: 10.20533/jitst.2046.3723.2021.0088
Patricia Yetunde Omole-Matthew, Gabriel Junior Arome, Aderonke Favour-Berthy Thompson, Boniface Kayode Alese Download Paper
730 - 734 The Appropriation of Fear as a Context by Cybersecurity

DOI: 10.20533/jitst.2046.3723.2021.0089
Anthony Caldwell Download Paper
735 - 740 Secure Storage and Sharing of COVID-19 Data in Health Facilities using AES-Cryptography and Audio Steganography

DOI: 10.20533/jitst.2046.3723.2021.0090
Gabriel Junior Arome Download Paper
741 - 746 Oversampling Techniques in Machine Learning Detection of Credit Card Fraud

DOI: 10.20533/jitst.2046.3723.2021.0091
Charlie Obimbo, Davleen Mand, Simarjeet Singh Download Paper
747 - 755 A Cost-benefit Analysis of Information Security Mitigation Methods for ORVIs

DOI: 10.20533/jitst.2046.3723.2021.0092
Jake Street, Funminiyi Olajide Download Paper
0