Search
Now showing items 21-23 of 23
Efficient Resource Utilization in Information Security Risk Management Investment
(International Journal of Computer Applications Technology and Research, 2018)
Efficient Resource Utilization in Information Security Risk Management Investment can improve organization resiliency to information security threats through identifying key information assets and security risks so that ...
Validation of Extended Theory of Reasoned Action to Predict Mobile Phone Money Usage
(World Journal of Computer Application and Technology, 2018-01-13)
Theory of Reasoned Action (TRA), postulated by social psychologist, has been established to be relevant in guiding Information Systems studies. The theory resulted from attitude research using the Expectancy Value Models. ...
Emerging Security Challenges due to Bring Your Own Device Adoption
(International Journal of Science and Research (IJSR), 2018-01-01)
Although a number of researches have been carried out by various organizations across the globe to establish security challenges facing education institutions due to BYOD adoption there is no evidence that a similar study ...