Search
Now showing items 1-4 of 4
Addition-composition Fully Homomorphic Encryption sheme and its Enhancement of Data Security in Cloud Computing
(JOOUST, 2019)
Cloud computing is a technological paradigm that enables computer users to access computing applications and services on a pay-as-you-use model. Over the years, the adoption of cloud computing by cloud service providers ...
A Stratified Cyber Security Vigilance Model for Corporate Information Technology Infrastructure
(JOOUST, 2019-06)
Cyberspace is a relatively new unavoidable battlefield for most organizations- businesses governments, security agencies, learning and research institutions, political parties, terrorist groups and many others. As a result ...
Influence of Accounting Security Threats on the Relationship between Computerized Financial Systems and Audit Risk Management in Public Institutions
(JOOUST, 2019)
The rapid change in information technology, the wide spread of user-friendly systems and
the great desire of organizations to acquire and implement up-to-date computerized financial systems and software's. ...
Integrated e-marketing adoption model for small businesses: An institutional theory perspective.
(JOOUST, 2019)
Small sized businesses play an important role in the growth of economies all over the world, yet they appear to be slow in adopting E-marketing technology to market their products and services despite the benefits ...