What do we know about information security governance? “From the basement to the boardroom”: towards digital security governance

S Schinagl, A Shahim - Information & Computer Security, 2020 - emerald.com
Purpose This paper aims to review the information security governance (ISG) literature and
emphasises the tensions that exist at the intersection of the rapidly changing business …

A systematic mapping study on gamification within information security awareness programs

O Pahlavanpour, S Gao - Heliyon, 2024 - cell.com
Abstract Information security awareness (ISA) has become a vital issue for organizations, as
security breaches are usually attributed to human errors. ISP programs are effective ways to …

[PDF][PDF] Security challenges in healthcare cloud computing: a systematic

E Mehraeen, M Ghazisaeedi… - Global journal of …, 2017 - pdfs.semanticscholar.org
Background: Healthcare data are very sensitive records that should not be made available
to unauthorized people in order for protecting patient's information security. However, in …

Performance and scalability evaluation of a permissioned Blockchain based on the Hyperledger Fabric, Sawtooth and Iroha

A Woznica, M Kedziora - Computer Science and Information …, 2022 - doiserbia.nb.rs
This paper shows the performance and scalability evaluation of different blockchain platform
implementations. Hyperledger Iroha implementing YAC consensus, Sawtooth implementing …

A systematic mapping study in cloud for educational innovation

M Scalera, E Gentile, P Plantamura, G Dimauro - Applied Sciences, 2020 - mdpi.com
For some years now there has been a growing use of cloud computing technologies in
education. This paper reports a systematic mapping study (SMS) about the interest in the …

Gestión de seguridad de la información: revisión bibliográfica

LJ Cárdenas-Solano… - Profesional de …, 2016 - revista.profesionaldelainformacion …
Resumen Desde 1969, cuando Peter Drucker pronosticó el surgimiento de la" sociedad del
conocimiento", el capital intelectual de las organizaciones ha tomado más importancia en el …

Software vulnerabilities overview: A descriptive study

MC Sánchez, JMC de Gea… - Tsinghua Science …, 2019 - ieeexplore.ieee.org
Computer security is a matter of great interest. In the last decade there have been numerous
cases of cybercrime based on the exploitation of software vulnerabilities. This fact has …

Efficient improved ant colony optimisation algorithm for dynamic software rejuvenation in web services

K Rezaei Kalantari, A Ebrahimnejad… - IET Software, 2020 - Wiley Online Library
Software rejuvenation is an effective technique to counteract software ageing in
continuously‐running applications such as web‐service‐based systems. In a client‐server …

Analytical hierarchy process model for managing cloud security

ZB Rizvi, CB Ahmad Khan, M O'Sullivan - Information & Computer …, 2024 - emerald.com
Purpose This paper aims to explore key management actions for implementing security on
the cloud, which is a critical issue as many organizations are moving business processes …

[HTML][HTML] A method and validation for auditing e-Health applications based on reusable software security requirements specifications

CM Mejía-Granda, JL Fernández-Alemán… - International Journal of …, 2025 - Elsevier
Objective This article deals with the complex process of obtaining security requirements for e-
Health applications. It introduces a tailored audit and validation methodology particularly …