In today's IT-centric, regulated and competitive environment, businesses rely more heavily on IT technologies. Organizations are often challenged by customers, business partn...
Alfred Ka Yiu Wong, Nandan Paramesh, Pradeep Kumar...
Dispute of transactions is a common problem that could jeopardise business. Hence non-repudiation services are essential in business transactions which provide evidence to enable ...
: Metrics are both fashionable and timely: many regulations that affect cybersecurity rely upon metrics – albeit, of the checklist variety in many cases – to ascertain complian...
Abstract. Information security risk management (ISRM) heavily depends on realistic impact values representing the resources’ importance in the overall organizational context. Alt...
In recent years, Software-as-a-Service (SaaS) is gaining momentum with more and more successful adoptions. Several companies including some well known names have embraced this new...