A process model for implementing information systems security governance M Nicho Information & Computer Security 26 (1), 10-38, 2018 | 87 | 2018 |
Human and organizational factors of healthcare data breaches: The swiss cheese model of data breach causation and prevention F Kamoun, M Nicho International Journal of Healthcare Information Systems and Informatics …, 2014 | 66 | 2014 |
Towards a taxonomy of challenges in an integrated IT governance framework implementation M Nicho, S Muamaar Journal of International Technology and Information Management 25 (2), 2, 2016 | 38 | 2016 |
Quick response code secure: a cryptographically secure anti-phishing tool for QR code attacks V Mavroeidis, M Nicho Computer Network Security: 7th International Conference on Mathematical …, 2017 | 37 | 2017 |
IT governance measurement tools and its application in IT-business alignment M Nicho, S Khan Journal of international technology and information management 26 (1), 81-111, 2017 | 36 | 2017 |
Success factors for integrated ITIL deployment: An IT governance classification M Nicho, BAI Mourad Journal of information technology case and application research 14 (1), 25-54, 2012 | 33 | 2012 |
Blockchain for Governments: The Case of the Dubai Government S Khan, M Shael, M Majdalawieh, N Nizamuddin, M Nicho Sustainability 14 (11), 6576, 2022 | 32 | 2022 |
Multiple case study approach to identify aggravating variables of insider threats in information systems M Nicho, F Kamoun Communications of the Association for Information Systems 35 (1), 18, 2014 | 28 | 2014 |
Dimensions of security threats in cloud computing: A case study M Nicho, M Hendy The Review of Business Information Systems (Online) 17 (4), 159, 2013 | 25 | 2013 |
A metrics generation model for measuring the control objectives of information systems audit M Nicho, B Cusack 2007 40th Annual Hawaii International Conference on System Sciences (HICSS …, 2007 | 24 | 2007 |
Managing information security risk using integrated governance risk and compliance M Nicho, S Khan, M Rahman 2017 International Conference on Computer and Applications (ICCA), 56-66, 2017 | 21 | 2017 |
IT controls in the public cloud: Success factors for allocation of roles and responsibilities S Khan, M Nicho, H Takruri Journal of information technology case and application research 18 (3), 155-180, 2016 | 18 | 2016 |
IT security governance innovations: theory and research: theory and research D Mellado IGI Global, 2012 | 17 | 2012 |
Identifying vulnerabilities of advanced persistent threats: An organizational perspective M Nicho, S Khan International Journal of Information Security and Privacy (IJISP) 8 (1), 1-18, 2014 | 15 | 2014 |
Dimensions of ‘socio’vulnerabilities of advanced persistent threats M Nicho, CD McDermott 2019 International Conference on Software, Telecommunications and Computer …, 2019 | 12 | 2019 |
An integrated security governance framework for effective PCI DSS implementation M Nicho, H Fakhry, C Haiber International Journal of Information Security and Privacy (IJISP) 5 (3), 50-67, 2011 | 12 | 2011 |
Role assigning and taking in cloud computing SN Khan, M Nicho, H Takruri, Z Maamar, F Kamoun Human Systems Management 38 (1), 1-27, 2019 | 11 | 2019 |
Identifying vulnerabilities in apt attacks: A simulated approach M Nicho, A Oluwasegun, F Kamoun 2018 9th IFIP International Conference on New Technologies, Mobility and …, 2018 | 11 | 2018 |
Information technology audit: systems alignment and effectiveness measures M Nicho Auckland University of Technology, 2008 | 10 | 2008 |
An information governance model for information security management M Nicho IT Security Governance Innovations: Theory and Research, 155-189, 2013 | 9 | 2013 |