https://techfarmjournal.org/ijcis/index.php/ojs/issue/feed IJCIS : International Journal of Computing and Information Security 2022-06-15T06:59:52-07:00 Open Journal Systems <p style="text-align: justify;">A goal of the Journal is to publish papers with novel results in Computing Science and Information security. Software Engineering and Information Systems within the Journal topics. All papers are published in the English Language. The issues of the Journal are published monthly. The Editorial Board consists of about 50 recognized worldwide scientists.</p> <p style="text-align: justify;">The areas covered by this journal are listed on the <a href="https://techfarmjournal.org/ijcis/index.php/ojs/scope">scope page</a>. This journal will accept the following contributions: articles based on original research, reviews, special reports, opinion and analysis, brief communications, current topics, and letters. A brief description of the specific features for each type of contribution is outlined below, and formatting specifications for each type of manuscript are outlined in the section.</p> <p style="text-align: justify;">This journal publishes Original Research Articles, Review articles, Short Communications, Case Studies thesis, and government and non-governmental organizations reports.</p> <p style="text-align: justify;">We mainly follow the existing SCOPUS requirements and the Committee on Publication Ethics (COPE) Code of Conduct which is widely recognized in the world.<br />Interested in submitting to this journal? We recommend that you review the About the Journal page for the journal's section policies, as well as the <a href="https://techfarmjournal.org/ijcis/index.php/ojs/authors_guide">Author Guidelines</a>. Authors need to register with the journal prior to submitting or, if already registered, can simply log in and begin submission.</p> https://techfarmjournal.org/ijcis/index.php/ojs/article/view/6 Behavarioural Compliance Towards Information Security 2022-06-15T06:49:51-07:00 Wolali Ametepe wolaamet@gmail.com Ken Abraham wolaamet@gmail.com <p>Auditing has always played an important role in the business environment. With the introduction of information technology and the resulting security challenges that organizations face daily, it has become essential to ensure the security of the organization’s information and other valuable assets. However, one aspect that auditing does not cover effectively is that of the behaviour of the employee, which is so crucial to any organization’s security. The objective of this paper is to explore the potential problems concerning the attempt to audit the behaviour of the employee. It will be demonstrated that it is extremely difficult to audit human behaviour and so an alternative method to be behavioural auditing needs to be found, where policing the employee is not necessary, but instead a softer, more informal approach is used to change the culture to a more information security conscious one.</p> 2022-06-15T00:00:00-07:00 Copyright (c) 2022 IJCIS : International Journal of Computing and Information Security https://techfarmjournal.org/ijcis/index.php/ojs/article/view/4 Knowledge Sharing and Decision Support System 2022-06-15T06:42:02-07:00 Wolali Ametepe wolaamet@gmail.com Florence Ametepe wolaamet@gmail.com <p>In a scenario where Healthcare organizations tend to rapid decentralization, with multiple actors involved in the care delivery processes, the importance for professionals to collaborate, access and share data and knowledge becomes more and more stringent. New technologies have improved the ability of electronically storing, transferring and sharing medical data; at the same time, they also create serious questions about who has access to this information and how it is protected. The aim of Doc@Hand is to support healthcare professionals in this changing environment, by providing a set of IT tools that help reducing the time and associated costs to collect the information and knowledge required, and, more crucially, [<a href="#_ENREF_1">1</a>] in making the best use of it for a more informed decision making (diagnoses, therapies, protocols).</p> 2022-06-15T00:00:00-07:00 Copyright (c) 2022 IJCIS : International Journal of Computing and Information Security https://techfarmjournal.org/ijcis/index.php/ojs/article/view/7 Waves Of Information Security 2022-06-15T06:59:52-07:00 Wolali Ametepe wolaamet@gmail.com Florence Ametepe wolaamet@gmail.com <p>In a previous article [<a href="#_ENREF_1">1</a>] the development of Information Security up to the year 2000 was characterized as consisting of three waves:&nbsp; the technical wave, the management wave, and the institutional wave. This paper continues this development of Information Security by characterizing the Fourth Wave – that of Information Security Governance.</p> 2022-06-15T00:00:00-07:00 Copyright (c) 2022 IJCIS : International Journal of Computing and Information Security https://techfarmjournal.org/ijcis/index.php/ojs/article/view/5 Data Modelling Predictive Preparation 2022-06-15T06:46:09-07:00 Jessey Anang frametepewo@yahoo.co.uk Wolali Ametepe frametepewo@yahoo.co.uk <p>Predictive modelling is aimed at developing tools that can be used for individual prediction of the most likely value of a continuous measure, or the probability of the occurrence (or recurrence) of an event. There has been a huge increase in popularity of developing tools for prediction of outcomes at the level of the individual patient. For instance, a recent review identified a total of 363 articles that described the development of prediction models for the risk of cardiovascular disease in the general population alone</p> 2022-06-15T00:00:00-07:00 Copyright (c) 2022 IJCIS : International Journal of Computing and Information Security https://techfarmjournal.org/ijcis/index.php/ojs/article/view/2 Ensuring Distributed Culpability for Provenance Sharing in the cloud 2022-04-05T09:20:03-07:00 Wolali Ametepe woolajs@outlooook.com Wang Changda changda@ujs.edu.cn Li Xiaowei changda@ujs.edu.cn <p>Cloud computing infrastructure is a new skill for sharing information Technology and data based services over the information super highway. Society, industry and science are being developed by essential new skills for information sharing. The major aspect for crosscutting question is recording and managing provenance, or information about the derivation, context, origin, or history of data. We postulate that data provenance will perform a vital role in developing advanced digital setups. Several researches have been conducted by focusing on managing, recording mechanisms or by means of provenance information. In this paper, we present the implementation of an automatic collection and storage of data provenance, by developing provenance collection and storage model. We also designed uniform interface with provenance triggering protocol for sending provenance to more than one cloud at the same time. To satisfy the basic models that define data provenance and relate it to security goals such as confidentiality, integrity and availability (CIA), we deployed security implementation on data provenance using Shamir’s secret sharing principle.</p> 2022-04-05T00:00:00-07:00 Copyright (c) 2022 IJCIS : International Journal of Computing and Information Security