Follow
Mathew Nicho
Mathew Nicho
Associate Professor, Rabdan Academy
Verified email at ra.ac.ae
Title
Cited by
Cited by
Year
A process model for implementing information systems security governance
M Nicho
Information & Computer Security 26 (1), 10-38, 2018
832018
Human and organizational factors of healthcare data breaches: The swiss cheese model of data breach causation and prevention
F Kamoun, M Nicho
International Journal of Healthcare Information Systems and Informatics …, 2014
632014
IT governance measurement tools and its application in IT-business alignment
M Nicho, S Khan
Journal of international technology and information management 26 (1), 81-111, 2017
352017
Towards a taxonomy of challenges in an integrated IT governance framework implementation
M Nicho, S Muamaar
Journal of International Technology and Information Management 25 (2), 2, 2016
352016
Success factors for integrated ITIL deployment: An IT governance classification
M Nicho, BAI Mourad
Journal of information technology case and application research 14 (1), 25-54, 2012
332012
Quick response code secure: a cryptographically secure anti-phishing tool for QR code attacks
V Mavroeidis, M Nicho
Computer Network Security: 7th International Conference on Mathematical …, 2017
322017
Multiple case study approach to identify aggravating variables of insider threats in information systems
M Nicho, F Kamoun
Communications of the Association for Information Systems 35 (1), 18, 2014
282014
Dimensions of security threats in cloud computing: A case study
M Nicho, M Hendy
Review of Business Information Systems (RBIS) 17 (4), 159-170, 2013
242013
A metrics generation model for measuring the control objectives of information systems audit
M Nicho, B Cusack
2007 40th Annual Hawaii International Conference on System Sciences (HICSS …, 2007
242007
Blockchain for Governments: The Case of the Dubai Government
S Khan, M Shael, M Majdalawieh, N Nizamuddin, M Nicho
Sustainability 14 (11), 6576, 2022
222022
Managing information security risk using integrated governance risk and compliance
M Nicho, S Khan, M Rahman
2017 International Conference on Computer and Applications (ICCA), 56-66, 2017
212017
IT controls in the public cloud: Success factors for allocation of roles and responsibilities
S Khan, M Nicho, H Takruri
Journal of information technology case and application research 18 (3), 155-180, 2016
192016
IT security governance innovations: theory and research: theory and research
D Mellado
IGI Global, 2012
172012
Identifying vulnerabilities of advanced persistent threats: An organizational perspective
M Nicho, S Khan
International Journal of Information Security and Privacy (IJISP) 8 (1), 1-18, 2014
152014
An integrated security governance framework for effective PCI DSS implementation
M Nicho, H Fakhry, C Haiber
International Journal of Information Security and Privacy (IJISP) 5 (3), 50-67, 2011
122011
Dimensions of ‘socio’vulnerabilities of advanced persistent threats
M Nicho, CD McDermott
2019 International Conference on Software, Telecommunications and Computer …, 2019
112019
Role assigning and taking in cloud computing
SN Khan, M Nicho, H Takruri, Z Maamar, F Kamoun
Human Systems Management 38 (1), 1-27, 2019
112019
Identifying vulnerabilities in apt attacks: A simulated approach
M Nicho, A Oluwasegun, F Kamoun
2018 9th IFIP International Conference on New Technologies, Mobility and …, 2018
112018
Information technology audit: systems alignment and effectiveness measures
M Nicho
Auckland University of Technology, 2008
102008
An information governance model for information security management
M Nicho
IT Security Governance Innovations: Theory and Research, 155-189, 2013
92013
The system can't perform the operation now. Try again later.
Articles 1–20