- Information and Cyber Security
- Cybercrime and Law Enforcement Studies
- Network Security and Intrusion Detection
- Technology Adoption and User Behaviour
- Smart Systems and Machine Learning
- Big Data and Business Intelligence
- FinTech, Crowdfunding, Digital Finance
- Impact of AI and Big Data on Business and Society
- Safety Systems Engineering in Autonomy
- Advanced Malware Detection Techniques
- Software Engineering Research
- Blockchain Technology Applications and Security
- Cloud Data Security Solutions
- Privacy, Security, and Data Protection
Universität Hamburg
2021-2022
University of Koblenz and Landau
2017-2018
Universität Koblenz
2017
Purpose The purpose of this study is to empirically analyse the key factors that influence adoption financial technology innovation in country Germany. advancement mobile devices and their usage have increased uptake (FinTech) innovation. Financial sectors startups see FinTech as a gateway increase business opportunities, but applications other platforms must be launched explore such opportunities. Mobile application security threats tremendously become challenge for both users innovators....
Purpose The aim of this study is to encourage management boards recognize that employees play a major role in the information security. Thus, these issues need be addressed efficiently, especially organizations which data are valuable asset. Design/methodology/approach Before developing instrument for survey, first, effective measurement built upon existing literature review was identified and developed survey questionnaires were set according past studies findings based on qualitative...
Digital transformation has become one of the most popular strategies for information systems (IS). Developing and implementing a digital strategy is mandatory task any organization that relies on systems. In this age, an IS/IT without security considerations could lead to serious data breaches. Despite all countermeasures, remains major concern in transformation, as digitization misjudged brings with it concerns. The manual goods, processes services, well their use, leads various issues...
The integration of security aspects into software development is an open topic, especially in highly regulated industries where standards are accompanied by a high degree complexity. research question this paper relates to the misconception industry compliance and field development. Cyber attackers constantly inventing new tools penetrate systems exploit even most minor flaws, adherence standard not solution. In study, empirical investigation conducted over six-month period observe various...
Purpose The purpose of this study is to develop a model called “IaaS adoption” identify the various challenges and precise implications that hinder adoption infrastructure as service (IaaS) in Germany. Design/methodology/approach was validated by an online survey 208 bank employees. Findings found nine-five-circle factors (data security, risk trust) other proved be statistically significant for IaaS acceptance among banks Originality/value cloud technology its advantages still critical issue...
Purpose This paper aims to develop an effective information security policy (ISP), which is important mechanism combat insider threats. Design/methodology/approach A general framework based on the Nine-Five-circle was proposed for developing, implementing and evaluating organisation's ISP. Findings The outlines steps involved in a successful Research limitations/implications study took place Germany, most of data collected virtually due different locations organisation. Practical...
The increases in mobile applications, IoT, and cloud technology have recently witnessed massive data leaks, ranging from personally identifiable information to corporate secrets.Despite numerous standards frameworks, human errors that cause security breaches not yet been managed.This study contributes the ISMS literature regarding processing operating of an concept based on new comprehensive measures management.The uses exploratory surveys determine significant differences fifty financial...
Earlier research by our team have focussed the multilayer SAM spiking neural network using training algorithms for implementing FPGA.In current work we outlined utilization of SAM-based developing function approximation.We deployed spike coding model work.In testing proved that "interpolated XOR" and 3-polynominal approximation this network.We found has ability to perform these approximations high accuracy.