Harrison Stewart

ORCID: 0000-0002-6956-9508
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Information and Cyber Security
  • Cybercrime and Law Enforcement Studies
  • Network Security and Intrusion Detection
  • Technology Adoption and User Behaviour
  • Smart Systems and Machine Learning
  • Big Data and Business Intelligence
  • FinTech, Crowdfunding, Digital Finance
  • Impact of AI and Big Data on Business and Society
  • Safety Systems Engineering in Autonomy
  • Advanced Malware Detection Techniques
  • Software Engineering Research
  • Blockchain Technology Applications and Security
  • Cloud Data Security Solutions
  • Privacy, Security, and Data Protection

Universität Hamburg
2021-2022

University of Koblenz and Landau
2017-2018

Universität Koblenz
2017

Purpose The purpose of this study is to empirically analyse the key factors that influence adoption financial technology innovation in country Germany. advancement mobile devices and their usage have increased uptake (FinTech) innovation. Financial sectors startups see FinTech as a gateway increase business opportunities, but applications other platforms must be launched explore such opportunities. Mobile application security threats tremendously become challenge for both users innovators....

10.1108/ics-06-2017-0039 article EN Information and Computer Security 2018-01-30

Purpose The aim of this study is to encourage management boards recognize that employees play a major role in the information security. Thus, these issues need be addressed efficiently, especially organizations which data are valuable asset. Design/methodology/approach Before developing instrument for survey, first, effective measurement built upon existing literature review was identified and developed survey questionnaires were set according past studies findings based on qualitative...

10.1108/ics-07-2016-0054 article EN Information and Computer Security 2017-11-06

Digital transformation has become one of the most popular strategies for information systems (IS). Developing and implementing a digital strategy is mandatory task any organization that relies on systems. In this age, an IS/IT without security considerations could lead to serious data breaches. Despite all countermeasures, remains major concern in transformation, as digitization misjudged brings with it concerns. The manual goods, processes services, well their use, leads various issues...

10.1080/08874417.2022.2115953 article EN Journal of Computer Information Systems 2022-09-07

The integration of security aspects into software development is an open topic, especially in highly regulated industries where standards are accompanied by a high degree complexity. research question this paper relates to the misconception industry compliance and field development. Cyber attackers constantly inventing new tools penetrate systems exploit even most minor flaws, adherence standard not solution. In study, empirical investigation conducted over six-month period observe various...

10.1142/s0218194022500152 article EN International Journal of Software Engineering and Knowledge Engineering 2022-03-01

Purpose The purpose of this study is to develop a model called “IaaS adoption” identify the various challenges and precise implications that hinder adoption infrastructure as service (IaaS) in Germany. Design/methodology/approach was validated by an online survey 208 bank employees. Findings found nine-five-circle factors (data security, risk trust) other proved be statistically significant for IaaS acceptance among banks Originality/value cloud technology its advantages still critical issue...

10.1108/ics-01-2021-0002 article EN Information and Computer Security 2021-08-23

Purpose This paper aims to develop an effective information security policy (ISP), which is important mechanism combat insider threats. Design/methodology/approach A general framework based on the Nine-Five-circle was proposed for developing, implementing and evaluating organisation's ISP. Findings The outlines steps involved in a successful Research limitations/implications study took place Germany, most of data collected virtually due different locations organisation. Practical...

10.1108/ics-06-2021-0076 article EN Information and Computer Security 2022-02-04

The increases in mobile applications, IoT, and cloud technology have recently witnessed massive data leaks, ranging from personally identifiable information to corporate secrets.Despite numerous standards frameworks, human errors that cause security breaches not yet been managed.This study contributes the ISMS literature regarding processing operating of an concept based on new comprehensive measures management.The uses exploratory surveys determine significant differences fifty financial...

10.6025/jdim/2022/20/3/90-103 article EN Journal of Digital Information Management 2022-09-01

Earlier research by our team have focussed the multilayer SAM spiking neural network using training algorithms for implementing FPGA.In current work we outlined utilization of SAM-based developing function approximation.We deployed spike coding model work.In testing proved that "interpolated XOR" and 3-polynominal approximation this network.We found has ability to perform these approximations high accuracy.

10.6025/jdim/2022/20/4/115-130 article EN Journal of Digital Information Management 2022-12-01

10.6025/jdim/2022/20/2/46-66 article EN Journal of Digital Information Management 2022-06-01
Coming Soon ...