SWOT analysis of information security management system ISO 27001 The ongoing concern for information security in organizations and highlights the use of the ISO 27000 series [..] Read more
Optimizing Server Refresh Cycles: The Case for Circular Economy With an Aging Moore’s Law As digital services demand escalates, data centres, pivotal to this growth, face the challenge of increasing energy [..] Read more
The impact of repeated data breach events on organisations’ market value Diving into the financial landscape, this study determines the direct impact of information security breaches on [..] Read more
An authentication model towards cloud federation in the enterprise In the realm of cloud computing, the architecture is crucial for security and performance, impacting service providers [..] Read more
Towards a more representative definition of cyber security In today’s digital landscape, the term “cyber security” is widely adopted across various sectors, including practitioners, politicians, Read more
Security predictions—A way to reduce uncertainty IT and security professionals face uncertainty due to rapid changes in security threats. Decision support data [..] Read more
How Software Architects Focus Their Attention Unlock the secrets of software architecture success! We identified a common challenge for new architects: figuring out [..] Read more
Corporate Information Security Investment Decisions: A Qualitative Data Analysis Approach The heightened attention to information security in boardrooms, subjecting security programs to increased scrutiny from senior business [..] Read more
A cost effective cloud data centre capacity planning method based on modality cost analysis In data center resource provisioning, the challenge lies in efficiently allocating resources to meet service level [..] Read more
Data Center Energy Demand: What Got Us Here Won’t Get Us There Given environmentalism’s rising tide and increasing energy prices and IT workloads, architects must determine whether they [..] Read more