ISSN: 1690-4524 (Online)
Peer Reviewed Journal via three different mandatory reviewing processes, since 2006, and, from September 2020, a fourth mandatory peer-editing has been added.
Indexed byDOAJ (Directory of Open Access Journals)Benefits of supplying DOAJ with metadata:DOAJ's statistics show more than 900 000 page views and 300 000 unique visitors a month to DOAJ from all over the world. Many aggregators, databases, libraries, publishers and search portals collect our free metadata and include it in their products. Examples are Scopus, Serial Solutions and EBSCO . DOAJ is OAI compliant and once an article is in DOAJ, it is automatically harvestable. DOAJ is OpenURL compliant and once an article is in DOAJ, it is automatically linkable. Over 95% of the DOAJ Publisher community said that DOAJ is important for increasing their journal's visibility. DOAJ is often cited as a source of quality, open access journals in research and scholarly publishing circles. JSCI Supplies DOAJ with Meta Data
, Academic Journals Database, and Google Scholar
Listed inCabell Directory of Publishing Opportunities and in Ulrich’s Periodical Directory
Published by
The International Institute of Informatics and Cybernetics
Re-Published in
Academia.edu (A Community of about 40.000.000 Academics)
Utilization of Artificial Intelligence by Students in Interdisciplinary Field of Biomedical Engineering Shigehiro Hashimoto (pages: 1-5) Transdisciplinary Applications of Data Visualization and Data Mining Techniques as Represented for Human Diseases Richard S. Segall (pages: 6-15) Beyond Status Quo: Why is Transdisciplinary Communication Instrumental in Innovation? James Lipuma , Cristo Leon (pages: 16-20) How We Can Locate Validatable Foundations of Life Themes Jeremy Horne (pages: 21-32) Bringing Discipline into Transdisciplinary Communications -The ISO 56000 Family of Innovation Standards- Rick Fernandez , William Swart (pages: 33-39) To AI Is Human: How AI Tools with Their Imperfections Enhance Learning Martin Cwiakala (pages: 40-46) Knowledge, Learning and Transdisciplinary Communication in the Evolution of the Contemporary World Rita Micarelli , Giorgio Pizziolo (pages: 47-52) Human Complexity vs. Machine Linearity: Tug-of-War Between Two Realities Coexisting in Precarious Balance Paolo Barile , Clara Bassano , Paolo Piciocchi (pages: 53-62) A Cybernetic Metric Approach to Course Preparation Russell Jay Hendel (pages: 63-70) The Impact of Artificial Intelligence on Education John Jenq (pages: 71-76) Bridging the Gap: Harnessing the Power of Machine Learning and Big Data for Media Research Li-jing Arthur Chang (pages: 77-84) Image Processing, Computer Vision, Data Visualization, and Data Mining for Transdisciplinary Visual Communication: What Are the Differences and Which Should or Could You Use? Richard S. Segall (pages: 85-92) Identification – The Essence of Education Jeremy Horne (pages: 93-99) The Greek-Roman Theatre in the Mediterranean Area Maria Rosaria D’acierno Canonici Cammino (pages: 100-108) Examination of AI and Conventional Teaching Approaches in Cultivating Critical Thinking Skills in High School Students Luis Castillo (pages: 109-112) Thoughts, Labyrinths, and Torii Maurício Vieira Kritz (pages: 113-119) Can Two Human Intelligences (HIs or Noes ) and Two Artificial Intelligences (AIs) Get Involved in Interlinguistic Communication? – A Transdisciplinary Quest Ekaterini Nikolarea (pages: 120-128)
ABSTRACT
Information Security Service Branding
– beyond information security awareness Rahul Rastogi, Rossouw Von Solms
End-users play a critical role in the effective implementation
and running of an information security program in any
organization. The success of such a program depends primarily
on the effective implementation and execution of associated
information security policies and controls and the resultant
behavior and actions of end-users. However, end-users often
have negative perception of information security in the
organization and exhibit non-compliance. In order to improve
compliance levels, it is vital to improve the image of
information security in the minds of end-users. This paper
borrows the concepts of brands and branding from the domain
of marketing to achieve this objective and applies these
concepts to information security. The paper also describes a
process for creating the information security service brand in
the organization.
Full Text