Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Mathew Nicho is active.

Publication


Featured researches published by Mathew Nicho.


Journal of information technology case and application research | 2012

Success Factors for Integrated Itil Deployment: An it Governance Classification

Mathew Nicho; Basel Ai Mourad

Abstract ITIL (IT infrastructure library) is a specific, detailed, and widely used service management framework commonly implemented with relevant IS controls from ITG frameworks resulting in integrated ITIL deployment. Since cultural differences impact ITG implementations, it remains unknown whether the success factors of ITG implementation that are applicable in one context can be transposed into a distinctly different context and lead to integrated ITIL deployment. Hence the objective of this study is to come up with a set of success factors from the Asian context gleaned through (I) a high level ITG model and (2) an ITIL specific perspective resulting in a classified set of success factors from an ITG perspective for integrated ITIL deployment. This is done through an exploratory study of six successful LTG/ITIL implemented organizations in the United Arab Emirates through interviews with key IS audit and security personnel. Information is obtained from the respondents on the appropriate success factors to be used for ITIL deployment rather than their experiences in implementing ITIL. While valuable research have been done on ‘best practices’, ‘critical success factors’, ‘success factors’, and ‘adoption factors’ for ITIL implementation, the objective in this study is not only to test the existing list in a different context but also extend and classify the list from a broader ITG and ITIL specific perspective, and to provide contextual positioning of success factors for practitioners


International Journal of Information Security and Privacy | 2014

Identifying Vulnerabilities of Advanced Persistent Threats: An Organizational Perspective

Mathew Nicho; Shafaq Khan

One of the most serious and persistent threat that has emerged in recent years combining technical as well as non-technical skills is the Advanced Persistent Threat, commonly known as APT where hackers circumvent the organizational defenses and instead target the naivety of the employees in making an unintentional mistake. While this threat has gained prominence in recent years, research on its cause and mitigation is still at the infancy stage. In this paper the authors explore APT vulnerabilities from an organizational perspective to create a taxonomy of non-technical and technical vulnerabilities. The objective is to enhance awareness and detection of APT vulnerabilities by managers and end users. To this end, the authors conducted interviews with senior IT managers in three large organizations in Dubai, United Arab Emirates. The analysis of the findings suggested that the APT threat environment is affected by multiple factors spanning primarily non-technical as well as technical vulnerabilities.


International Journal of Healthcare Information Systems and Informatics | 2014

Human and Organizational Factors of Healthcare Data Breaches: The Swiss Cheese Model of Data Breach Causation And Prevention

Faouzi Kamoun; Mathew Nicho

Over the past few years, concerns related to healthcare data privacy have been mounting since healthcare information has become more digitized, distributed and mobile. However, very little is known about the root cause of data breach incidents; making it difficult for healthcare organizations to establish proper security controls and defenses. Through a systematic review and synthesis of data breaches literature, and using databases of earlier reported healthcare data breaches, the authors re-examine and analyze the causal factors behind healthcare data breaches. The authors then use the Swiss Cheese Model SCM to shed light on the technical, organizational and human factors of these breaches. The authors research suggests that incorporating the SCM concepts into the healthcare security policies and procedures can assist healthcare providers in assessing the vulnerabilities and risks associated with the maintenance and transmission of protected health information.


International Journal of Information Security and Privacy | 2011

An Integrated Security Governance Framework for Effective PCI DSS Implementation

Mathew Nicho; Hussein Fakhry; Charles Haiber


business information systems | 2013

Dimensions Of Security Threats In Cloud Computing: A Case Study

Mathew Nicho; Mahmoud El Hendy


Communications of The Ais | 2014

Multiple Case Study Approach to Identify Aggravating Variables of Insider Threats in Information Systems

Mathew Nicho; Faouzi Kamoun


Journal of Applied Computing and Information Technology | 2004

Implementation failures in customer relationship management software

Mathew Nicho


international conference on emerging security information systems and technologies | 2012

A Data Centric Security Cycle Model for Data Loss Prevention of Custodial Data and Company Intellectual Property

Mathew Nicho; Avinash Advani


business information systems | 2015

A Role Allocation Model For IT Controls In A Cloud Environment

Shafaq Khan; Mathew Nicho; Grahame Cooper


new technologies mobility and security | 2018

Identifying Vulnerabilities in APT Attacks: A Simulated Approach

Mathew Nicho; Adelaiye Oluwasegun; Faouzi Kamoun

Collaboration


Dive into the Mathew Nicho's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Charles Haiber

Kent State University at Stark

View shared research outputs
Researchain Logo
Decentralizing Knowledge