Peter Mok's research while affiliated with Southern University at New Orleans and other places

Publications (2)

Article
Full-text available
One of the foremost small businesses security concerns is the protection of critical information, both within their internal financial infrastructures and from external elements. Studies show that most cyber-attacks occur inside organizations, instigated by personnel with valid access to the system. This paper describes the design, implementation,...
Article
In the 21st century, there is no doubt that organizations are using information technologies (IT) to become more effective and efficient, consequently gaining competitive advantages. There are extensive researches on the organizational effectiveness of IT. However, there is lack of empirical study in how organizations are using IT. In this study, u...

Citations

... It is appropriate for encryption and digital signature. RSA is the utmost far used algorithm in Internet security [19] [10]. In fact, Internet security depends significantly on the security properties of the RSA cryptosystem. ...