https://www.acaa-p.com/index.php/acj/issue/feed Applied computing Journal 2025-11-18T05:05:56+00:00 Prof. Dr. Nameer Al-Emam acaapub@gmail.com Open Journal Systems <p><img src="/public/site/images/admin/temp4acaa.jpg"></p> <p><span style="text-align: justify; color: #555555; text-transform: none; text-indent: 0px; letter-spacing: normal; font-family: Montserrat, sans-serif; font-size: 16px; font-style: normal; font-weight: 400; word-spacing: 0px; float: none; display: inline !important; white-space: normal; orphans: 2; widows: 2; background-color: #ffffff; font-variant-ligatures: normal; font-variant-caps: normal; -webkit-text-stroke-width: 0px; text-decoration-style: initial; text-decoration-color: initial;"><strong>Applied Computing Journal (ACJ) (ISSN 2788-9688)</strong> publishes original research relevant to computer science's analytical and computational aspects and its applications. The journal is <strong>peer-reviewed and open-access</strong>, covering various applied computing topics such as computing development, website development, networking and cybersecurity, image processing, virtual reality, big data and database management, and mobile technology.</span></p> <p>All works are licensed under a Creative Commons Attribution International License (CC BY 4.0). The journal is currently archived as a <strong>Long-term preservation service at Portico, PKP PN and the journal website.</strong></p> https://www.acaa-p.com/index.php/acj/article/view/64 CYBER SECURITY FRAMEWORK SELECTION: COMPARISION OF NIST AND ISO27001 2025-11-18T05:05:56+00:00 Marwan Alshar'e mshare@su.edu.om <p>Plans for preventing and mitigating vulnerabilities in computer networks are known as cybersecurity frameworks. With the assistance of the Cybersecurity Framework, organisations are able to reduce their vulnerability to cyber attacks and improve the strength of their defences. The cybersecurity framework has made the decision to take part in trials so that it may improve its ability to handle long-term security frameworks. This gives rise to concerns about cost and time rather than safety at this point in time because of the situation that is occurring. A firm may utilise the similarities that are shared by many cyber security frameworks as a reference to assist it in selecting the framework that is the most suitable for the needs that are unique to the organisation. According to the findings of this study, the risk maturity level, cost, and certification are the three most significant components of CSF implementation for firms.</p> 2023-02-09T00:00:00+00:00 Copyright (c) 2023 Author(s) of this work retain copyright and grant the journal right, publishing license of first publication with the work simultaneously licensed under Creative Commons Attribution International License (CC BY 4.0). Author(s) and ACAA permit unrestricted use, distribution, and reproduction in any medium, provided the original work with proper citation. ACAA publishing house is located in Oman / Sohar , Zip code 311. ISNI 0000 0004 9361 5767