Skip to content

Journal papers

Selected journal papers

2014 - 2022

  1. The 2014 to 2022 selected journal papers are available on request.


  1. D. Caragata, Assad, S. El., Shoniregun C.A., and Akmayeva, G.A., (2013), 'Confidential initial identification and other improvements for UMTS security', Security and Communication Networks, ISSN (online): 1939-0122 , 2013.


  1. Shoniregun C.A.Nwankwo S.Imafidon C., and Wynarczyk, P. (2005), ‘Information security challenges facing TEISME business operations in the UK’, International IJI), vol. 1; ISSN 1742-4720 (print), ISSN 1742-4712 (online).
  2. Shoniregun C.A. and Logvynovskiy O. (2005), ‘Securing XML query processing storage’, Australian Journal of Information Systems (AJIS), vol. 13, no. 1, pp. 150–158; ISSN 1449-8618.
  3. Shoniregun C.A.Yusuf A.Ifeagwu E.Aluko O., and Logvynovskiy O.(2005), ‘Evaluation of Security Issues of Agile Methodology in Designing E-Commerce’.
  4. Shoniregun C.A. and Saravanapavan P. (2005) ‘Deployment of mobile phone and interactive TV for e-Commerce (eC)’.


  1. Shoniregun C.A. (2004), ‘Cybermediation really the future or risk?’, International Journal of Electronic Business (IJEB), vol. 2, no. 6; ISSN1470-6067 (print), ISSN 1741-5063 (online).
  2. Shoniregun C.A. and Logvynovskiy O. (2004), ‘Securing XML Documents’, The Australasian Journal of Information Systems (AJIS), vol. 12, no. 1, pp. 18–27; ISSN 1039-7841.
  3. Shoniregun C.A. (2004), ‘An investigation of information systems project failure and its implication on organisations’, International Journal of Services, Technology and Management (IJSTM), vol. 5, no.1, pp. 25–41; ISSN 1460-6720 (print), ISSN 1741-525X (online).


  1. Shoniregun C.A. (2003), ‘Are existing internet security measures guaranteed to protect user identity in the financial services industry?’, International Journal of Services, Technology and Management (IJSTM), vol. 4, no. 3, pp. 194–216; ISSN 1460-6720 (print), ISSN 1741-525X (online).
  2. Shoniregun C.A. and Andersen A.A. (2003), ‘Is child internet access a questionable risk?’, Communication of the ACM: Ubiquity, vol. 4, no. 29, p.1; DOI 10.1145/964687.964688.
  3. Shoniregun C.A. and Gray S.-J. (2003), ‘Is e-learning really the future or a risk’, Communication of the ACM: Ubiquity, vol. 4, no. 10, p.1; DOI 10.1145/777947.777948
  4. Shoniregun C.A. (2003), ‘Intellectual property rights of multimedia enriched websites’, Communication of the ACM: Ubiquity, vol. 3, no. 47, pp. 1-2; DOI 10.1145/763958.763960


  1. Shoniregun C.A. (2002), ‘The future of Internet security: should common Internet security technologies be blended with biometrics for accuracy and reliability’, ACM: Ubiquity, vol. 3, no. 37; DOI 10.1145/763940.763941

‘I think theoreticians should work on whatever interests them, because I have this belief that we human beings are wired to find important things interesting. … If you’re going to be a theoretician, remain true to it and find elegant, beautiful stuff that’s inspired by some practical application, but do it mostly because you find some beauty in it.’

Copyright © Professor Charles A. Shoniregun - 2023