Implementing Information Security Research Articles