152 Citations
Blockchain Protocols and Edge Computing Targeting Industry 5.0 Needs
- 2023
Computer Science, Engineering
The ways in which decentralized networks that make use of protocols help to achieve decentralization and how network meshes can grow to make things more secure, reliable, and cohere with these technologies, which are not going away anytime soon are discussed.
METHODOLOGY FOR ASSESSING THE RISK ASSOCIATED WITH INFORMATION AND KNOWLEDGE LOSS MANAGEMENT
- 2021
Business, Computer Science
A rapid methodology to assess the risk of information and knowledge loss management that provides the implementation of eight steps and combines a risk mapping method modified by assessments based on risk factors and incidents as elements from set theory and using formalization via binary estimates.
Developing a Global Data Breach Database and the Challenges Encountered
- 2021
Computer Science, Law
The results of this research can help government entities, regulatory bodies, security and data quality researchers, companies, and managers to improve the data quality of data breach reporting and increase the visibility of the data breach landscape around the world in the future.
Healthcare Data Breaches: Insights and Implications
- 2020
Medicine, Computer Science
The main objective is to do an in-depth analysis of healthcare data breaches and draw inferences from them, thereby using the findings to improve healthcare data confidentiality, and employs the simple moving average method and the simple exponential soothing method of time series analysis to examine the trend of healthcareData breaches and their cost.
Speed, the Double-edged Sword of the Industry 4.0
- 2022
Computer Science, Business
This paper is a summarized introduction to key challenges, such as data interoperability and data traceability, which manufacturers need to understand in order to adopt the best mitigation strategies.
Toward a Unified Model of Information Security Policy Compliance: A Conceptual Replication Study
- 2021
Computer Science
This study has empirically examined UMISPC through three types of ISS behaviors within a work environment in the European Union, where General Data Protection Regulation (GDPR) is in force.
THE USE OF GAMIFICATION TO TEACH CYBERSECURITY THE USE OF GAMIFICATION TO TEACH CYBERSECURITY AWARENESS IN INFORMATION SYSTEMS AWARENESS IN INFORMATION SYSTEMS
- 2021
Computer Science, Education
The authors are designing 3 gamified activities that can be used to teach and learn cyber security awareness and hope the results of this study will support the use of gamification in teaching and learning cybersecurity awareness.
Capstone Project Report Analysis of Best Practices for Data Leak Management and Prevention of Data Harvesting Under the Guidance of
- 2021
AI-Driven Proactive Cloud Application Data Access Security
- 2024
Computer Science
This research addresses the critical need for proactive security measures in the dynamic landscape of cloud application data security with a uniquely intelligent system where both human and artificial intelligence coexist, with the ultimate overriding control lying with humans (admin).
Optimizing URL Phishing Detection: A Manifold Learning Approach with an Efficient Neural Network Focused on Reducing Computational Cost
- 2024
Computer Science
A neural network is employed, utilizing simple activation and optimization functions to ensure efficient and rapid prediction, and the model achieves an accuracy of 87% under 30 training epochs.