Search
Search Results
-
Legal Protection for the Personal Data in Indonesia and Malaysia
Rapid globalization in Indonesia has led to the growth of the information technology sector, which has an impact on individuals and global economic... -
To Bot or Not to Bot?: Analysing Mental Health Data Disclosures
Disclosure of personal information about wellbeing and mental health is a nuanced situation requiring trust between agents. Current methods for... -
Are UK Parents Empowered to Act on Their Cybersecurity Education Responsibilities?
The UK government responsibilizes its citizens to take care of their own cybersecurity. They provide extensive advice but no other direct support... -
Using a Digital Transformation to Improve Enterprise Security—A Case Study
In this case study, I review a specific digital transformation of the Hawai‘i State Department of Education (HIDOE), over the time period from... -
Electrical Muscle Stimulation System for Automatic Reproduction of Secret Information Without Exposing Biometric Data
Biometric data is personal information, which leads to the psychological resistance of the user. Using biometric-based FIDO authentication eliminates... -
Revolutionizing Social Engineering Awareness Raising, Education and Training: Generative AI-Powered Investigations in the Maritime Domain
Innovation in generative Artificial Intelligence (AI) has already been leveraged by cybercriminals to deliver AI-powered social engineering attacks,... -
Expert Perspectives on Information Security Awareness Programs in Medical Care Institutions in Germany
Human factors play a crucial role in the increasing number of information security incidents in the medical sector. European medical institutions,... -
Paralyzed or Compromised: A Case Study of Decisions in Cyber-Physical Systems
Human operators of Cyber-Physical Systems (CPSs) within Critical Infrastructure (CI) need to protect their systems from cyber-attacks. When CPSs are... -
Competencies Required for the Offensive Cyber Operations Planners
This paper presents a systematic review of competencies required for Offensive Cyber Operations planners. Military Cyber Headquarters staff must... -
“I’m not planning on dying anytime soon!”: A Survey of Digital Legacy Planning
Increasing technology integration into daily life has broadened the concept of legacy to include the digital footprint individuals leave behind.... -
Why Do Organizations Fail to Practice Cyber Resilience?
When organizations fall victim to cyber incidents, they are exposed to financial implications, data losses, and potential damage to their reputation.... -
Enhancing Cyber Hygiene and Literacy via Interactive Mini-games
Cyber threats are an increasingly reality for technology users in day-to-day use. As such, it is important to teach people how to protect themselves... -
Performance Evaluation of LoRa in a Linear Deployment Scenario
The Internet of Things (IoT) has become an essential daily field. This is mainly because of the advances in digital technologies, miniaturization,... -
Data Balancing Process to Strengthen a Malaria Control Prediction System in Senegal
Malaria is a public health problem in Senegal. Despite the implementation of prevention and treatment programs, the prevalence rate remains high,... -
Convergence of Blockchain Enabled Internet of Things (IoT) Framework: A Survey
Recent research and experiments in the field of Internet of Things (IoT) security have found that these devices are vulnerable to various attacks,... -
SE Based Development Framework for Changeable Maritime Systems
Maritime vessels are complex systems that generate and require the utilization of large amounts of data for maximum efficiency. However, integrating... -
How to Support Knowledge Exchange in a Multi-division Manufacturing Firm Using a Prototype Platform?
Knowledge management and intellectual capital are essential factors in a company's success. An intrinsic element of knowledge management is knowledge... -
A Digital Twin Framework for Industry 4.0/5.0 Technologies
Industry 4.0 Paradigm unleashed tremendous opportunities to boost economical and societal transitions for the business and improved living standards... -
Derivation of Evacuation Routes to Avoid Narrow Road Adopting Physarum Solver
Japan is a country where disasters occur frequently. When disasters occur, people need to escape from their homes to shelters immediately. Thus, it... -
Performance Evaluation of Flood Level Estimation Method Using State-Space Model with Time-Series Monitoring Data
This paper proposes a method for estimating flood levels using a state-space model in order to figure out the time-series changes at locations...