2,102 results on '"Digital Security"'
Search Results
2. Digital State and Municipal Management Technologies
- Author
-
Chkhutiashvili, Lela V., Chkhutiashvili, Nana V., Petrov, Alexander A., and Golubeva, Galina F.
- Published
- 2024
- Full Text
- View/download PDF
3. Digital security by design.
- Author
-
Radanliev, Petar
- Subjects
TECHNOLOGICAL innovations ,DIGITAL technology ,QUANTUM computing ,DIGITAL divide ,SECURITY sector - Abstract
This paper scrutinises the evolving digital security landscape, encompassing technological advancements, regulatory frameworks, and industry-specific challenges. It explores the influence of technologies like AI, quantum computing, and blockchain on security paradigms whilst identifying emergent threats. The study analyses the interplay between digital security and legislative policies, underlining their impact on industry practices and individual behaviours. Sector-specific examinations are conducted, pinpointing unique security concerns in sectors such as healthcare and finance and advocating bespoke solutions. The study highlights discrepancies between security intentions and actions, proposing strategies to bridge this divide. Projecting into the future, we anticipate shifts in technology and regulation, culminating in pragmatic recommendations for stakeholders. This article offers an informed perspective on digital security, laying the groundwork for proactive approaches in a dynamic digital environment. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
4. A Comprehensive Review of MI-HFE and IPHFE Cryptosystems: Advances in Internal Perturbations for Post-Quantum Security.
- Author
-
Wang, Yong, Li, Lingyue, Zhou, Ying, and Zhang, Huili
- Abstract
The RSA cryptosystem has been a cornerstone of modern public key infrastructure; however, recent advancements in quantum computing and theoretical mathematics pose significant risks to its security. The advent of fully operational quantum computers could enable the execution of Shor's algorithm, which efficiently factors large integers and undermines the security of RSA and other cryptographic systems reliant on discrete logarithms. While Grover's algorithm presents a comparatively lesser threat to symmetric encryption, it still accelerates key search processes, creating potential vulnerabilities. In light of these challenges, there has been an intensified focus on developing quantum-resistant cryptography. Current research is exploring cryptographic techniques based on error-correcting codes, lattice structures, and multivariate public key systems, all of which leverage the complexity of NP-hard problems, such as solving multivariate quadratic equations, to ensure security in a post-quantum landscape. This paper reviews the latest advancements in quantum-resistant encryption methods, with particular attention to the development of robust trapdoor functions. It also provides a detailed analysis of prominent multivariate cryptosystems, including the Matsumoto–Imai, Oil and Vinegar, and Polly Cracker schemes, alongside recent progress in lattice-based systems such as Kyber and Crystals-DILITHIUM, which are currently under evaluation by NIST for potential standardization. As the capabilities of quantum computing continue to expand, the need for innovative cryptographic solutions to secure digital communications becomes increasingly critical. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
5. ДОСВІД УКРАЇНИ В ГАЛУЗІ МІЖНАРОДНОГО СПІВРОБІТНИЦТВА В ГАЛУЗІ КІБЕРБЕЗПЕКИ
- Author
-
М. С., Тєтєвін
- Abstract
In today's digital world, cybersecurity has become one of the most pressing issues, as the growing number of connected devices has led to an increase in cyber threats that pose a serious risk to national and international security. In this context, cooperation between countries becomes extremely important to protect sovereignty and ensure cybersecurity at the global level. Ukraine, which has extensive experience in countering cyber threats, is actively involved in international initiatives and cooperation in this area. The article is devoted to the analysis of international cooperation in the field of cybersecurity and Ukraine's role in this process. The study reveals the importance of an effective regulatory framework, in particular the Bug Bounty program and the vulnerability detection mechanism. Ukraine actively cooperates with international partners, which facilitates the exchange of experience and strengthening of cybersecurity. International cooperation with organizations that recognize security as one of their main goals, such as NATO and the European Union, is also of key importance. It is noted that Ukraine, being an active participant in international initiatives and having extensive experience in the field of cybersecurity, continues to play an important role in strengthening global cybersecurity and contributes to the creation of a safer cyberspace for all countries. In the process of ensuring cybersecurity, Ukraine is developing and implementing new programs and strategies, such as Bug Bounty, to help identify and eliminate vulnerabilities in information systems. In addition, an important step is the adoption of the Vulnerability Search and Identification Procedure, which allows business owners and government agencies to request permission to search for weaknesses in their systems. These initiatives allow Ukraine to actively participate in international cybersecurity processes and contribute to improving overall Internet security. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
6. Information security for criminological ethnographers.
- Author
-
Kindynis, Theo and Fleetwood, Jennifer
- Subjects
INFORMATION technology security ,DATA encryption ,ETHNOLOGY research ,CELL phones ,SOCIAL networks ,ANONYMITY - Abstract
Information security refers to 'the practice of defending information from unauthorised access'. Information security practices include everyday activities such as protecting your bank details, or keeping your workplace logins secure. Despite increasingly restrictive approaches to research ethics, academia continues to lag behind journalism when it comes to best practice with regards to information security. This article discusses information security as it pertains to qualitative and especially ethnographic research into crime and deviance. In doing so, the article addresses a gap in the methodological literature by drawing on lessons and real-world examples from journalism, academia and activism, in order to offer guidance for researchers seeking to maintain information security in a digital, networked social world. The article proceeds in three parts. First, the article considers what information researchers might want to protect, who they might want to protect it from and what the consequences might be if they failed to do so (an exercise known as 'threat modelling'). The different powers, resources and capacities of, and threats posed by, state actors such as the police and intelligence agencies, as well as an array of non-state actors, are considered. Second, the article outlines some general principles of information security and how they might apply to ethnographic research into crime and deviance. Third, the article discusses a range of practical considerations when it comes to using mobile phones (cell phones), social media, passwords and encryption in the course of researching crime and deviance. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
7. Individual Differences in Psychological Stress Associated with Data Breach Experiences
- Author
-
Christopher R. Sears and Daniel R. Cunningham
- Subjects
data breach ,psychology ,stress ,anxiety ,digital security ,Technology (General) ,T1-995 - Abstract
Data breach incidents are now a regular occurrence, with millions of people affected worldwide. Few studies have examined the psychological aspects of data breach experiences, however, or the individual differences that influence how people react to these events. In this study, we examined the psychological stress associated with a personal experience with a data breach and several individual differences hypothesized to modulate such stress (age, gender, digital security awareness and expertise, trait anxiety, negative emotionality, and propensity to worry). A student sample (N = 166) and a community sample (N = 359) completed an online survey that asked participants to describe their most serious data breach and then complete the Impact of Events Scale—Revised (IES-R) to answer specific questions about the nature of the stress they experienced after the breach. Standard measures of trait anxiety, negative emotionality, and propensity to worry were also completed. A Data Breach Severity Index (DBSI) was created to quantify the invasiveness and consequences of each participant’s data breach. Hierarchical multiple regression analyses were used to identify demographic variables and psychological characteristics predictive of IES-R scores while controlling for DBSI scores. As expected, more invasive and consequential data breaches were associated with higher IES-R scores (greater data-breach-induced stress). Women had higher IES-R scores than men, and this difference persisted after controlling for gender differences in anxiety, negative emotionality, and propensity to worry. Greater daily social media use was associated with higher IES-R scores, whereas higher digital security expertise was associated with lower IES-R scores. The results illuminate several relationships between demographic and psychological characteristics and data-breach-induced stress that should be investigated further.
- Published
- 2024
- Full Text
- View/download PDF
8. Elementary student experiences from digital safety immersion summer program.
- Author
-
Martin, Florence, Mushi, Doreen, Bacak, Julie, Wang, WeiChao, Ahlgrim-Delzell, Lynn, and Polly, Drew
- Subjects
- *
ELEMENTARY schools , *CAMPS , *CYBERBULLYING , *DATA privacy , *PRE-tests & post-tests - Abstract
Digital Safety refers to the knowledge and skills needed for the intentional protection of users in the digital environment. With children having access to digital devices at a young age, it has become essential for them to be educated on how to be safe in the digital world. Through a week-long summer camp on digital safety, elementary-age learners were introduced to four topics (digital identity and digital footprint, cyberbullying, netiquette, and digital security and privacy). This study found that the digital safety immersion camp was beneficial to elementary school learners based on the achievement, attitude, and behavior data that were collected. Posttest scores were statistically significant from the pre-test. Cyberbullying topic had the highest pre- and post-knowledge, whereas netiquette and online behavior, and digital security and privacy had comparatively lesser scores. Students demonstrated positive attitudes in the post-camp survey and they also included several lessons learned from the camp in the Pixton comic strip, which they created as the final project from the camp. The findings from this study contribute to the current literature on preparing elementary school students' knowledge and skills related to digital safety and have implications for students, teachers, administrators, and parents. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
9. Digital Maturity Assessment and the Impact of Its Level on the Regional Economy Based on Materials from the Republic of Dagestan.
- Author
-
Kasimova, Taisa, Magomedova, Sabina, and Ismikhanov, Zaur
- Abstract
Russian President Vladimir Putin has approved new criteria for assessing the governors' work effectiveness (2021). One of the rating indicators is "Digital maturity" of state authorities of the Russian Federation constituent entities, local government bodies and organizations, namely, their ability to make use of domestic information and technology solutions. The heads of the constituent entities are responsible for the digital transformation in the regions of the Russian Federation; they are their KPIs — key performance indicators. The region's economy transformation into a digital one is impossible without the participation of municipalities. However, the problem the digital maturity level assessment of local governments and executive authorities at the regional level has not been properly investigated. The methodology for compiling and assessing the digital maturity index of local self-government bodies is presented in the article on the materials of the federal statistical observation form No. 3-inform "Information on the use of digital technologies and the production of the related goods and providing of services" in the Republic of Dagestan in 2019. On the basis of which the sub-indices "digital infrastructure," "digital security," "digital technologies," and "digital skills" were calculated. The ratings of digital maturity of local government bodies and the executive branch of the government of the region, as well as the comparative analysis of the index structure, are presented in the article. It was revealed that the average digital maturity indices for local self-government and executive authorities are practically the same. In addition, the digital infrastructure sub index makes up a large share, namely, about half in the digital maturity indices. An econometric model has been built to assess the dependence of the regional economy on the digital maturity level. Thus, the key socio-economic indicators were taken into account to assess the effectiveness of local self-government body activities in urban and municipal districts. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
10. Creative Independent Investigative Documentary Storytellers in the Streaming Age: Toward a Community of Practice Framework.
- Author
-
Borum, Caty, Conrad-Pérez, David, and Bello, Bryan
- Abstract
This study articulates the motives, craft, practice, and urgent needs of creative independent investigative documentary as a distinct field of practice that utilizes both the subjective expression of artistic cinema with the objectivity-based legacy practices of watchdog journalism. Leveraging community of practice theory, based on in-depth interviews and a two-year investigation of ten of the inaugural films supported by the International Documentary Association (IDA) Enterprise Documentary Fund award—launched in 2016 as the first contemporary institutional recognition of creative investigative documentary as a distinct sub-genre—this study demonstrates how recognizing the unique experiences of this distinct dual journalistic and artistic practice is vital in order for scholars to more widely appreciate the potentiality and significance of this journalistic practice, and to more widely engage with the unique security challenges and needs that it faces, largely overlooked in prevailing conversations in journalism today. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
11. Need of Encryption Legislation: Protecting India's Digital Realm and Beyond.
- Author
-
Katkuri, Srinivas
- Subjects
DIGITAL technology ,RIGHT of privacy ,PUBLIC opinion ,CIVIL rights ,GOVERNMENT agencies ,DATA security failures - Abstract
Encryption is essential for protecting sensitive data, individual privacy and national security in a time of digital transition and growing cybersecurity threats. This article begins by highlighting the need for encryption laws in India, emphasising the growing reliance on digital technologies across sectors and the critical necessity of protecting digital assets. It proceeds to dissect the existing legal frameworks governing encryption and the enforcement challenges faced by regulatory agencies. A critical aspect of the research involves examining international perspectives on encryption legislations, drawing lessons from global approaches and discerning their relevance to India's policy landscape. This article underscores the delicate balance between privacy and security concerns, particularly in the context of counterterrorism efforts. In addition, this research unravels case studies and incidents involving notable cybersecurity breaches in India, shedding light on the legal implications and consequences that follow such breaches. The study culminates with an exploration of the public opinion and stakeholders' perspectives on encryption legislations, considering industry views and civil liberties concerns. It offers insights into the best practices for drafting effective encryption laws and provides recommendations to strengthen India's digital resilience. It calls for proactive measures to secure India's digital future while preserving individual freedoms and privacy rights. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
12. Individual Differences in Psychological Stress Associated with Data Breach Experiences.
- Author
-
Sears, Christopher R. and Cunningham, Daniel R.
- Subjects
PSYCHOLOGICAL stress ,INDIVIDUAL differences ,DATA security failures ,ANXIETY ,MULTIPLE regression analysis - Abstract
Data breach incidents are now a regular occurrence, with millions of people affected worldwide. Few studies have examined the psychological aspects of data breach experiences, however, or the individual differences that influence how people react to these events. In this study, we examined the psychological stress associated with a personal experience with a data breach and several individual differences hypothesized to modulate such stress (age, gender, digital security awareness and expertise, trait anxiety, negative emotionality, and propensity to worry). A student sample (N = 166) and a community sample (N = 359) completed an online survey that asked participants to describe their most serious data breach and then complete the Impact of Events Scale—Revised (IES-R) to answer specific questions about the nature of the stress they experienced after the breach. Standard measures of trait anxiety, negative emotionality, and propensity to worry were also completed. A Data Breach Severity Index (DBSI) was created to quantify the invasiveness and consequences of each participant's data breach. Hierarchical multiple regression analyses were used to identify demographic variables and psychological characteristics predictive of IES-R scores while controlling for DBSI scores. As expected, more invasive and consequential data breaches were associated with higher IES-R scores (greater data-breach-induced stress). Women had higher IES-R scores than men, and this difference persisted after controlling for gender differences in anxiety, negative emotionality, and propensity to worry. Greater daily social media use was associated with higher IES-R scores, whereas higher digital security expertise was associated with lower IES-R scores. The results illuminate several relationships between demographic and psychological characteristics and data-breach-induced stress that should be investigated further. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
13. Revisión sistemática de la literatura sobre la seguridad digital en estudiantes de educación superior.
- Author
-
Trujillo-Torres, Juan-Manuel, Rodríguez-Jiménez, Carmen, Alonso-García, Santiago, and Berral-Ortiz, Blanca
- Subjects
- *
STUDENT attitudes , *DIGITAL technology , *INTERNET security , *INTERNET safety , *INTERNET privacy - Abstract
This study aims to identify and analyze the main research streams on digital safety and online privacy related to higher education students. Students are at risk of cybercrime, including online harassment, identity theft, and exposure to inappropriate content. A systematic literature review is conducted on digital security, cybersecurity, Internet security, online safety, and use of digital technologies. The results show that publications on digital security for higher education students have increased consistently during the last two decades. The main research streams are: digital risk and student perspectives, digital children, digital teenagers, online harassment, and digital behavior. In conclusion, this study provides a wide assessment on digital security for university students and highlights the importance of future research on improving awareness and safety on digital environments for teenagers. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
14. Cryptography Performance Analysis in Intel Core i5-12500H and AMD Ryzen 7 5800H Processors: Implications for Secure Computing.
- Author
-
Effendi, Jerry, Ong, Albert Sanjaya, and Wicaksono, Danang Wahyu
- Subjects
DATA encryption ,DATA integrity ,SPEED - Abstract
Digital security relies heavily on processor-level encryption to ensure the integrity and confidentiality of data. This study compares the cryptographic performance of two modern CPUs, the Intel Core i5-12500H and the AMD Ryzen 7 5800H, focusing on their AES instruction sets. The study benchmarks simulations of cryptographic workloads to evaluate the speed and efficiency of encryption operations supported by the specific instruction sets of these processors. By analyzing the different AES instructions implemented in the microprocessors, the research provides insight into the performance overhead of hardware-accelerated encryption. These findings are critical to understanding the practical applications of cryptographic capabilities in various computing environments and security-sensitive applications. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
15. Beyond Data Protection: Exploring the Convergence between Cybersecurity and Sustainable Development in Business.
- Author
-
Morales-Sáenz, Francisco Isaí, Medina-Quintero, José Melchor, and Reyna-Castillo, Miguel
- Abstract
The increase in the use of information technology (IT) poses a challenge derived from the risks and threats of computer security in all areas of society. In this sense, cybersecurity emerges as an important pillar of support for protecting infrastructures essential for countries' sustainable economic and social development. This paper explores the possible links between cybersecurity and sustainable development within the high-impact scientific literature. The study uses a systematic literature review methodology based on the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) protocol, ensuring a rigorous and structured approach to selecting and analyzing relevant literature. The scientific database Web of Science is used to ensure the integrity and quality of the data collected, following criteria widely validated in this type of methodology. The study reveals a significant interrelationship between cybersecurity and sustainable development in the business sphere. It highlights cybersecurity's contribution to economic sustainability by protecting critical infrastructure and minimizing financial risks. Concerning environmental sustainability, cybersecurity facilitates the implementation of cleaner and more efficient technology. Social sustainability ensures personal data protection and fosters a culture of responsibility and trust within organizations. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
16. Technological and Sustainable Security: A Longitudinal Study on Teacher Training.
- Author
-
Cabero-Almenara, Julio, Barragán-Sánchez, Raquel, Llorente-Cejudo, Carmen, and Palacios-Rodríguez, Antonio
- Subjects
- *
CORE competencies , *TEACHER training , *SUSTAINABLE development , *SCIENCE education , *SELF-perception - Abstract
This study examines future teachers' self-perception regarding competences related to the environmental impact of digital technologies. The sample includes 1948 participants (235 men and 1713 women) selected through incidental sampling from the Faculty of Education Sciences at the University of Seville. The validated instrument used was the Teacher's Digital Competence and Eco-responsible Use of Technology Scale. Results indicated that the participants had received less than optimal training and had limited knowledge about technologies and their environmental impact. The study concludes that it is necessary to establish training on the development of environmental competences and their link to educational technologies, starting from the institution, with the aim of guaranteeing the achievement of the Sustainable Development Goals (SDGs). [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
17. Digital Competences in Cybersecurity of Teachers in Training.
- Author
-
D. Guillén-Gámez, Francisco, Martínez-García, Inmaculada, Alastor, Enrique, and Tomczyk, Łukasz
- Subjects
- *
EARLY childhood education , *TEACHER competencies , *TEACHER training , *CORE competencies , *OUTCOME-based education , *COMPUTER passwords - Abstract
The authors have developed a psychometric instrument with the purpose of assessing the digital competencies of teachers in aspects of cybersecurity. From the collection of data, different secondary objectives were carried out: (1) identify if there were significant differences regarding gender; (2) understand if there are significant differences based on various actions (use of different operating systems, two-step authentication, use of different passwords for applications and profiles), for each gender; (3) identify if the frequency of updating of passwords in LMS, emails, RRSS and apps correlate with the digital competencies of teachers in training, for each gender. For this purpose, an ex post facto ad hoc design was used based on a sample of 220 students enrolled in a Primary Education and Early Childhood Education course at the University of Malaga (Spain). The results show that the digital skills of these teachers of the future are at a low level, and that they find it hard to navigate their way in this new world. It is also concluded that there are significant differences with respect to gender in terms of various cybersecurity actions (use of the Mac operating system; two-step authentication). In addition, it was found that the frequency of updating passwords in LMS, emails, RRSS and apps affects the competences of the teachers in training in security and prevention, in both genders. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
18. "Right To Be Forgotten Amidst Data Protection, Right To Privacy And Cyber Security".
- Author
-
Yadav, Rachna and Varshney, Rahul
- Subjects
DATA privacy ,INFORMATION technology ,INTERNET privacy ,RIGHT of privacy ,DATA protection ,RIGHT to be forgotten - Abstract
The term "privacy" is defined broadly and includes many different ideas. The "right to privacy" comprises "right to be forgotten." Today's world of digitalization, social media, media trial and information technology, this right has become more important especially when any person can get famous or we can say infamous, in seconds. Trending on social media is a new trend nowadays, but with its speedy popularity and easy fame it also brings with it many downsides. A notion in law known as the "right to be forgotten" essentially gives someone the right to request that their personal information be deleted through websites and search engines, and other online sources. The right to forget is a component of one's right to privacy. The right to privacy has been affirmed by the Honourable Supreme Court as a basic freedom in the historic decision of Justice K.S. Puttuswamy v. Union of India1. Article will examine the significance Regarding the contemporary right to be forgotten, how to exercise it, how to recognize it, what might happen if this right is denied, and, finally, how challenging it is to exercise in this day and age where information is readily available. [ABSTRACT FROM AUTHOR]
- Published
- 2024
19. Encryption
- Author
-
Garrie, Daniel B., Gordon, Leo M., Newman, Bradford, Garrie, Daniel B., Gordon, Leo M., and Newman, Bradford
- Published
- 2024
- Full Text
- View/download PDF
20. The Limits of Everyday Digitalization in the Arctic: A Digital Security Perspective
- Author
-
Salminen, Mirva, Morris, Laurence, Ford, James D., Series Editor, Desjardins, Sean, Editorial Board Member, Eicken, Hajo, Editorial Board Member, Falardeau-Cote, Marianne, Editorial Board Member, Jackson, Jen, Editorial Board Member, Mustonen, Tero, Editorial Board Member, Nenasheva, Marina, Editorial Board Member, Olsen, Julia, Editorial Board Member, and Acadia, Spencer, editor
- Published
- 2024
- Full Text
- View/download PDF
21. Digital Security for the Present-Day Journalist
- Author
-
Chawla, Abhay, Dahiya, Surbhi, editor, and Trehan, Kulveen, editor
- Published
- 2024
- Full Text
- View/download PDF
22. Security and Journalism: A Systematic Review
- Author
-
Mendoza-Ríos, Richard Anderson, Turriate-Guzman, Adriana Margarita, Fernández-Saucedo, Yaritza Zarait, Bravo-Guevara, Dalia Rosa, del Pilar Segura-Carmona, Norka, Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Joshi, Amit, editor, Mahmud, Mufti, editor, Ragel, Roshan G., editor, and Karthik, S., editor
- Published
- 2024
- Full Text
- View/download PDF
23. Zero Trust and Compliance with Industry Frameworks and Regulations : A Structured Zero Trust Approach to Improve Cybersecurity and Reduce the Compliance Burden
- Author
-
Bobbert, Yuri, Timmermans, Tim, Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, and Arai, Kohei, editor
- Published
- 2024
- Full Text
- View/download PDF
24. Authentication, Authorization, Administration and Audit Impact on Digital Security
- Author
-
Navarro, Fauricio Alban Conejo, García, Melvin, Jadán-Guerrero, Janio, Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Rocha, Alvaro, editor, Adeli, Hojjat, editor, Dzemyda, Gintautas, editor, Moreira, Fernando, editor, and Colla, Valentina, editor
- Published
- 2024
- Full Text
- View/download PDF
25. Digital Security on Smart Grids: A Technical Review
- Author
-
Marvin, Ggaliwango, Hellen, Nakayiza, Ngubiri, John, Angrisani, Leopoldo, Series Editor, Arteaga, Marco, Series Editor, Chakraborty, Samarjit, Series Editor, Chen, Jiming, Series Editor, Chen, Shanben, Series Editor, Chen, Tan Kay, Series Editor, Dillmann, Rüdiger, Series Editor, Duan, Haibin, Series Editor, Ferrari, Gianluigi, Series Editor, Ferre, Manuel, Series Editor, Jabbari, Faryar, Series Editor, Jia, Limin, Series Editor, Kacprzyk, Janusz, Series Editor, Khamis, Alaa, Series Editor, Kroeger, Torsten, Series Editor, Li, Yong, Series Editor, Liang, Qilian, Series Editor, Martín, Ferran, Series Editor, Ming, Tan Cher, Series Editor, Minker, Wolfgang, Series Editor, Misra, Pradeep, Series Editor, Mukhopadhyay, Subhas, Series Editor, Ning, Cun-Zheng, Series Editor, Nishida, Toyoaki, Series Editor, Oneto, Luca, Series Editor, Panigrahi, Bijaya Ketan, Series Editor, Pascucci, Federica, Series Editor, Qin, Yong, Series Editor, Seng, Gan Woon, Series Editor, Speidel, Joachim, Series Editor, Veiga, Germano, Series Editor, Wu, Haitao, Series Editor, Zamboni, Walter, Series Editor, Zhang, Junjie James, Series Editor, Tan, Kay Chen, Series Editor, Shrivastava, Vivek, editor, and Bansal, Jagdish Chand, editor
- Published
- 2024
- Full Text
- View/download PDF
26. A New Frontier in Digital Security: Verification for NFT Image Using Deep Learning-Based ConvNeXt Model in Quantum Blockchain
- Author
-
Prihatno, Aji Teguh, Suryanto, Naufal, Larasati, Harashta Tatimma, Oktian, Yustus Eko, Le, Thi-Thu-Huong, Kim, Howon, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Kim, Howon, editor, and Youn, Jonghee, editor
- Published
- 2024
- Full Text
- View/download PDF
27. Multidimensional Scale to Assess Digital Security in Adolescents
- Author
-
José Néstor Peraza-Balderrama, Ángel Alberto Valdés-Cuervo, Lizeth Guadalupe Parra-Pérez, and Maricela Urías-Murrieta
- Subjects
citizenship ,digital security ,adolescentes ,Education - Abstract
The study examined the psychometric properties of a Digital Security Scale (DSS-A) in a sample of 868 adolescents (460 female, 408 male), made up of 424 early adolescents (M age = 11.84 years, SD = 0.36) and 444 middle adolescents (M age = 13.44, SD = 0.49). The sample was randomly split into two for validation (n = 434) and cross-validation (n = 434) purposes. The results confirmed the fit of a one second-order factor model with four first-order factors (personal data protection, safe relationships, healthy internet use, and self-disclosure). As expected, digital security dimensions were positively associated with parental mediation. Measurement invariance was found in this model by gender and stage of adolescence. Latent mean comparisons showed differences by gender and stage of adolescence. Overall, findings indicate that the measurement model is helpful for measuring adolescents’ digital security behaviors.
- Published
- 2024
- Full Text
- View/download PDF
28. "I straight up criminalized myself on messenger": law enforcement risk management among people who buy and sell drugs on social media.
- Author
-
van der Sanden, Robin, Wilkins, Chris, and Rychert, Marta
- Subjects
- *
DRUG laws , *MARKETING laws , *SOCIAL media , *MOBILE apps , *RISK management in business , *INTERVIEWING , *THEMATIC analysis , *RESEARCH methodology , *PSYCHOLOGICAL vulnerability , *DRUGS of abuse - Abstract
Social media drug markets are likely to present people participating in these spaces with new vulnerabilities to law enforcement. There is currently limited research on how people perceive and manage the risk of exposure to law enforcement in social media drug markets. This is particularly notable considering widespread practices of user data collection and the normalization of surveillance as part of social media engagement. We present a thematic analysis of data from anonymous online interviews with people who buy and sell drugs (N = 33) via social media and messaging apps in New Zealand. We use the concept of "imagined surveillance" to explore how participants adapted existing understandings of online surveillance to online risk management strategies to avoid police. Most participants reported low concern for exposure to law enforcement while using social media and messaging apps for drug trading. Nevertheless, almost all participants took active risk management measures. Examples of strategies used included limiting the accumulation of evidence via self-deleting messages or arranging drug trades using code language. Participants often also reported low concern for their digital trace data to be accessed by police. Navigating law enforcement risk in social media drug markets is likely to be informed and shaped by more general perceptions of digital privacy risk and related management strategies, particularly in more normalized drug market contexts. The potential for broader and unexpected consequences to result from the use of drug-related digital trace data across public and private contexts is discussed. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
29. Ebeveynlerin Dijital Ebeveynlik Yeterlilikleri: Sosyoekonomik Farklılıklar ve Teknoloji Deneyimi Bağlamında Bir İnceleme.
- Author
-
AKAN, Salman, KESKİN, Sinan, and ŞENER, Kübra
- Abstract
Copyright of Educational Academic Research is the property of Ataturk University Coordinatorship of Scientific Journals and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
30. High School Students' Awareness of the Concept of Digital Citizenship in the Office of Education in Diriyah- Riyadh.
- Author
-
Aljadou, Fahad Abdullah Mohammed
- Abstract
The present study aims to assess high school students' awareness of the concept of digital citizenship and its relation to other variables, including grade, educational sector, and the rate of using digital technology means in the Office of Education in Diriyah, Riyadh, Saudi Arabia. The author adopted the descriptive survey approach and applied a 30-item questionnaire distributed to five domains "i.e., digital values and behavior, digital rights and responsibilities, digital security, digital laws, and digital health and security" to a sample of (674) students. The results showed a moderate level of awareness of the concept of digital citizenship among the participants, with an arithmetic mean of (3.49). The "digital laws" domain was ranked first, with the highest arithmetic mean of (3.74), whereas the "digital rights and responsibilities" domain was ranked last, with an arithmetic mean of (3.24). Moreover, there were statistically significant differences between the arithmetic means of the participants' responses to their awareness level of the digital citizenship concept due to the educational sector in favor of the "public" and due to the rate of using digital technology means favoring more than five hours a day. However, there were no statistically significant differences due to grade and the impact of the interaction between the educational sector, grade, and the rate of using digital technology means. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
31. Sosyal bilgiler dersinde dijital güvenlik yeterliği için geliştirilen çevrim içi destekleyici öğrenme aracının öğrencilerin öz yeterlik algılarına etkisi.
- Author
-
Akcan, Fatma and Çakmak, Mehmet Ali
- Abstract
Copyright of Journal of Social Sciences Research / Sosyal Bilimler Arastirmalari Dergisi is the property of ODU Journal of Social Sciences Research and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
32. Enhancing digital security through randomized cryptology: a novel algorithm utilizing prime numbers, pi, linear encryption, and matrices.
- Author
-
Gül, Neslihan
- Subjects
DATA encryption ,INFORMATION technology security ,MATHEMATICAL formulas ,PRIME numbers ,DIGITAL technology - Abstract
Recently, the widespread use of computer technology and the development of the internet have facilitated access to information. However, this has also increased the importance of information security. Public and private sector organizations need robust databases to protect their digital assets. For this reason, many security-oriented products and projects are being developed. Especially with the rapid progress of the internet age and the increasing importance of digital security, the field of cryptology has attracted great interest. Cryptology is the science of ciphers. The infrastructure of cryptology is based on mathematics. In order to ensure the security of information in the digital environment, a strong database is needed. This is achieved with strong encryption algorithms. Algorithms that incorporate the principle of randomness and allow repeating letters to take different values are stronger against external attacks. For these reasons, the aim of this study is to create a cryptology algorithm that is resistant to password cracking techniques, adopts the principle of randomness, contains mathematical formulas and has a decryption. In this study, prime numbers, pi number, linear encryption technique and matrices are used. In the encryption algorithm, it is aimed to adopt the principle of randomness with prime numbers and pi number. By using linear encryption technique and matrices, new sequence numbers of each letter were obtained, and it was aimed to strengthen against the frequency analysis method, which is one of the password cracking techniques, by ensuring that the repeating letters take different number values. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
33. Cyber-Spirituality in the Workplace
- Author
-
Özgün Atalay, Mustafa, author, Erdem Tunç, Yusuf, author, and Ceren Erkengel, Hazel, author
- Published
- 2023
- Full Text
- View/download PDF
34. Metaverse: Virtual Currencies as a Mechanism for Employee Engagement and Retention.
- Author
-
Robertson, Shelley, Baror, Stacey, and Venter, Hein
- Abstract
Virtual currencies, including cryptocurrencies and non-fungible tokens (NFT's), are increasingly used as rewards in virtual environments. Traditional reward systems have been effective in improving employee satisfaction and retention but with the shift to hybrid or remote work post-COVID-19, organisations need adapted reward systems. However, the problem of this research is that it's unclear how virtual currencies can be effectively utilised as a reward system, in the Metaverse, and their impact on employee motivation and engagement. This study explores this by reviewing literature, analysing reward mechanisms, and proposing a conceptual model to evaluate the feasibility of such a reward system. The study considers factors like social comparison and loss aversion as well as rewards known to boost motivation and engagement. The flexibility of virtual currencies for conversion or exchange into rewards offers numerous possibilities, with specific reward choices left to organisations' discretion. This study offers promise to organisations seeking to retain and motivate their employees, ultimately contributing to increased productivity. In turn, employees can benefit from improved job satisfaction and reduced work-related pressures. The study's conclusion assesses the usefulness of this research and outlines potential areas for future research. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
35. Advanced Plasmonic Resonance-enhanced Biosensor for Comprehensive Real-time Detection and Analysis of Deepfake Content
- Author
-
Maheshwari, R. Uma, Kumarganesh, S., K V M, Shree, Gopalakrishnan, A., Selvi, K., Paulchamy, B., Rishabavarthani, P., Sagayam, K. Martin, Pandey, Binay Kumar, and Pandey, Digvijay
- Published
- 2024
- Full Text
- View/download PDF
36. "Voices from the Island": Informational annexation of Crimea and transformations of journalistic practices.
- Author
-
Ermoshina, Ksenia
- Subjects
TELECOMMUNICATION ,BROADCASTING industry ,JOURNALISM ,CENSORSHIP - Abstract
After the annexation of Crimea by Russia in March 2014, the peninsula experienced a progressive transition of telecommunication and broadcasting infrastructure under Russian influence, followed by a wave of repression of Ukrainian media. Between 2014 and 2015, dozens of Ukrainian media organizations and independent journalists left the peninsula to continue working in exile. This paper explores the phenomenon of informational annexation using a mixed methods approach consisting of in-depth interviews with media and IT professionals as well as digital ethnography and network measurements. It argues that, besides pressure from pro-Russian authorities, journalistic work in the area is challenged by legal and infrastructural factors such as the absence of legal and financial protections for Ukrainian journalists traveling to Crimea, lack of holistic digital security within media organizations, and increased Internet censorship in Crimea. By analyzing the risk perceptions and digital security practices of exiled and Crimean civic journalists, this paper explores how informational annexation challenges journalistic work on the infrastructural and organizational level, enabling the rise of civic journalism, and how it affects journalists' individual digital security practices. In the context of the current Russian invasion of Ukraine, this research provides insights into some of the informational annexation tactics used by Russians in the occupied Ukrainian territories. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
37. Digital Competencies and their Impact on Public Servants' Productivity in Peru.
- Author
-
Medina-Esquivel, Wilfredo-Alexander, Cernaqué-Miranda, Ofelia-Carol, and Prudenci-Cuela, Fausto-Enrique
- Subjects
- *
PUBLIC administration , *DIGITAL literacy , *LOGISTIC regression analysis , *CIVIL service , *INFORMATION & communication technologies - Abstract
In an increasingly digitized environment, with a heavy reliance on Information and Communication Technologies (ICT), the significance of digital competencies (DC) in the public sector is undeniably crucial. This study focuses on assessing the impact of DC on the productivity of public servants in a governmental entity in Peru during 2022. Utilizing logistic regression analysis on a sample of 134 participants, and asserting a 99% confidence level with a 3.8% margin of error, it is concluded that DC accounts for a significant proportion (24.9%) of productivity variability. The analysis identifies a deficiency in DC among older public servants, following an examination of skills in information, communication, creation, digital security, and digital empathy. While communication sk ills are prominent, creative abilities emerge as the most vulnerable aspect. This study advocates for the implementation of a training program aimed at enhancing DC, with a particular emphasis on creative skills, and adopting a tailored approach for digital natives and immigrants. The training plan should be underpinned by the proposed concept of DC within a directed acyclic diagram, illustrating the integration and interrelation of the five key digital skills - information, communication, creation, digital security, and digital empathy - thereby enhancing productivity through increased effectiveness and efficiency. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
38. Digital culture in scientific libraries.
- Author
-
Lomachinska, Iryna, Lomachinskyi, Bohdan, and Rykhlitska, Oksana
- Subjects
- *
INFORMATION technology security , *SCIENCE education , *DIGITAL communications , *VIRTUAL culture , *PUBLIC spaces , *CITIZENSHIP education - Abstract
The article reveals the main areas of higher education institutions scientific libraries’ work in the field of forming the youth digital culture and ensuring the basic principles of digital citizenship. The relevance and novelty of the research lies in clarifying the need for constant improvement of digital culture in its relationship with digital citizenship in the modern educational space with the involvement of the scientific libraries’ experience. The research methodology is based on a combination of comparative analysis, systematic, heuristic and logical methods of scientific research. The essential features of information culture, digital culture and the culture of knowledge management in the modern educational space are analyzed, in particular, the dynamics of knowledge management in higher educational institutions stimulate students to exchange experience and knowledge not only within the boundaries of one educational institution, but also in the network educational space in general. Digital technologies provide effective communication in the network public space and create prerequisites for successful professional and personal self-realization of a person. It is noted that the formation of digital culture is based on the development of digital competences, as a dynamic combination of knowledge, abilities, skills, ways of thinking, views, other personal qualities in the field of information, communication and digital technologies for communication, personal development, learning, work, participation in social life. The main features of digital citizenship are defined as the awareness of universal cultural and social issues related to technologies, the formed practice of legal and ethical behavior; safe, legal and responsible use of information and technologies; demonstration of a positive attitude towards the use of technology, that support collaboration, learning and productivity; a sense of responsibility for one's lifelong learning; commitment to intellectual honesty; respect for different cultures and societies in the virtual environment and the preservation of personal information. The Conclusions emphasize the worldview component of digital culture, which contributes to a change in thinking style based on new digital competencies. In the conditions of globalization challenges of modern times, the formation of digital culture of youth contributes to ensuring information security not only of an individual, but also of society as a whole. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
39. Digital Consciousness and Identity.
- Author
-
Veliyev, Daxil Jahangir
- Subjects
- *
ARTIFICIAL intelligence , *SOCIAL intelligence , *DIGITAL media , *DIGITAL technology , *GROUP identity - Abstract
The aim of the study is to analyze how the development of digital consciousness and the widespread ingress of digital technologies into daily life affect the under-standing and formation of human identity in contemporary society. This aim encompasses several key research directions: studying the impact of virtual agents and artificial intelligence systems with elements of digital conscious-ness on individuals’ self- perception and their views of the world; identifying the role of digital media in the process of forming and rethinking social identity; analyzing the consequences of continuous interaction with digital technologies and content for personal development, self-esteem, and self-presentation; considering ethical and philosophical issues related to the creation and interaction with digital conscious-ness; reflecting on potential pathways for the development of relationships between humans and digital technologies, assessing opportunities and risks associated with a closer integration of artificial intelligence into the social and personal spheres of people’s lives. The result of exercising this interdisciplinary approach and combining various theories and observations show that people, with the help of technology, are taking part in developing their own identity, further proving the impact of digitalization on an individualistic and collective level; digital technologies also tend to have a profound and transformative impact on the peoples’ self-awareness and relations in a globalized world; furthermore, the use of digital technologies proves to be an effective means of global and subtle influence on the life, behavior and beliefs of modern people. It has been argued that postmodernism and cyberculture, in addition to having an ontological connection, share a model of world perception, which is not affiliated with any type of hierarchical model. The result of the author's reasoning is the conclusion that changes in technology or data loss are not mere technical problems – people end up feeling serious consequences of them, including drastic shifts in their personality, cognitive abilities and general well-being. This deeply affects the user’s ability to maintain their productivity, interact with information, and, more broadly, their ability to function in everyday life. Such situations highlight the need for the development and implementation of strategies and policies that consider potential vulnerabilities associated with technology dependence and aim to minimize the negative consequences of such dependence. Ethical considerations around cognitive extenders should include discussions on precautionary measures and development standards that ensure protection and support for users in the event of technological changes, updates, or failures. This might involve creating more resilient systems for data storage and recovery, developing more transparent and predictable update schemes, and introducing policies that support users’ cognitive autonomy and wellbeing. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
40. Reactualising the problem of social engineering and digital security.
- Author
-
Kolinko, Maryna, Petryshyn, Halyna, and Chumak, Halyna
- Subjects
- *
SOCIAL engineering (Fraud) , *SOCIAL engineering (Political science) , *SOCIAL facts , *DIGITAL technology , *FRAUD - Abstract
The article explores the current aspects of social engineering in the digital age. Social engineering is considered as a strategic technology of constructing new meanings, principles, rules and facts of social interaction. The socio-philosophical concepts of K. Popper, P. Sorokin, and R. Silverstone are analyzed in the context of constructive proposals of social engineering. The application of historical and philosophical intellectual constructs to the practices of social transformations is described in the article. The article reveals the possibilities and limitations of digital technologies in social engineering. The risks of creating new tools and algorithms for manipulation, disorientation of users of virtual technologies by social engineering methods are shown within the framework of the digital security problem. The diversity of views on the essence of social engineering and the analysis of its spheres of application problematize the interpretation of its social role and meaning. The methods of constructing social events and interfering in people's lives require critical evaluation. The implementation of AI in social engineering developments leads to the new risks, which are systematized in the article. They are related to the manipulation of public consciousness, distortion of identification and personalisation methods, financial fraud, and violation of human security [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
41. A Study on Customers' Perception towards Modern Banking Frauds and Safety Awareness in Mewat District, Haryana.
- Author
-
Kumar, Ramesh
- Abstract
The banking sector has encountered essential change with the coming of computerized advancements, presenting phenomenal comfort and proficiency. Notwithstanding, this shift has similarly increased the weakness to various kinds of misrepresentation, strikingly e-banking frauds, which have turned into a developing concern. This study examines the awareness and perception of e-banking frauds among bank customers in Mewat district, Haryana, determined to decrease misrepresentation incidents and propelling a protected, credit only economy. The exploration surveys awareness levels across various segment factors like age, orientation, training, and business status, revealing essential assortments. Men, more youthful individuals, and those with advanced education and work status displayed more prominent awareness. The revelations include the significance of designated instructive missions and good safety efforts custom-made to explicit segment needs. Future examination ought to expand to different areas and include bigger example sizes to improve the completeness and real nature of the encounters gained. [ABSTRACT FROM AUTHOR]
- Published
- 2024
42. EXPLORING THE SECURITY OF THE DIGITAL SOCIETY: FOCUSING ON THE "PHYGITAL" SPACE. ADVOCATING FOR A NOVEL EDUCATIONAL MODEL TARGETING DIGITAL NATIVES -- GEN Z AND ALPHA.
- Author
-
MÂNDRAȘ, PAUL
- Subjects
DIGITAL transformation ,DIGITAL technology ,INDUSTRY 4.0 ,GENERATION Z ,SOCIAL space - Abstract
The digital society represents the latest stage of societal evolution that humanity is currently experiencing. The advent of information technologies and digitalisation has had a profound effect on society, affecting not only the economy but also a multitude of other domains, including business, defence, politics, social aspects, and the environment. Digitalisation creates the fourth industrial revolution and a new type of social space, the "phygital", that represents a convergence of physical and digital realms. It is therefore imperative to focus on the impact of digitalisation and assess digital dangers on society as a whole. We argue that these phenomena represent significant and tangible transformations with a disruptive impact on individuals, societies and human life. Consequently, rather than debating whether Generation Z is the least resilient generation, we emphasize the need for specialised training and education designed for digital natives--especially, Generation Z, who were born and raised during the digital revolution. We posit that such an educational training can ensure social success in the face of digital transformation. [ABSTRACT FROM AUTHOR]
- Published
- 2024
43. مستوى تعزيز حماية الطفل في العالم الرقمي من وجهة نظر أولياء الأمور في مدينة الرياض.
- Author
-
خلود راشد الكثير
- Subjects
CHILD welfare ,PARENTS ,COMPUTER security ,KINDERGARTEN - Abstract
Copyright of Dirasat: Educational Sciences is the property of University of Jordan and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
44. Strengthening Digital Security: Dynamic Attack Detection with LSTM, KNN, and Random Forest.
- Author
-
Hasas, Ansarullah, Zarinkhail, Mohammad Shuaib, Hakimi, Musawer, and Quchi, Mohammad Mustafa
- Subjects
INTERNET security ,MACHINE learning ,COMPARATIVE studies ,COMPUTER network security ,DATA analysis - Abstract
Digital security is an ever-escalating concern in today's interconnected world, necessitating advanced intrusion detection systems. This research focuses on fortifying digital security through the integration of Long Short-Term Memory (LSTM), K-Nearest Neighbors (KNN), and Random Forest for dynamic attack detection. Leveraging a robust dataset, the models were subjected to rigorous evaluation, considering metrics such as accuracy, precision, recall, F1-score, and AUC-ROC. The LSTM model exhibited exceptional proficiency in capturing intricate sequential dependencies within network traffic, attaining a commendable accuracy of 99.11%. KNN, with its non-parametric adaptability, demonstrated resilience with a high accuracy of 99.23%. However, the Random Forest model emerged as the standout performer, boasting an accuracy of 99.63% and showcasing exceptional precision, recall, and F1-score metrics. Comparative analyses unveiled nuanced differences, guiding the selection of models based on specific security requirements. The AUC-ROC comparison reinforced the discriminative power of the models, with Random Forest consistently excelling. While all models excelled in true positive predictions, detailed scrutiny of confusion matrices offered insights into areas for refinement. In conclusion, the integration of LSTM, KNN, and Random Forest presents a robust and adaptive approach to dynamic attack detection. This research contributes valuable insights to the evolving landscape of digital security, emphasizing the significance of leveraging advanced machine learning techniques in constructing resilient defenses against cyber adversaries. The findings underscore the need for adaptive security solutions as the cyber threat landscape continues to evolve, with implications for practitioners, researchers, and policymakers in the field of cybersecurity. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
45. ÉTICA E PRIVACIDADE NA EDUCAÇÃO DIGITAL: OS DESAFIOS ÉTICOS E DE PRIVACIDADE NO USO DE TECNOLOGIAS DIGITAIS.
- Author
-
Narciso, Rodi, Aparecido Urso Silva, Alexander, Rodrigues Barros, Ayrla Morganna, Lima Costa, Jessé Marques, Alves Pereira, João, Martins de Araujo, Maria Nilsa, das Neves Meroto, Monique Bolonha, and de Oliveira Moniz, Sibele Selvina
- Subjects
DATA protection ,DATA privacy ,BLENDED learning ,SCHOOL administrators ,DATA protection laws - Abstract
Copyright of Revista Foco (Interdisciplinary Studies Journal) is the property of Revista Foco and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
46. Digital culture in scientific libraries
- Author
-
Ірина Ломачинська, Богдан Ломачинський, and Оксана Рихліцька
- Subjects
digital culture ,information culture ,digital citizenship ,digital competences ,digital security ,digital education ,History (General) and history of Europe ,Philosophy. Psychology. Religion - Abstract
The article reveals the main areas of higher education institutions scientific librar-ies’ work in the field of forming the youth digital culture and ensuring the basic prin-ciples of digital citizenship. The relevance and novelty of the research lies in clarify-ing the need for constant improvement of digital culture in its relationship with digital citizenship in the modern educational space with the involvement of the scientific libraries’ experience. The research methodology is based on a combination of com-parative analysis, systematic, heuristic and logical methods of scientific research. The essential features of information culture, digital culture and the culture of knowledge management in the modern educational space are analyzed, in particular, the dynamics of knowledge management in higher educational institutions stimulate students to exchange experience and knowledge not only within the boundaries of one educational institution, but also in the network educational space in general. Digital technologies provide effective communication in the network public space and create prerequisites for successful professional and personal self-realization of a person. It is noted that the formation of digital culture is based on the develop-ment of digital competences, as a dynamic combination of knowledge, abilities, skills, ways of thinking, views, other personal qualities in the field of information, communication and digital technologies for communication, personal development, learning, work, participation in social life. The main features of digital citizenship are defined as the awareness of universal cultural and social issues related to technolo-gies, the formed practice of legal and ethical behavior; safe, legal and responsible use of information and technologies; demonstration of a positive attitude towards the use of technology, that support collaboration, learning and productivity; a sense of responsibility for one's lifelong learning; commitment to intellectual honesty; re-spect for different cultures and societies in the virtual environment and the preserva-tion of personal information. The Conclusions emphasize the worldview component of digital culture, which contributes to a change in thinking style based on new digital competencies. In the conditions of globalization challenges of modern times, the formation of digital culture of youth contributes to ensuring information security not only of an individual, but also of society as a whole.
- Published
- 2024
- Full Text
- View/download PDF
47. Reactualising the problem of social engineering and digital security
- Author
-
Марина Колінько, Галина Петришин, and Галина Чумак
- Subjects
artificial intelligence ,liminality ,social engineering ,digital security ,social construction ,virtual reality ,History (General) and history of Europe ,Philosophy. Psychology. Religion - Abstract
The article explores the current aspects of social engineering in the digital age. Social engineering is considered as a strategic technology of constructing new meanings, principles, rules and facts of social interaction. The socio-philosophical concepts of K. Popper, P. Sorokin, and R. Silverstone are analyzed in the context of constructive proposals of social engineering. The application of historical and philosophical intellectual constructs to the practices of social transformations is described in the article. The article reveals the possibilities and limitations of digital technologies in social engineering. The risks of creating new tools and algorithms for manipulation, disorientation of users of virtual technologies by social engineering methods are shown within the framework of the digital security problem. The diversity of views on the essence of social engineering and the analysis of its spheres of application problematize the interpretation of its social role and meaning. The methods of constructing social events and interfering in people's lives require critical evaluation. The implementation of AI in social engineering developments leads to the new risks, which are systematized in the article. They are related to the manipulation of public consciousness, distortion of identification and personalisation methods, financial fraud, and violation of human security.
- Published
- 2024
- Full Text
- View/download PDF
48. DIGITAL SKILLS – AN ASSET FOR FUTURE ACCOUNTING PROFESSIONALS. ANALYSIS OF ROMANIA’S POSITIONING WITHIN THE EU MEMBER STATES
- Author
-
Veronica MÎȚA and Mariana MAN
- Subjects
digitalization ,digital skills ,information skills ,digital communication ,digital security ,accounting profession ,Business ,HF5001-6182 ,Finance ,HG1-9999 - Abstract
Globalisation, digitisation and technological advances describe the present and future of accounting. In order for accounting professionals to remain always connected to the present and prepared for the future, they constantly need to update their knowledge and skills acquired to date and not hinder their continuous learning process. The focus of this paper is on the digital skills of accounting professionals, which are an imperative in a digital economy. This paper is based on the analysis over time, using mathematical calculation methods, of 5 indicators, which describe the level of information and communication technology skills of the European population. The aim of this analysis is to determine the level of digital skills of the Romanian population in comparison with other EU member countries. Romania, in terms of the 5 indicators, ranks lower in the European ranking. This analysis shows that Romanians, compared to other European populations, use basic digital technologies, are more adaptable in their use, but do not use technologies in a competitive way and do not use them in a more efficient way. For Romania's population to achieve an advanced level of digitisation, they need to develop digital and information skills, digital problem-solving skills, digital communication skills and cybercrime safety skills. These skills must be mandatory in the knowledge portfolio of accounting professionals. These are the most current requirements of financial jobs. Accounting professionals must comply with the new requirements of the digital economy which is extending to all fields of activity, such as social relations, health, public administration.
- Published
- 2023
- Full Text
- View/download PDF
49. Examining and Analyzing ChatGPT from the Perspective of Digital Security
- Author
-
Fu Xiang, Wei Xiaowei, Zhang Hao, Xu Ning
- Subjects
digital security ,chatgpt ,network security ,information security ,social security ,cognitive security ,weapon and equipment ,Motor vehicles. Aeronautics. Astronautics ,TL1-4050 - Abstract
The development of digital technology and artificial intelligence technology hastens the progress in the field of digital security. As the latest technology in the field of natural language processing, ChatGPT has become the focus of attention around the world since its birth, and also has a significant impact on the field of digital security. This paper reviews the basic situation of ChatGPT, summarizes and combs the basic concepts of digital security, and then examines and analyzes ChatGPT from the perspective of digital security. It analyzes and sorts out the impact of ChatGPT from six aspects: ChatGPT’s own security, intellectual property security, network security, information security, social security and cognitive security to clarify twenty specific digital security risks. On this basis, the impact of ChatGPT on the fields of equipment intelligence analysis, equipment production and development, and equipment logistics support is analyzed. Finally, this paper provides countermeasures and suggestions from the perspectives of ChatGPT industry development, regulatory construction, false information disposal, and equipment intelligence development.
- Published
- 2023
- Full Text
- View/download PDF
50. Emerging Cyber Scams Trend in Southeast Asia and Addressing Its White-Collar Trafficked Victims
- Author
-
Ye Minn Thein
- Subjects
digital security ,preparing for safer access to cyber technology ,Political institutions and public administration (General) ,JF20-2112 - Abstract
Southeast Asia has seen a surge in cybercrimes exploiting the growing digital landscape, affecting individuals, businesses, and governments. The problem roots in traditional transnational crimes with criminal networks moving across Southeast Asia, particularly to Cambodia and Myanmar due to increased scrutiny in China. The COVID-19 pandemic has worsened cyber scams, expanding online operations in gambling and underground banking, leading to labor shortages and the emergence of «job scams» targeting people in Taiwan, Hong Kong, Malaysia, and Macau. The growth of Special Economic Zones (SEZs) in Southeast Asia and the Casinos in the region also significantly contribute to illicit economies, serving as smuggling hubs, dealing with regulatory challenges, and fostering illicit demand. Addressing cyber scams in Southeast Asia requires collaboration among governments, law enforcement, businesses, civil society, and the public. The comprehensive strategy would involve education, collaboration, legal frameworks, capacity building, public-private partnerships, international cooperation, technological solutions, consumer protection, victim-centered approaches, incident response mechanisms, and continuous monitoring and evaluation.
- Published
- 2023
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.