Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
ICT has become an essential factor in Ethiopia and other East African countries to transform their economies. Meanwhile, the agriculture sector is still the primary driver of economic development. The difference between the past and... more
ICT has become an essential factor in Ethiopia and other East African countries to transform their economies. Meanwhile, the agriculture sector is still the primary driver of economic development. The difference between the past and present years is the injection of technology to further drive this business. For Ethiopia, this means using a database to support countrywide micro-financing to farmers in seeking capital for leasing land, purchasing needed materials, and hiring workers. The objectives of this chapter were to redesign and harden the database architecture of the researched micro-financing organization. The researchers performed an assessment of the organization's information systems. After identifying weaknesses, they followed controls identified in the NIST SP 800-53. This chapter describes the security faults within the database, showing the lack of baseline cybersecurity controls to ensure a hardened system. The authors proposed a security-centered database architecture after auditing the researched organization's IT infrastructure and information systems.
The escalating complexity of cyber attacks demands innovative intrusion detection systems (IDS) to safeguard critical assets and data. The study aims to explore the potential of Artificial Intelligence (AI) in enhancing the IDS's ability... more
The escalating complexity of cyber attacks demands innovative intrusion detection systems (IDS) to safeguard critical assets and data. The study aims to explore the potential of Artificial Intelligence (AI) in enhancing the IDS's ability to identify and classify network traffic and detect anomalous behavior. The paper offers a concise overview of IDS and AI and examines the existing literature on the subject, highlighting the significance of integrating advanced language models for cybersecurity enhancement. The research outlines the methodology employed to assess the efficacy of AI within IDS. Furthermore, the study considers key performance metrics such as detection accuracy, false positive rate, and response time to ensure a comprehensive evaluation. Findings indicate that AI is a valuable asset in enhancing the accuracy of AI for detecting and responding to cyber attacks. Nonetheless, the study also brings to light certain limitations and challenges associated with incorporating AI into IDS, such as computational complexity and potential biases in training data. This research emphasizes the potential of advanced language models like ChatGPT in augmenting cybersecurity solutions and offers insights into overcoming associated challenges for a more robust and effective defense against sophisticated cyber attacks.
Healthcare systems in the United States have discovered the massive potential for digital technology to enhance clinical outcomes and change care delivery (Coventry & Branley, 2018). Technologies range from telemedicine technology... more
Healthcare systems in the United States have discovered the massive potential for digital technology to enhance clinical outcomes and change care delivery (Coventry & Branley, 2018). Technologies range from telemedicine technology providing care remotely, storing electronic health records (EHRs), and devices that deliver medication or monitor health (Coventry & Branley, 2018). There has been a 300% increase in cyberattacks in the healthcare industry (Janofsky, 2019). The increasing cost and threat to cybersecurity, especially amid a global pandemic, highlights organizations' immediate need to utilize system thinking to prevent continuous loss. This research discussion aims to use the literature's contextual review to examine healthcare cybersecurity organizational behavior through systems thinking lens to explore a holistic managerial thinking to better manage healthcare cybersecurity.
Android is a free, open source platform that allows any developer to submit apps to the Android Market with no restrictions. This enables hackers to pass their malicious apps to the Android Market as legitimate apps. The central issue... more
Android is a free, open source platform that allows any developer to submit apps to the Android Market with no restrictions. This enables hackers to pass their malicious apps to the Android Market as legitimate apps. The central issue lies at the heart of the Android permission mechanism, which is not capable of blocking malicious apps from accessing sensitive phone resources (e.g., contact info and browsing history); it either allows or disallows apps from accessing the resources requested by the app at the installation time. This chapter investigated the scope of this issue and concluded that hackers use malicious apps as attack vectors to compromise Android smartphones and steal confidential data and that no security solutions exist to combat malicious apps. The researcher suggested designing a real time monitoring application to detect and deter malicious apps from compromising users' sensitive data; such application is necessary for Android users to protect their privacy an...
Relatório apresentado à Universidade Fernando Pessoa como parte dos requisitos para obtenção do título de pós-doutoramento em Ciências da InformaçãoCybersecurity has gone through several changes that have presented new challenges in... more
Relatório apresentado à Universidade Fernando Pessoa como parte dos requisitos para obtenção do título de pós-doutoramento em Ciências da InformaçãoCybersecurity has gone through several changes that have presented new challenges in recent years, complicated by the rise of cybercrime and digital warfare. With the introduction of militarizing the space domain, it has become apparent that we must consider multidomain concepts. Thus, the threat landscape has again shifted, and defenders must become knowledgeable about how the cyber domain crosses into maritime, land, air, and space. The traditional thinking of protecting enterprise systems locked away in a building is no longer. Thus, we have the emergence of cyber warfare and cyber as a fifth domain that brings together maritime, land, space, and air. These domains are not just for the military but the civilian sector as well. Understanding the role of cyber and how it can be used to take advantage or secure the remaining domains will...
In the wake of a pandemic, it has been essential that programs move online quickly while remaining the same academic rigor as being on the ground. Therefore the cybersecurity coursework and labs were taught entirely online while... more
In the wake of a pandemic, it has been essential that programs move online quickly while remaining the same academic rigor as being on the ground. Therefore the cybersecurity coursework and labs were taught entirely online while representing real-world scenarios. The College of Computing at Illinois Institute of Technology has recently been actively creating new partnerships, strengthening their cybersecurity, Information Technology, and other computing programs to meet national security needs. These activities have allowed partnerships with the United States Armed Services, Department of Defense, and numerous industry partners. The newly found focus on national security has provided a different perspective on cybersecurity-related to global events and how it can shape those currently, such as political events.
Cybercrime affects multiple areas of society with nefarious activities ranging from human trafficking to illegal arms sale. The Internet has allowed some nefarious activities to be revived as others have emerged in this new age. In turn,... more
Cybercrime affects multiple areas of society with nefarious activities ranging from human trafficking to illegal arms sale. The Internet has allowed some nefarious activities to be revived as others have emerged in this new age. In turn, this has become a national security issue for countries as this requires resources to combat this evolving threat. These activities include undermining legitimate services that provide government services to its citizens, such as passport, national identification, tax services, and more. This paper introduces some of these activities, enabling readers to understand this digital criminal world further.
Many countries in the Economic Community of West African States (ECOWAS) are using Information Communications Technology (ICT) to enhance agriculture development and production. To do this efficiently the John Ogonowski and Doug Bereuter... more
Many countries in the Economic Community of West African States (ECOWAS) are using Information Communications Technology (ICT) to enhance agriculture development and production. To do this efficiently the John Ogonowski and Doug Bereuter Farmer-to-Farmer Program managed for West Africa by Winrock International has been tasked with providing volunteer assignments to ministries of agriculture. The University of Missouri Saint Louis (UMSL) has entered a partnership with Winrock International to offer upper-level undergraduate and graduate students the opportunity to provide technical assistance to international government entities. In this panel; we discuss findings and opportunities for improvement in Guinea and Senegal as they relate to ICT discovered through the onsite support provided.
This paper provides insights on performance and usability from an assignment funded by the Catholic Relief Service Farmer-to-Farmer Program, which provides technical assistance with volunteers from the United States to farmers,... more
This paper provides insights on performance and usability from an assignment funded by the Catholic Relief Service Farmer-to-Farmer Program, which provides technical assistance with volunteers from the United States to farmers, agricultural institutions, and government organizations involved in the agricultural sector. The assignment required an affordable mobile data collection solution and IT training in Benin. The researchers developed a platform and provided technical training on-site. This investigation looks at conclusions based on the interpretation of the system usability scale (SUS) results from a representation of 13 cooperators. The research demonstrated the efficiency of the mobile data collection platform, and the training proved to be helpful for the participants. Before the contributions of the researchers, 46.2% of the participants scored at the D level or below. Once training was complete, 76.9% of the participants scored in the range of the B or higher.
The Internet of Things describes a world in which smart technologies enable objects with a network to communicate with each other and interface with humans effortlessly. This connected world of convenience and technology does not come... more
The Internet of Things describes a world in which smart technologies enable objects with a network to communicate with each other and interface with humans effortlessly. This connected world of convenience and technology does not come without its drawbacks, as interconnectivity implies hackability. This new world of convenience calls for revolutionary protection strategies to reassess security. Risk management concepts and Information Assurance architecture similar to those practiced in the United States Department of Defense should be used as guidelines for cyber security implementation. This new emerging market that is facilitating the exchange of services and goods requires understanding the associated laws for the implementation of an IoT architecture (Weber, 2010).
Since the popularization of the big data concept, it has been implemented in various areas. Contemporary literature has proved the potential of using big data in crime prevention. In this research paper, we examine research on big data... more
Since the popularization of the big data concept, it has been implemented in various areas. Contemporary literature has proved the potential of using big data in crime prevention. In this research paper, we examine research on big data being used in Crime Prevention while implementing an author-centric to a concept-centric research approach. We also present the foundation for future research by analyzing data derived from the City of Chicago. We identified the neighborhoods in Chicago that are statistically more prone to crimes and used data of the last 10 years to make our observations. We additionally provide further discussion points for future research purpose.
The cybersecurity of critical infrastructures is an essential topic within national and international security as 16 critical infrastructure sectors touch various aspects of American society. Because the failure to provide adequate... more
The cybersecurity of critical infrastructures is an essential topic within national and international security as 16 critical infrastructure sectors touch various aspects of American society. Because the failure to provide adequate cybersecurity controls within the critical infrastructure sectors renders the country open to an attack that could have a debilitating effect on security, national public health, safety, and economic security, this matter is so vital that there is the Presidential Policy Directive (PPD) 21 Critical Infrastructure Security and Resilience advances a national policy to strengthen and maintain secure, functioning and resilient critical infrastructure. An organization identified as the Cybersecurity and Infrastructure Security Agency (CISA) at the Department of Homeland Security (DHS) has the mission to be the risk advisor for the United States (US). Other organizations, such as the National Security Agency (NSA), have approved a specific Knowledge Unit (KU) t...
The explosion of the internet has given rise to cybercrimes, online identity theft, and fraud. With the internet, these crimes are able to occur anywhere in the world and limitless to whatever selected target. The anonymity of the... more
The explosion of the internet has given rise to cybercrimes, online identity theft, and fraud. With the internet, these crimes are able to occur anywhere in the world and limitless to whatever selected target. The anonymity of the internet allows criminal activity to flourish, and the number of unsuspecting victims is growing. From script kiddies to nation-states, this new method of internet-enabled crimes has strained governments. This chapter provides insight into how crimes related to online identity theft and fraud are carried out. Examined within this chapter are the evolution of cybercrime, history of identity theft, applications for internet anonymity, and discussion on effects caused by romance scams and data breaches. Finally, recommendations are provided on what organizations and individuals can do to protect themselves against these vicious crimes.
This article critically analyzes a project executed for the John Ogonowski and Doug Bereuter Farmer-to-Farmer Program which provides technical assistance with volunteers from the United States to farmers, agricultural institutions, and... more
This article critically analyzes a project executed for the John Ogonowski and Doug Bereuter Farmer-to-Farmer Program which provides technical assistance with volunteers from the United States to farmers, agricultural institutions, and government organizations involved in agriculture such as the Ministry of Agriculture. In Guinea, the focus is on computer literacy as more sectors of agriculture rely on computing technology. These skills range from basic computing tasks such as creating databases to more advanced items such as programming global positional systems. This study looks at findings, based on the analysis of the system usability scale results from a sample of 16 participants. The findings demonstrated that the training proved to be effective for the participants and continued training is necessary. As a result of training, 62.5% of the participants ranked above average, as opposed to 43.6% prior to training.
There has been a fast-growing demand for cybersecurity professionals to defend cyber space and information systems. With more and more programs and course offerings in cybersecurity popping up in higher education, it is important to have... more
There has been a fast-growing demand for cybersecurity professionals to defend cyber space and information systems. With more and more programs and course offerings in cybersecurity popping up in higher education, it is important to have a consistent and reliable quality standard to guide and evaluate the training and preparation of qualified cyber defense workforce. The national Centers of Academic Excellence in Cyber Defense Education (CAE-CDE) designation program jointly sponsored by the US National Security Agency (NSA) and Department of Homeland Security (DHS) is a rigorous national standard with specific criteria for maintaining the quality of cybersecurity education. This article explains the CAE-CDE program criteria and requirements and discusses the important role of the special designation in improving cyber defense education and workforce development. This article illustrates the educational value and quality impact of the CAE-CDE program with three case studies: (1) Univ...
Secure computing is essential as environments continue to become intertwined and hyperconnected. As the Internet of Things (IoT), Web of Things (WoT), and the Internet of Everything (IoE) dominate the landscape of technological platforms,... more
Secure computing is essential as environments continue to become intertwined and hyperconnected. As the Internet of Things (IoT), Web of Things (WoT), and the Internet of Everything (IoE) dominate the landscape of technological platforms, protection these complicated networks is important. The everyday person who wishes to have more devices that allow the ability to be connected needs to be aware of what threats they could be potentially exposing themselves to. Additionally, for the unknowing consumer of everyday products needs to be aware of what it means to have sensors, Radio Frequency IDentification (RFID), Bluetooth, and WiFi enabled products. This submission explores how Availability, Integrity, and Confidentiality (AIC) can be applied to IoT, WoT, and IoE with consideration for the application of these architectures in the defense sector.
Technology is changing the landscape of learning and teaching in America. The use of virtual worlds enable engineering and technology programs to implement software programs such as Second Life and Open Simulator to enhance what they may... more
Technology is changing the landscape of learning and teaching in America. The use of virtual worlds enable engineering and technology programs to implement software programs such as Second Life and Open Simulator to enhance what they may currently already have. Additionally, virtual worlds can add a more dynamic environment in the online classroom for multiple platforms such as the Personal Computer (PC), wearables, and mobile devices. The purpose of this chapter is to provide a review of these programs to include how to implement these items into an engineering course. Further detailed in this submission is how to incorporate Institute of Electrical and Electronics Engineers (IEEE) documentation and other engineering guidelines into the projects. Included in this chapter is a detailed layout of a simulated environment as well as various approaches of structuring and organization for classroom activities.
... on Global Learn Table of Contents. Authors. Maurice Dawson, Morgan State University, USA; Darrell Burrell, Virginia International University, USA; William Emanuel, Morgan State University, USA. Abstract. This paper is a report ...
In this paper, the researcher briefly discusses the attacks that have occurred recently within Saudi Arabia to entities such as Saudi Aramco to the Ministry of Health. These attacks are aggressions against government institutions that can... more
In this paper, the researcher briefly discusses the attacks that have occurred recently within Saudi Arabia to entities such as Saudi Aramco to the Ministry of Health. These attacks are aggressions against government institutions that can render a sector vulnerable. Observing the ongoing attacks on critical infrastructure in Ukraine one can see a replication of similar attacks that could occur and spread over the Middle East. As this nation is a politically turbulent region, there is no small number of external threats. To combat these evolving threats, a shift towards cyber readiness must occur. This includes new laws, security-hardened technologies, and education for people living in the kingdom.
With a fast-growing demand for properly trained cybersecurity professionals to defend our cyber space and information systems, effective cybersecurity education programs and courses with consistent and reliable quality control and... more
With a fast-growing demand for properly trained cybersecurity professionals to defend our cyber space and information systems, effective cybersecurity education programs and courses with consistent and reliable quality control and evaluation are necessary to prepare qualified workforce for the cybersecurity industry. The national Centers of Academic Excellence in Cyber Defense Education (CAE-CDE) designation program jointly sponsored by the US National Security Agency (NSA) and Department of Homeland Security (DHS) is a rigorous certification and national standard for maintaining quality of cybersecurity education. This paper explains the CAE-CDE program criteria and requirements and discusses the important role of the designation in cybersecurity education and workforce development. This paper illustrates the educational value and impact of the CAE-CDE program with case studies of three different institutions: (1) University of Missouri—St. Louis, which has obtained the CAE-CDE and Security Policy Development and Compliance Focus Area designations; (2) American Public University System, which has just completed the application for CAE-CDE; and (3) Robert Morris University, which is in the process of applying for the CAE-CDE designation.
This paper focuses on the positives of introducing entrepreneurship education at the primary and secondary levels of education. Specifically, its central focus deals with building children’s entrepreneurial self-efficacy at a young age.... more
This paper focuses on the positives of introducing entrepreneurship education at the primary and secondary levels of education. Specifically, its central focus deals with building children’s entrepreneurial self-efficacy at a young age. Several benefits, of increasing self-efficacy at a young age, are outlined. Benefits, such as entrepreneurship training, not only train students but, it helps to prepare them for the new knowledge based economy. Further, entrepreneurship education should help increase the success and survival rates of women and minority entrepreneurs. Essential to this process, a new curriculum needs to be devised including its means of assessment. Lastly barriers to an entrepreneurship program are discussed; this includes financial, political and negative perceptions of entrepreneurship education.
ligning information systems to corporate goals has emerged as a leading concern over the last couple of decades. It is essential that we understand the need for cloud computing and how this technology can be implemented. Through this... more
ligning information systems to corporate goals has emerged as a leading concern over the last couple of decades. It is essential that we understand the need for cloud computing and how this technology can be implemented. Through this literature review we review theories of cloud computing and further elaborate on the theoretical framework for the implementation of cloud computing technology across organizations. We also detail cloud computing implementations across various governmental organizations and also across the industry. This review is expected to provide the current study with a more practical perspective on the issues and complexities of using cloud computing and the benefits that can be derived from it.
ealth Information Technology (IT) is an important topic within the health community currently. Many states must update their status in relation to the Strategic and Operation Plan under the State Cooperative Agreement. In this literature... more
ealth Information Technology (IT) is an important topic within the health community currently. Many states must update their status in relation to the Strategic and Operation Plan under the State Cooperative Agreement. In this literature review the findings have been summarized in reference to what is proposed in three states. Key items reviewed are the following; governance, policy/legal, technical infrastructure, business and technical operations, communications/marketing, and relationships to Medicaid/Medicare. With regards to the States of Maryland and Georgia, the State Health Information Exchange (HIE) Cooperative Agreement Program will allow both states to enhance its existing strategic plan and to build an operational plan. In order to address the five domains outlined in the cooperative agreement, Department of Community Health (DCH) plans to spend the first three months amending their strategic plan and building an operational plan that will result in consensus among Georg...
Abstract: This paper is a report on the findings of a study conducted on a doctoral level virtual course utilizing Second Life for usability and interaction. The project from this course allowed for further exploration of training... more
Abstract: This paper is a report on the findings of a study conducted on a doctoral level virtual course utilizing Second Life for usability and interaction. The project from this course allowed for further exploration of training servicemen from other nations in decision making techniques to include a level of familiarization with various technologies. As Second Life is a low cost tool this could prove invaluable to offset training costs to involve getting servicemen to understand technologies through simulation. Currently the available tools are costly and as government looks for ways to save costs Second Life can prove to be a valuable tool. As the future of web interaction is virtual it becomes essential that organizations take advantage of the available tools at their disposal. In the book Technology's Promise: Expert Knowledge on the Transformation of Business and Society written by W. E. Halal mentioned is the shift of societies online. As this shift occurs in the civili...
At the beginning of 2021, the Internet was used to spread words to incite insurrection and violence through social media, incited a pro-Trump mob riot into a U.S. Capitol building. Furthermore, due to recent acts of domestic terrorism in... more
At the beginning of 2021, the Internet was used to spread words to incite insurrection and violence through social media, incited a pro-Trump mob riot into a U.S. Capitol building. Furthermore, due to recent acts of domestic terrorism in Texas, New Zealand, and California, police authorities have begun investigating social media presence that premeditated harmful acts. In all three instances, the shooters posted their manifesto online and had a presence on 8chan. The common thread among all shooters is their identification as a white nationalist and their social media site affiliation with Infinitechan, where they hid their radical ideas. Similarities in the shooters’ profiles include their perceived viewpoints of population groups regarding their political, ethnic, and social identities. This paper will provide insight into the forums where domestic terrorists spread their agendas. It will also set the foundation for further research towards a strategic algorithm that compiles and ...
This article critically analyzes a project executed for the The John Ogonowski and Doug Bereuter Farmer-to-Farmer Program which provides technical assistance with volunteers from the United States to farmers, agricultural institutions,... more
This article critically analyzes a project executed for the The John Ogonowski and Doug Bereuter Farmer-to-Farmer Program which provides technical assistance with volunteers from the United States to farmers, agricultural institutions, and government organizations involved in agriculture such as the Ministry of Agriculture. In Guinea, the focus is on computer literacy as more sectors of agriculture rely on computing technology. These skills needs range from basic computing tasks such as creating databases to more advanced items such as programming Global Positional Systems. This study looks at findings, based on the analysis of the System Usability Scale results from a sample of 16 participants. The findings demonstrated that the training proved to be effective for the participants and continued training is necessary. As a result of training 62.5% of the participants ranked above average, as opposed to 43.6% prior to training.
This paper represents the evaluation and integration of Open Source Software (OSS) technologies to enhance the learning of engineers and scientists within the university. The utilization of OSS is essential as costs around the world... more
This paper represents the evaluation and integration of Open Source Software (OSS) technologies to enhance the learning of engineers and scientists within the university. The utilization of OSS is essential as costs around the world continue to rise for education, institutions must become innovative in the ways they teach and grow Science, Technology, Engineering, & Mathematics (STEM) majors. To do this effectively professors and administrative staff should push toward the utilization of OSS and other available tools to enhance or supplement currently available tools with minimal integration costs. The OSS applications would allow students the ability to learn critical technological skills for success at small fraction of the cost. OSS also provides faculty members the ability to have students dissect source code, analyze network traffic, create virtual instances of real Operating Systems (OSs), and prepare students for low level software development. It is critical that all institu...
Hyperconnectivity and Internet of Things are changing the landscape of Information Technology (IT). Architectures are becoming more sophisticated while cyber security is slowing adapting to this shift of Internet-enabled technologies in... more
Hyperconnectivity and Internet of Things are changing the landscape of Information Technology (IT). Architectures are becoming more sophisticated while cyber security is slowing adapting to this shift of Internet-enabled technologies in automotive, industrial, consumer, and networking. This slow adoption of proper security controls, defenses, and aggressive measures is leaving individuals vulnerable. This submission explores how policies can be created that automate the process of device connectivity, and how current frameworks can be used to minimize system risks.
The Saint Louis Metropolitan Area has been one of the top American cities for tech startups while hosting a substantial number of fortune 500 companies. Usually, this translates into job opportunities for those living and working within... more
The Saint Louis Metropolitan Area has been one of the top American cities for tech startups while hosting a substantial number of fortune 500 companies. Usually, this translates into job opportunities for those living and working within the area. However, the immediate challenge is the lack of women within the workforce that is currently there. While one of the top 50 largest metropolitan areas, Saint Louis has a deficit of women in computer engineering related fields. This paper aims to address those issues while displaying what this city has done to increase the workforce in the metropolitan area. The authors review current initiatives while providing recommendations for enhancing those already present.
The use of Linux based Operating Systems (OS) in the classroom is increasing, but there is little research to address usability differences between Windows and Linux based OSs. Moreover, studies related to the ability for students to... more
The use of Linux based Operating Systems (OS) in the classroom is increasing, but there is little research to address usability differences between Windows and Linux based OSs. Moreover, studies related to the ability for students to navigate effectively between Ubuntu 14.04 Long Term Support (LTS) and Windows 8 OSs are scant. This research aims to bridge the gap between modern Linux and Windows Oss, as the former represents a viable alternative to eliminate licensing costs for educational institutions. Preliminary findings, based on the analysis of the System Usability Scale results from a sample of 14 students, demonstrated that Ubuntu users did not require technical support to use the system, while the majority found little inconsistency in the system and regarded it as well integrated.
martphones are becoming a vehicle to provide an efficient and convenient way to access, find and share information; however, the availability of this information has caused an increase in cyber attacks. Currently, cyber threats range from... more
martphones are becoming a vehicle to provide an efficient and convenient way to access, find and share information; however, the availability of this information has caused an increase in cyber attacks. Currently, cyber threats range from Trojans and viruses to botnets and toolkits. Presently, 96% of smartphones do not have pre-installed security software. This lack in security is an opportunity for malicious cyber attackers to hack into the various devices that are popular (i.e. Android, iPhone and Blackberry). Traditional security software found in personal computers (PCs), such as firewalls, antivirus, and encryption, is not currently available in smartphones. Moreover, smartphones are even more vulnerable than personal computers because more people are using smartphones to do personal tasks. Nowadays, smartphone users can email, use social networking applications (Facebook and Twitter), buy and download various applications and shop. Furthermore, users can now conduct monetary t...
Research on cyber security related to social engineering has expanded from its purely technological orientation into explaining the role of human behaviour in detecting deception (Workman, 2007). In the broadest definition, social... more
Research on cyber security related to social engineering has expanded from its purely technological orientation into explaining the role of human behaviour in detecting deception (Workman, 2007). In the broadest definition, social engineering, in the context of information security, is the manipulation of individuals to perform actions that cause harm or increase the probability of causing future harm. Human personality traits significantly contribute to the probability that an individual is susceptible to manipulation related to social engineering deception attacks and exploits (Maurya, 2013). The outcome of the attacks and objective is the alteration of normal and rational decision making as described in behaviour decision theory (Kamis, 2011). This quantitative and non-experimental study determined what makes an individual based on personality traits predisposed to social engineering treats in the context of susceptibility to deception manipulation and exploitation.
The fourth industrial revolution is referred to as Industry 4.0. The current trend with manufacturing is automation and unparalleled levels of data exchange. To bring this trend to realization requires integrating the Internet of Things,... more
The fourth industrial revolution is referred to as Industry 4.0. The current trend with manufacturing is automation and unparalleled levels of data exchange. To bring this trend to realization requires integrating the Internet of Things, Internet of Everything cyber-physical systems, cloud computing technologies, and more into manufacturing. Industry 4.0 involves a hyperconnected system that includes the smarter use of robotics to effectively and efficiently move to manufacture to new heights. With the use of all these technological systems, it is imperative to ensure that cyber security plays a role during the rise of this digital industrial revolution. In the United Kingdom, more than eighty manufacturing plants were hit by cyber attacks while threats in this specific industry have risen. The pitfalls of having hyperconnected systems leave an entire industry even more vulnerable than the traditional enterprise system design.
In this paper, the researchers provide a background of human trafficking, review the use and implications of digital currency, and apply machine learning techniques to analyze publicly available trafficking datasets. The study also... more
In this paper, the researchers provide a background of human trafficking, review the use and implications of digital currency, and apply machine learning techniques to analyze publicly available trafficking datasets. The study also provides recommendations related to data collection, management, and analysis to aid the vital fight against individuals' exploitation. The researchers conducted an exploratory data analysis using Python, RapidMiner, and Microsoft Excel towards an iterative review and interpretation of the dataset from the Counter Trafficking Data Collaborative (CTDC). The researchers found that there are more female victims of human trafficking in most age groups than male victims. However, for the age group between 39-47, there was a higher male victim count. Additionally, researchers found that the top five countries affected by human trafficking were the Philippines, Ukraine, Republic of Moldova, USA, and Cambodia. However, it must be noted that there are limitations to the overall data because they are provided voluntarily by organizations, and therefore, there is no equitable distribution of actual results from all countries and players. After mapping the country of origin and country of exploitation, it was made clear that there is a movement of victims from the country of origin to the country of exploitation. Lastly, researchers found that a complex combination of different variables is needed to provide accurate predictions for law enforcement and anti-trafficking organizations to aid them in fighting human trafficking, including country
Numerous standards and codes of best practice recommend the implementation of security practices since the early stages of the application development process. Commonly known as ‘security-as-default’, these practices consist of coding... more
Numerous standards and codes of best practice recommend the implementation of security practices since the early stages of the application development process. Commonly known as ‘security-as-default’, these practices consist of coding while keeping security in mind to start addressing threats and vulnerabilities before integrating security measures becomes too laborious. Hence, these best practices lead to cleaner and safer code. An effective way to find out whether the application is secure is by performing source code analyses. These analyses report weaknesses in the code once run against a predefined set of rules. Consequently, developers can detect and correct these issues, preventing the application from future exploits. A static source code analysis was performed to assess a National Crime Reporting System for a Latin American country’s National Police. The system is comprised of three modules: the mobile app, the desktop app, and the backend service. This paper focuses on the...
Today’s society is growing, moving, pushing and pulling in so many different directions. Society has moved from the invention of electricity in the 1800’s to the invention of the iPhone, which has changed the way we use, and perceive... more
Today’s society is growing, moving, pushing and pulling in so many different directions. Society has moved from the invention of electricity in the 1800’s to the invention of the iPhone, which has changed the way we use, and perceive technology today. The survival of an architectural student depends on being able to communicate multiple drawings, graphics, images, diagrams and more in the most productive method. Each phase in design requires a clear and concise conversation between the designer and the observer. Schematic Designs generate some of the most creative ideas during a projects progression. With this understood, this section of this paper will analyze the introduction of Second life to students, professionals, and clients of architecture in a virtual simulated environment. The ability to demonstrate a design solution to a professor or another student across the world will truly increase the effectiveness of collaboration, critic, and cooperation. This applied research pape...
Securing the cyberspace is a challenging task that needs well educated and trained professionals. Developing a workforce that can hold the burden of monitoring and ensure cyberspace security is becoming prominent nowadays. Accordingly,... more
Securing the cyberspace is a challenging task that needs well educated and trained professionals. Developing a workforce that can hold the burden of monitoring and ensure cyberspace security is becoming prominent nowadays. Accordingly, developing effective cybersecurity programs is gaining more focus in academia and industry. This paper examines the current state of various cybersecurity programs in Saudi universities and provides some recommendations.

And 90 more