Journal of Educational Technology and Learning Creativity,
Journal Year:
2024,
Volume and Issue:
2(1), P. 71 - 82
Published: June 24, 2024
Purpose
of
the
study:
This
study
aims
to
analyze
role
Flo
application
as
a
digital
educational
media
based
on
AI
in
improving
adolescent
knowledge,
attitudes,
and
behavior
related
reproductive
health
era
modern
technology.
Methodology:
uses
qualitative
approach
with
descriptive
analytical
method
explore
experiences,
perceptions,
impacts
using
adolescents
context
education.
Data
were
collected
through
in-depth
interviews,
questionnaires,
observations,
documentation
studies.
The
sampling
technique
used
was
purposive
sampling,
while
data
analysis
carried
out
thematic
for
statistics
quantitative
data.
Main
Findings:
results
showed
that
app
effective
increasing
adolescents'
understanding
health,
majority
respondents
feeling
more
confident
managing
their
menstrual
cycles
maintaining
health.
most
appreciated
features
cycle
prediction
daily
symptom
logs.
Although
had
positive
impact,
there
obstacles
such
limited
access
premium
difficult-to-understand
medical
terms.
Overall,
well
received
by
users
potential
further
development.
Novelty/Originality
this
offers
novelty
exploring
predict
provide
personalized
education
content.
Unlike
previous
studies,
leverages
an
is
already
widely
available,
opening
up
opportunities
develop
relevant
platform
adolescents.
Computer Science & IT Research Journal,
Journal Year:
2024,
Volume and Issue:
5(1), P. 237 - 253
Published: Jan. 21, 2024
In
an
era
dominated
by
digital
transformation,
superannuation
organizations
face
unprecedented
challenges
in
safeguarding
the
confidentiality
and
integrity
of
sensitive
financial
data.
This
review
explores
intricate
relationship
between
accounting
practices
cybersecurity
controls
within
context
entities.
By
examining
existing
literature,
regulatory
frameworks,
industry
best
practices,
this
paper
synthesizes
key
considerations
essential
for
ensuring
robust
data
protection.
The
study
delves
into
critical
role
systems
managing
information
subsequent
implications
confidentiality.
It
investigates
how
evolving
standards
intersect
with
protocols
to
fortify
records
organizations.
dynamic
nature
cyber
threats
necessitates
a
comprehensive
analysis
technological
safeguards,
risk
management
compliance
measures
uphold
Furthermore,
underscores
imperative
multidimensional
approach
sector.
discusses
integration
advanced
technologies
such
as
encryption,
blockchain,
anomaly
detection
alongside
traditional
create
resilient
defense
against
emerging
threats.
exploration
extends
examination
employee
training
programs,
incident
response
strategies,
third-party
assessments
integral
components
posture.
As
navigate
complex
landscape
management,
holistic
understanding
interplay
becomes
paramount.
contributes
body
knowledge
providing
insights
opportunities
presented
landscape,
offering
practitioners
policymakers
foundation
enhancing
sector.
Keywords:
Data
Confidentiality;
Accounting;
Cybersecurity;
Superannuation
Organization;
Integrity.
International Journal of Computational and Experimental Science and Engineering,
Journal Year:
2024,
Volume and Issue:
10(4)
Published: Nov. 24, 2024
In
a
simulated
healthcare
setting,
the
algorithms
were
assessed
based
on
organized
threat
insight
data,
inconsistency
location
executed
with
blockchain-enhanced
access
control,
and
machine
learning-driven
interruption
detection.
The
test
results
depiction
showed
that
all
calculations
feasible,
an
accuracy
range
of
0.88-0.94
lift
defined
between
0.75
1;
knowledge
values
ranging
from.86
to.92,
F1
scores
above.90
are
displayed
as
follows:
Above
all,
TIAA
excelled
in
risk
insights
management;
ADA
exceeded
expectations
detecting
inconsistencies;
BACA
used
blockchain
to
fortify
control;
ML-IDS
produced
remarkable
intrusion
importance
these
addressing
particular
cybersecurity
concerns
industry
is
highlighted
through
comparative
comparison
similar
studies.
suggested
relevant
growing
conversation
about
because
they
offer
comprehensive
strategy
protect
private
health
guarantee
reliability
assessment
models,
organizations
against
variety
evolving
cyberthreats.
Applied Sciences,
Journal Year:
2024,
Volume and Issue:
14(20), P. 9459 - 9459
Published: Oct. 16, 2024
Federated
learning,
as
a
novel
distributed
machine
learning
mode,
enables
the
training
of
models
on
multiple
devices
while
ensuring
data
privacy.
However,
existence
single-point-of-failure
bottlenecks,
malicious
threats,
scalability
federated
implementation,
and
lack
incentive
mechanisms
have
seriously
hindered
development
technology.
In
recent
years,
ledger,
blockchain
has
characteristics
decentralization,
tamper-proof,
transparency,
security,
etc.,
which
can
solve
issues
encountered
in
above-mentioned
learning.
Particularly,
integration
leads
to
new
paradigm,
called
blockchain-based
(BFL),
been
successfully
applied
many
application
scenarios.
This
paper
aims
provide
comprehensive
review
efforts
More
concretely,
we
propose
design
taxonomy
models,
along
with
providing
summary
state
art.
Various
applications
based
are
introduced.
Finally,
expand
current
trends
perspectives
pertaining
this
exciting
field.
Sensors,
Journal Year:
2025,
Volume and Issue:
25(3), P. 807 - 807
Published: Jan. 29, 2025
Sharding
is
an
emerging
blockchain
technology
that
used
extensively
in
several
fields
such
as
finance,
reputation
systems,
the
IoT,
and
others
because
of
its
ability
to
secure
increase
number
transactions
every
second.
In
sharding-based
technology,
divided
into
sub-chains,
also
known
shards,
enhance
network
throughput.
This
paper
aims
examine
impact
integrating
securing
IoT
sensors,
which
further
for
environmental
monitoring.
this
paper,
idea
proposed,
along
with
advantages
disadvantages,
by
conducting
a
systematic
literature
review
studies
based
on
recent
years.
Based
research
findings,
beneficial
systems
improving
security,
access,
transaction
rates.
The
findings
suggest
issues,
cross-shard
transactions,
synchronization
concentration
stakes.
With
increased
focus
showcasing
important
trade-offs,
offers
recommendations
implementation
sensors
applications
environment
These
valuable
insights
are
effective
facilitating
informed
decisions
while
developing
more
efficient
decentralized
networks
internet
data
centers
(IDCs),
monitoring
picking
out
key
points
data.
Information,
Journal Year:
2023,
Volume and Issue:
14(12), P. 666 - 666
Published: Dec. 18, 2023
The
increasing
complexity
and
connectivity
of
automotive
systems
have
raised
concerns
about
their
vulnerability
to
security
breaches.
As
a
result,
the
integration
formal
methods
validation
techniques
has
become
crucial
in
ensuring
systems.
This
survey
research
paper
aims
provide
comprehensive
overview
current
state-of-the-art
employed
industry
for
system
security.
begins
by
discussing
challenges
associated
with
potential
consequences
Then,
it
explores
various
methods,
such
as
model
checking,
theorem
proving,
abstract
interpretation,
which
been
widely
used
analyze
verify
properties
Additionally,
highlights
ensure
effectiveness
measures,
including
penetration
testing,
fault
injection,
fuzz
testing.
Furthermore,
examines
within
development
lifecycle,
requirements
engineering,
design,
implementation,
testing
phases.
It
discusses
benefits
limitations
these
approaches,
considering
factors
scalability,
efficiency,
applicability
real-world
Through
an
extensive
review
relevant
literature
case
studies,
this
provides
insights
into
trends,
challenges,
open
questions
field
findings
can
serve
valuable
resource
researchers,
practitioners,
policymakers
involved
development,
evaluation
secure
Advances in information security, privacy, and ethics book series,
Journal Year:
2024,
Volume and Issue:
unknown, P. 300 - 365
Published: Feb. 2, 2024
The
exponential
growth
of
digital
connectivity
in
the
logistics
landscape
has
heightened
significance
cybersecurity.
This
chapter
delves
into
intricate
fabric
securing
supply
chains
against
evolving
cyber
threats,
aiming
to
equip
professionals
with
actionable
strategies
for
resilience.
Beginning
analysing
prevailing
threat
landscape,
it
illuminates
common
vulnerabilities
and
highlights
recent
impactful
attacks
targeting
chains.
Understanding
nexus
between
cybersecurity
resilience
becomes
pivotal,
emphasizing
need
continuous
operations
amidst
adversities.
To
fortify
this
resilience,
meticulously
navigates
through
risk
assessment
methodologies,
mitigation
strategies,
imperative
role
chain
visibility.
It
elaborates
on
vendor
partner
management
protocols,
advocating
stringent
considerations
within
contractual
agreements.
Moreover,
outlines
robust
incident
response
plans
recovery
essential
mitigating
incidents'
ramifications.
Nowadays,
the
proportion
of
traffic
incidents
is
on
increase
due
to
rapid
growth
vehicles,
making
it
a
per-sistent
problem.
Consequently,
number
amicable
accident
reports
unmeasurable.
An
effective
management
information
crucial
element,
especially
in
absence
an
system
for
report
management.
However,
use
traditional
centralized
systems
critical,
as
long
they
fail
present
secure,
transparent,
reliable,
and
trustworthy
platforms
accident's
This
paper
provides
innovative
solution.
It's
case
study
developing
Blockchain
interplanetary
file
(IPFS)
protocol-based
management,
using
mobile
application.
application
could
be
used
at
time
accident.
By
application,
road
users
can
fill
out
same
while
maintaining
data
authenticity,
integrity,
reliability,
without
need
third
trusted
party.
Furthermore,
reflects
safety
performance
insurance
companies
allows
them
put
end
oversights,
inaccuracies,
or
incorrect
when
completing
report.
A
better
understanding
streamlining
process
handling
essential
component
enhance
emergency
response,
promote
safety,
mitigate
economic
impacts
incidents,
both
companies.
World Journal of Advanced Research and Reviews,
Journal Year:
2024,
Volume and Issue:
23(2), P. 2687 - 2697
Published: Aug. 30, 2024
This
review
paper
explores
the
dynamic
landscape
of
Android
mobile
computing,
focusing
on
best
practices
and
emerging
technologies
driving
innovation
in
field.
The
begins
by
discussing
current
state
development,
highlighting
key
challenges
market
trends.
It
then
delves
into
essential
for
designing
intuitive
interfaces,
optimizing
app
performance,
ensuring
robust
security.
Additionally,
examines
transformative
impact
such
as
artificial
intelligence,
5G,
augmented
reality,
virtual
blockchain,
Internet
Things
development.
Finally,
offers
insights
future
trends
ecosystem,
emphasizing
importance
continuous
to
meet
evolving
user
demands
maintain
a
competitive
edge.
comprehensive
provides
developers
stakeholders
with
valuable
knowledge
navigate
complexities
computing
leverage
new
growth
opportunities