Disaster Medicine and Public Health Preparedness,
Journal Year:
2024,
Volume and Issue:
18
Published: Jan. 1, 2024
Abstract
Objectives
This
study
investigates
the
public
health
implications
of
terrorist
attacks
on
telecommunications
infrastructure
globally,
assessing
direct
and
indirect
impacts
emergency
response
medical
services.
Methods
Utilizing
retrospective
analysis,
this
research
delves
into
incidents
recorded
in
Global
Terrorism
Database
(GTD)
from
1970
to
2020.
The
employs
descriptive
statistical
methods
identify
patterns
examine
regional
distribution
frequency
these
attacks,
alongside
types
weaponry
used
casualties
involved.
Results
analysis
underscores
a
significant
focus
by
groups,
revealing
frequent
use
high-impact
weapons
like
explosives
incendiary
devices
aimed
at
maximizing
disruption.
highlights
considerable
variations
nature
emphasizing
strategic
importance
infrastructures
safety
systems.
Conclusions
findings
demonstrate
critical
need
for
robust
security
enhancements
tailored
threats
integration
advanced
technologies
strategies.
advocates
enhanced
international
cooperation
policymaking
mitigate
ensuring
resilience
face
global
terrorism.
Asian Journal of Research in Computer Science,
Journal Year:
2024,
Volume and Issue:
17(5), P. 172 - 189
Published: March 15, 2024
This
research
explores
the
integration
of
Information
Governance
(IG)
strategies
and
Blockchain
Technologies
(BT)
in
enhancing
digital
trust
security
within
democratic
processes.
Amid
concerns
about
integrity
vulnerability
electoral
systems
era,
this
study
examines
how
these
technologies
can
collectively
safeguard
democracy.
Utilizing
Partial
Least
Squares
Structural
Equation
Modeling
(PLS-SEM),
bootstrapping
analysis
for
mediation
effects,
Fornell-Larcker
Criterion
discriminant
validity,
was
conducted
on
data
from
934
participants
involved
process.
Key
findings
demonstrate
that
IG
significantly
impact
trust,
indicating
importance
robust
management,
legal
compliance,
privacy
measures
public
confidence
systems.
positively
affect
processes
due
to
their
decentralized
immutable
characteristics.
Furthermore,
is
identified
as
a
critical
mediator
between
strategies,
BT,
processes,
highlighting
effectiveness
technologies.
Based
insights
gained,
three
actionable
recommendations
are
proposed:
Electoral
authorities
should
adopt
comprehensive
frameworks
enhance
transparency;
Pilot
blockchain
projects
be
expanded
refine
understand
broader
implementation
implications
election
security;
Efforts
increased
foster
literacy
among
electorate,
emphasizing
role
securing
integrity.
Journal of Engineering Research and Reports,
Journal Year:
2024,
Volume and Issue:
26(6), P. 31 - 49
Published: May 4, 2024
This
research
paper
explores
the
integration
of
Enterprise
Risk
Management
(ERM),
ISO
27001
standard,
and
mobile
forensics
methodologies
as
a
comprehensive
framework
for
enhancing
digital
security
measures
within
modern
business
ecosystems.
Employing
quantitative
design,
this
utilized
survey
methodology,
gathering
data
from
372
professionals
across
various
sectors
including
risk
management,
IT/security,
forensic
analysis.
The
analysis
was
conducted
using
Partial
Least
Squares
Structural
Equation
Modeling
(PLS-SEM)
to
test
hypotheses
assess
impact
integrated
approach
on
organizational
capabilities.
findings
reveal
significant
positive
effect
integrating
ERM,
27001,
an
organization’s
ability
manage
risks
effectively.
Specifically,
found
enhance
strategic
improve
identification,
assessment,
mitigation
risks,
strengthen
information
management
practices,
elevate
effectiveness
efficiency
crime
investigation
processes.
These
outcomes
underscore
value
cohesive
strategy
that
leverages
strengths
in
addressing
complex
interconnected
threat
landscape.
Based
results,
study
recommends
adopting
holistic
framework,
investing
continuous
professional
development,
leveraging
technological
advancements
proactive
fostering
culture
collaboration.
Such
are
crucial
organizations
aiming
their
resilience
against
cyber
threats
protect
assets
face
sophisticated
cyber-attacks.
contributes
field
cybersecurity
by
providing
empirical
evidence
benefits
security,
offering
practical
guidelines
seeking
measures,
highlighting
need
adaptation
collaboration
fight
threats.
Journal of Engineering Research and Reports,
Journal Year:
2024,
Volume and Issue:
26(6), P. 165 - 177
Published: May 17, 2024
This
research
paper
explores
the
potential
of
artificial
intelligence
(AI)
and
automation
to
reduce
digital
divide
in
developing
countries.
The
study
investigates
how
these
technologies
can
enhance
accessibility
efficiency
critical
sectors
such
as
education,
healthcare,
agriculture,
economic
development,
thereby
contributing
social
progress.
Key
findings
indicate
that
AI
significantly
improve
educational
outcomes
by
providing
personalized
learning
experiences,
enhancing
healthcare
delivery
through
better
diagnostics
patient
care,
increasing
agricultural
productivity
with
precision
farming,
stimulating
growth
creating
new
job
opportunities
improving
market
access.
However,
deploying
faces
substantial
challenges,
including
inadequate
infrastructure,
significant
skills
gaps,
cultural
resistance,
policy
constraints.
adopts
a
mixed-methods
approach,
combining
quantitative
data
analysis
qualitative
case
studies
comprehensively
understand
impacts
challenges
associated
implementing
less
developed
regions.
scope
spans
several
countries,
offering
insights
relevant
policymakers,
NGOs,
private
sector
engaged
technology
deployment
for
development.
underscores
necessity
collaborative
approach
overcome
identified
barriers
suggests
strategic
recommendations
stakeholders
leverage
practical
tools
closing
divide.
contributes
broader
discourse
on
technology’s
role
global
highlighting
both
transformative
need
inclusive
context-sensitive
governance.
Archives of Current Research International,
Journal Year:
2024,
Volume and Issue:
24(5), P. 612 - 629
Published: June 15, 2024
This
study
investigates
the
criminal
use
and
abuse
of
artificial
intelligence
(AI),
exploring
effectiveness
various
mitigation
strategies.
It
employs
a
mixed-methods
approach,
combining
quantitative
data
from
survey
211
experts
with
qualitative
insights
academic,
governmental,
industrial
publications.
The
research
examines
four
key
hypotheses:
impact
public
organizational
awareness,
role
advanced
detection
technologies,
ethical
guidelines,
influence
penalties
enforcement.
findings
reveal
that
technology,
ethics,
enforcement
all
contribute
to
mitigating
AI
misuse.
concludes
by
proposing
comprehensive
strategies,
including
targeted
awareness
campaigns,
investment
in
robust
strengthened
legal
frameworks,
effectively
combat
AI.
Asian Journal of Research in Computer Science,
Journal Year:
2024,
Volume and Issue:
17(7), P. 128 - 144
Published: July 6, 2024
This
study
critically
analyzes
the
impact
of
artificial
intelligence
(AI)
and
big
data
on
media
industry,
focusing
ethical
challenges
biases
introduced
by
these
technologies.
The
research
aims
to
uncover
extent
which
AI
influence
content
personalization,
creation,
marketing,
ramifications
influences
cultural
diversity
societal
norms.
A
mixed-methods
approach
was
employed,
combining
quantitative
analysis
through
a
survey
532
respondents
qualitative
thematic
10
academic
literatures.
findings
reveal
significant
associations
between
automated
creation
tools
biases,
personalized
recommendation
systems
echo
chambers,
algorithmic
recommendations
homogenization.
Conversely,
no
association
found
analytics
privacy
concerns.
highlights
need
for
guidelines,
enhanced
diversity,
strengthened
measures,
increased
transparency
mitigate
in
AI-driven
platforms.
These
insights
contribute
broader
understanding
data's
role
shaping
offering
valuable
implications
future
research,
policy-making,
industry
practices.
Archives of Current Research International,
Journal Year:
2024,
Volume and Issue:
24(6), P. 355 - 375
Published: July 27, 2024
The
rising
threat
of
deepfake
technology
challenges
public
trust
in
media,
necessitating
robust
countermeasures.
This
study
proposes
the
Anti-DFK
framework,
a
comprehensive
strategy
to
mitigate
spread
deepfakes
on
major
social
platforms
such
as
Instagram,
Facebook,
YouTube,
and
Twitter.
framework
integrates
deep
learning-based
detection
engines,
digital
watermarking,
advanced
network
access
controls,
including
URL
filtering,
domain
reputation
content-type
Geo-IP
blocking.
Analyzing
historical
data,
user
engagement
metrics,
sentiment
from
Kaggle
Datasets,
employed
learning
models—CNNs,
LSTMs,
Transformer-based—to
evaluate
capabilities,
achieving
highest
controlled
environment
accuracy
0.97.
Digital
watermarking
techniques
were
tested
for
robustness
against
various
attacks,
with
DCT
method
displaying
significant
resilience.
Network
controls
assessed
their
effectiveness
curtailing
deepfakes,
content
filtering
proving
most
effective
by
reducing
dissemination
nearly
80%.
Findings
indicate
critical
negative
impact
trust,
underscoring
need
integrated
approach
offered
framework.
concludes
that
implementing
these
sophisticated
tools,
combined
stringent
can
significantly
enhance
integrity
media
restore
confidence.
Journal of Engineering Research and Reports,
Journal Year:
2024,
Volume and Issue:
26(8), P. 161 - 184
Published: July 31, 2024
This
study
investigates
endpoint
security
strategies
for
remote
workforces
utilizing
VPN
networks,
focusing
on
mitigating
ransomware
and
botnet
attacks.
A
mixed-methods
approach
was
employed,
analyzing
the
effectiveness
of
existing
solutions
simulating
network
segmentation
strategies.
The
highlights
enhanced
traditional
when
augmented
with
advanced
technologies
specific
applications
including
email
filtering
to
block
phishing
attempts,
MFA
verify
user
identities,
EDR
systems
detect
unauthorized
access
tools,
encryption
secure
data
during
cloud
services.
introduction
zero-trust
architectures
further
secured
centers
by
limiting
lateral
movements
requiring
continuous
re-authentication.
Results
demonstrate
that
while
remain
essential,
their
can
be
through
a
multi-layered
incorporating
this
research
showing
quick
response
times,
high
containment
efficiency,
fast
recovery
speeds
across
all
segments,
Finance
Department
notably
achieving
time
5
minutes
efficiency
95%.
Specifically,
our
cost-benefit
analysis
shows
Strategy
1,
despite
higher
cost,
offers
superior
improvements
in
throughput
latency
reduction,
providing
more
value
per
dollar
spent.
These
results
underscore
plan’s
capability
rapidly
detecting,
containing,
recovering
from
User
education
significantly
improved
cybersecurity
awareness
reduced
susceptibility
provides
practical
recommendations
organizations
strengthen
posture
protect
workforce
combination
technologies,
proactive
measures,
education.
Journal of Engineering Research and Reports,
Journal Year:
2024,
Volume and Issue:
26(7), P. 347 - 365
Published: July 4, 2024
This
study
evaluates
the
integration
of
edge
computing
and
serverless
architectures
to
enhance
scalability
sustainability
in
cloud-based
big
data
management
systems.
With
exponential
increase
from
internet-connected
devices,
traditional
cloud
faces
challenges
scalability,
cost-efficiency,
environmental
impact.
research
utilized
a
simulated
environment
compare
setups
with
integrated
under
conditions
typical
for
smart
city
applications.
The
simulation
focused
on
four
key
performance
metrics:
latency,
operational
costs,
energy
consumption,
throughput.
Results
indicated
substantial
decrease
reduction
149.73
ms
88.94
during
peak
hours,
enhancing
real-time
processing
capabilities
essential
time-sensitive
Operational
costs
were
significantly
lowered
by
approximately
30%,
attributed
dynamic
resource
allocation
that
reduce
financial
waste.
Additionally,
showed
notable
consumption
carbon
emissions,
highlighting
potential
these
technologies
contribute
positively
sustainability.
Lastly,
enhanced
system
was
evident,
throughput
increasing
50%,
proving
its
effectiveness
handling
large
volumes
user
requests
efficiently.
findings
suggest
synergistic
use
could
revolutionize
across
various
sectors,
offering
improvements
performance,
Journal of Engineering Research and Reports,
Journal Year:
2024,
Volume and Issue:
26(7), P. 424 - 443
Published: July 16, 2024
This
study
investigates
the
development
and
enhancement
of
adaptive
location-based
routing
protocols
within
dynamic
wireless
sensor
networks
(WSNs)
in
urban
cyber-physical
systems,
recommending
implementation
study’s
innovative
Urban
Adaptive
Location-based
Routing
Protocol
(UALRP).
protocol
integrates
real-time
data
analytics
machine
learning
models
into
its
algorithmic
framework
to
dynamically
optimize
decisions
based
on
continuously
changing
conditions.
Through
utilization
data-driven
simulation
techniques,
research
sought
significantly
improve
efficiency,
reliability,
scalability
WSNs.
Existing
such
as
Geographic
Fidelity
(GAF),
Greedy
Perimeter
Stateless
(GPSR),
Dynamic
Source
(DSR)
were
critically
assessed
under
settings
using
extensive
datasets
detailing
New
York
City's
traffic
patterns
environmental
variables.
The
analysis
demonstrated
that
while
GPSR
showed
superior
performance
terms
latency,
throughput,
energy
efficiency
among
traditional
protocols,
introduction
UALRP,
with
advanced
predictive
capabilities,
can
further
these
metrics.
affirms
critical
role
enhancing
location
accuracy
ongoing
advancement
protocols.
These
insights
advocate
for
broader
strategies
like
UALRP
foster
more
resilient
efficient
systems.