Analysis of the Role of the Flo Application as a Digital Educational Media for Adolescent Reproductive Health in the Technology Era DOI

Ambra Hyskaj,

Auliya Ramadhanti,

Hira Farhan

и другие.

Journal of Educational Technology and Learning Creativity, Год журнала: 2024, Номер 2(1), С. 71 - 82

Опубликована: Июнь 24, 2024

Purpose of the study: This study aims to analyze role Flo application as a digital educational media based on AI in improving adolescent knowledge, attitudes, and behavior related reproductive health era modern technology. Methodology: uses qualitative approach with descriptive analytical method explore experiences, perceptions, impacts using adolescents context education. Data were collected through in-depth interviews, questionnaires, observations, documentation studies. The sampling technique used was purposive sampling, while data analysis carried out thematic for statistics quantitative data. Main Findings: results showed that app effective increasing adolescents' understanding health, majority respondents feeling more confident managing their menstrual cycles maintaining health. most appreciated features cycle prediction daily symptom logs. Although had positive impact, there obstacles such limited access premium difficult-to-understand medical terms. Overall, well received by users potential further development. Novelty/Originality this offers novelty exploring predict provide personalized education content. Unlike previous studies, leverages an is already widely available, opening up opportunities develop relevant platform adolescents.

Язык: Английский

DATA CONFIDENTIALITY AND INTEGRITY: A REVIEW OF ACCOUNTING AND CYBERSECURITY CONTROLS IN SUPERANNUATION ORGANIZATIONS DOI Creative Commons

Anthony Anyanwu,

Temidayo Olorunsogo,

Temitayo Oluwaseun Abrahams

и другие.

Computer Science & IT Research Journal, Год журнала: 2024, Номер 5(1), С. 237 - 253

Опубликована: Янв. 21, 2024

In an era dominated by digital transformation, superannuation organizations face unprecedented challenges in safeguarding the confidentiality and integrity of sensitive financial data. This review explores intricate relationship between accounting practices cybersecurity controls within context entities. By examining existing literature, regulatory frameworks, industry best practices, this paper synthesizes key considerations essential for ensuring robust data protection. The study delves into critical role systems managing information subsequent implications confidentiality. It investigates how evolving standards intersect with protocols to fortify records organizations. dynamic nature cyber threats necessitates a comprehensive analysis technological safeguards, risk management compliance measures uphold Furthermore, underscores imperative multidimensional approach sector. discusses integration advanced technologies such as encryption, blockchain, anomaly detection alongside traditional create resilient defense against emerging threats. exploration extends examination employee training programs, incident response strategies, third-party assessments integral components posture. As navigate complex landscape management, holistic understanding interplay becomes paramount. contributes body knowledge providing insights opportunities presented landscape, offering practitioners policymakers foundation enhancing sector. Keywords: Data Confidentiality; Accounting; Cybersecurity; Superannuation Organization; Integrity.

Язык: Английский

Процитировано

33

The Role of Blockchain and AI in Fortifying Cybersecurity for Healthcare Systems DOI Open Access

M. Husain Bathushaw,

S. Nagasundaram

International Journal of Computational and Experimental Science and Engineering, Год журнала: 2024, Номер 10(4)

Опубликована: Ноя. 24, 2024

In a simulated healthcare setting, the algorithms were assessed based on organized threat insight data, inconsistency location executed with blockchain-enhanced access control, and machine learning-driven interruption detection. The test results depiction showed that all calculations feasible, an accuracy range of 0.88-0.94 lift defined between 0.75 1; knowledge values ranging from.86 to.92, F1 scores above.90 are displayed as follows: Above all, TIAA excelled in risk insights management; ADA exceeded expectations detecting inconsistencies; BACA used blockchain to fortify control; ML-IDS produced remarkable intrusion importance these addressing particular cybersecurity concerns industry is highlighted through comparative comparison similar studies. suggested relevant growing conversation about because they offer comprehensive strategy protect private health guarantee reliability assessment models, organizations against variety evolving cyberthreats.

Язык: Английский

Процитировано

6

Blockchain-Based Federated Learning: A Survey and New Perspectives DOI Creative Commons
Wanshan Ning, Y. Zhu,

Caixia Song

и другие.

Applied Sciences, Год журнала: 2024, Номер 14(20), С. 9459 - 9459

Опубликована: Окт. 16, 2024

Federated learning, as a novel distributed machine learning mode, enables the training of models on multiple devices while ensuring data privacy. However, existence single-point-of-failure bottlenecks, malicious threats, scalability federated implementation, and lack incentive mechanisms have seriously hindered development technology. In recent years, ledger, blockchain has characteristics decentralization, tamper-proof, transparency, security, etc., which can solve issues encountered in above-mentioned learning. Particularly, integration leads to new paradigm, called blockchain-based (BFL), been successfully applied many application scenarios. This paper aims provide comprehensive review efforts More concretely, we propose design taxonomy models, along with providing summary state art. Various applications based are introduced. Finally, expand current trends perspectives pertaining this exciting field.

Язык: Английский

Процитировано

4

Securing IoT Sensors Using Sharding-Based Blockchain Network Technology Integration: A Systematic Review DOI Creative Commons
A.Mohamed Aslam, Octavian Postolache, Sancho Oliveira

и другие.

Sensors, Год журнала: 2025, Номер 25(3), С. 807 - 807

Опубликована: Янв. 29, 2025

Sharding is an emerging blockchain technology that used extensively in several fields such as finance, reputation systems, the IoT, and others because of its ability to secure increase number transactions every second. In sharding-based technology, divided into sub-chains, also known shards, enhance network throughput. This paper aims examine impact integrating securing IoT sensors, which further for environmental monitoring. this paper, idea proposed, along with advantages disadvantages, by conducting a systematic literature review studies based on recent years. Based research findings, beneficial systems improving security, access, transaction rates. The findings suggest issues, cross-shard transactions, synchronization concentration stakes. With increased focus showcasing important trade-offs, offers recommendations implementation sensors applications environment These valuable insights are effective facilitating informed decisions while developing more efficient decentralized networks internet data centers (IDCs), monitoring picking out key points data.

Язык: Английский

Процитировано

0

Formal Methods and Validation Techniques for Ensuring Automotive Systems Security DOI Creative Commons
Moez Krichen

Information, Год журнала: 2023, Номер 14(12), С. 666 - 666

Опубликована: Дек. 18, 2023

The increasing complexity and connectivity of automotive systems have raised concerns about their vulnerability to security breaches. As a result, the integration formal methods validation techniques has become crucial in ensuring systems. This survey research paper aims provide comprehensive overview current state-of-the-art employed industry for system security. begins by discussing challenges associated with potential consequences Then, it explores various methods, such as model checking, theorem proving, abstract interpretation, which been widely used analyze verify properties Additionally, highlights ensure effectiveness measures, including penetration testing, fault injection, fuzz testing. Furthermore, examines within development lifecycle, requirements engineering, design, implementation, testing phases. It discusses benefits limitations these approaches, considering factors scalability, efficiency, applicability real-world Through an extensive review relevant literature case studies, this provides insights into trends, challenges, open questions field findings can serve valuable resource researchers, practitioners, policymakers involved development, evaluation secure

Язык: Английский

Процитировано

9

Securing the Supply Chain DOI
Siva Raja Sindiramutty, Chong Eng Tan, Wei Wei Goh

и другие.

Advances in information security, privacy, and ethics book series, Год журнала: 2024, Номер unknown, С. 300 - 365

Опубликована: Фев. 2, 2024

The exponential growth of digital connectivity in the logistics landscape has heightened significance cybersecurity. This chapter delves into intricate fabric securing supply chains against evolving cyber threats, aiming to equip professionals with actionable strategies for resilience. Beginning analysing prevailing threat landscape, it illuminates common vulnerabilities and highlights recent impactful attacks targeting chains. Understanding nexus between cybersecurity resilience becomes pivotal, emphasizing need continuous operations amidst adversities. To fortify this resilience, meticulously navigates through risk assessment methodologies, mitigation strategies, imperative role chain visibility. It elaborates on vendor partner management protocols, advocating stringent considerations within contractual agreements. Moreover, outlines robust incident response plans recovery essential mitigating incidents' ramifications.

Язык: Английский

Процитировано

2

Navigating Knowledge Dynamics: Algorithmic Music Recombination, Deep Learning, Blockchain, Economic Knowledge, and Copyright Challenges DOI
Yue Fa Zhou, Fei Huang

Journal of the Knowledge Economy, Год журнала: 2024, Номер unknown

Опубликована: Янв. 23, 2024

Язык: Английский

Процитировано

1

Blockchain-Based Mobile Application for Traffic Accident Report's Management DOI

Manal Jlil,

Kaoutar Jouti,

Jaouad Boumhidi

и другие.

Опубликована: Май 16, 2024

Nowadays, the proportion of traffic incidents is on increase due to rapid growth vehicles, making it a per-sistent problem. Consequently, number amicable accident reports unmeasurable. An effective management information crucial element, especially in absence an system for report management. However, use traditional centralized systems critical, as long they fail present secure, transparent, reliable, and trustworthy platforms accident's This paper provides innovative solution. It's case study developing Blockchain interplanetary file (IPFS) protocol-based management, using mobile application. application could be used at time accident. By application, road users can fill out same while maintaining data authenticity, integrity, reliability, without need third trusted party. Furthermore, reflects safety performance insurance companies allows them put end oversights, inaccuracies, or incorrect when completing report. A better understanding streamlining process handling essential component enhance emergency response, promote safety, mitigate economic impacts incidents, both companies.

Язык: Английский

Процитировано

1

Innovations in android mobile computing: a review of best practices and emerging technologies DOI Creative Commons

Oluwayemisi Runsewe,

Olajide Soji Osundare,

Samuel Olaoluwa Folorunsho

и другие.

World Journal of Advanced Research and Reviews, Год журнала: 2024, Номер 23(2), С. 2687 - 2697

Опубликована: Авг. 30, 2024

This review paper explores the dynamic landscape of Android mobile computing, focusing on best practices and emerging technologies driving innovation in field. The begins by discussing current state development, highlighting key challenges market trends. It then delves into essential for designing intuitive interfaces, optimizing app performance, ensuring robust security. Additionally, examines transformative impact such as artificial intelligence, 5G, augmented reality, virtual blockchain, Internet Things development. Finally, offers insights future trends ecosystem, emphasizing importance continuous to meet evolving user demands maintain a competitive edge. comprehensive provides developers stakeholders with valuable knowledge navigate complexities computing leverage new growth opportunities

Язык: Английский

Процитировано

1

Efficient Lightweight Blockchain with Hybridized Consensus Algorithm for IoT Networks DOI

S.A. Mohammed Uveise,

S.M.H. Sithi Shameem Fathima

IETE Journal of Research, Год журнала: 2024, Номер unknown, С. 1 - 11

Опубликована: Сен. 17, 2024

Язык: Английский

Процитировано

1