This
study
aims
to
examine
the
Effects
of
Office
Hours
on
Academic
Performance
in
Mogadishu,
Somalia
The
investigated
relationship
between
students'
engagement
office
hours,
time
spent
studying,
utilization
academic
support
services,
and
their
influence
performance.
utilized
cross-sectional
design
collect
data
from
348
first
year
students
four
universities
Mogadishu.
was
collected
through
an
online
survey
using
a
non-random
purposive
sampling
technique.
acquired
were
examined
utilizing
R-programming,
Structural
Equation
Modeling
(SEM),
SPSS
22.0.
study's
findings
showed
noteworthy
correlations
amount
assistance
resources,
null
hypotheses
(H1,
H2,
H3)
rejected
since
corresponding
p-values
all
below
threshold
value
0.05.
According
these
findings,
researchers
suggest
improving
by
increasing
participation
dedicating
more
making
better
use
resources.
These
recommendations
this
are
expected
future
direction
offer
useful
insights
for
educators
policymakers
enhancing
university
environments,
facilities,
teaching
capacities
further
improve
student
involvement
Hours.
Advances in information security, privacy, and ethics book series,
Год журнала:
2024,
Номер
unknown, С. 236 - 290
Опубликована: Янв. 26, 2024
The
widespread
use
of
drones
across
various
industries
is
leading
to
significant
transformations.
However,
the
resulting
concerns
about
data
security
and
privacy
are
quite
significant.
This
section
offers
a
thorough
exploration
these
important
issues,
providing
insights
into
challenges
they
pose
potential
ways
address
them.
Starting
with
an
overview
increasing
utility
drones,
this
chapter
highlights
importance
strong
protocols
for
privacy.
By
examining
complexities
collection
storage,
it
reveals
different
types
that
gather,
delves
storage
techniques,
vulnerabilities,
setting
stage
effective
countermeasures.
At
core
discussion
cybersecurity
risks,
which
range
from
cyberattacks
on
drone
systems
unauthorized
access
tampering
data.
To
sum
up,
serves
as
comprehensive
guide
understanding,
addressing,
mitigating
related
in
operations.
Advances in information security, privacy, and ethics book series,
Год журнала:
2024,
Номер
unknown, С. 405 - 451
Опубликована: Янв. 26, 2024
The
rapid
proliferation
of
drones
across
various
industries
necessitates
a
comprehensive
examination
the
privacy
and
ethical
implications
in
their
cybersecurity
landscape.
This
chapter
aims
to
dissect
address
these
concerns,
providing
valuable
resource
for
scholars,
policymakers,
industry
practitioners.
objectives
are
clearly
outlined,
emphasizing
exploration
challenges
considerations
within
context
drone
cybersecurity.
begins
by
delving
into
associated
with
operations,
focusing
on
surveillance
concerns
responsible
collection
storage
sensitive
data.
Ethical
then
scrutinized,
highlighting
dual-use
nature
intricacies
autonomous
decision-making.
A
critical
evaluation
existing
regulatory
landscape
governing
operations
frameworks
is
presented,
shedding
light
effectiveness
limitations.
Advances in information security, privacy, and ethics book series,
Год журнала:
2024,
Номер
unknown, С. 148 - 195
Опубликована: Янв. 26, 2024
The
rapid
proliferation
of
drone
technology
has
ushered
in
a
new
era
innovation
and
convenience
across
various
industries.
However,
this
technological
advancement
also
given
rise
to
host
cybersecurity
challenges
that
demand
proactive
attention.
This
chapter
delves
into
the
dynamic
landscape
security,
exploring
evolving
trends
emerging
threats
shape
field.
Beginning
with
an
overview
advancements,
including
integration
artificial
intelligence
machine
learning,
examines
their
implications
for
cybersecurity.
It
then
scrutinizes
growing
influence
swarms
autonomous
operations,
pinpointing
associated
strategies
securing
these
systems.
explores
expansion
operations
beyond
visual
line
sight
(BVLOS)
risks
involved,
emphasizing
importance
secure
communications
legal
considerations.
Advances in information security, privacy, and ethics book series,
Год журнала:
2024,
Номер
unknown, С. 42 - 87
Опубликована: Янв. 26, 2024
The
rapid
proliferation
of
drones,
coupled
with
their
increasing
integration
into
various
aspects
our
lives,
has
brought
to
the
forefront
a
myriad
ethical
considerations
in
realm
cybersecurity.
This
chapter
delves
deep
intricate
web
challenges
surrounding
drone
cybersecurity,
aiming
provide
comprehensive
understanding
this
critical
issue.
introduction
sets
stage
by
highlighting
essential
role
ethics
emphasizing
need
for
responsible
decision-making
an
age
where
drones
are
omnipresent.
It
lays
out
scope,
objectives,
and
key
concepts
research,
underscoring
contributions
it
makes
field.
core
explores
principles
underpinning
cybersecurity
elucidates
how
these
can
be
applied
domain
technology.
authors
delve
delicate
balance
between
security
privacy,
discussing
implications
data
collection,
retention,
surveillance
context
drones.
Advances in logistics, operations, and management science book series,
Год журнала:
2023,
Номер
unknown, С. 36 - 74
Опубликована: Дек. 29, 2023
This
chapter
explores
the
topic
of
a
novel
network-based
intrusion
detection
system
(NIDPS)
that
utilises
concept
graph
theory
to
detect
and
prevent
incoming
threats.
With
technology
progressing
at
rapid
rate,
number
cyber
threats
will
also
increase
accordingly.
Thus,
demand
for
better
network
security
through
NIDPS
is
needed
protect
data
contained
in
networks.
The
primary
objective
this
explore
based
four
different
aspects:
collection,
analysis
engine,
preventive
action,
reporting.
Besides
analysing
existing
NIDS
technologies
market,
various
research
papers
journals
were
explored.
authors'
solution
covers
basic
structure
an
system,
from
collecting
processing
generating
alerts
reports.
Data
collection
methods
like
packet-based,
flow-based,
log-based
collections
terms
scale
viability.
Advances in information security, privacy, and ethics book series,
Год журнала:
2024,
Номер
unknown, С. 281 - 332
Опубликована: Июль 26, 2024
Protecting
AI
in
web
applications
is
necessary.
This
domain
a
composite
of
technology
and
huge
scope
with
good
prospects
immense
difficulties.
chapter
covers
the
landscape
security
issues
advancing
generative
techniques
for
integration
into
development
frameworks.
The
initial
section
on
development—a
conversation
subtleties
AI-based
methods.
In
literal
stance,
offers
13
ways
to
approach
it.
Among
threats
are
those
that
introduce
related
deployments,
which
illustrate
why
it
vital
defenders
infrastructure
owners
implement
mitigation
measures
proactively.
pertains
privacy
data
lessons
securing
preventing
vulnerability.
explores
attacks,
model
poisoning,
bias
issues,
defence
mechanisms,
long-term
strategies.
Additionally,
Service
A
promotes
transparency,
explainability,
compliance
applicable
laws
while
structuring
methodology
deployment
methods/operation.
text
outlines
how
respond
recover
from
incidents
as
provides
response
frameworks
everyone
involved
managing
breaches.
Finally,
addresses
trends,
possible
threats,
learned
real-world
case
studies.
order
contribute
addressing
these
research
needs,
this
sheds
light
considerations
associated
suggests
recommendations
can
help
researchers,
practitioners,
policymakers
enhance
posture
popular
advancements
used
generating
applications.
Advances in information security, privacy, and ethics book series,
Год журнала:
2025,
Номер
unknown, С. 369 - 404
Опубликована: Фев. 14, 2025
In
the
era
of
digitization,
Artificial
Intelligence
(AI)
integration
in
healthcare
has
become
a
necessity
to
ensure
patient
identification
&
privacy.
With
rise
digitalisation
health
systems,
it
also
increasingly
important
have
more
stringent
data
protection
requirements.
This
transformation
is
heavily
facilitated
by
AI-driven
technologies
that
reinforce
security,
identify
real-time
threats
and
streamline
compliance
with
regulations.
By
utilizing
Machine
Learning
(ML)
algorithms
comb
through
big
data,
outliers
can
be
pinpointed
filtered
out
so
unauthorized
access
prevented
assistance
advanced
forms
encryption
which
protect
information
while
transit
or
at
rest.
But
fast
pace
AI
development
creates
as
many
opportunities
challenges,
especially
when
comes
marrying
availability
These
ethical
concerns,
for
effective
regulatory
frameworks,
are
critical
an
evolving
ecosystem
technologies.
Advances in information security, privacy, and ethics book series,
Год журнала:
2025,
Номер
unknown, С. 347 - 368
Опубликована: Фев. 14, 2025
Since
the
invention
of
Internet
Things
(IoT),
people
are
seeing
a
new
world
in
healthcare.
The
rapid
growth
IoT
has
brought
with
it
solutions
to
dilemmas
and
few
challenges
cloud
devices.
But
keeping
mind
benefits
these
devices,
need
be
solved
efficiency
security.
Putting
place
storage
analysis
for
specific
periods
is
very
popular
medicine.
On
other
hand,
creating
big
data,
considering
sensitivity,
some
limitations
have
accepted.
use
latency,
throughput,
bandwidth
increases
cost
Internet.
Numerous
alternative
paradigms,
most
notably
edge
computing
fog
computing,
evolved
solve
shortcomings.
Consequently,
studies
shown
an
increase
hybrid
based.
Advances in information security, privacy, and ethics book series,
Год журнала:
2025,
Номер
unknown, С. 229 - 262
Опубликована: Фев. 14, 2025
Cybersecurity
is
enriched
due
to
Artificial
Intelligence
(AI),
which
provides
better
real-time
threat
detection
and
anomaly
identification,
response
systems.
As
attackers
grow
more
sophisticated
leverage
AI
in
creating
malware.
The
present
study
gives
an
overview
of
the
future
threats
associated
with
AI-driven
attacks
challenges
faced
by
existing
cybersecurity
countermeasures.
Additionally,
it
also
analyses
feasibility
using
capabilities
like
predictive
intelligence,
advanced
quantum
computing
for
some
these
emerging
threats.
For
such
as,
we
need
user
permissions
rights
on
this
application,
should
take
into
consideration
privacy
policies
while
designing
security
as
well.
To
end,
get
ready
against
risks
a
proactive
adaptive
approach
needed
stressing
collaboration
between
industry,
academia
well
global
entities.
Advances in information security, privacy, and ethics book series,
Год журнала:
2025,
Номер
unknown, С. 1 - 40
Опубликована: Фев. 14, 2025
The
technology
is
becoming
a
little
more
widely
known
with
its
data
security
and
hyper-transaction
reliability.
By
very
design
of
decentralization
implementation
cryptographic
principles
to
maintain
integrity,
blockchain
eliminates
central
points
failure
making
tampering
unauthorized
changes
virtually
impossible
as
well.
This
part
the
diary
will
discuss
how
giving
our
financial
transactions,
providing
safety
identities
agreements
seamless
smart
contracts.
From
healthcare
supply
chain
management,
it
amazing
witness
many
industries
are
beginning
incorporate
decree
validity
information,
prevent
fraud.
But
you
know
what
they
say
—
new
tech
has
ways
break.
ride
been
accompanied
by
scalability
challenges,
energy
consumption
worries,
regulation
problems
so
on.
There
also
some
promising
prospects,
quantum-resistant
algorithms
enhanced
interoperability
may
resolve
these
widen
blockchain's
influence.