Effects of office hours on the academic performance of students in Mogadishu universities, Somalia DOI Creative Commons
Ahmed Absuge Gabow, Abdirahman Ibrahim Abdi

Cogent Education, Год журнала: 2024, Номер 12(1)

Опубликована: Дек. 19, 2024

This study aims to examine the Effects of Office Hours on Academic Performance in Mogadishu, Somalia The investigated relationship between students' engagement office hours, time spent studying, utilization academic support services, and their influence performance. utilized cross-sectional design collect data from 348 first year students four universities Mogadishu. was collected through an online survey using a non-random purposive sampling technique. acquired were examined utilizing R-programming, Structural Equation Modeling (SEM), SPSS 22.0. study's findings showed noteworthy correlations amount assistance resources, null hypotheses (H1, H2, H3) rejected since corresponding p-values all below threshold value 0.05. According these findings, researchers suggest improving by increasing participation dedicating more making better use resources. These recommendations this are expected future direction offer useful insights for educators policymakers enhancing university environments, facilities, teaching capacities further improve student involvement Hours.

Язык: Английский

Data Security and Privacy Concerns in Drone Operations DOI
Siva Raja Sindiramutty, N. Z. Jhanjhi, Chong Eng Tan

и другие.

Advances in information security, privacy, and ethics book series, Год журнала: 2024, Номер unknown, С. 236 - 290

Опубликована: Янв. 26, 2024

The widespread use of drones across various industries is leading to significant transformations. However, the resulting concerns about data security and privacy are quite significant. This section offers a thorough exploration these important issues, providing insights into challenges they pose potential ways address them. Starting with an overview increasing utility drones, this chapter highlights importance strong protocols for privacy. By examining complexities collection storage, it reveals different types that gather, delves storage techniques, vulnerabilities, setting stage effective countermeasures. At core discussion cybersecurity risks, which range from cyberattacks on drone systems unauthorized access tampering data. To sum up, serves as comprehensive guide understanding, addressing, mitigating related in operations.

Язык: Английский

Процитировано

18

Eyes in the Sky DOI
Siva Raja Sindiramutty, Chong Eng Tan, Wei Wei Goh

и другие.

Advances in information security, privacy, and ethics book series, Год журнала: 2024, Номер unknown, С. 405 - 451

Опубликована: Янв. 26, 2024

The rapid proliferation of drones across various industries necessitates a comprehensive examination the privacy and ethical implications in their cybersecurity landscape. This chapter aims to dissect address these concerns, providing valuable resource for scholars, policymakers, industry practitioners. objectives are clearly outlined, emphasizing exploration challenges considerations within context drone cybersecurity. begins by delving into associated with operations, focusing on surveillance concerns responsible collection storage sensitive data. Ethical then scrutinized, highlighting dual-use nature intricacies autonomous decision-making. A critical evaluation existing regulatory landscape governing operations frameworks is presented, shedding light effectiveness limitations.

Язык: Английский

Процитировано

12

Future Trends and Emerging Threats in Drone Cybersecurity DOI
Siva Raja Sindiramutty, N. Z. Jhanjhi, Chong Eng Tan

и другие.

Advances in information security, privacy, and ethics book series, Год журнала: 2024, Номер unknown, С. 148 - 195

Опубликована: Янв. 26, 2024

The rapid proliferation of drone technology has ushered in a new era innovation and convenience across various industries. However, this technological advancement also given rise to host cybersecurity challenges that demand proactive attention. This chapter delves into the dynamic landscape security, exploring evolving trends emerging threats shape field. Beginning with an overview advancements, including integration artificial intelligence machine learning, examines their implications for cybersecurity. It then scrutinizes growing influence swarms autonomous operations, pinpointing associated strategies securing these systems. explores expansion operations beyond visual line sight (BVLOS) risks involved, emphasizing importance secure communications legal considerations.

Язык: Английский

Процитировано

11

Ethical Considerations in Drone Cybersecurity DOI
Siva Raja Sindiramutty, Chong Eng Tan,

Bhavin Shah

и другие.

Advances in information security, privacy, and ethics book series, Год журнала: 2024, Номер unknown, С. 42 - 87

Опубликована: Янв. 26, 2024

The rapid proliferation of drones, coupled with their increasing integration into various aspects our lives, has brought to the forefront a myriad ethical considerations in realm cybersecurity. This chapter delves deep intricate web challenges surrounding drone cybersecurity, aiming provide comprehensive understanding this critical issue. introduction sets stage by highlighting essential role ethics emphasizing need for responsible decision-making an age where drones are omnipresent. It lays out scope, objectives, and key concepts research, underscoring contributions it makes field. core explores principles underpinning cybersecurity elucidates how these can be applied domain technology. authors delve delicate balance between security privacy, discussing implications data collection, retention, surveillance context drones.

Язык: Английский

Процитировано

10

Detecting Cyber Threats With a Graph-Based NIDPS DOI

Brendan Ooi Tze Wen,

Najihah Syahriza,

Nicholas Chan Wei Xian

и другие.

Advances in logistics, operations, and management science book series, Год журнала: 2023, Номер unknown, С. 36 - 74

Опубликована: Дек. 29, 2023

This chapter explores the topic of a novel network-based intrusion detection system (NIDPS) that utilises concept graph theory to detect and prevent incoming threats. With technology progressing at rapid rate, number cyber threats will also increase accordingly. Thus, demand for better network security through NIDPS is needed protect data contained in networks. The primary objective this explore based four different aspects: collection, analysis engine, preventive action, reporting. Besides analysing existing NIDS technologies market, various research papers journals were explored. authors' solution covers basic structure an system, from collecting processing generating alerts reports. Data collection methods like packet-based, flow-based, log-based collections terms scale viability.

Язык: Английский

Процитировано

22

Security Considerations in Generative AI for Web Applications DOI
Siva Raja Sindiramutty,

Krishna Raj V. Prabagaran,

N. Z. Jhanjhi

и другие.

Advances in information security, privacy, and ethics book series, Год журнала: 2024, Номер unknown, С. 281 - 332

Опубликована: Июль 26, 2024

Protecting AI in web applications is necessary. This domain a composite of technology and huge scope with good prospects immense difficulties. chapter covers the landscape security issues advancing generative techniques for integration into development frameworks. The initial section on development—a conversation subtleties AI-based methods. In literal stance, offers 13 ways to approach it. Among threats are those that introduce related deployments, which illustrate why it vital defenders infrastructure owners implement mitigation measures proactively. pertains privacy data lessons securing preventing vulnerability. explores attacks, model poisoning, bias issues, defence mechanisms, long-term strategies. Additionally, Service A promotes transparency, explainability, compliance applicable laws while structuring methodology deployment methods/operation. text outlines how respond recover from incidents as provides response frameworks everyone involved managing breaches. Finally, addresses trends, possible threats, learned real-world case studies. order contribute addressing these research needs, this sheds light considerations associated suggests recommendations can help researchers, practitioners, policymakers enhance posture popular advancements used generating applications.

Язык: Английский

Процитировано

4

AI in Healthcare Safeguarding Patient Privacy and Confidentiality DOI
Siva Raja Sindiramutty, N. Z. Jhanjhi, Navid Ali Khan

и другие.

Advances in information security, privacy, and ethics book series, Год журнала: 2025, Номер unknown, С. 369 - 404

Опубликована: Фев. 14, 2025

In the era of digitization, Artificial Intelligence (AI) integration in healthcare has become a necessity to ensure patient identification & privacy. With rise digitalisation health systems, it also increasingly important have more stringent data protection requirements. This transformation is heavily facilitated by AI-driven technologies that reinforce security, identify real-time threats and streamline compliance with regulations. By utilizing Machine Learning (ML) algorithms comb through big data, outliers can be pinpointed filtered out so unauthorized access prevented assistance advanced forms encryption which protect information while transit or at rest. But fast pace AI development creates as many opportunities challenges, especially when comes marrying availability These ethical concerns, for effective regulatory frameworks, are critical an evolving ecosystem technologies.

Язык: Английский

Процитировано

0

Progress and Obstacles in Cloud Computing for Healthcare DOI

Abu Jor Al Gefari,

Imran Hasan,

Md Amin Ullah Sheikh

и другие.

Advances in information security, privacy, and ethics book series, Год журнала: 2025, Номер unknown, С. 347 - 368

Опубликована: Фев. 14, 2025

Since the invention of Internet Things (IoT), people are seeing a new world in healthcare. The rapid growth IoT has brought with it solutions to dilemmas and few challenges cloud devices. But keeping mind benefits these devices, need be solved efficiency security. Putting place storage analysis for specific periods is very popular medicine. On other hand, creating big data, considering sensitivity, some limitations have accepted. use latency, throughput, bandwidth increases cost Internet. Numerous alternative paradigms, most notably edge computing fog computing, evolved solve shortcomings. Consequently, studies shown an increase hybrid based.

Язык: Английский

Процитировано

0

Future Trends in AI Security DOI
Siva Raja Sindiramutty, N. Z. Jhanjhi, Navid Ali Khan

и другие.

Advances in information security, privacy, and ethics book series, Год журнала: 2025, Номер unknown, С. 229 - 262

Опубликована: Фев. 14, 2025

Cybersecurity is enriched due to Artificial Intelligence (AI), which provides better real-time threat detection and anomaly identification, response systems. As attackers grow more sophisticated leverage AI in creating malware. The present study gives an overview of the future threats associated with AI-driven attacks challenges faced by existing cybersecurity countermeasures. Additionally, it also analyses feasibility using capabilities like predictive intelligence, advanced quantum computing for some these emerging threats. For such as, we need user permissions rights on this application, should take into consideration privacy policies while designing security as well. To end, get ready against risks a proactive adaptive approach needed stressing collaboration between industry, academia well global entities.

Язык: Английский

Процитировано

0

Blockchain in Cybersecurity Enhancing Data Integrity and Transaction Security DOI
Siva Raja Sindiramutty, N. Z. Jhanjhi, Sayan Kumar Ray

и другие.

Advances in information security, privacy, and ethics book series, Год журнала: 2025, Номер unknown, С. 1 - 40

Опубликована: Фев. 14, 2025

The technology is becoming a little more widely known with its data security and hyper-transaction reliability. By very design of decentralization implementation cryptographic principles to maintain integrity, blockchain eliminates central points failure making tampering unauthorized changes virtually impossible as well. This part the diary will discuss how giving our financial transactions, providing safety identities agreements seamless smart contracts. From healthcare supply chain management, it amazing witness many industries are beginning incorporate decree validity information, prevent fraud. But you know what they say — new tech has ways break. ride been accompanied by scalability challenges, energy consumption worries, regulation problems so on. There also some promising prospects, quantum-resistant algorithms enhanced interoperability may resolve these widen blockchain's influence.

Язык: Английский

Процитировано

0