Information security effectiveness has become the focus of organizations whether they manage their own information, or rely on providers. The research literature suggests that organizational characteristics have a sig...
Information security effectiveness has become the focus of organizations whether they manage their own information, or rely on providers. The research literature suggests that organizational characteristics have a significant, positive effect on information security [1]–[4]. This paper examines the impact of organizational characteristics, specifically, the size of the organization, culture, IT budget, frequency of reported IT audits, and executive support, on the effectiveness of information security processes at higher educational institutions (HEI.) Nine information governance processes used in this study include communication of information security roles, the protection of sensitive data, and business agreement audits. Findings suggest that organizational culture, frequency of reported audits, and executive-level support positively influence information effectiveness, but the size of institutions and level of IT budget did not show any significant effect.
The success of terrorist attacks reflects the capability of terrorists and the vulnerability of the security defense, explainable prediction of the average attack success rate at the country-annual level is crucial fo...
详细信息
Traditional news recommendation methods usually encode news text and user interests directly into vectors and then calculate the matching degree of the two. Such approaches may lose low-level matching signals and diff...
Traditional news recommendation methods usually encode news text and user interests directly into vectors and then calculate the matching degree of the two. Such approaches may lose low-level matching signals and different levels of textual information. We propose a BERT-based news recommendation model, MLFBERT. This model consists of a BERT-based news encoder and a user encoder. The news encoder uses a PLM Fusion Module and additive attention to generate embeddings of available news items. The user encoder builds a user profile by aggregating the representations of their news browsing history. Recommendations are made by computing matching scores between the user profile and candidate news. Experiments on the MIND news dataset demonstrate that our model outperforms existing methods on multiple evaluation metrics.
The chemical mixing plant could be automated using supervisory control and data acquisition (SCADA) technique. The SCADA system contains a central control unit, a remote terminal unit, and a communication medium. The ...
The chemical mixing plant could be automated using supervisory control and data acquisition (SCADA) technique. The SCADA system contains a central control unit, a remote terminal unit, and a communication medium. The chemical mixing plant operator may use the central control unit to automate the operations of the chemical mixing plant. The field devices of the chemical mixing plant are connected with the remote terminal unit. Ethernet, Profinet, or WAN network could be used to establish the communication medium between the central control unit and the remote terminal unit. The central control unit acts as the server and the remote terminal unit act as the client. The simple server-client communication system is used to exchange the messages between the central control unit and remote terminal unit. The communication medium uses Genesys protocol to exchange the messages between the central control unit and the remote terminal unit.
The ubiquitous use of Internet of Things devices in supply chain management has facilitated manufacturers and other stakeholders to monitor various aspects of the product or shipment. However, conventional solutions h...
The ubiquitous use of Internet of Things devices in supply chain management has facilitated manufacturers and other stakeholders to monitor various aspects of the product or shipment. However, conventional solutions have numerous challenges ranging from data integrity, product provenance, and trust issues to scalability problems. This research demonstrates how scalability and provenance of cement bags can be ensured through a combination of blockchain technology and the Internet of Things devices. The distributed ledger securely records each step, from acquiring raw materials to delivering the finished product. The inherent transparency of blockchain technology promotes confidence among all the stakeholders in the supply chain and makes it easier to comply with legal requirements. The security and performance analysis determines that the proposed solution is secure and efficient with minimal performance overheads.
The marketing field has been looking for more creative and effective ways to attract customers. Advergames have recently attracted a lot of attention in increasing brand awareness and attracting wider groups of audien...
详细信息
In recent years, computer architecture instruction has undergone significant transformation, moving away from a primarily theoretical approach, and placing greater emphasis on practical, hands-on learning. Leading thi...
In recent years, computer architecture instruction has undergone significant transformation, moving away from a primarily theoretical approach, and placing greater emphasis on practical, hands-on learning. Leading this shift is the Raspberry Pi (RaPi), a credit card-sized computer powered by the versatile Broadcom BCM2835 system-on-a-chip (SoC). RaPi offers an open-source operating system, an extensive software library, and abundant online documentation, creating an ideal environment for dynamic and experiential learning. This paper features the successful integration of RaPi into the computer architecture curriculum at CNU, with a primary focus on hands-on labs. These labs cover diverse topics, including RaPi setup and connectivity, low-level programming, Python-based sensor interfacing, and AI-driven image processing for object detection and recognition. The paper provides valuable insights for educators looking to incorporate this single-board computer into their teaching methods, highlighting its multifaceted applications in AI and computer architecture to enhance students' learning experience.
In addition to tanking the economy and society, credential fraud frequently damages the credibility of higher education. As the majority of conventional verification and issuance procedures are arduous, expensive, and...
详细信息
In supervised learning algorithms, the class imbalance problem often leads to generating results biased towards the majority classes. Present methods used to deal with the class imbalance problem ignore a principal as...
详细信息
This research paper offers an in-depth exploration of the evolving cybersecurity landscape in the pacific region, characterized by rapid economic growth and technological advancements, with an expanding digital ecosys...
This research paper offers an in-depth exploration of the evolving cybersecurity landscape in the pacific region, characterized by rapid economic growth and technological advancements, with an expanding digital ecosystem. While these advancements have steered significant benefits, they have concurrently exposed vulnerabilities susceptible to exploitation by cybercriminals. The study highlights prevailing trends and early challenges projected for 2023, specifically focusing on local infections, ransomware, network attacks, and exploit incidents. The research thoroughly analyzes these aspects and reveals complex insights into the evolving threat scenarios. Furthermore, the study emphasizes the importance of expanding regional collaboration and international cooperation as essential strategies to address the pacific nations' multilayered cybersecurity challenges effectively. Beyond these trends, the paper investigates evolving fundamentals, the impact of technological progress, regulatory dynamics, and collaborative initiatives while exploring emerging technologies' influence on security vulnerabilities besides the complex interaction of cultural norms and geopolitical factors. This comprehensive analysis enhances understanding of the pacific Region's cybersecurity landscape, furnishing a robust foundation for strategic mitigation approaches and contributing substantively to the growth of regional cyber resilience in 2023 and beyond.
暂无评论