The increasing threat of ransomware attacks in an interconnected and digital world presents important hurdles for cybersecurity, prompting further examination into how organizational security culture affects their abi...
详细信息
This study presents a comprehensive approach to IT asset security risk management in physical access control systems, integrating NIST SP 800-116, 800-53, 800-30, ISO 31000, and 27002:2022 standards. Using a mixed-met...
详细信息
This paper presents a model for response interoperability between intruder detection systems (IDSs), compatible with the model for alert interoperability developed by the Intrusion Detection Working Group (IDWG). Alte...
详细信息
The research was centered on adapting and assessing a new, unique game concept. The game onKeys presents a new approach and poses as an alternative method for improving typing skills. However, despite offering a promi...
详细信息
Image descriptions are crucial in assisting individuals without eyesight by providing verbal representations of visual content. While manual and Artificial Intelligence (AI)-generated descriptions exist, automatic des...
详细信息
Exams are an important component of any educational program, including online education. In any test, there is a possibility of cheating, so its detection and prevention is important. This study aims to conduct an in-...
详细信息
Hoaxes are something that can not be avoided, especially in Indonesia, where the literacy rate in Indonesia is quite low, they are easy to believe in news without doing fact check. The worst thing is that news that is...
详细信息
The results of observations showed that the book about Tais produced by Secretariat de Estado da Arte e Cultura (SEAC) has not been able to meet the needs of users because the information is less interesting and inter...
详细信息
Metaverse is gaining a lot of traction lately, especially after Mark Zuckerberg's Facebook changed its name to Meta as a preparation to enter another universe called metaverse. The eXtended Reality (XR) technology...
详细信息
To develop a data entry application, one may use a general-purpose programming language, a domain-specific programming language for data entry, or end-user tools that offer no programming at all. The first two offer m...
详细信息
暂无评论