Representing computational activities is still an open problem in the field of Activity-Aware Computing. In this paper, drawn from our experiences çdeveloping activity-aware applications in support of two populat...
详细信息
Application architecture and information technology systems in the company should be able to support the company's policy that leads to their alignment with the business objectives. The alignment of the implementa...
详细信息
This study proposes a smart contract risk management model built on the NIST Risk Management Framework (RMF) to help identify, assess, and manage the risks of smart contracts. While smart contracts are beloved as a me...
详细信息
Defragmentation can potentially be employed as a tactic by perpetrators to conceal, misrepresent, or eliminate digital evidence. This study explores the effects of minor defragmentation, a potential method to conceal ...
详细信息
The development of technology and the internet is one of the critical factors that must be considered by companies especially those engaged in e-commerce. The web-based application is one of the tools used by e-commer...
详细信息
The increasing threat of ransomware attacks in an interconnected and digital world presents important hurdles for cybersecurity, prompting further examination into how organizational security culture affects their abi...
详细信息
The research was centered on adapting and assessing a new, unique game concept. The game onKeys presents a new approach and poses as an alternative method for improving typing skills. However, despite offering a promi...
详细信息
Design of digital circuits and systems are topics covered in undergraduate courses on computerscience, computer Engineering, and Electrical Engineering. Simple processor architectures are used as example of digital s...
详细信息
A title provides readers a succinct representation of the whole document and consequently helps them get the gist without going through the details. Although the research of title generation has been investigated for ...
详细信息
This study presents a comprehensive approach to IT asset security risk management in physical access control systems, integrating NIST SP 800-116, 800-53, 800-30, ISO 31000, and 27002:2022 standards. Using a mixed-met...
详细信息
暂无评论