|
Go
Mar 01, 2025Open Access
Philippine government entities are struggling to improve services to catch up with the demands of the contemporary times which is to embed technology. One case is the potential work output of a cloud-powered productivity platform that is beneficial for State Universities and Colleges (SUCs) to advance the process of their government services. This study analyzed the feasibility and applicability of a central repository system (CRS) using a platform, Microsoft 365, of the Mariano Marcos ...
Feb 05, 2025Open Access
Since Bangladesh recently announced the Smart Bangladesh concept, the Government has decided to move its national services online. To that end, they have built websites for each sector, including the Land Ministry, to serve the nation. The initial goal of this step is to ensure that the service is equal and hassle-free in both urban and rural areas of the country. With this modern technological support, almost one hundred percent of the Land Ministry’s office work has shifted to online services....
Jan 08, 2025Open Access
Insider threats pose significant risks to organizations, particularly in cybersecurity, where individuals with authorized access can misuse their privileges to cause data breaches, financial losses, or operational disruptions. This study explores the vulnerabilities within NamPost’s organizational structure that could be exploited by insider threats, aiming to develop a tailored detection and prevention model. A qualitative research approach was employed, involving semi-structured interviews wit...
Nov 27, 2024Open Access
This paper presents a comprehensive approach to face detection utilizing the YOLOv8 model, specifically trained on a diverse dataset consisting of images from four individuals. The trained model is seamlessly integrated into an AI module from Huada, a leading AI company, equipped with a camera and LED indicators, enabling real-time face recognition and classification of known and unknown individuals. The model’s performance is evaluated across various metrics, demonstrating its high accuracy, ro...
Sep 29, 2024Open Access
Advancements in technology have exposed significant vulnerabilities in academic credentialing systems; they are costly, time-consuming, and susceptible to sophisticated forms of fraud. This research proposes an innovative solution that can be implemented to make an almost complete overhaul of the traditional methods used to verify educational documents much faster, more secure, and more credible. In contrast to popular approaches that involve manual checks or third-party services, we propose a s...
Aug 30, 2024Open Access
The rapid adoption of enterprise resource planning (ERP), the necessity for remote access to information systems, and the swift development of digital technologies like IoT and cloud computing have increased cyberattacks on organizations, including universities. Despite not being as heavily targeted as major industries, universities have become more vulnerable due to open ERP systems, insufficient cybersecurity investment, and limited cyber expertise. This study aimed to enhance cybersecurity in...
May 13, 2024Open Access
Wireless networks are an integral part of day-to-day life for many people, with businesses and home users relying on them for connectivity and communication. This scholarly research will examine the security vulnerabilities and threats in wireless communications. The security requirements of wireless networks including their authenticity, confidentiality, integrity, and availability will be identified and summarized. Different research and surveys have been undertaken by academic researchers on ...
May 07, 2024Open Access
In the Democratic Republic of Congo (DRC) over the last few decades, digital work environments have gradually been set up to enable the various players in social life to work together, access resources, engage in distance learning, archive and trace data, and so on. These environments are set to become increasingly important in the daily lives of citizens, in order to maximize revenue while minimizing expenditure.
To boost the DRC's development, the management of the Res Publica must meet the cr...
Feb 20, 2024Open Access
Digital contact tracing solutions have aided humanity in the first line of de-fense against the COVID-19 pandemic, but not without major technical drawbacks such as attacks against digital contact tracing technology and loss of privacy and security. The most popularly used digital contact tracing system is the decentralised DP-3T protocol and it suffers from the replay attack. A re-play attack involves taking contact tracing data from one location and re-transmitting it to another location and c...
Nov 28, 2023Open Access
Cybersecurity is the study of protecting information and systems. One of the most secure ways of protecting information online is through cloud services when used appropriately. In St. Mary’s university, cloud computing adaption has rapidly grown and evolved over the years. However, the protection and safety of students and staff’s information is still unsteady, which prompted the evaluation and survey of this research. In this paper, a risk analysis is performed on one of the university’s cloud...
Go
|
|
|