OALib 期刊
  OALib Journal (ISSN Print: 2333-9705, ISSN Online: 2333-9721)是一本多合一的开源期刊,以同行评审的方式出版发行文章,其所涵盖的研究领域多达311种领域。本刊发表的全部文章均可在期刊网站上免费阅读、下载、引用和传播。单篇文章出版费用为99美元。详情请咨询service@oalib.com 或 QQ: 3279437679 WhatsApp +8615387084133。现在就去投稿!
               文章    |    目标与领域    |    读者指南    |    编委    |    文章版面费    |    检索             


Go

Mar 01, 2025Open    Access

Central Repository System: A Quantitative Analysis of Its Feasibility and Applicability in MMSU

Suzeth Nicole M. Ruguian, Bensen Alex U. Pola
Philippine government entities are struggling to improve services to catch up with the demands of the contemporary times which is to embed technology. One case is the potential work output of a cloud-powered productivity platform that is beneficial for State Universities and Colleges (SUCs) to advance the process of their government services. This study analyzed the feasibility and applicability of a central repository system (CRS) using a platform, Microsoft 365, of the Mariano Marcos ...
Open Access Library J.   Vol.12, 2025
Doi:10.4236/oalib.1112673


Feb 05, 2025Open    Access

Vulnerability and Accessibility Analysis of Bangladesh Ministry of Land’s Government Websites

Noor-E-Sefat Ahmed
Since Bangladesh recently announced the Smart Bangladesh concept, the Government has decided to move its national services online. To that end, they have built websites for each sector, including the Land Ministry, to serve the nation. The initial goal of this step is to ensure that the service is equal and hassle-free in both urban and rural areas of the country. With this modern technological support, almost one hundred percent of the Land Ministry’s office work has shifted to online services....
Open Access Library J.   Vol.12, 2025
Doi:10.4236/oalib.1112756


Jan 08, 2025Open    Access

Unveiling Insider Threats: Examining Vulnerabilities in an Organizational Structure: A Case Study of NamPost

Iyaloo N. Waiganjo,Linekela S. Nandjenda
Insider threats pose significant risks to organizations, particularly in cybersecurity, where individuals with authorized access can misuse their privileges to cause data breaches, financial losses, or operational disruptions. This study explores the vulnerabilities within NamPost’s organizational structure that could be exploited by insider threats, aiming to develop a tailored detection and prevention model. A qualitative research approach was employed, involving semi-structured interviews wit...
Open Access Library J.   Vol.12, 2025
Doi:10.4236/oalib.1112797


Nov 27, 2024Open    Access

Advanced Face Detection with YOLOv8: Implementation and Integration into AI Modules

Handiso Misgana Yisihak,Li Li
This paper presents a comprehensive approach to face detection utilizing the YOLOv8 model, specifically trained on a diverse dataset consisting of images from four individuals. The trained model is seamlessly integrated into an AI module from Huada, a leading AI company, equipped with a camera and LED indicators, enabling real-time face recognition and classification of known and unknown individuals. The model’s performance is evaluated across various metrics, demonstrating its high accuracy, ro...
Open Access Library J.   Vol.11, 2024
Doi:10.4236/oalib.1112474


Sep 29, 2024Open    Access

Development of Blockchain-Based Academic Credential Verification System

Noshi,Yuan Xu
Advancements in technology have exposed significant vulnerabilities in academic credentialing systems; they are costly, time-consuming, and susceptible to sophisticated forms of fraud. This research proposes an innovative solution that can be implemented to make an almost complete overhaul of the traditional methods used to verify educational documents much faster, more secure, and more credible. In contrast to popular approaches that involve manual checks or third-party services, we propose a s...
Open Access Library J.   Vol.11, 2024
Doi:10.4236/oalib.1112130


Aug 30, 2024Open    Access

Cybersecurity Framework for Kenyan Universities in Conformity with ISO/IEC 27001:2022 Standard

Patrick Macharia Gichubi,Bernard Maake,Ruth Chweya
The rapid adoption of enterprise resource planning (ERP), the necessity for remote access to information systems, and the swift development of digital technologies like IoT and cloud computing have increased cyberattacks on organizations, including universities. Despite not being as heavily targeted as major industries, universities have become more vulnerable due to open ERP systems, insufficient cybersecurity investment, and limited cyber expertise. This study aimed to enhance cybersecurity in...
Open Access Library J.   Vol.11, 2024
Doi:10.4236/oalib.1110810


May 13, 2024Open    Access

Trends in Wireless Network Security

Anita C. Eluwa
Wireless networks are an integral part of day-to-day life for many people, with businesses and home users relying on them for connectivity and communication. This scholarly research will examine the security vulnerabilities and threats in wireless communications. The security requirements of wireless networks including their authenticity, confidentiality, integrity, and availability will be identified and summarized. Different research and surveys have been undertaken by academic researchers on ...
Open Access Library J.   Vol.11, 2024
Doi:10.4236/oalib.1111033


May 07, 2024Open    Access

Economic impact and ethical challenge of new information and communication technologies in the Democratic Republic of Congo

Christophe Lwanyi Ashimalu,Jean Claude Bukasa Mukengeshayi
In the Democratic Republic of Congo (DRC) over the last few decades, digital work environments have gradually been set up to enable the various players in social life to work together, access resources, engage in distance learning, archive and trace data, and so on. These environments are set to become increasingly important in the daily lives of citizens, in order to maximize revenue while minimizing expenditure. To boost the DRC's development, the management of the Res Publica must meet the cr...
Open Access Library J.   Vol.11, 2024
Doi:10.4236/oalib.1110627


Feb 20, 2024Open    Access

Replay Attack Prevention in Decentralised Contact Tracing: A Blockchain-Based Approach

Lavanya-Nehan Degambur
Digital contact tracing solutions have aided humanity in the first line of de-fense against the COVID-19 pandemic, but not without major technical drawbacks such as attacks against digital contact tracing technology and loss of privacy and security. The most popularly used digital contact tracing system is the decentralised DP-3T protocol and it suffers from the replay attack. A re-play attack involves taking contact tracing data from one location and re-transmitting it to another location and c...
Open Access Library J.   Vol.11, 2024
Doi:10.4236/oalib.1111179


Nov 28, 2023Open    Access

Cloud Computing Security, Protecting University Information

Anita C. Eluwa
Cybersecurity is the study of protecting information and systems. One of the most secure ways of protecting information online is through cloud services when used appropriately. In St. Mary’s university, cloud computing adaption has rapidly grown and evolved over the years. However, the protection and safety of students and staff’s information is still unsteady, which prompted the evaluation and survey of this research. In this paper, a risk analysis is performed on one of the university’s cloud...
Open Access Library J.   Vol.10, 2023
Doi:10.4236/oalib.1110925


Go

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133