This study examined the various forms of continuing professional development (CPD) that Nigerian academic librarians have participated in during the last five years with a view to ascertain the various ways in which skills acquired from... more
The 21st century has witnessed a rapid growth of cyberattacks worldwide, and Kazakhstan is no exception. This paper analyzes significant cyber incidents in Kazakhstan, including DDoS attacks, phishing, malware, ransomware, and social... more
This article explores how medical ethics and criminal liability intersect in mental health care across various Asian jurisdictions, from busy urban clinics to remote rural hospitals. Using a combination of doctrinal investigation and... more
The use of APIs has become a central component of the development of modern software, which allows moving smoothly between services and applications. Nonetheless, low-quality APIs are highly dangerous since they tend to fall victims to... more
We present a cloud-native, AI-powered Central Authorization Framework (CAF) engineered to support enterprise-scale, zero-trust API security across a Shared Services Platform (SSP) in the insurance domain. Designed on Microsoft Azure and... more
Application Programming Interfaces (APIs) have become the nervous system of modern financial-services platforms; yet fractured authorization logic remains a dominant breach vector, exposing organizations to data exfiltration, fraudulent... more
The progression of software testing has evolved from manual processes to automated systems. However, the emergence of Agentic AI-driven testing represents the next transformative leap. These intelligent agents autonomously generate,... more
The study was conducted to design and obtain evidence concerning the software quality and acceptance of a graphical user interface (GUI) student electoral voting system. The intention of this research is three-fold; firstly, a system... more
COVID19 has yielded serious consequences globally, including severe damages to the economic, social, and health sectors around the world. The ensuing global crisis has created a strong realization among states that non-traditional... more
This article explores the transformative role of artificial intelligence (AI) and machine learning (ML) in strengthening financial security and combating fraud across digital platforms. As financial transactions increasingly migrate... more
Application Programming Interfaces (APIs) have become the nervous system of modern financial-services platforms; yet fractured authorization logic remains a dominant breach vector, exposing organizations to data exfiltration, fraudulent... more
Certified AI Cybersecurity Analysts are not just professionals — they are the frontline architects of digital trust. Their hybrid expertise allows organizations to combat threats with unmatched intelligence and foresight. Learn more in... more
Recent advancements in Artificial Intelligence (AI), particularly in Generative AI, have significantly impacted various domains. Innovation of models such as ChatGPT, Bard, DALL-E, Midjourney, and DeepMind has transformed academia. The... more
The global manufacturing sector is undergoing a paradigm shift toward zero-defect manufacturing (ZDM) to meet the demands of Industry 4.0, which prioritizes precision, efficiency, and sustainability. This paper presents a scalable... more
The rapid growth in Information and Communication Technology paved the way to the development of various systems that will help Guidance Counselors with their information storage and retrieval needs. Since the birth of the World Wide Web,... more
With the exponential growth in computer storage demands, driven by current human data requirements, accommodating these needs has become a critical concern. Traditional data storage methods face numerous problems, prompting researchers to... more
As cybercrime evolves, so too do the methods used by malicious actors to exploit individuals and organizations. Among the most concerning innovations are Deepfake Voice Phishing (vishing) and Synthetic Identity Fraud. Both threats... more
A new framework for adaptive model context protocols that improve multi-agent cooperation in dispersed environments is presented in this study. The suggested method makes use of dynamic context sharing mechanisms that adjust to task... more
The integration of artificial intelligence (AI) in clinical trial management represents a transformative approach in medical research. This study examines the impact of AI on clinical trials, highlighting its ability to automate routine... more
The emergence of Agentic AI autonomous systems that can make and execute decisions without human intervention has presented new and complex challenges in cybersecurity. Traditional trust models and defense mechanisms are insufficient to... more
Fraud detection remains an active area for research. While fraud is a difficult problem hampered by issues ranging from uncertain data to adversarial environments, new technologies and techniques from the fields of data science, machine... more
In the era of cloud computing, organizations increasingly rely on cloud databases to store and manage vast volumes of sensitive information. While cloud-based solutions offer scalability, cost-efficiency, and remote accessibility, they... more
Purpose -This paper examines the Internet security perception of Filipinos to establish a need and sense of urgency on the part of the government to create a culture of cybersecurity for every Filipino. Method -A quantitative survey was... more
The banking sector is increasingly leaning on advanced technologies to optimize infrastructure services, particularly through the deployment of Artificial Intelligence (AI) and machine learning methodologies. This movement is driven by... more
Certified AI cybersecurity specialists stand at the cutting edge of digital defense. Mastery of these technologies not only enhances their ability to combat cyber threats but also ensures their skills remain relevant in a fast-evolving... more
The study discussed the decriminalization of attempted suicide in Nigeria, with regards to the provisions of the Mental Health Act 2021. It provides among others the conceptual, historical and theoretical understanding of the topic... more
The study discussed the decriminalization of attempted suicide in Nigeria, with regards to the provisions of the Mental Health Act 2021. It provides among others the conceptual, historical and theoretical understanding of the topic... more
The purpose of this study is to discuss thelegal education of euthanasia from an analytical perspective. The comparative method examined the legal gaps in the framework and psychoeducation discipline in Albania compared to international... more
Esboço cartográfico dos tópicos essenciais para a investigação [/ pesquisa] no domínio do Direito da Cibersegurança, a serem prosseguidos no âmbito do PDPC - Centro de estudos e análise da privacidade e proteção de dados da Universidade... more
WCAP (Web Complete Application Protection) is an innovative cybersecurity model that introduces a unified, native, and automated approach to securing modern web applications. Unlike traditional fragmented solutions such as standalone WAFs... more
Audit manajemen sangat penting bagi perguruan tinggi selain untuk pemeriksaan dan penilaian manajemen teknologi informasi dalam proses bisnis berjalan secara efisien dan efektif. Keamanan teknologi informasi sebagai upaya pengendalian... more
This paper investigates whether the presence of ambitious entrepreneurs is a more important determinant of national economic growth than entrepreneurial activity in general. We use data from the Global Entrepreneurship Monitor to test the... more
The increased importance of knowledge as a source of competitiveness for modern economies suggests that the organization of industries most conducive to innovative activity and unrestrained competition will be linked to higher growth... more
This paper aims at explaining cross-country variation in nascent entrepreneurship. Regression analysis is applied using various explanatory variables derived from three different approaches. We make use of the Global Entrepreneurship... more
The increased importance of knowledge as a source of competitiveness for modern economies suggests that the organization of industries most conducive to innovative activity and unrestrained competition will be linked to higher growth... more
In the modern era of distributed systems and cloud architecture, RESTful APIs have become the essential foundation of contemporary web applications, facilitating effortless data interchange across various platforms. Despite their... more
With the increasing shift of administrative operations to online platforms by governments globally, concerns regarding cybersecurity are escalating significantly. The process of digitization expands the potential vulnerabilities to cyber... more
SaaS applications have transformed the business model. They are adaptable, scalable, and cost-effective. But with all these advantages, there are also security threats. Cyber-attacks increase by the day, and SaaS applications are prime... more
The integration of data analytics, artificial intelligence (AI), and cloud computing has significantly transformed the healthcare industry, particularly in optimizing Medicaid and enhancing patient outcomes. This paper delves into the... more
The integration of Artificial Intelligence (AI), data analytics, and cloud computing in healthcare has revolutionized Medicaid services, predictive analytics, interoperability, and workforce training. This paper explores scalable AI... more
In recent years, there have been a number of different crises such as the dotcom crisis at the end of the 1990s, the global financial crisis of 2007-2009, the pandemic economic crisis and the global economic recession of 2020, the... more
As organizations increasingly transition their software development, deployment, and operations to the cloud, the need for robust security practices is paramount. By combining the DevOps and Security together, we can call it DevSecOps,... more
The Hostel Management System (HMS) is a webbased software application designed to streamline the management of hostels in educational institutions and other accommodation facilities. The system provides a platform for managing various... more
Encryption in transit is a critical component in safeguarding sensitive healthcare data transmitted via Software-as-a-Service (SaaS) platforms. This research paper examines the current state of encryption within SaaS, focusing... more
In April 2016, Bandari Savings and Credit Cooperative Society lost Sh5 million through fraudulent ATM withdrawals (Nation Newspapers, April 8, 2016). These examples demonstrate weaknesses that may exist from security breaches and... more
In April 2016, Bandari Savings and Credit Cooperative Society lost Sh5 million through fraudulent ATM withdrawals (Nation Newspapers, April 8, 2016). These examples demonstrate weaknesses that may exist from security breaches and... more
Artificial intelligence will redefine the concept and operation of data security by infusing increased advanced threat detection, response, and prevention mechanisms. This paper will specifically discuss the critical role that AI-based... more
We propose to integrate deep learning and big data analytics to better manage cybersecurity threats that may emerge within an enterprise resource planning (ERP) ecosystem. Big data analytics on their own are insufficient for a rapidly... more
Over the last few years, open-source Content Management Systems (CMS) like WordPress, Joomla, and Drupal have powered millions of websites worldwide. Despite that, however, they have also become prime targets for cyber attacks, such as... more
Over the last few years, open-source Content Management Systems (CMS) like WordPress, Joomla, and Drupal have powered millions of websites worldwide. Despite that, however, they have also become prime targets for cyber attacks, such as... more