|
|
|
Brian K. Masinde, Caroline M. Gevaert, Michael H. Nagenborg and Jaap A. Zevenbergen
The role of geodata technologies in humanitarian action is arguably indispensable in determining when, where, and who needs aid before, during, and after a disaster. However, despite the advantages of using geodata technologies in humanitarianism (i.e., ...
ver más
|
|
|
|
|
|
|
Md Irfanuzzaman Khan, M Abu Saleh and Ali Quazi
This research identifies the underlying drivers impacting on healthcare professionals? social media usage behaviours using the technology acceptance model (TAM) as the theoretical lens. A self-administered survey questionnaire was developed and administe...
ver más
|
|
|
|
|
|
|
Muath A. Obaidat, Suhaib Obeidat, Jennifer Holst, Abdullah Al Hayajneh and Joseph Brown
The Internet of Things (IoT) has experienced constant growth in the number of devices deployed and the range of applications in which such devices are used. They vary widely in size, computational power, capacity storage, and energy. The explosive growth...
ver más
|
|
|
|
|
|
|
P.J. Harrison, Sam Ramanujan
The practice of storing health care records in electronic format, rather than the traditional paper, is becoming increasing popular, especially since the advent of legislation that provided a framework for transmission of these data and encouragement to ...
ver más
|
|
|
|
|
|
|
Maryam Pahlevan and Valentin Ionita
In recent years, sharing threat information has been one of the most suggested solutions for combating the ever-increasing number of cyberattacks, which stem from the system-wide adoption of Information and Communication Technology (ICT) and consequently...
ver más
|
|
|
|
|
|
|
Hadeel Alrubayyi, Moudy Sharaf Alshareef, Zunaira Nadeem, Ahmed M. Abdelmoniem and Mona Jaber
The hype of the Internet of Things as an enabler for intelligent applications and related promise for ushering accessibility, efficiency, and quality of service is met with hindering security and data privacy concerns. It follows that such IoT systems, w...
ver más
|
|
|
|
|
|
|
Al Tariq Sheik, Carsten Maple, Gregory Epiphaniou and Mehrdad Dianati
Cloud-Assisted Connected and Autonomous Vehicles (CCAV) are set to revolutionise road safety, providing substantial societal and economic advantages. However, with the evolution of CCAV technology, security and privacy threats have increased. Although se...
ver más
|
|
|
|
|
|
|
Sungchae Park and Heung-Youl Youm
As COVID-19 became a pandemic worldwide, contact tracing technologies and information systems were developed for quick control of infectious diseases in both the private and public sectors. This study aims to strengthen the data subject?s security, priva...
ver más
|
|
|
|
|
|
|
Neelambike S,Parashuram Baraki
In Vehicular Ad Hoc Networks (VANET), vehicles communicate with another vehicle and also communicate with infrastructure (RSU) points by broadcasting safety and non-safety messages in the network by using the DSRC. In wireless communication, security and...
ver más
|
|
|
|
|
|
|
Huseyn Huseynov, Tarek Saadawi and Kenichi Kourai
The extreme bandwidth and performance of 5G mobile networks changes the way we develop and utilize digital services. Within a few years, 5G will not only touch technology and applications, but dramatically change the economy, our society and individual l...
ver más
|
|
|
|
|
|
|
Weizhi Meng, Thanassis Giannetsos and Christian D. Jensen
The Internet has rapidly grown into a distributed and collaborative network with over one billion users, e.g., the Internet of Things (IoT). The future Internet will become the core of the next information infrastructure in regard to computation and comm...
ver más
|
|
|
|
|
|
|
Anthony M. Maina and Upasana G. Singh
Big data applications are at the epicentre of recent breakthroughs in digital health. However, controversies over privacy, security, ethics, accountability, and data governance have tarnished stakeholder trust, leaving health-relevant big data projects u...
ver más
|
|
|
|
|
|
|
Robail Yasrab, Wanqi Jiang and Adnan Riaz
Recent improvements in deepfake creation have made deepfake videos more realistic. Moreover, open-source software has made deepfake creation more accessible, which reduces the barrier to entry for deepfake creation. This could pose a threat to the people...
ver más
|
|
|
|
|
|
|
In Lee
Along with the growing threat of cyberattacks, cybersecurity has become one of the most important areas of the Internet of Things (IoT). The purpose of IoT cybersecurity is to reduce cybersecurity risk for organizations and users through the protection o...
ver más
|
|
|
|
|
|
|
Jiazhu Dai and Keke Qiao
With the development of the mobile Internet, location-based services are playing an important role in everyday life. As a new location-based service, Spatial Crowdsourcing (SC) involves collecting and analyzing environmental, social, and other spatiotemp...
ver más
|
|
|
|
|
|
|
Sara Pizzi, Chiara Suraci, Leonardo Militano, Antonino Orsino, Antonella Molinaro, Antonio Iera and Giuseppe Araniti
Device-to-device (D2D) communication is considered as one of the key enabling technologies for fifth-generation (5G) networks as it allows data offloading generated by the huge number of connected devices. In this respect, group-oriented services are amo...
ver más
|
|
|
|
|
|
|
Jiazhu Dai and Keke Qiao
With the development of the mobile Internet, location-based services are playing an important role in everyday life. As a new location-based service, Spatial Crowdsourcing (SC) involves collecting and analyzing environmental, social, and other spatiotemp...
ver más
|
|
|
|
|
|
|
Sara Pizzi, Chiara Suraci, Leonardo Militano, Antonino Orsino, Antonella Molinaro, Antonio Iera and Giuseppe Araniti
Device-to-device (D2D) communication is considered as one of the key enabling technologies for fifth-generation (5G) networks as it allows data offloading generated by the huge number of connected devices. In this respect, group-oriented services are amo...
ver más
|
|
|
|
|
|
|
Jingsha He, Qi Xiao, Peng He and Muhammad Salman Pathan
In recent years, smart home technologies have started to be widely used, bringing a great deal of convenience to people?s daily lives. At the same time, privacy issues have become particularly prominent. Traditional encryption methods can no longer meet ...
ver más
|
|
|
|
|
|
|
Jingsha He, Qi Xiao, Peng He and Muhammad Salman Pathan
In recent years, smart home technologies have started to be widely used, bringing a great deal of convenience to people?s daily lives. At the same time, privacy issues have become particularly prominent. Traditional encryption methods can no longer meet ...
ver más
|
|
|
|