|
|
|
Mohammed M. Yassin, Dea?a Al-Deen Al-Sraheen, Khaldoon Ahmad Al Daoud, Mohammad Alhadab and Farouq Altahtamouni
The Financial Accounting Standards Board (FASB) released Accounting Standards Codification (ASC) 606, ?Revenue from Contracts with Customers?, with the aim of enhancing transparency to provide fairer representation and inhibit the misuse of revenues to m...
ver más
|
|
|
|
|
|
|
Lijun Zu, Wenyu Qi, Hongyi Li, Xiaohua Men, Zhihui Lu, Jiawei Ye and Liang Zhang
The digital transformation of banks has led to a paradigm shift, promoting the open sharing of data and services with third-party providers through APIs, SDKs, and other technological means. While data sharing brings personalized, convenient, and enriche...
ver más
|
|
|
|
|
|
|
Fahad Alqahtani, Mohammed Almutairi and Frederick T. Sheldon
This study provides a comprehensive review and comparative analysis of existing Information Flow Tracking (IFT) tools which underscores the imperative for mitigating data leakage in complex cloud systems. Traditional methods impose significant overhead o...
ver más
|
|
|
|
|
|
|
Li Zhao, Changwei Wang, Haiying Gu and Chengyan Yue
Nonstandard pesticide-application behavior leads to excessive pesticide residue and even affects the quality and safety of agricultural products and agricultural sustainability. Based on 968 valid samples randomly selected in Jiangsu Province of China, i...
ver más
|
|
|
|
|
|
|
Brian K. Masinde, Caroline M. Gevaert, Michael H. Nagenborg and Jaap A. Zevenbergen
The role of geodata technologies in humanitarian action is arguably indispensable in determining when, where, and who needs aid before, during, and after a disaster. However, despite the advantages of using geodata technologies in humanitarianism (i.e., ...
ver más
|
|
|
|
|
|
|
Mircea Constantin ?cheau, Monica Violeta Achim, Larisa Gabudeanu, Viorela Ligia Vaidean, Alexandru Lucian Vîlcea and Liliana Apetri
Drones have been included in more and more activities in various domains, such as military, commercial and personal use. The existing legislative framework insufficiently addresses the responsibility and preventive measures angles in case of vulnerabilit...
ver más
|
|
|
|
|
|
|
Changui Lee and Seojeong Lee
The maritime industry, which transports approximately 90% of the world?s goods, plays a crucial role in the global economy. However, increasing reliance on digital technologies has made the industry vulnerable to cybersecurity threats that may compromise...
ver más
|
|
|
|
|
|
|
Jasmin Kaur and Rozita Dara
Farm data license agreements are legal documents that play an important role in informing farmers about farm data processing practices such as collection, use, safeguarding, and sharing. These legal documents govern the exchange, access, and disseminatio...
ver más
|
|
|
|
|
|
|
Bithin Alangot, Pawel Szalachowski, Tien Tuan Anh Dinh, Souhail Meftah, Jeff Ivanos Gana, Khin Mi Mi Aung and Zengpeng Li
Decentralized identity (DID) systems aim to give users full control over their identities by using completely decentralized technologies, such as blockchain or distributed ledgers, as identity providers. However, when user credentials are compromised, it...
ver más
|
|
|
|
|
|
|
Abdul Majeed, Abdullah M. Alnajim, Athar Waseem, Aleem Khaliq, Aqdas Naveed, Shabana Habib, Muhammad Islam and Sheroz Khan
In fifth Generation (5G) networks, protection from internal attacks, external breaches, violation of confidentiality, and misuse of network vulnerabilities is a challenging task. Various approaches, especially deep-learning (DL) prototypes, have been ado...
ver más
|
|
|
|