|
|
|
Lun-Min Shih, Huan-Liang Tsai and Cheng-Yu Tsai
This paper presents an original wireless DYU Air Box of an environment-monitoring IoT (EMIoT) system on a campus to offer information on environmental conditions through the public ThingSpeak IoT platform for stakeholders including all the students and e...
ver más
|
|
|
|
|
|
|
Manal Rajeh AlShalaan and Suliman Mohamed Fati
To address a business need, most organizations allow employees to use their own devices to enhance productivity and job satisfaction. For this purpose, the Bring Your Own Device (BYOD) policy provides controllable access for employees to organize data th...
ver más
|
|
|
|
|
|
|
Han Zhang and Dongli Wu
The problem of high grain production costs, which is not conducive to sustainable agricultural development and food security, is highlighted in the context of China?s ?large country and small household farmers?. Reducing the grain production costs throug...
ver más
|
|
|
|
|
|
|
Yolanda Valdés-Rodríguez, Jorge Hochstetter-Diez, Jaime Díaz-Arancibia and Rodrigo Cadena-Martínez
Software development must be based on more than just the experience and capabilities of your programmers and your team. The importance of obtaining a quality product lies in the risks that can be exploited by software vulnerabilities, which can jeopardiz...
ver más
|
|
|
|
|
|
|
Michaela Cellina, Maurizio Cè, Marco Alì, Giovanni Irmici, Simona Ibba, Elena Caloro, Deborah Fazzini, Giancarlo Oliva and Sergio Papa
Digital twins are virtual replicas of physical objects or systems. This new technology is increasingly being adopted in industry to improve the monitoring and efficiency of products and organizations. In healthcare, digital human twins (DHTs) represent v...
ver más
|
|
|
|
|
|
|
Afrah Almansoori, Mostafa Al-Emran and Khaled Shaalan
Cybersecurity procedures and policies are prevalent countermeasures for protecting organizations from cybercrimes and security incidents. Without considering human behaviors, implementing these countermeasures will remain useless. Cybersecurity behavior ...
ver más
|
|
|
|
|
|
|
Jirí Du?ek
The paper focuses on the analysis of the computerization of public administration in the Czech Republic in the context of the implementation and operation of data mailboxes, which have been an integral and very important part of e-Government in that coun...
ver más
|
|
|
|
|
|
|
Peter R. J. Trim and Yang-Im Lee
Although artificial intelligence (AI) and machine learning (ML) can be deployed to improve cyber security management, not all managers understand the different types of AI/ML and how they are to be deployed alongside the benefits associated with sociocul...
ver más
|
|
|
|
|
|
|
Mohammad Ishfaq, Heitham Al-Hajieh and Majed Alharthi
The quality of work life (QWL), job satisfaction, and individual work performance are the lynchpins of organizational performance and sustained business growth (SBG). Numerous researchers have recognized an association between QWL and SBG. Positive QWL d...
ver más
|
|
|
|
|
|
|
Meriem Kherbouche, Galena Pisoni and Bálint Molnár
Business process modeling and verification have become an essential way to control and assure organizational evolution. We overview the opportunities for the application of blockchain in Business Process Management and Modeling in Finance and we focus on...
ver más
|
|
|
|