-
121
-
122
TS-PAID: A Two-Stage PUF-Based Lightweight Authentication Protocol for Internet of Drones
Published 2025-01-01“…The proliferation of Internet of Drones (IoDs)-based use cases has greatly transformed the cyberspace into pervasive and ubiquitous world. The IoD applications could range beyond military, civilian and industrial domains. …”
Get full text
Article -
123
Investigating the electronic health literacy promotion strategies in adolescent girls: A cross-sectional study in Iran
Published 2025-01-01“…Therefore, developing comprehensive programs for the use of cyberspace, creating simple and understandable media, and educational materials, as well as efficient educational interventions for people with insufficient e-health literacy can be an effective step to develop health literacy skills and ultimately reduce health anxiety among adolescents.…”
Get full text
Article -
124
Efficient and Secure Traffic Scheduling Based on Private Sketch
Published 2025-01-01Get full text
Article -
125
-
126
DIGITISATION OF LEGAL ALGORITHMS TO PREVENT PUBLIC PROCUREMENT CORRUPTION
Published 2024-12-01“…Given the globalisation of the information space, investment, financial, trade and logistics markets, the threat of financing terrorism, war and other crimes through improper control of virtual assets in cyberspace. It was determined that the legal nature of public procurement complaints is defined by the public interest. …”
Get full text
Article -
127
-
128
-
129
Identifying the Dimensions and Consequences of Digital Customer Experience: A Phenomenological Study
Published 2024-03-01“…It also seeks to determine the factors contributing to the digital experience of customers in cyberspace. MethodologyThe research employs a qualitative and descriptive phenomenological approach. …”
Get full text
Article -
130
Tantangan dan Strategi Pencegahan Konflik akibat Intoleransi dan Radikalisme di Era Digital untuk Mewujudkan Keamanan Nasional
Published 2024-12-01“…Therefore, a prevention strategy that involves strengthening digital literacy, improving regulations, and collaboration between stakeholders is considered very important in tackling radicalism in cyberspace. Hopefully, the implementation of this comprehensive strategy can realize a more resilient, inclusive and safe society from the influence of radical ideologies in the digital era. …”
Get full text
Article -
131
Perlindungan Hak Cipta Dari Tindakan Pembajakan Software di Tinjau Dari Hukum Nasional
Published 2024-11-01“…Setiap harinya lebih dari jutaan orang menggunakan atau log in ke internet dengan berbagai macam tujuan, mulai dari riset ilmiah sampai bermain game interaktif di cyberspaces, ataupun mulai dari perdagangan atau e-commerce sampai surfing ke situs perjudian. …”
Get full text
Article