[PDF][PDF] Social media networks security threats, risks and recommendation: A case study in the kurdistan region

S Zeebaree, S Ameen, M Sadeeq - International Journal of …, 2020 - researchgate.net
It is well known that social media networks have a rapid growth in the number of users, since
it is widely adopted as a way of communication, sharing knowledge, sharing thoughts …

The quality of service to residents by public administration on the example of municipal offices in Poland.

R Wolniak, I Jonek-Kowalska - Administration & Public Management …, 2021 - ceeol.com
Currently, at a time when the Smart City concept is aimed at improving thequality of life of
residents and being implemented in cities, the role of measuring thefunctioning of offices in …

Understanding the social media interactivity paradox: the effects of social media interactivity on communication quality, work interruptions and job performance

X Liu, B Zheng, H Liu - Information Technology & People, 2021 - emerald.com
Purpose Although social media is widely used for organizational communication, studies
have begun to show its controversial effects on job performance in the workplace. To …

Temporomandibular disorders: A cross sectional study into the knowledge and awareness among Saudi Arabian population

A Elsawy, R Alkhalaf, S Binnjefan… - Archives of Pharmacy …, 2022 - archivepp.com
Temporomandibular disorder (TMD) is a group of clinical troubles and is considered one of
the major causes of non-dental pain. TMD is characterized by a wide range of signs and …

Aegis: An Agent for Multi-party Privacy Preservation

R Ben Salem, E Aïmeur, H Hage - Proceedings of the 2022 AAAI/ACM …, 2022 - dl.acm.org
The proliferation of social media set the foundation for the culture of over-disclosure where
many people document every single event, incident, trip, etc. for everyone to see. Raising …

Smart farming using machine learning and IoT

A Sen, R Roy, SR Dash - … using the IoT and machine learning, 2021 - Wiley Online Library
From the early civilization till the date, three things: Shelter, Garment and Food are main
mantra of a human being. People are quite advanced with modern houses and dresses. But …

[PDF][PDF] Analysis of techniques and attacking pattern in cyber security approach: A survey

A Sharma, A Tyagi, M Bhardwaj - International journal of health …, 2022 - academia.edu
IT or Cybersecurity. It's the protection of computer systems and networks against data
leakage, theft or damage to their hardware and software as well as service interruption or …

[PDF][PDF] CYBERSECURITY: LEGAL AND ORGANIZATIONAL SUPPORT IN LEADING COUNTRIES, NATO AND EU STANDARDS.

I Shopina, D Khomiakov… - Journal of Security …, 2020 - dspace.lvduvs.edu.ua
The authors have investigated the features of legal support for cybersecurity in some of the
leading countries of the world, have established the organizational basis for its support, as …

Revolutionizing cyberbullying prevention: A cutting-edge natural language processing-based approach

T Kanan, S Hendawi, S AlZu'bi, M Elbes… - 2023 International …, 2023 - ieeexplore.ieee.org
The rise of social media has brought about new cybersecurity threats that can affect
individuals and organizations. To ensure safe social media usage, there is a need for …

[PDF][PDF] Cyber security

R Kalakuntla, AB Vanamala… - HOLISTICA–Journal of …, 2019 - sciendo.com
Cyber Security accepts a vigorous role in the area of information technology. Safeguarding
the information has become an enormous problem in the current day. The cybersecurity the …