Results 51 to 60 of about 8,371 (231)
We introduce multi‐class socio‐technical congruence (MC‐STC), an extension of the widely studied socio‐technical congruence framework, to enable the assessment of coordination between contributors with different functional alignments or roles (e.g., development and security).
Roshan Namal Rajapakse, Claudia Szabo
wiley +1 more source
Ciberseguridad en sitios web: auditoría de seguridad de una plataforma en línea
Vivimos en un mundo digital cada vez más dependiente de plataformas en línea donde garantizar la seguridad se ha convertido en una de las grandes dificultades del día a día. Este trabajo muestra los resultados obtenidos de una auditoría de ciberseguridad
Juan Andres Jaramillo Barreiro +2 more
doaj +1 more source
Fakultas Teknik Universitas Muhammadiyah Ponorogo telah menerapkan Ujian Tengah Semester dan Ujian Akhir Semester menggunakan aplikasi Si Ujo (Sistem Ujian Online) berbasis web.
Mohammad Muhsin, Adi Fajaryanto
doaj +1 more source
How Can Cryptography Secure Online Assessments Against Academic Dishonesty?
ABSTRACT Popular learning platforms like Canvas LMS (Learning Management System), Moodle, and Google Forms have become widespread among university students. This research focuses on these platforms because of their significant role in modern online education.
Aarav Ashish Mehrishi +2 more
wiley +1 more source
Analisis Celah Keamanan dan Mitigasi Website E-learning Itera Menggunakan Owasp Zed Attack Proxy
Website kuliah atau E-Learning ITERA merupakan sistem yang mewadahi proses belajar mengajar antara dosen dan mahasiswa. Keamanan informasi dari sistem ini sangat penting mengingat banyaknya data terkait nilai ataupun materi perkuliahan yang ada pada ...
Ilham Firman Ashari +3 more
doaj +1 more source
The OWASP Logging Project [PDF]
The presentation explained current shortcomings of Security Information Management systems. A new solution and a working prototype were presented.
openaire +1 more source
Building trust: Foundations of security, safety, and transparency in AI
Abstract This paper explores the rapidly evolving ecosystem of publicly available AI models and their potential implications on the security and safety landscape. Understanding their potential risks and vulnerabilities is crucial as AI models become increasingly prevalent.
Huzaifa Sidhpurwala +4 more
wiley +1 more source
Investigating the tension between cloud-related actors and individual privacy rights [PDF]
Historically, little more than lip service has been paid to the rights of individuals to act to preserve their own privacy. Personal information is frequently exploited for commercial gain, often without the person’s knowledge or permission.
Duncan, Bob +2 more
core
Improving the effectiveness of web application vulnerability scanning [PDF]
Using web application vulnerability scanners is very appealing as they promise to detect vulnerabilities with minimal configuration effort. However, using them effectively in practice is often difficult.
Esposito, Damiano +3 more
core +1 more source
Integrating Security Controls in DevSecOps: Challenges, Solutions, and Future Research Directions
In this paper, we conducted a systematic literature review on security controls in DevSecOps. We identified 19 challenges and 18 solutions that are reported in the literature. We also identified research gaps where future research efforts should be directed.
Maysa Sinan +2 more
wiley +1 more source

