Benjamin Yankson
YOU?
Author Swipe
View article: The Rise of Hacking in Integrated EHR Systems: A Trend Analysis of U.S. Healthcare Data Breaches
The Rise of Hacking in Integrated EHR Systems: A Trend Analysis of U.S. Healthcare Data Breaches Open
Electronic health record (EHR) data breaches create severe concerns for patients’ privacy, safety, and risk of loss for healthcare entities responsible for managing patient health records. EHR systems collect a vast amount of user-sensitiv…
View article: The Rise of Hacking in AIoT-EHR Systems: A Trend Analysis of U.S. Healthcare Data Breaches
The Rise of Hacking in AIoT-EHR Systems: A Trend Analysis of U.S. Healthcare Data Breaches Open
Electronic Health Record (EHR) data breaches create severe concerns for patients' privacy, safety, and risk of loss for healthcare entities responsible for managing patient health records. EHR systems collect a vast amount of user-sen…
View article: Cyberattacks in government organizations
Cyberattacks in government organizations Open
In the digital government era, the government must protect citizens’ data from cyberattacks to gain public trust. This study aims to identify the type of cyberattack incidents in government organizations and the implementation strategies t…
View article: A Hybrid Integrated High Availability Cluster (Ihac) for Enhancing System Resilience and Addressing Persistent Cyber Threats
A Hybrid Integrated High Availability Cluster (Ihac) for Enhancing System Resilience and Addressing Persistent Cyber Threats Open
View article: The Role of Industry-Academia Partnerships Can Play in Cybersecurity:
The Role of Industry-Academia Partnerships Can Play in Cybersecurity: Open
Cybercrime presents a pervasive threat globally, affecting governments, organizations, and individuals. Addressing this threat requires collaborative efforts, particularly between industry and academia. This paper delves into the key role …
View article: Diverse students' perspectives on privacy and technology integration in higher education
Diverse students' perspectives on privacy and technology integration in higher education Open
The rapid increase and use of educational technologies have a significant impact on students' privacy, personal information and metadata in higher education. The past two decades have also witnessed the process where information about stud…
View article: Human Error - A Critical Contributing Factor to the Rise in Data Breaches: A Case Study of Higher Education
Human Error - A Critical Contributing Factor to the Rise in Data Breaches: A Case Study of Higher Education Open
With increasing technical safeguards to protect information systems, Human error continues to be a critical factor contributing to the rise in information systems attacks and data breaches. Inadequate or unenforceable Cybersecurity policie…
View article: Robots Security Assessment and Analysis Using Open-Source Tools
Robots Security Assessment and Analysis Using Open-Source Tools Open
The Internet of things (IoT) has revolutionized many aspects of the world, including industrial systems, automobiles, home automation, and surveillance, to name a few. IoT has offered a multitude of conveniences for our daily lives, such a…
View article: Social Robots Privacy Enhancement Using Colored Petri Net (CPN) for Behavior Modeling: A Case Study of Asus Zenbo Robot
Social Robots Privacy Enhancement Using Colored Petri Net (CPN) for Behavior Modeling: A Case Study of Asus Zenbo Robot Open
The interactions between a social robot and the user consist of continuous communication and behavior involving different data types that can be subject to cybersecurity attacks and prone to user privacy concerns. In this paper, we use Col…
View article: MLOPS E DESIGNOPS: EM BUSCA DE UM MODELO INTEGRADO
MLOPS E DESIGNOPS: EM BUSCA DE UM MODELO INTEGRADO Open
Um em cada cinco projetos de gestão de código fonte usam tecnologias DevOps durante o processo de engenharia de software. Mais de um terço (38%) das vagas publicadas para funções de desenvolvimento de software exigem habilidades DevOps na …
View article: Predicting the Occurrence of a Data Breach
Predicting the Occurrence of a Data Breach Open
View article: Social Media Privacy Using EDEE Security Model
Social Media Privacy Using EDEE Security Model Open
Social Media platforms have become a significant part of our daily lives and a modern way to connect friends and family, document our lives, and share other great personal information about our lives. These activities leave us vulnerable t…
View article: Recommendations to Enhance Privacy and Usability of Smart Toys
Recommendations to Enhance Privacy and Usability of Smart Toys Open
The collection of personal information by smart toys causes various privacy concerns. The use of personal information has also been subject to regulatory acts by different governments. For these reasons, smart toy manufacturers need to dev…
View article: ドローン法医学:共通ドローンモデルに関するディジタル法医学研究の事例研究【JST・京大機械翻訳】
ドローン法医学:共通ドローンモデルに関するディジタル法医学研究の事例研究【JST・京大機械翻訳】 Open
View article: Drone Forensics
Drone Forensics Open
Drones (a.k.a. unmanned aerial vehicles – UAV) have become a societal norm in our daily lives. The ability of drones capture high-quality photos from an aerial view and store and transmit such data presents a multi-facet problem. These act…
View article: A Literature Survey on Smart Toy-related Children's Privacy Risks
A Literature Survey on Smart Toy-related Children's Privacy Risks Open
Smart toys have become popular as technological solutions offer a better experience for children. However, the technology used increases the risks to children's privacy, which does not seem to have become a real concern for toy makers. Mos…
View article: Drone forensics: examination and analysis
Drone forensics: examination and analysis Open
Unmanned aerial vehicles (UAVs), also known as drones, provides unique functionalities, which allows area surveillance, inspection, surveying, unarmed cargo, armed attack machines, and aerial photography. Drones are susceptible to GPS spoo…
View article: Modeling Privacy Preservation in Smart Connected Toys by Petri-Nets
Modeling Privacy Preservation in Smart Connected Toys by Petri-Nets Open
Children data privacy must be considered as integral and factored into the system design of Smart Connected Toy (SCT). The challenge is that SCTs are capable to gather significant amount volunteered and non-volunteered data, which lacks pr…