Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : Journal of Social Science Utilizing Technology

The Transformative Power of Information and Communication Technology in Empowering Women in Afghanistan Musawer Hakimi; Mohammad Mustafa Quchi; Ansarullah Hasas; Abdul Wajid Fazil
Journal of Social Science Utilizing Technology Vol. 2 No. 1 (2024)
Publisher : Yayasan Pendidikan Islam Daarut Thufulah

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70177/jssut.v2i1.702

Abstract

Background. This research addresses the intersection of Information and Communication Technology (ICT) and women’s empowerment in Afghanistan, aligning with global initiatives and Sustainable Development Goals (SDGs). The study aims to provide nuanced insights into the multifaceted impact of ICT on financial independence, economic empowerment, and health outcomes among Afghan women. Purpose. The research employs a purposive sampling method, involving 170 participants from diverse regions in Afghanistan to ensure representation from areas with varying socio-economic and cultural characteristics. Through a mixed-methods approach, including structured surveys and qualitative analysis, the study seeks to understand the perceptions of ICT and its experiences with women’s empowerment. Method. Structured surveys cover demographics, ICT perceptions, and women’s empowerment experiences. Qualitative data undergo thematic analysis, while quantitative analysis utilizes statistical methods such as ANOVA, logistic regression, chi-square tests, binomial tests, and descriptive statistics. Results. The findings underscore a consensus among participants on the positive impact of ICT, particularly on financial independence, economic empowerment, and health outcomes. Associations between telemedicine, digital health, and improved women’s health are identified. Binomial tests highlight success in bridging the digital gender gap and enhancing awareness. Positive perceptions of social media, online communities, and digital advocacy in promoting gender equality are revealed through descriptive statistics. Conclusion. This study contributes novel insights by comprehensively examining the impact of ICT on women’s empowerment in Afghanistan, covering diverse dimensions such as financial independence, economic empowerment, and health outcomes. The robust mixed-methods approach yields unique findings that enrich the existing literature on ICT and women’s empowerment.
A Comprehensive Review of Cybersecurity Measures in the IoT Era Ezatullah Ahmady; Abdul Rahman Mojadadi; Musawer Hakimi
Journal of Social Science Utilizing Technology Vol. 2 No. 1 (2024)
Publisher : Yayasan Pendidikan Islam Daarut Thufulah

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70177/jssut.v2i1.722

Abstract

Background. This research presents a comprehensive review of cybersecurity measures in the Internet of Things (IoT) era. The primary focus is on elucidating the evolving landscape of IoT cybersecurity, with specific attention to the integration of Artificial Intelligence (AI), machine learning, and risk management. The study aims to identify key advancements, challenges, and opportunities in securing interconnected devices, offering valuable insights for researchers, policymakers, and industry professionals. Purpose. Employing a hybrid methodological design that combines elements from narrative synthesis and heuristic analysis, this study utilizes purposive and snowball sampling techniques to select diverse and pertinent sources. The integration of semantic analysis, leveraging natural language processing algorithms, enriches data interpretation. Collaborative intelligence from cybersecurity, machine learning, and IoT experts enhances the study's perspective. A proprietary algorithm, incorporating machine learning principles, enhances data collection efficiency. Method. The synthesis reveals a dynamic landscape marked by the symbiotic relationship between AI and IoT, fortifying defenses against cyber threats. Machine learning emerges as a potent ally, providing robust solutions for threat detection. The study identifies challenges in implementing cybersecurity measures in the IoT landscape, including data privacy, scalability, and regulatory compliance. Results. In conclusion, the review emphasizes the need for proactive and adaptive security strategies in the IoT era, highlighting the role of AI and collaborative interdisciplinary approaches. The study provides a roadmap for future research, policy formulation, and industry practices to fortify the security posture of the IoT ecosystem. Conclusion. This study has comprehensive review of IoT cybersecurity illuminates a dynamic landscape marked by the symbiotic relationship between Artificial Intelligence (AI) and the Internet of Things (IoT). The integration of AI signifies a paradigm shift towards proactive and adaptive security strategies, enhancing the resilience of IoT ecosystems against evolving cyber threats.