cover
Contact Name
R. Ahmad Zaky El Islami
Contact Email
citj.gmpi@gmail.com
Phone
-
Journal Mail Official
citj.gmpi@gmail.com
Editorial Address
Perumahan Citra Gading Blok C5 No.14 RT 05/05 Kel. Cilaku, Kec. Curug, Kota Serang, Provinsi Banten, Indonesia, Post Code 42121
Location
Kota serang,
Banten
INDONESIA
Cybersecurity and Innovative Technology Journal
ISSN : -     EISSN : 30256682     DOI : http://dx.doi.org/10.53889/citj.v2i1.338
Core Subject : Science,
Cybersecurity and Innovative Technology Journal is a peer-reviewed journal that covers research publications and review articles in the field of cybersecurity and innovative technology. Cybersecurity and Innovative Technology Journal is published by Gemilang Maju Publikasi Ilmiah (GMPI). Cybersecurity and Innovative Technology Journal has become a Crossref member since year 2023 with prefix 10.53889. Therefore all articles published by Cybersecurity and Innovative Technology Journal will have uniques DOI numbers since Vol.1, No.1, September 2023. Since Vol.1, No.1, September 2023. Cybersecurity and Innovative Technology Journal uses Anti-Plagiarism Software "Turnitin" to check the authenticity article.
Articles 10 Documents
The Emerging Obstacles in the Provision of Healthcare Supply Chain Services
Cybersecurity and Innovative Technology Journal Vol 2, No 1 (2024)
Publisher : Gemilang Maju Publikasi Ilmiah (GMPI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53889/citj.v2i1.341

Abstract

The COVID-19 pandemic has exposed flaws in the healthcare supply chain, including shortages, delays, and logistical issues. Key problems include inadequacies in resilience, visibility restrictions, cost management obstacles, integration barriers, unstated costs, and disparities in inclusivity. This research uses secondary data analysis to analyze findings from academic literature, industry reports, and case studies. It emphasizes the value of resilience and visibility, suggesting investing in blockchain, AI, and IoT technology for increased transparency and risk management. The report also emphasizes the need for proactive solutions, such as data analytics for improved supply chain visibility, hybrid inventory strategies for cost control, and stakeholder engagement for smooth integration. Integrating procurement, transportation, storage, and production, addressing misuse and hidden costs, and fostering inclusion are critical aspects of enhancing the healthcare supply chain.
AI Trust Framework and Maturity Model: Improving Security, Ethics and Trust in AI Michael Mylrea; Nikki Robinson
Cybersecurity and Innovative Technology Journal Vol 1, No 1 (2023)
Publisher : Gemilang Maju Publikasi Ilmiah (GMPI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53889/citj.v1i1.198

Abstract

The following article develops an AI Trust Framework and Maturity Model (AI-TFMM) to improve trust in AI technologies used by Autonomous Human Machine Teams Systems (A-HMT-S). The framework establishes a methodology to improve quantification of trust in AI technologies.  Key areas of exploration include security, privacy, explainability, transparency and other requirements for AI technologies to be ethical in their development and application. A maturity model framework approach to measuring trust is applied to improve gaps in quantifying trust and associated metrics of evaluation. Finding the right balance between performance, governance and ethics also raises several critical questions on AI technology and trust. Research examines methods needed to develop an AI-TFMM and validates it against a popular AI technology (Chat GPT).  OpenAI's GPT, which stands for "Generative Pre-training Transformer," is a deep learning language model that can generate human-like text by predicting the next word in a sequence based on a given prompt. ChatGPT is a version of GPT that is tailored for conversation and dialogue, and it has been trained on a dataset of human conversations to generate responses that are coherent and relevant to the context. The article concludes with results and conclusions from testing the AI Trust Framework and Maturity Model (AI-TFMM) applied to AI technology. Based on these findings, this paper highlights gaps that could be filled with future research to improve the accuracy, efficacy, application, and methodology of the AI-TFMM.
The Growing Number of Cybersecurity Vulnerabilities Inside Healthcare Supply Chain Maurice L. McBride
Cybersecurity and Innovative Technology Journal Vol 2, No 1 (2024)
Publisher : Gemilang Maju Publikasi Ilmiah (GMPI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53889/citj.v2i1.338

Abstract

The healthcare supply chain is increasingly vulnerable to cybersecurity risks due to the integration of digital technology. The rise of digital records, telemedicine, and network connectivity has made it more susceptible to cyberattacks. The COVID-19 pandemic has further exacerbated this vulnerability, highlighting deficiencies in medical supplies, equipment, and services. The sector has implemented cybersecurity precautions, such as following HIPAA and GDPR, and collaborating with authorities and experts. However, the changing threat landscape necessitates continuous updates and changes. The study uses secondary data from the past three years to highlight the need for strong cybersecurity protocols to protect patient data, deliver services, and defend the supply chain from new threats. Future research should explore leveraging blockchain and AI-based cybersecurity, as well as strengthening government regulation, international cooperation, cybersecurity education, and patient empowerment.
Impact of Technology Integration in STEM Education William J. Triplett
Cybersecurity and Innovative Technology Journal Vol 1, No 1 (2023)
Publisher : Gemilang Maju Publikasi Ilmiah (GMPI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53889/citj.v1i1.295

Abstract

The challenge of preparing students for technology has prompted educators to increase technology in public schools. Yet despite the increased availability of technology in schools, few teachers are integrating technology for instructional purposes. Teachers must be equipped with adequate content knowledge of technology to create an advantageous learning experience in classrooms. To understand teachers’ conceptions of technology integration, this research study explored definitions and importance of STEM education in technology and individuals’ attitudes toward incorporating technology int teaching. Through a qualitative analysis, we identified existing research gaps in the field, current challenges, benefits, and implication of technology integration in science teaching after instruction. 
Cybersecurity Vulnerabilities in Healthcare: A Threat to Patient Security William J. Triplett
Cybersecurity and Innovative Technology Journal Vol 2, No 1 (2024)
Publisher : Gemilang Maju Publikasi Ilmiah (GMPI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53889/citj.v2i1.333

Abstract

Healthcare information systems hold significant importance; hence, their cybersecurity is crucial. Exposed networks make it easy for cybercriminals to launch cyberattacks and access healthcare data. Thus, concerns regarding cybersecurity and its link to healthcare privacy, confidential data, and medical devices are growing. Therefore, cybersecurity vulnerabilities in healthcare and patient security are significant issues. Healthcare information systems comprise correlated networks and play a vital role in treating and saving patients. However, advanced circulated ransomware attacks on hospitals prevent access to electronic health records for providing appropriate patient care, thus forcing doctors to turn to other facilities. These cyberattacks can leak patient data, and regaining control of information systems and patient data is highly expensive, thus resulting in extensive monetary losses. Cyberattacks aimed toward electronic medical records, information technology systems, and medical devices have corrupted the best systems across clinics and small offices with physicians, as well as merged health systems. There is an urgency to address cybersecurity vulnerabilities in healthcare; however, opinions differ regarding suitable measures for safeguarding patient data and ensuring infrastructural security. We aimed to reconcile these diverging hypotheses and provide an understanding of the current landscape and directions for further improvements by reviewing several studies on healthcare cybersecurity. We also interviewed healthcare professionals, cybersecurity experts, and administrators and distributed a survey questionnaire to healthcare organizations to gather quantitative data on existing cybersecurity measures and vulnerabilities. Our analyses show that healthcare organizations are vulnerable to a variety of threats, cyberattacks disrupt the health sector, cybersecurity vulnerabilities impact patient security, and implementations of cybersecurity measures are inconsistent across organizations. Owing to the sophisticated nature of cyberattacks, the healthcare industry must prioritize cybersecurity and provide the funding required to develop critical systems for safeguarding patients and their data. The study's findings underscore the need for standardized cybersecurity practices in healthcare to address inconsistencies in measures across organizations. Adequate and ongoing investment in cybersecurity infrastructure is imperative to counter increasingly sophisticated cyberattacks. Additionally, protecting patient data and maintaining trust within the healthcare sector are ethical imperatives that should guide industry actions. By embracing these implications, the healthcare industry can enhance patient security, financial stability, and ethical integrity.
Artificial Intelligence in STEM Education William J. Triplett
Cybersecurity and Innovative Technology Journal Vol 1, No 1 (2023)
Publisher : Gemilang Maju Publikasi Ilmiah (GMPI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53889/citj.v1i1.296

Abstract

The study examined Artificial Intelligence in STEM Education research crucial role in facilitating personalized learning, advanced analytics, and instructional automation. The primary goal of this research is to explore the effectiveness of AI in advancing STEM education. The specific objectives include assessing the practical challenges in integrating AI, examining the efficiency of various AI-enabled pedagogical strategies, and evaluating the short-term and long-term impacts of AI utilization in STEM subjects. The outcomes of this study are expected to provide valuable insights that could benefit educators, curriculum developers, policymakers, and researchers. Additionally, the findings may contribute to the development of innovative strategies for effectively integrating AI into STEM education, thereby potentially enhancing students, learning outcomes
Predicting Vulnerabilities in the Delivery of Secure Healthcare Supply Chain Services Maurice L. McBride
Cybersecurity and Innovative Technology Journal Vol 2, No 1 (2024)
Publisher : Gemilang Maju Publikasi Ilmiah (GMPI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53889/citj.v2i1.340

Abstract

The COVID-19 pandemic exposed the weaknesses in healthcare supply chains, leading to shortages, increased costs, and untrustworthy vendors. This has put patients at risk for treatment delays, worse care, and higher death rates. The healthcare supply chain's dependence on single sourcing has made these issues worse. Geopolitical conflicts, climatic catastrophes, data privacy issues, cybersecurity threats, and counterfeit goods are emerging risks. Resilient solutions are needed due to the complex ecosystem of manufacturers, wholesalers, regulatory organizations, and healthcare providers. Supply Chain Resilience (SCRES) is crucial for uninterrupted healthcare services, with redundancy, visibility, and adaptability being key components. Future research directions include blockchain integration, data analytics, and regulatory frameworks to improve resilience. Successful mitigation solutions require understanding interdependence, resilience measurements, and behavioral elements. Addressing these vulnerabilities is crucial for patient safety and healthcare effectiveness.
Barriers to Using Mobile Devices in the Classroom Angela Triplett; William J. Triplett
Cybersecurity and Innovative Technology Journal Vol 1, No 1 (2023)
Publisher : Gemilang Maju Publikasi Ilmiah (GMPI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53889/citj.v1i1.304

Abstract

Mobile devices in specific, cell phones have become progressively trendy. Even though the usage of mobile devices can accelerate the learning process, there may be obstacles to utilizing it for learning purposes. This study directed to recognize and examine the barriers and catalysts of using mobile devices as an educational device from the perspective of educators. The numerous barriers impeding the effective integration of mobile devices in the classroom have been identified. This study has uncovered several key findings that shed light on the challenges hindering the effective integration of mobile devices in the classroom.
Exploring and Mitigating Cybersecurity Challenges in Electronic Health Records William J. Triplett
Cybersecurity and Innovative Technology Journal Vol 2, No 1 (2024)
Publisher : Gemilang Maju Publikasi Ilmiah (GMPI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53889/citj.v2i1.344

Abstract

This study explores the complexities of cybersecurity challenges in electronic health record (EHR) systems and provides comprehensive solutions to enhance security. Furthermore, it analyzes existing research on EHR cybersecurity, considers relevant frameworks, and presents a well-designed research approach. Extensive research has examined the cybersecurity landscape of electronic health records (EHRs). Furthermore, it identifies the inherent flaws, challenges, and threats prevalent in existing systems and firmly emphasizes the need for robust security solutions to safeguard sensitive patient information. This study highlights the significance of addressing EHR cybersecurity concerns, enhancing existing knowledge on vulnerabilities, and providing a comprehensive understanding of this field. The study emphasizes the need for proactive and multifaceted security measures that can adapt to the ever-evolving landscape of cyber threats. Future research must continue to explore innovative tools and methodologies to safeguard EHRs against the increasing complexity and sophistication of cyber threats.
The Role of Technology in Promoting Diversity and Inclusion William J. Triplett
Cybersecurity and Innovative Technology Journal Vol 1, No 1 (2023)
Publisher : Gemilang Maju Publikasi Ilmiah (GMPI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53889/citj.v1i1.306

Abstract

Diversity and inclusion are vital organization priorities, as they connect clearly to organizations. Digital technology has revealed that it can connect individuals into successful teams with substantial benefits in promoting diversity and inclusion. This observation establishes the need to make sure complete entry to digital technology, regardless of economic, social, and cultural background. There was a significant positive impact when technology was used to promote diversity and inclusion. The findings of our rigorous investigation suggest that technology plays a vital role in promoting diversity and inclusion.

Page 1 of 1 | Total Record : 10


Filter by Year

2023 2024