This paper unfolds the opportunities and challenges associated with implementing a blockchain-based Hyperledger framework in the medical sector. Blockchain technology is well known for its security and privacy by providing distributed...
This paper focuses on examining and outlining how machines can be trained to recognize trends associated with human perceptions as it relates to the COVID-19 vaccination. Social media especially the Twitter platform has proven to be...
Prescription opioid misuse and opioid use disorder (OUD) are significant health problems in the US and impact stakeholders across the healthcare sector[1]. The Center for Medicare and Medicaid Services'(CMS's) paper summarizes these...
An assessment of a workplace is an important event needed to control occupational safety for injuries, incidents prevention, and promotion of a healthy workforce. Global estimation of the burden due to occupational injuries, poor health,...
Since the information age, knowledge and data has been increasing exponentially and constantly evolving into everything we interact with daily - IOT, Big data, Cloud, smart homes etc. The Protection and security of information and...
SolarWinds hack compromised the U.S. agencies as well as higher education institutions. This paper reviews the literature about the SolarWinds attack and ISO/IEC 27001 standards, NIST cybersecurity framework, Microsoft cybersecurity...
This paper is early work to describe the introduction of Evidence-Based Practice (EBP) to the field of information technology (IT). We begin by describing EBP and its history within medicine and other fields of practice. IT is then...
Crime hotspot locations identification is a very important endeavor to help ensure public safety. Been able to effectively identify these locations will help provide useful information to law enforcement bodies to help minimize criminal...
The problem or purpose of this research is to analyze and gather information regarding unemployment fraud and cyber attacks against state welfare sites using the black web. With the coronavirus unemployment pay being implemented this...
The world is still overwhelmed by the spread of COVID-19 virus. With total 118,154,964 infected cases as of ninth of March, 2021 and affecting 219 countries and territories, the world is still in the pandemic. The detection of COVID-19...
Today, more than 59% of the world population is plugged to the internet. The increase in figures from just 413 million in 2000 to over 4.66 billion in 2020 was influenced not only by economic advancements but also recent events such...
Providing security to Health Information is considered to be the topmost priority when compared to any other field. After the digitalization of the patient's records in the medical field, the healthcare/medical field has become a victim...
Diabetes is one of the highest causes of death in the world. Diabetes is caused when the blood glucose level is too high in the body. Gradually, high blood glucose leads to heart disease, stroke, eye and foot problems. To prevent the...
The present exponential growth in computer and internet development has brought in numerous cybersecurity challenges which are constantly changing with time. The current cybersecurity solutions are no longer optimal in tackling these...
PIVOT is a web-based program that helps users to process and geospatially simulate social media data beside other media sources. Geospatial coordinates and content are used. PIVOT would enable researchers to concentrate their study...
Due to the effect of COVID-19, the people are scared to go out of the houses and work as it is being transmitted easily from person to person. But without doing any work, they can't survive with their families and revenue to the companies...
This study is a preliminary investigation into using user-centered design methodology to inform a context-appropriate support intervention for cyber-bullying victims. Our focus is on social media's role in the increase of harmful interactions...
The technological advancement of the Internet of Things (IoT) devices in our world today has become beneficial to many users but has security issues that are left unattended. IoT devices have the ability to connect to other devices...
The vulnerability exposure of interconnected device in the cyberspace keep surging with evolving technology. Gathering social and technical indicators useful for threat intelligence from open-source data is essential in developing...
911 telecommunicators and dispatchers act as the first line of response during an emergency crisis. Their work is considered to be more than clerical work as they undergo massive stress and are trained to dispatch incident response...
This study is regarding virality in video games and educational games as a whole with the idea of potential application of successful game characteristics to the field of educational games. The study is to determine the characteristics...
With the rapid innovations in technology, wireless internet-connected devices are more ubiquitous than ever and can be found in virtually every aspect of both our personal and professional lives. In this paper, we propose a comprehensive...
Automated testing is the practice of using software tools to automate the execution of test cases upon the release of a new software version. It is a well-known practice in the software industry, often used to save organizational resources...
Premier Sponsor
Gold Sponsor
Silver Sponsor
Judging Provided By
#ITExpo24