Table of Contents
Articles
| A State-of-the-Art Review of Ransomware Attacks on Internet of Things: Trends and Mitigation Strategies | |
| Mobolaji D. Ogunbadejo, Oluwatobi A. Ayilara-Adewale, Moghaddam Anna | 1-18 |
| The Future of Compliance in the Era of Artificial Intelligence | |
| Chukwunalu Chukzy Edemenya | 19-23 |
| Mitigating Insider Threats with Advanced Cyber-Security Measures in Nursing Staffing Agencies | |
| Temitope Oyinkansola Asade, Olutoye Ransome-Kuti, Ojonoka Erika Atawodi, Oyindamola Omolayo, Nonye Fortune Lesinwa, Tolulope Awe | 24-31 |
| Categorization of Internet Protocol Addressing Standards for Sustainable Global Internet of Things Devices | |
| Oluwagbemiga O. Shoewu | 32-44 |
| Meta-analysis of Cybersecurity Threats and Vulnerabilities among Nursing Training Students in Ghana | |
| Japhter Yankey, Emmanuel Harris, Timothy Simpson, Kenneth S. Boadi, Gillian E. Akuetteh | 45-54 |
| Application of AES-RSA Hybrid Encryption Technology in Data Transmission Practices | |
| Linyu Ji | 55-60 |
| DEVELOPMENT OF AN ENHANCED PELICAN RSA ENCRYPTION TECHNIQUE FOR DATA SECURITY SYSTEM | |
| Babatunde Victor Feyiseto, Adeyemo Isiaka Akinkunmi, Jeremiah Yetomiwa Sinat, Ajala funmilola Alaba | 61-92 |
| Cyber Threat Intelligence Sharing: A Survey | |
| Rufus Muchiri, Shem Mbandu, Charles Katila | 93-110 |
| Recalibrating Responsible AI: Non-Western Ethics, Sustainable Machine Learning, and Human Oversight | |
| Lawal Wasiu | 111-123 |
| Ur Iraqi Portal for Government Digital Services: A Descriptive Analytical Study. | |
| Mustafa Hamdi Ahmed, Ali Mohammad Suleiman Al Naimat | 124-133 |
Paper submission email: JIEA@iiste.org
ISSN (Paper)2224-5782 ISSN (Online)2225-0506
Please add our address "contact@iiste.org" into your email contact list.
This journal follows ISO 9001 management standard and licensed under a Creative Commons Attribution 3.0 License.
Copyright © www.iiste.org
Journal of Information Engineering and Applications


