Search Results
Design and Development of a Vulnerability Simulation-Based Cybersecurity Training Platform for Secure Programming
Authors: Habib Nurfaizal, Afrizal Zein
View Affiliation Details
Habib Nurfaizal:
Universitas Pamulang
Afrizal Zein:
Universitas Pamulang
Pages: 231-245
Find this article on:
Identifying and Mitigating Web Application Vulnerabilities: A Comparative Study of Countermeasures and Tools
Authors: Sayed Elham Sadat, Mohammed Fahim Naseri, Khosraw Salamzada
View Affiliation Details
Sayed Elham Sadat:
Kabul Education University
Mohammed Fahim Naseri:
Kabul Education University
Khosraw Salamzada:
Kabul Education University
Pages: 1109-1127
Find this article on:
A Comparison of Product Weight Method and Simple Addition Weight Method in Employee Selection System
Authors: Adie G. Alwani, Donny Avianto
View Affiliation Details
Adie G. Alwani:
Universitas Teknologi Yogyakarta
Donny Avianto:
Universitas Teknologi Yogyakarta
Pages: 365-376
Find this article on:
Preventing Crypto Scams Through Digital Literacy and Cyber Security
Authors: Muhammad Dzaky Maulana, Agus Juhana
View Affiliation Details
Muhammad Dzaky Maulana:
Indonesia University of Education
Agus Juhana:
Indonesia University of Education
Pages: 25-33
Find this article on:
User Trust, Security, and Data Privacy Awareness in GoPay Usage Using Protection Motivation Theory (PMT)
Authors: Diva Ayu Gitareswara, Tri Suratno, Dewi Lestari
View Affiliation Details
Diva Ayu Gitareswara:
Jambi University
Tri Suratno:
Jambi University
Dewi Lestari:
Jambi University
Pages: 781-791
Find this article on:
1 - 5 of 5 items