Social Engineering pose a significant problem for enterprises. Cybercriminals continue developing new and sophisticated methods to trick individuals into disclosing confidential information or granting unauthorized access to infrastructure systems. These attacks remain a significant threat to enterprise systems despite significant investments in technical architecture and security measures. User awareness train...
The so-called fourth industrial revolution brought a disruptive change in the way that communication technologies, distributed systems, intelligent data management, analytics and computational capability and other technologies are integrated to enable new functions and enhance capabilities not only to production systems, but also in many other domains such as education. Mobile Health (m-Health) education is one...
Many of the issues that require resolution are not easy to mitigate just from the technology perspective. The ancestral learned logic of processes, the people traditions, and many other variants define inner contexts that make the adhesion and efficient use of information technologies a delicate process. The enormous geographical dispersion of the beekeeping economic activity, the mostly amateur profile of beek...
The so-called fourth industrial revolution brought a disruptive change in the way that communication technologies, distributed systems, intelligent data management, analytics and computational capability and other technologies are integrated to enable new functions and enhance capabilities not only to production systems, but also in many other domains such as education. Mobile Health (m-Health) education is one...