Skip to main content

Posts

Internet of Things

Internet of Things and Big Data Analytics for Risk Management in Digital Tourism Ecosystems Participation and inclusion in the business ecosystem have emerged as a growing trend for company collaboration in areas such as innovation, product development, and research. Collaborations can take many forms, ranging from the traditional value chain to strategic alliances, corporate networks, and digital ecosystems. The Internet of Things (IoT) and Big Data Analytics (BDA) play key roles in developing smart tourism destinations by delivering efficient management solutions, increased public safety, and improved operational efficiency while managing different risks and challenges, while also being a source of such risks and challenges. The objective of this article was to investigate the potential of IoT and BDA to properly control the risks associated with participants in a tourism destination’s digital ecosystem. The authors used the systematic literature review (SLR) method to examine scient...
Recent posts

Digiever network

Updated CISA KEV list includes Digiever network video recorder RCE Ongoing attacks involving the high-severity missing authorization bug impacting Digiever DS-2105 Pro network video recorders, tracked as CVE-2025-52163, have prompted the issue's inclusion in the Cybersecurity and Infrastructure Security Agency's Known Exploited Vulnerabilities catalog , with federal civilian executive branch agencies urged to mitigate the weakness or retire impacted instances by Jan. 12, reports The Hacker News . Abuse of the flaw, which was reported by Akamai and Fortinet researchers to have allowed Mirai and ShadowV2 botnet deployment, could allow command injection, according to CISA.  Such a vulnerability and another medium-severity arbitrary read issue, tracked as CVE-2023-52164, have remained unfixed after the Digiever NVRs reached end-of-life, said TXOne Research's Ta-Lun Yen. Exploitation requires an attacker to be logged in and send a specially crafted request. Users are advised to ...

Network and Security skills

7 SASE certifications to validate converged network and security skills For IT professionals, SASE certifications can demonstrate hands-on experience with cloud-based network and security-as-a-service platforms. As cyberattacks grow more sophisticated and AI-powered threats escalate, enterprises are under pressure to evolve beyond traditional perimeter-based network security. Many are turning to Secure Access Service Edge (SASE), a cloud-native framework that converges network and security functions to protect distributed workforces, optimize network performance, and simplify management across multiple tools. SASE platforms typically include SD-WAN, secure web gateway (SWG), firewall as a service (FWaaS), cloud access security broker (CASB), and zero-trust network access (ZTNA). They can also encompass a growing list of additional features such as browser isolation, sandboxing and data loss prevention (DLP). The overall SASE market is projected to climb from $15 billion in 2025 t...

Theory in Teaching Effectiveness

The role of project-based learning with activity theory in teaching effectiveness: Evidence from the internet of things course Higher education is beginning to focus on how to effectively cultivate IoT engineers who possess both hard skills and soft skills. Therefore, from the perspective of activity theory and combining it with project-based learning, this study constructed a project-based learning framework based on activity theory and applied this framework to an IoT course at a university in central China. The first half of the course adopted a traditional lecture-based teaching method, while the second half of the course was carried out based on the proposed framework, thus constituting a control group and an experimental group. To further explore the effectiveness of the proposed framework on IoT courses, the data of this study consisted of two aspects: on the one hand, questionnaires on students’ learning engagement and satisfaction with the IoT course were collected; on the ot...

Erasing for Art Authentication

Weakly Supervised Object Localization with Background Suppression Erasing for Art Authentication and Copyright Protection The problem of art forgery and infringement is becoming increasingly prominent, since diverse self-media contents with all kinds of art pieces are released on the Internet every day. For art paintings, object detection and localization provide an efficient and effective means of art authentication and copyright protection. However, the acquisition of a precise detector requires large amounts of expensive pixel-level annotations. To alleviate this, we propose a novel weakly supervised object localization (WSOL) with background superposition erasing (BSE), which recognizes objects with inexpensive image-level labels. First, integrated adversarial erasing (IAE) for vanilla convolutional neural network (CNN) dropouts the most discriminative region by leveraging high-level semantic information. Second, a background suppression module (BSM) limits the activation area of ...

Analysing the Quality of Risk

Analysing the Quality of Risk-Focused Socio-Scientific Arguments on Nuclear Power Using a Risk-Benefit Oriented Model Literature has emphasised the need for SSI education to systematically address the risks produced by modern society. This study examines the quality of risk-focused, socio-scientific arguments generated by 22 elementary students in South Korea, concerning nuclear power. Participants read two articles with opposing views on the nuclear phase-out policy and constructed written arguments to justify their positions on this policy. To analyse the quality of arguments, a risk-benefit oriented model encompassing both positivist and constructivist perspectives on risk was developed and applied. The model comprises knowledge components and comparison components. The research results showed that participants generally tended to justify their claims without incorporating comparison components. Some included risk-benefit comparison components, justifying their claims by presenting ...

Language Network

Long arcuate fascicle in wild and captive chimpanzees as a potential structural precursor of the language network The arcuate fascicle (AF) is the main fibre tract in the brain for human language. It connects frontal and temporal language areas in the superior and middle temporal gyrus (MTG). The AF’s connection to the MTG was considered unique to humans and has influenced theories of the evolution of language. Here, using high-resolution diffusion MRI of post-mortem brains, we demonstrate that both wild and captive chimpanzees have a direct AF connection into the MTG, albeit weaker than in humans. This finding challenges the notion of a strictly human-specific AF morphology and suggests that language-related neural specialisation in humans likely evolved through gradual evolutionary strengthening of a pre-existing connection, rather than arising de novo. It is likely that this neural architecture supporting complex communication was already present in the last common ancestor of homin...