Ahead of print

Table of Contents:

Original Article

Comparative Performance Evaluation of Real-Time Webcam and HOG-Based Facial Recognition Systems for Children'’s Screen Time Management

Fatimah Alghamdi,Abdulrahman Alghamdi

Cryptocurrency Fund Appropriation Techniques: Analysis of Strategies for 'Laundering' and Withdrawing Stolen Digital Assets

Dmitry Mikhaylov

Machine Learning Model for Detecting Attack in Service Supply Chain

O. Olaniyi,O. A. Ayeni,M. G. Adewunmi

Policy and Framework

From Prevention to Resilience: Operational Tactics and EU Cybersecurity Frameworks

Jersain Zadamig Llamas Covarrubias

Review Article

Information Security Behavior in Higher Education Institutions: A Systematic Literature Review

Keefa Bwiino,Geoffrey Kituyi Mayoka,Lawrence Nkamwesiga,Makafui Nyamadi

Case Study

CrowdStrike Causes Global Microsoft Outage: A Case Study

Reef E. Alsowaigh