Next Issue
Volume 3, December
Previous Issue
Volume 3, June
 
 

Digital, Volume 3, Issue 3 (September 2023) – 7 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list.
  • You may sign up for e-mail alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.
Order results
Result details
Select all
Export citation of selected articles as:
13 pages, 737 KiB  
Article
Web-Based Malware Detection System Using Convolutional Neural Network
by Ali Alqahtani, Sumayya Azzony, Leen Alsharafi and Maha Alaseri
Digital 2023, 3(3), 273-285; https://doi.org/10.3390/digital3030017 - 12 Sep 2023
Cited by 2 | Viewed by 3086
Abstract
In this article, we introduce a web-based malware detection system that leverages a deep-learning approach. Our primary objective is the development of a robust deep-learning model designed for classifying malware in executable files. In contrast to conventional malware detection systems, our approach relies [...] Read more.
In this article, we introduce a web-based malware detection system that leverages a deep-learning approach. Our primary objective is the development of a robust deep-learning model designed for classifying malware in executable files. In contrast to conventional malware detection systems, our approach relies on static detection techniques to unveil the true nature of files as either malicious or benign. Our method makes use of a one-dimensional convolutional neural network 1D-CNN due to the nature of the portable executable file. Significantly, static analysis aligns perfectly with our objectives, allowing us to uncover static features within the portable executable header. This choice holds particular significance given the potential risks associated with dynamic detection, often necessitating the setup of controlled environments, such as virtual machines, to mitigate dangers. Moreover, we seamlessly integrate this effective deep-learning method into a web-based system, rendering it accessible and user-friendly via a web interface. Empirical evidence showcases the efficiency of our proposed methods, as demonstrated in extensive comparisons with state-of-the-art models across three diverse datasets. Our results undeniably affirm the superiority of our approach, delivering a practical, dependable, and rapid mechanism for identifying malware within executable files. Full article
(This article belongs to the Topic Artificial Intelligence Models, Tools and Applications)
Show Figures

Figure 1

22 pages, 8263 KiB  
Article
Using Virtual Reality to Support Retrieval Practice in Blended Learning: An Interdisciplinary Professional Development Collaboration between Novice and Expert Teachers
by Pamela Cowan and Rachel Farrell
Digital 2023, 3(3), 251-272; https://doi.org/10.3390/digital3030016 - 12 Sep 2023
Viewed by 1785
Abstract
This small-scale study comprised an evaluation of a teacher professional learning experience that involved the collaborative creation of resources using immersive virtual reality (VR) as a retrieval practice tool, specifically focusing on the open access aspects of the SchooVR platform. SchooVR offers teachers [...] Read more.
This small-scale study comprised an evaluation of a teacher professional learning experience that involved the collaborative creation of resources using immersive virtual reality (VR) as a retrieval practice tool, specifically focusing on the open access aspects of the SchooVR platform. SchooVR offers teachers and students tools to enhance teaching and learning by providing a range of virtual field trips and the ability to create customised virtual tours aligned with curriculum requirements. By leveraging the immersive 360° learning environment, learners can interact with content in meaningful ways, fostering engagement and deepening understanding. This study draws on the experiences of a group of postgraduate teacher education students and co-operating teachers in Ireland and Northern Ireland who collaborated on the creation of a number of immersive learning experiences across a range of subjects during a professional learning event. The research showcases how immersive realities, such as VR, can be integrated effectively into blended learning spaces to create resources that facilitate retrieval practice and self-paced study, thereby supporting the learning process. By embedding VR experiences into the curriculum, students are given opportunities for independent practice, review, and personalised learning tasks, all of which contribute to the consolidation of knowledge and the development of metacognitive skills. The findings suggest that SchooVR and similar immersive technologies have the potential to enhance educational experiences and promote effective learning outcomes across a variety of subject areas. Full article
(This article belongs to the Collection Multimedia-Based Digital Learning)
Show Figures

Figure 1

19 pages, 3949 KiB  
Article
Teaching Data Science with Literate Programming Tools
by Marcus Birkenkrahe
Digital 2023, 3(3), 232-250; https://doi.org/10.3390/digital3030015 - 8 Sep 2023
Viewed by 1706
Abstract
This paper presents a case study on using Emacs and Org-mode for literate programming in undergraduate computer and data science courses. Over three academic terms, the author mandated these tools across courses in R, Python, C++, SQL, and more. The onboarding relied on [...] Read more.
This paper presents a case study on using Emacs and Org-mode for literate programming in undergraduate computer and data science courses. Over three academic terms, the author mandated these tools across courses in R, Python, C++, SQL, and more. The onboarding relied on simplified Emacs tutorials and starter configurations. Students gained proficiency after undertaking initial practice. Live coding sessions demonstrated the flexible instruction enabled by literate notebooks. Assignments and projects required documentation alongside functional code. Student feedback showed enthusiasm for learning a versatile IDE, despite some frustration with the learning curve. Skilled students highlighted efficiency gains in a unified environment. However, the uneven adoption of documentation practices pointed to a need for better incorporation into grading. Additionally, some students found Emacs unintuitive, desiring more accessible options. This highlights a need to match tools to skill levels, potentially starting novices with graphical IDEs before introducing Emacs. The key takeaways are as follows: literate programming aids comprehension but requires rigorous onboarding and reinforcement, and Emacs excels for advanced workflows but has a steep initial curve. With proper support, these tools show promise for data science education. Full article
(This article belongs to the Collection Multimedia-Based Digital Learning)
Show Figures

Figure 1

32 pages, 6388 KiB  
Article
Enhancing Cyber Security Governance and Policy for SMEs in Industry 5.0: A Comparative Study between Saudi Arabia and the United Kingdom
by Nisha Rawindaran, Liqaa Nawaf, Suaad Alarifi, Daniyal Alghazzawi, Fiona Carroll, Iyad Katib and Chaminda Hewage
Digital 2023, 3(3), 200-231; https://doi.org/10.3390/digital3030014 - 14 Aug 2023
Cited by 3 | Viewed by 3067
Abstract
The emergence of Industry 5.0 has revolutionized technology by integrating physical systems with digital networks. These advancements have also led to an increase in cyber threats, posing significant risks, particularly for small and medium-sized enterprises (SMEs). This research investigates the resistance of SMEs [...] Read more.
The emergence of Industry 5.0 has revolutionized technology by integrating physical systems with digital networks. These advancements have also led to an increase in cyber threats, posing significant risks, particularly for small and medium-sized enterprises (SMEs). This research investigates the resistance of SMEs in Saudi Arabia and the United Kingdom (UK) to cyber security measures within the context of Industry 5.0, with a specific focus on governance and policy. It explores the cultural and economic factors contributing to this resistance, such as limited awareness of cyber security risks, financial constraints, and competing business priorities. Additionally, the study examines the role of government policies and regulations in promoting cyber security practices among SMEs and compares the approaches adopted by Saudi Arabia and the UK. By employing a mixed methods analysis, including interviews with SME owners and experts, the research highlights challenges and opportunities for improving cyber security governance and policy in both countries. The findings emphasize the need for tailored solutions due to the differing cultural and economic contexts between Saudi Arabia and the UK. Specifically, the study delves into the awareness and implementation of cyber security measures, focusing on SMEs in Saudi Arabia and their adherence to the Essential Cyber Security Controls (ECC-1:2018) guidelines. Furthermore, it examines the existing cyber security awareness practices and compliance in the UK, while also comparing official guidance documents aimed at supporting SMEs in achieving better cyber security practices. Based on the analysis, greater engagement with these documents is recommended in both countries to foster awareness, confidence, and compliance among SMEs, ultimately enhancing their cyber security posture. This paper offers a comparative research study on governance and policy between Saudi Arabia and the UK, presenting a set of recommendations to strengthen cyber security awareness and education, fortify regulatory frameworks, and foster public–private partnerships to combat cyber security threats in the Industry 5.0 landscape. Full article
Show Figures

Figure 1

11 pages, 276 KiB  
Article
Digital Health Information Systems in the Member States of the Commonwealth of Independent States: Status and Prospects
by Alexandr Semyonov, Elena Bogdan, Elena Shamal, Aelita Sargsyan, Karapet Davtyan, Natasha Azzopardi-Muscat and David Novillo-Ortiz
Digital 2023, 3(3), 189-199; https://doi.org/10.3390/digital3030013 - 14 Jul 2023
Viewed by 1433
Abstract
This paper examines the status of the development of national digital health information systems (HIS) in Commonwealth of Independent States (CIS) member states. Data for research were collected using a questionnaire adapted from the questionnaire of the WHO’s Third Global Survey on eHealth. [...] Read more.
This paper examines the status of the development of national digital health information systems (HIS) in Commonwealth of Independent States (CIS) member states. Data for research were collected using a questionnaire adapted from the questionnaire of the WHO’s Third Global Survey on eHealth. The results showed that the digital transformation of HIS was occurring in all seven CIS member states (participating in the study), which were financed by different resources. Laws and regulations on electronic medical records (EMR) use were present in almost all participating CIS member states. Various international standards and classifications were used to support development and the interoperability of digital health information system (d-HIS), including International Classification of Diseases (ICD), Digital Imaging and Communications in Medicine (DICOM), ISO 18308, Logical Observation Identifiers, Names, and Codes (LOINC), Systematized Nomenclature of Medicine Clinical Terms (SNOMED CT), and ISO TC 215. Several CIS member states had adopted a national information security strategy for the safe processing of both personal data and medical confidential information. The digital transformation of healthcare and the Empowerment through Digital Health initiative are taking place in all CIS member states, which are at different stages of introducing electronic medical and health records. Full article
17 pages, 3413 KiB  
Article
Object Detection Models and Optimizations: A Bird’s-Eye View on Real-Time Medical Mask Detection
by Dimitrios A. Koutsomitropoulos and Ioanna C. Gogou
Digital 2023, 3(3), 172-188; https://doi.org/10.3390/digital3030012 - 1 Jul 2023
Cited by 1 | Viewed by 1375
Abstract
Convolutional Neural Networks (CNNs) are well-studied and commonly used for the problem of object detection thanks to their increased accuracy. However, high accuracy on its own says little about the effective performance of CNN-based models, especially when real-time detection tasks are involved. To [...] Read more.
Convolutional Neural Networks (CNNs) are well-studied and commonly used for the problem of object detection thanks to their increased accuracy. However, high accuracy on its own says little about the effective performance of CNN-based models, especially when real-time detection tasks are involved. To the best of our knowledge, there has not been sufficient evaluation of the available methods in terms of their speed/accuracy trade-off. This work performs a review and hands-on evaluation of the most fundamental object detection models on the Common Objects in Context (COCO) dataset with respect to this trade-off, their memory footprint, and computational and storage costs. In addition, we review available datasets for medical mask detection and train YOLOv5 on the Properly Wearing Masked Faces Dataset (PWMFD). Next, we test and evaluate a set of specific optimization techniques, transfer learning, data augmentations, and attention mechanisms, and we report on their effect for real-time mask detection. Based on our findings, we propose an optimized model based on YOLOv5s using transfer learning for the detection of correctly and incorrectly worn medical masks that surpassed more than two times in speed (69 frames per second) the state-of-the-art model SE-YOLOv3 on the PWMFD while maintaining the same level of mean Average Precision (67%). Full article
Show Figures

Figure 1

26 pages, 3230 KiB  
Review
Unlocking the Power of Digital Commons: Data Cooperatives as a Pathway for Data Sovereign, Innovative and Equitable Digital Communities
by Michael Max Bühler, Igor Calzada, Isabel Cane, Thorsten Jelinek, Astha Kapoor, Morshed Mannan, Sameer Mehta, Vijay Mookerje, Konrad Nübel, Alex Pentland, Trebor Scholz, Divya Siddarth, Julian Tait, Bapu Vaitla and Jianguo Zhu
Digital 2023, 3(3), 146-171; https://doi.org/10.3390/digital3030011 - 29 Jun 2023
Cited by 12 | Viewed by 4985
Abstract
Network effects, economies of scale, and lock-in-effects increasingly lead to a concentration of digital resources and capabilities, hindering the free and equitable development of digital entrepreneurship, new skills, and jobs, especially in small communities and their small and medium-sized enterprises (“SMEs”). To ensure [...] Read more.
Network effects, economies of scale, and lock-in-effects increasingly lead to a concentration of digital resources and capabilities, hindering the free and equitable development of digital entrepreneurship, new skills, and jobs, especially in small communities and their small and medium-sized enterprises (“SMEs”). To ensure the affordability and accessibility of technologies, promote digital entrepreneurship and community well-being, and protect digital rights, we propose data cooperatives as a vehicle for secure, trusted, and sovereign data exchange. In post-pandemic times, community/SME-led cooperatives can play a vital role by ensuring that supply chains to support digital commons are uninterrupted, resilient, and decentralized. Digital commons and data sovereignty provide communities with affordable and easy access to information and the ability to collectively negotiate data-related decisions. Moreover, cooperative commons (a) provide access to the infrastructure that underpins the modern economy, (b) preserve property rights, and (c) ensure that privatization and monopolization do not further erode self-determination, especially in a world increasingly mediated by AI. Thus, governance plays a significant role in accelerating communities’/SMEs’ digital transformation and addressing their challenges. Cooperatives thrive on digital governance and standards such as open trusted application programming interfaces (“APIs”) that increase the efficiency, technological capabilities, and capacities of participants and, most importantly, integrate, enable, and accelerate the digital transformation of SMEs in the overall process. This review article analyses an array of transformative use cases that underline the potential of cooperative data governance. These case studies exemplify how data and platform cooperatives, through their innovative value creation mechanisms, can elevate digital commons and value chains to a new dimension of collaboration, thereby addressing pressing societal issues. Guided by our research aim, we propose a policy framework that supports the practical implementation of digital federation platforms and data cooperatives. This policy blueprint intends to facilitate sustainable development in both the Global South and North, fostering equitable and inclusive data governance strategies. Full article
Show Figures

Figure 1

Previous Issue
Next Issue
Back to TopTop