Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (2,135)

Search Parameters:
Keywords = information security management

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
22 pages, 1217 KB  
Article
The Missing Layer in Modern IT: Governance of Commitments, Not Just Compute and Data
by Rao Mikkilineni and William Patrick Kelly
Computers 2026, 15(5), 275; https://doi.org/10.3390/computers15050275 - 24 Apr 2026
Abstract
Contemporary enterprise IT operations are largely implemented on Shannon–Turing computing models in which programs execute read–compute–write cycles over data structures, while governance—fault handling, configuration control, auditability, continuity, and accounting—is applied externally through infrastructure platforms, observability stacks, and human operational processes. This separation scales [...] Read more.
Contemporary enterprise IT operations are largely implemented on Shannon–Turing computing models in which programs execute read–compute–write cycles over data structures, while governance—fault handling, configuration control, auditability, continuity, and accounting—is applied externally through infrastructure platforms, observability stacks, and human operational processes. This separation scales analytical throughput but accumulates what we term coherence debt: locally expedient operational commitments whose provenance and revisability degrade over time until exposed by failures, security incidents, regulatory demands, or architectural transitions. This paper examines the evolution of operational computing models that integrate com-pupation with regulation at two distinct levels. First, Distributed Intelligent Managed Elements (DIME) extend the classical Turing cycle toward a supervised execution loop—read–check-with-oracle–compute–write—by incorporating signaling overlays and FCAPS (Fault, Configuration, Accounting, Performance, and Security) supervision into computation in progress. Second, the Autopoietic Management and Orchestration System (AMOS), grounded in the General Theory of Information, the Burgin–Mikkilineni Thesis, and Deutsch’s epistemic framework, fully decouples process executors from governance by treating any Turing-equivalent engine as a replaceable execution substrate while elevating knowledge structures—encoded as local and global Digital Genomes—to first-class operational state within a governed knowledge network. Using a distributed microservice transaction testbed, we demonstrate how this approach operationalizes topology-as-data, a capability-oriented control plane, decoupled application-layer FCAPS independent of infrastructure management, and policy-selectable consistency/availability semantics. Our results show that the principal benefit of AMOS is not circumventing theoretical constraints such as the Consistency, Availability, and Partition tolerance (CAP) theorem, but governing their trade-offs as explicit, auditable commitments with defined convergence pathways and controlled return to a coherent system state, thereby reducing coherence debt and improving operational reliability in distributed AI-enabled enterprise systems. Full article
(This article belongs to the Special Issue Cloud Computing and Big Data Mining)
32 pages, 1875 KB  
Article
Contextual Zero-Knowledge Authentication with IPFS-Backed Hyperledger Fabric for Privacy-Preserving Blood Supply Chain Management
by Leda Kamal and Jeberson Retna Raj R
Appl. Sci. 2026, 16(9), 4182; https://doi.org/10.3390/app16094182 - 24 Apr 2026
Abstract
Ensuring data security and privacy has emerged as a serious concern in the realm of blood supply chain. This is mainly because of sensitivity of donor information, the involvement of multiple stakeholders, and the need for transparent traceability. This paper proposes a novel [...] Read more.
Ensuring data security and privacy has emerged as a serious concern in the realm of blood supply chain. This is mainly because of sensitivity of donor information, the involvement of multiple stakeholders, and the need for transparent traceability. This paper proposes a novel privacy-preserving, permissioned blockchain framework for blood supply chain management that integrates Hyperledger Fabric, the InterPlanetary File System (IPFS), and a Zero-Knowledge Proof (ZKP)-based authentication protocol. The framework introduces a Pseudonymous Role-Bound Zero-Knowledge Authentication (PRZKA) mechanism that enables donors to authenticate and authorize access to their medical data without revealing their real identities. Context-specific pseudonyms derived through cryptographic hash-to-curve operations ensure unlinkability across different healthcare interactions, while Schnorr-style challenge–response proofs prevent replay attacks and credential misuse. Sensitive donor information is protected using Fabric Private Data Collections, whereas encrypted medical records are stored off-chain in IPFS, with only secure content identifiers recorded on the blockchain. Smart contracts enforce fine-grained, consent-aware access control policies and maintain immutable audit logs of all access events. The proposed system architecture combines an off-chain ZKP gateway with on-chain authorization logic to minimize blockchain overhead while preserving strong security guarantees. Furthermore, a performance evaluation framework is defined, including metrics, workload scenarios, and system configurations, to support future empirical validation. Security analysis indicates that the proposed framework enhances privacy, prevents identity linkage, and enables auditable, consent-driven data sharing compared with existing blockchain-based healthcare solutions. Full article
28 pages, 6360 KB  
Article
Multi-Criteria Geospatial Assessment of Rainwater Harvesting Potential in Urban Environments Using Remote Sensing and GIS
by Satish Kumar Mummidivarapu, Shaik Rehana, Chiravuri Sai Sowmya and Ataur Rahman
Water 2026, 18(9), 1014; https://doi.org/10.3390/w18091014 - 24 Apr 2026
Abstract
Urban cities have been intensely prone to floods during extreme rainfall events and water scarcity issues during dry periods in recent years. In this context, identifying rainwater harvesting potential (RWHP) regions in urban environments provides a sustainable approach to mitigate both urban flooding [...] Read more.
Urban cities have been intensely prone to floods during extreme rainfall events and water scarcity issues during dry periods in recent years. In this context, identifying rainwater harvesting potential (RWHP) regions in urban environments provides a sustainable approach to mitigate both urban flooding and water security, thereby improving urban stormwater management. Geospatial mapping of RWHP has tried to consider various hydrometeorological, topographical and other geospatial datasets, but integrating socio-economic factors over urban environments has not been explored much. The present study integrated remote sensing and hydrological-based information, such as slope, soil type, drainage density, geomorphology, topographic wetness index (TWI), land use land cover (LULC), rainfall, runoff coefficient, proximity to roads, and proximity to settlements for geospatial mapping of RWH potential zones for Hyderabad city using multi-criteria decision analysis (MCDA) and weighted overlay analysis (WOA). The resulting RWH potential map indicates that 80.20% of the area falls within the “low” potential category, 17.53% as “moderate”, 2.0% as “very low”, and only 0.25% as “high” potential, mainly in the southeastern portion near the Hussain Sagar outlet. These categories are spatially verified using Sentinel-2 LULC and Google Earth imagery to assess the qualitative plausibility of the mapped RWH potential zones. Northwestern areas, with loamy soils and mild slopes, demonstrate suitability for rooftop collection and percolation structures, highlighting the effectiveness of the proposed modelling framework for sustainable stormwater management for urban environments. Full article
(This article belongs to the Section Urban Water Management)
Show Figures

Figure 1

13 pages, 3005 KB  
Review
Transcatheter Aortic Valve Implantation for Pure Aortic Regurgitation
by Samuel Norman, Noman Ali and Daniel Blackman
J. Clin. Med. 2026, 15(9), 3206; https://doi.org/10.3390/jcm15093206 - 22 Apr 2026
Viewed by 119
Abstract
Transcatheter aortic valve implantation (TAVI) has transformed the management of severe aortic stenosis (AS), evolving from a therapy reserved for inoperable patients to a viable treatment across the spectrum of surgical risk. This success has stimulated innovation in transcatheter therapies for other valvular [...] Read more.
Transcatheter aortic valve implantation (TAVI) has transformed the management of severe aortic stenosis (AS), evolving from a therapy reserved for inoperable patients to a viable treatment across the spectrum of surgical risk. This success has stimulated innovation in transcatheter therapies for other valvular heart diseases, including aortic regurgitation (AR). In contrast to AS, AR is characterised by heterogeneous aetiologies, absence of annular calcification, larger and more elliptical annular dimensions, and concomitant aortopathy. These challenges have limited the efficacy and safety of conventional transcatheter aortic valves (TAVs), use of which in pure native AR is associated with high rates of valve embolisation, significant residual regurgitation, permanent pacemaker implantation, and mortality. The development of dedicated TAVs designed specifically for the treatment of AR has addressed many of these anatomical challenges. The JenaValve Trilogy and J-Valve systems incorporate leaflet-grasping mechanisms that enable secure anchoring independent of calcification, resulting in transformation of procedural and clinical outcomes. Recent prospective registry data, including the landmark ALIGN-AR trial, demonstrate high technical and procedural success rates, low residual regurgitation, acceptable safety profiles, and meaningful improvements in functional status and ventricular remodelling. These data have informed contemporary guideline updates, with the 2025 European Society of Cardiology (ESC)/European Association of Cardiothoracic Surgery (EACTS) Guidelines for the management of valvular heart disease issuing the first conditional recommendation for TAVI in selected patients with severe AR and the National Institute for Health and Care Excellence (NICE) recommending TAVI for native AR in patients for whom surgical AVR is not available or is high risk. This review summarises the clinical implications of AR, examines current guideline recommendations for management, and critically appraises the evidence supporting transcatheter treatment strategies. Full article
(This article belongs to the Special Issue Clinical Insights and Advances in Structural Heart Disease)
28 pages, 11380 KB  
Article
Crop Type Mapping in an Irrigation District Using Multi-Source Remote Sensing and LSTM-Based Time Series Analysis
by Sensen Shi, Quanming Liu and Zhiyuan Yan
Agriculture 2026, 16(9), 920; https://doi.org/10.3390/agriculture16090920 - 22 Apr 2026
Viewed by 232
Abstract
Fine-scale crop type information is essential for agricultural monitoring, irrigation management, and food security assessment. This study mapped three major crops—wheat, corn, and sunflower—in the Hetao Irrigation District, China, using multi-temporal Sentinel-2 optical imagery and Sentinel-1 SAR observations at the parcel scale. A [...] Read more.
Fine-scale crop type information is essential for agricultural monitoring, irrigation management, and food security assessment. This study mapped three major crops—wheat, corn, and sunflower—in the Hetao Irrigation District, China, using multi-temporal Sentinel-2 optical imagery and Sentinel-1 SAR observations at the parcel scale. A multi-source feature set, including spectral bands, vegetation and red-edge indices, moisture-related variables, radar backscatter coefficients, and derived radar features, was constructed from the full growing season. An LSTM network was used to learn temporal representations of crop phenological dynamics, and the resulting embeddings were then combined with traditional machine learning classifiers, including Random Forest (RF), Support Vector Machine (SVM), and Extreme Gradient Boosting (XGBoost), for final classification. The results show that the hybrid framework substantially improves classification performance compared with the corresponding non-LSTM classifiers. Among all tested models, XGBoost + LSTM achieved the best performance, with an overall accuracy of 93.61%, a Kappa coefficient of 91.66%, and a mean IoU of 87.41%. The class-wise F1-scores were 85.61% for wheat, 97.22% for corn, and 87.27% for sunflower. Additional experiments further confirmed the advantages of parcel-based aggregation in improving spatial consistency and reducing mixed-field noise. The proposed framework provides a promising parcel-scale workflow for crop type mapping in fragmented irrigation districts, while its transferability across years and regions still requires further validation. Full article
(This article belongs to the Section Artificial Intelligence and Digital Agriculture)
Show Figures

Figure 1

25 pages, 2360 KB  
Article
ACF-YOLO: Feature Enhancement and Multi-Scale Alignment for Sustainable Crop Small Object Detection
by Chuanxiang Li, Yihang Li, Wenzhong Yang and Danny Chen
Sustainability 2026, 18(9), 4168; https://doi.org/10.3390/su18094168 - 22 Apr 2026
Viewed by 128
Abstract
Sustainable precision agriculture is crucial for optimizing resource utilization, reducing chemical inputs, and ensuring global food security. High-precision automatic recognition and monitoring of key crop organs (e.g., wheat heads and flower clusters) serve as the technological foundation for sustainable agricultural management decisions. However, [...] Read more.
Sustainable precision agriculture is crucial for optimizing resource utilization, reducing chemical inputs, and ensuring global food security. High-precision automatic recognition and monitoring of key crop organs (e.g., wheat heads and flower clusters) serve as the technological foundation for sustainable agricultural management decisions. However, visual perception in natural field environments is highly susceptible to external conditions. To address the challenges of severe background interference and feature dilution in crop small object detection within complex agricultural scenarios, this paper proposes an enhanced detection network, ACF-YOLO, based on YOLO11. First, an Aggregated Multi-scale Local-Global Attention (AMLGA) module is designed to enhance the feature representation of weak targets by fusing local details with global semantics. Second, a Context-Guided Fusion Module (CGFM) and a Soft-Neighbor Interpolation (SNI) strategy are introduced. Their synergy alleviates feature aliasing effects and ensures the precise alignment of deep semantic information with shallow spatial details. Furthermore, the Inner-MPDIoU loss function is employed to optimize the bounding box regression accuracy for non-rigid targets by incorporating geometric constraints and auxiliary scale factors. To verify the detection capability of the proposed method, we constructed a UAV Wheat Head Dataset (UWHD) and conducted extensive experiments on the UWHD, GWHD2021, and RFRB datasets. The experimental results demonstrate that ACF-YOLO outperforms other comparative methods, confirming its stable detection performance and contributing to the sustainable development of agriculture. Full article
(This article belongs to the Section Sustainable Agriculture)
81 pages, 3148 KB  
Article
Global Virtual Prosumer Framework for Secure Cross-Border Energy Transactions Using IoT, Multi-Agent Intelligence, and Blockchain Smart Contracts
by Nikolaos Sifakis
Information 2026, 17(4), 396; https://doi.org/10.3390/info17040396 - 21 Apr 2026
Viewed by 138
Abstract
Global decarbonization and the rapid growth of distributed energy resources increase the need for information-centric mechanisms that can support secure, scalable, cross-border coordination under heterogeneous technical and regulatory conditions. This paper proposes a Global Virtual Prosumer (GVP) framework that integrates IoT sensing, multi-agent [...] Read more.
Global decarbonization and the rapid growth of distributed energy resources increase the need for information-centric mechanisms that can support secure, scalable, cross-border coordination under heterogeneous technical and regulatory conditions. This paper proposes a Global Virtual Prosumer (GVP) framework that integrates IoT sensing, multi-agent coordination, and permissioned blockchain smart contracts to operationalize cross-border energy services as auditable service commitments rather than physical power exchange. Building on prior work that validated MAS-based power management and blockchain-secured operation within individual Virtual Prosumers, the present contribution lies in the cross-border coordination layer and its associated contractual and evaluation mechanisms, not in the constituent technologies themselves. A layered IoT–AI–blockchain architecture is introduced, where off-chain optimization produces allocations and admissibility indicators and on-chain contracts enforce identity, feasibility guards, delegation and partner-assignment rules, oracle verification, and settlement time compliance outcomes. The contractual lifecycle is formalized through four smart-contract algorithms covering trade registration, conditional delegation, cooperative fulfillment, and cross-border settlement with explicit failure semantics and event-based audit trails. The framework is evaluated on a global case study with seven Virtual Prosumers and quantified using contract-centric KPIs that capture registration time rejections, settlement success versus non-compliance, oracle-driven failure attribution, and full lifecycle traceability. The results demonstrate internal consistency of the proposed lifecycle and the practical value of KPI-driven accountability for cross-border energy service coordination. At the same time, the evaluation is based on synthetic parameterization and an emulated contract environment; realistic deployment constraints—including consensus latency, cross-region communication reliability, and regulatory overlap—are discussed as explicit limitations and directions for future empirical validation. Full article
(This article belongs to the Special Issue IoT, AI, and Blockchain: Applications, Security, and Perspectives)
35 pages, 1484 KB  
Systematic Review
Soil Property Monitoring in Africa via Spectroscopy: A Review
by Mohammed Hmimou, Ahmed Laamrani, Soufiane Hajaj, Faissal Sehbaoui and Abdelghani Chehbouni
Environments 2026, 13(4), 228; https://doi.org/10.3390/environments13040228 - 21 Apr 2026
Viewed by 166
Abstract
Efficient soil fertility monitoring is essential for sustainable agriculture, food security, and environmental management across Africa, yet conventional laboratory methods remain prohibitively costly and slow for continental-scale applications. Soil spectroscopy is considered as a rapid, non-destructive alternative with transformative potential. This review provides [...] Read more.
Efficient soil fertility monitoring is essential for sustainable agriculture, food security, and environmental management across Africa, yet conventional laboratory methods remain prohibitively costly and slow for continental-scale applications. Soil spectroscopy is considered as a rapid, non-destructive alternative with transformative potential. This review provides a systematic synthesis of spectroscopic applications across Africa, encompassing laboratory, field, airborne, and satellite-based platforms, while examining major data sources including the Africa Soil Information Service (AfSIS) and GEO-CRADLE spectral libraries. We critically evaluate the evolution of modeling approaches, revealing that Partial Least Squares Regression (PLSR) dominates, but a shift toward advanced frameworks like hybrid physically based models, ensemble learning and deep neural networks is essential. Critically, we identify a pronounced imbalance wherein laboratory spectroscopy prevails while imaging and satellite-based approaches remain comparatively underutilized, despite their unparalleled potential for scaling point measurements to continental extents. The review consolidates findings on key soil properties, demonstrating consistent successes for primary constituents with direct spectral responses (i.e., organic carbon), while revealing relative uncertainty for properties inferred indirectly via covariance (e.g., available phosphorus, potassium). Despite significant local and regional progress, the absence of a standardized pan-African spectral library and the intractable transferability problem remain formidable barriers. Future research must pivot decisively toward imaging spectroscopy and satellite platforms, mitigating PLSR dominance through systematic adoption of ensemble methods, transfer learning, and model harmonization frameworks to fully operationalize these technologies in support of Africa’s sustainable development goals. Full article
(This article belongs to the Topic Soil Quality: Monitoring Attributes and Productivity)
20 pages, 1592 KB  
Article
Agricultural Soil pH in Fiji
by Diogenes L. Antille, Xueyu Zhao, Jack C. J. Vernon, Timothy P. Stewart, Maria Narayan, James R. F. Barringer, Thomas Caspari, Peter Zund and Ben C. T. Macdonald
Data 2026, 11(4), 90; https://doi.org/10.3390/data11040090 - 20 Apr 2026
Viewed by 149
Abstract
Agriculture in the Pacific is driven primarily by small-scale private farmers, many of whom do not have access to soil testing services or advice, nor the means to interpret analytical results into soil management and agronomic recommendations. Soil degradation through the process of [...] Read more.
Agriculture in the Pacific is driven primarily by small-scale private farmers, many of whom do not have access to soil testing services or advice, nor the means to interpret analytical results into soil management and agronomic recommendations. Soil degradation through the process of acidification poses a significant risk to food and income security as it directly threatens crop productivity. The nutritional quality of food crops may also be affected through sub-optimal nutrient uptake by plants and nutrient imbalances. The dataset reported here provides a useful platform for the development of a decision-support tool (DST) that will assist Fiji farmers in understanding and managing soil pH and soil acidity. The DST will enable making informed decisions about liming to help correct soil pH. To support this development, historical soil pH data available from the Pacific Soils Portal were combined with updated analyses of agricultural soils from 17 locations in Viti Levu Island (Fiji) collected during a field campaign undertaken in August 2025. The soils were sampled at two depth intervals (0–15 and 15–30 cm) and analyzed for pH using a variety of methods. These methods included direct field measurements using a portable pH-meter as well as traditional laboratory determinations. Of the soils sampled, it was found that most soils exhibited pH levels below 7, which were observed for both depth intervals. Across all samples taken in 2025, it was found that 54.3% of them had soil pH < 5, 38.6% had soil pH between 5 and 6, and 7.1% had pH > 6 (based on soil pH1:5 soil-to-water method). Depending upon specific land uses, climate and cropping intensity, it was recommended that routine liming be built into soil fertility management programs to help farmers overcome soil acidity-related constraints to production. Liming frequency, timing of application and application rate will need to be determined for specific soil and cropping situations; however, it was suggested that soil pH was not changed by more than 1 unit each time lime was applied. Such an approach should reduce the risk of soil organic matter loss through accelerated mineralization, which would be challenging to restore in that environment if soils remained under continuous cropping. The analytical information contained in this article expanded and updated the datasets available in the Pacific Soils Portal. Furthermore, this work provided an opportunity to build analytical expertise in aspects of soil chemistry at local organizations to support academic and extension activities as well as the ongoing development of the Pacific Soils Portal. Full article
(This article belongs to the Section Spatial Data Science and Digital Earth)
17 pages, 913 KB  
Article
An Empirical Study of Knowledge Graph-Enhanced RAG for Information Security Compliance
by Dimitar Jovanovski, Marija Stojcheva, Mila Dodevska, Petre Lameski, Igor Mishkovski and Dejan Gjorgjevikj
Information 2026, 17(4), 389; https://doi.org/10.3390/info17040389 - 20 Apr 2026
Viewed by 378
Abstract
Information security compliance has become critical for organizations worldwide, with the ISO/IEC 27000 family serving as the most widely adopted framework for establishing information security management systems. Despite their global acceptance, these standards present significant interpretation challenges due to their formal language, abstract [...] Read more.
Information security compliance has become critical for organizations worldwide, with the ISO/IEC 27000 family serving as the most widely adopted framework for establishing information security management systems. Despite their global acceptance, these standards present significant interpretation challenges due to their formal language, abstract structure, and extensive cross-referencing across 97 documents. Traditional retrieval-augmented generation (RAG) systems, which rely on independent text chunking and dense vector retrieval, prove inadequate for such highly interconnected regulatory materials, often fragmenting contextual relationships and reducing accuracy. This study introduces a privacy-preserving RAG framework that integrates LightRAG, a knowledge graph-based retrieval system, with locally hosted open-source language models. Unlike chunk-based RAG systems that treat document segments independently, the system in this study constructs a semantic knowledge graph that explicitly models relationships between clauses through typed edges representing cross-references, semantic similarity, and hierarchical dependencies. To enable rigorous evaluation, we developed a curated benchmark dataset of 222 multiple-choice questions with authoritative ground-truth answers, systematically constructed from official ISO standards, certification preparation materials, and academic sources. Through systematic evaluation on this benchmark, we show that knowledge graph-based retrieval achieves higher accuracy than chunk-based RAG and non-retrieval LLM baselines within the evaluated setup. The analysis indicates that embedding model quality is strongly associated with system performance, that hybrid retrieval modes combining local and global graph traversal tend to yield better accuracy, and that mid-sized open-source models paired with strong retrievers can approach the performance of larger proprietary systems. The best configuration achieves 90.54% accuracy, demonstrating the promising effectiveness of graph-structured retrieval for multiple-choice regulatory questions. Full article
Show Figures

Figure 1

25 pages, 767 KB  
Article
A Qualitative Synthesis of Cyberattack Trends in Managed Service Providers: Analyzing Multi-Tenant Vulnerabilities and Mitigation Strategies
by Shiva Ram Neupane, Neeraj Shrestha and Weiqing Sun
Information 2026, 17(4), 378; https://doi.org/10.3390/info17040378 - 17 Apr 2026
Viewed by 342
Abstract
Managed Service Providers (MSPs) have increasingly become prime targets for cyberattacks due to their privileged access across multiple client environments. Utilizing a qualitative thematic synthesis and an Open-Source Intelligence (OSINT) methodology, this study examines a purposive sample of major MSP-targeted cyber incidents from [...] Read more.
Managed Service Providers (MSPs) have increasingly become prime targets for cyberattacks due to their privileged access across multiple client environments. Utilizing a qualitative thematic synthesis and an Open-Source Intelligence (OSINT) methodology, this study examines a purposive sample of major MSP-targeted cyber incidents from 2020 to 2025 to identify common attack patterns, exploited vulnerabilities, and operational impacts on downstream clients, particularly small and medium-sized businesses. Analysis of publicly reported incidents reveals a clear trend toward attacks leveraging centralized management platforms, remote access tools, and multi-tenant architectures, resulting in cascading disruptions from limited initial compromise. The synthesis highlights extortion-driven ransomware, supply chain compromises, and the exploitation of unpatched edge devices as dominant threats. To counter these systemic risks, this study outlines contextualized mitigation strategies such as zero trust principles, strict identity controls, tenant isolation, and continuous monitoring tailored to balance security requirements with MSP operational constraints. While these strategies are evidence-informed and grounded in observed trends, they remain proposed solutions that require further empirical validation. The findings emphasize the critical need for proactive, collaborative security practices among MSPs, clients, and regulators to manage evolving cyber threats effectively. Full article
Show Figures

Graphical abstract

29 pages, 2696 KB  
Article
B2CDMS: A Blockchain-Based Architecture for Secure and High-Throughput Classified Document Logging
by Enis Konacaklı and Can Eyüpoğlu
Electronics 2026, 15(8), 1681; https://doi.org/10.3390/electronics15081681 (registering DOI) - 16 Apr 2026
Viewed by 182
Abstract
The secure management of classified documents containing sensitive information is critical for governments, military organizations, and the industry. Traditional data loss prevention (DLP) systems lack robustness against insider threats, particularly regarding access log integrity and tamper-proof auditing. To address log security, the previous [...] Read more.
The secure management of classified documents containing sensitive information is critical for governments, military organizations, and the industry. Traditional data loss prevention (DLP) systems lack robustness against insider threats, particularly regarding access log integrity and tamper-proof auditing. To address log security, the previous literature has proposed multiple solutions, including private and hybrid blockchain models (e.g., Ethereum + MultiChain) to ensure audit trail integrity. However, hybrid architectures often face challenges such as unpredictable transaction costs (gas fees) and potential privacy risks when scaled for enterprise DLP logs. Conversely, private architectures may require higher resources, potentially causing bottlenecks on endpoints. In this paper, we propose an optimized Blockchain-Based Classified Document Management System (B2CDMS) utilizing a permissioned architecture. Our work demonstrates the challenges, advantages, and weak points of current solutions. We optimized a permissioned blockchain (BC) (Hyperledger Fabric v2.5) with an External Chaincode Builder using the Chaincode-as-a-Service (CCaaS) pattern. We compared our proposed private architecture with a hybrid architecture (Ethereum + MultiChain) and a public solution (Ethereum). We conducted a comprehensive analysis using pseudo Trellix ePolicy Orchestrator (ePO) Data Loss Prevention (DLP) logs. Experimental results on an Apple Silicon M4 (Apple Inc., Cupertino, CA, USA) testbed show that the proposed architecture achieves a throughput of 845.8 Transactions Per Second (TPS) with a sub-second latency of 55 ms, aiming to eliminate the bottlenecks of public blockchains. Furthermore, the system introduces a privacy-preserving hashing mechanism (i.e., committing only deterministic Secure Hash Algorithm 256-bit (SHA-256) digests to the immutable ledger while keeping the actual sensitive Personally Identifiable Information (PII) strictly in off-chain databases) compliant with General Data Protection Regulation (GDPR). It ensures that classified document metadata remains immutable and secure against rogue access benefiting from admin privileges. This study concludes that permissioned blockchain architectures offer a scalable and resource-efficient solution for forensic evidence preservation throughout the classified document lifecycle. Full article
Show Figures

Figure 1

17 pages, 280 KB  
Article
Evaluating the Effectiveness of Information Security Management Systems: An Analysis Framework and Key Metrics
by Safia El Moutaouakil, John Lindström and Karl Andersson
J. Cybersecur. Priv. 2026, 6(2), 73; https://doi.org/10.3390/jcp6020073 - 14 Apr 2026
Viewed by 437
Abstract
As large scale digitization continues to reform business processes, one critical challenge organizations are currently facing is managing the staggering amount of data flowing. Further, with large datasets comes the added complexity of insuring a cyber secure environment and shielding the information security [...] Read more.
As large scale digitization continues to reform business processes, one critical challenge organizations are currently facing is managing the staggering amount of data flowing. Further, with large datasets comes the added complexity of insuring a cyber secure environment and shielding the information security management system (ISMS) from undesirable manipulations. Today’s drastic rise of cyberattacks urges the need for effective security frameworks to guard against unauthorized access and malicious acts impeding business operations. The latter of which compelled organizations to adopt holistic information security approaches, commonly implemented via ISMS frameworks. Further, to maintain an effective ISMS, ongoing monitoring and measurements are highly required. Considering the aforementioned points, this paper explores how organizations measure the effectiveness of their ISMS focusing on key performance indicators, metrics, and foundational components involved in information security management by categorizing metrics into governance, risk, and incident response as well as determining the maturity level based on ISO alignment, the presence, specificity and automation of KPIs. Based on empirical interviews with eight diverse organizations, the research findings reveal a wide range of maturity among organizations, from those lacking clear defined KPIs to those with sophisticated multi-layered systems. While special attention is paid to incident-response management, companies with a strong ISMS stand out because they use automated and proactive metrics for strategic reporting, whereas companies with a weaker ISMS often do not have organized KPIs and depend on random manual audits. Based on these results, the present work suggests an analysis framework for evaluating ISMS effectiveness. While previous studies have struggled to define clear ISMS measurement practices, this paper aims to provide insights on measurements by identifying the core building blocks of ISMS and revealing how they are evaluated to drive continual ISMS improvement. Full article
(This article belongs to the Special Issue Current Trends in Data Security and Privacy—2nd Edition)
Show Figures

Figure 1

21 pages, 903 KB  
Article
An Integrated Information Security Governance Model for Hyperconnected IoT Ecosystems; Unified Resilient Security Governance Model (URSGM)
by Hamed Taherdoost, Chin-Shiuh Shieh and Shashi Kant Gupta
Computers 2026, 15(4), 236; https://doi.org/10.3390/computers15040236 - 10 Apr 2026
Viewed by 457
Abstract
Hyperconnected IoT ecosystems have become crucial for organizational operations; yet, existing governance structures remain fragmented, are technology-centric, and not well-equipped to manage the risks, compliance pressures, and resilience needs of IoT. This paper presents an integrated, theory-based information security governance model that is [...] Read more.
Hyperconnected IoT ecosystems have become crucial for organizational operations; yet, existing governance structures remain fragmented, are technology-centric, and not well-equipped to manage the risks, compliance pressures, and resilience needs of IoT. This paper presents an integrated, theory-based information security governance model that is tailored for IoT-driven organizations. A conceptual synthesis is performed through integrating five theoretical anchors: governance theory, socio-technical systems theory, risk governance theory, institutional/compliance theory, and resilience/adaptive capacity theory. These theoretical lenses are used to derive essential governance constructs and to develop a modular architecture tailored to IoT security needs. The model’s validity is grounded in theoretical integration rather than empirical testing, consistent with the nature of conceptual research. The integrated model provides six interdependent governance dimensions: strategic governance, operational governance, technical oversight, compliance alignment, risk governance, and resilience/adaptation, anchored by an ecosystem coordination layer. It provides structured decision rights, continuous risk monitoring, regulatory legitimacy, and native adaptive capabilities toward dynamic cyber-physical threats. This research addresses a known gap in the literature on IoT governance by providing an integrated, theoretically validated governance model that systematically connects the rationale and operational mechanisms of governance for resilient, future-proof IoT adoption. The model is further operationalized through a five-level maturity structure, enabling organizations to assess and progressively enhance governance capabilities. Full article
Show Figures

Figure 1

25 pages, 2504 KB  
Article
Teaching Strategies and Methods in a Complex Education Process: Use Case of Multi-Level Computer-Assisted Exercises on Constructive Simulation Systems
by Miro Čolić and Mirko Sužnjević
Appl. Sci. 2026, 16(8), 3692; https://doi.org/10.3390/app16083692 - 9 Apr 2026
Viewed by 178
Abstract
This study develops a new concept of computer-assisted exercises (CAX) on constructive simulation systems and how the proposed concept affects the strategy and teaching methods. The current state of affairs in the field of defense and security, both in Europe and in the [...] Read more.
This study develops a new concept of computer-assisted exercises (CAX) on constructive simulation systems and how the proposed concept affects the strategy and teaching methods. The current state of affairs in the field of defense and security, both in Europe and in the world, requires the acquisition of competencies (European Qualifications Framework—EQF: knowledge, skills, independence, and responsibility), i.e., the education and training of a significantly larger number of personnel in the field of defense and security than has been the case in the last 70 years. In addition, an important specificity of today is that students need to acquire some competencies that were almost unknown until recently. Most of these competencies are the result of the rapid development of technology, which has significantly changed human life in all areas. In order to respond to the modern requirements of conducting operations, where the transfer of information both horizontally and vertically is exponentially accelerated, current concepts of preparation and implementation of education and training, of which exercises are often the most important part, need to be replaced with new concepts, and one such concept is developed in this paper. New information introduced is mostly related to the new weapons that are being introduced (unmanned systems, hypersonic missiles, weapons based on microwaves and lasers, etc.), which all result in necessary changes to the traditional approach to conducting war, i.e., tactics, techniques, and procedures (TTP). This novel exercise concept allows for the simultaneous implementation of training for up to three or four hierarchical levels (e.g., TF Div, brigade, battalion, and company) in one exercise, while in most countries, including the NATO alliance, it is still common for such exercises to be conducted according to a concept that is over 20 years old and, as a rule, is focused on the implementation of exercises for one or two hierarchical levels. This approach allows key personnel from the headquarters of units from four hierarchical levels to be simulated in real time, which is not provided by current concepts for preparing and conducting exercises. The new concept was applied as a multi-level, computer-assisted exercise (CAX) on constructive simulation systems. In addition, significant advantages of the new concept relate to the flexibility and adaptability of the proposed concept to be applied in addition to operational units and in training institutions such as academies and higher education institutions. In addition to the above, the new concept requires a shorter planning period as well as fewer total resources needed for the preparation and implementation of the exercise. The management, organizational, and technological components of the proposed exercise concept are implemented in the CAX model. The hypotheses in this paper will be tested in an applied study, which was evaluated through an external evaluation body. The implemented CAX model was tested in Croatia on the example of using exercises at the Croatian Defense Academy. Full article
(This article belongs to the Special Issue Applications of Smart Learning in Education)
Show Figures

Figure 1

Back to TopTop