Triplett, William J.
Unknown Affiliation

Published : 7 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 7 Documents
Search

Digital Divide in Cybersecurity Triplett, William J.
Cybersecurity and Innovative Technology Journal Vol 3, No 1 (2025)
Publisher : Gemilang Maju Publikasi Ilmiah (GMPI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53889/citj.v3i1.622

Abstract

The digital gap actively determines how people obtain varying degrees of access to technological resources, educational opportunities, and job opportunities, specifically within cybersecurity. Research explores digital divide patterns in cybersecurity populations by analyzing unequal opportunities related to cybersecurity education, job opportunities, and security protection levels. This study combines demographic analytics and interview data to reveal how socioeconomic standing, racial background, gender identities, and regional locations simultaneously shape cybersecurity accessibility and workforce take-up. The data reveals systemic obstacles between low-income citizens and minority groups while closing access to awareness regarding entry into cybersecurity roles. The study ends by suggesting policy and educational outreach reforms that might eliminate digital inequalities.
Telehealth, Data Privacy, and Cybersecurity and Their Implications for STEM Education Triplett, William J.; El Islami, R. Ahmad Zaky
Jurnal Pendidikan Abad Ke-21 Vol 3, No 1 (2025)
Publisher : Gemilang Maju Publikasi Ilmiah (GMPI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53889/jpak.v3i1.655

Abstract

This article examined the factors of telehealth, data privacy, and cybersecurity in today’s healthcare environment and discusses what key issues should be addressed and what effective solutions should be implemented and their implications for STEM Education. As telehealth brings more opportunities for the delivery of care, patient data have emerged as critical areas of concern. This paper aimed at discussing the telehealth data privacy concerns, the current and future cybersecurity threats facing healthcare systems, and recommended ways of enhancing these two areas. Based on a literature analysis and interviews with telehealth experts, this paper identifies that telehealth has unique advantages and opens specific security threats. The studies demonstrate the importance of enhanced data security policies, better IT systems to prevent unauthorized access, and constantly evolving legislation to safeguard the patient’s life and their personal information. The implications of telehealth, data privacy, and cybersecurity for STEM Education are these three contexts can be used as the contexts in the science learning process.
Needs Analysis: Implementation of Outdoor STEM Learning in Biology Education at High School Madani, Willy Faisal; Auliya, Roudhatul; Nadillah, Sabrina; Sari, Indah Juwita; Alasa, Victor; Triplett, Angela; Triplett, William J.
International Journal of Biology Education Towards Sustainable Development Vol 4, No 2 (2024)
Publisher : Gemilang Maju Publikasi Ilmiah (GMPI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53889/ijbetsd.v4i2.554

Abstract

This study examined the preparation and implementation of outdoor learning by integrating STEM concepts into Biology Education. It highlights the opportunity for further investigation into how the STEM approach can enrich students’ learning experiences in outdoor learning. The research uses a case study method with a qualitative approach, where data is collected through observations and interviews to understand the implementation of Outdoor STEM Learning in Biology Education at high schools. Data collection was conducted at two schools, with two Biology teachers as informants from one high school in Banten and Jakarta. The findings reveal that both schools have not yet implemented the Outdoor STEM Learning concept in Biology Education. However, both show a growing interest and curiosity to adopt it, especially with the implementation of the Merdeka Curriculum. Challenges such as limited resources, facilities, and teacher training pose obstacles, but it is hoped that this implementation could enhance learning experiences, strengthen the understanding of Biology, and develop students’ character.
Cybersecurity Vulnerabilities in Healthcare: A Threat to Patient Security Triplett, William J.
Cybersecurity and Innovative Technology Journal Vol 2, No 1 (2024)
Publisher : Gemilang Maju Publikasi Ilmiah (GMPI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53889/citj.v2i1.333

Abstract

Healthcare information systems hold significant importance; hence, their cybersecurity is crucial. Exposed networks make it easy for cybercriminals to launch cyberattacks and access healthcare data. Thus, concerns regarding cybersecurity and its link to healthcare privacy, confidential data, and medical devices are growing. Therefore, cybersecurity vulnerabilities in healthcare and patient security are significant issues. Healthcare information systems comprise correlated networks and play a vital role in treating and saving patients. However, advanced circulated ransomware attacks on hospitals prevent access to electronic health records for providing appropriate patient care, thus forcing doctors to turn to other facilities. These cyberattacks can leak patient data, and regaining control of information systems and patient data is highly expensive, thus resulting in extensive monetary losses. Cyberattacks aimed toward electronic medical records, information technology systems, and medical devices have corrupted the best systems across clinics and small offices with physicians, as well as merged health systems. There is an urgency to address cybersecurity vulnerabilities in healthcare; however, opinions differ regarding suitable measures for safeguarding patient data and ensuring infrastructural security. We aimed to reconcile these diverging hypotheses and provide an understanding of the current landscape and directions for further improvements by reviewing several studies on healthcare cybersecurity. We also interviewed healthcare professionals, cybersecurity experts, and administrators and distributed a survey questionnaire to healthcare organizations to gather quantitative data on existing cybersecurity measures and vulnerabilities. Our analyses show that healthcare organizations are vulnerable to a variety of threats, cyberattacks disrupt the health sector, cybersecurity vulnerabilities impact patient security, and implementations of cybersecurity measures are inconsistent across organizations. Owing to the sophisticated nature of cyberattacks, the healthcare industry must prioritize cybersecurity and provide the funding required to develop critical systems for safeguarding patients and their data. The study's findings underscore the need for standardized cybersecurity practices in healthcare to address inconsistencies in measures across organizations. Adequate and ongoing investment in cybersecurity infrastructure is imperative to counter increasingly sophisticated cyberattacks. Additionally, protecting patient data and maintaining trust within the healthcare sector are ethical imperatives that should guide industry actions. By embracing these implications, the healthcare industry can enhance patient security, financial stability, and ethical integrity.
Artificial Intelligence and Cybersecurity in Preventing Sentinel Events Triplett, William J.
Cybersecurity and Innovative Technology Journal Vol 2, No 2 (2024)
Publisher : Gemilang Maju Publikasi Ilmiah (GMPI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53889/citj.v2i2.555

Abstract

The study mainly focused on the impact of artificial intelligence (AI) in addressing sentinel occurrences in healthcare, particularly the unanticipated events that cause intensive patient harm. Through initiatives such as leveraging predictive analytics, machine learning algorithms, and processing of natural language, AI could help promote safety and prevent risks. This article evaluates the uses of AI, drawbacks, and the ethical implications while developing an understanding of how this innovation would boost patient care and cultural safety. Moreover, the paper examines the security issues related to AI-based healthcare to highlight the advantages of enforcing critical information safeguards while enhancing organizational dependability.
Exploring and Mitigating Cybersecurity Challenges in Electronic Health Records Triplett, William J.
Cybersecurity and Innovative Technology Journal Vol 2, No 1 (2024)
Publisher : Gemilang Maju Publikasi Ilmiah (GMPI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53889/citj.v2i1.344

Abstract

This study explores the complexities of cybersecurity challenges in electronic health record (EHR) systems and provides comprehensive solutions to enhance security. Furthermore, it analyzes existing research on EHR cybersecurity, considers relevant frameworks, and presents a well-designed research approach. Extensive research has examined the cybersecurity landscape of electronic health records (EHRs). Furthermore, it identifies the inherent flaws, challenges, and threats prevalent in existing systems and firmly emphasizes the need for robust security solutions to safeguard sensitive patient information. This study highlights the significance of addressing EHR cybersecurity concerns, enhancing existing knowledge on vulnerabilities, and providing a comprehensive understanding of this field. The study emphasizes the need for proactive and multifaceted security measures that can adapt to the ever-evolving landscape of cyber threats. Future research must continue to explore innovative tools and methodologies to safeguard EHRs against the increasing complexity and sophistication of cyber threats.
Artificial Intelligence, Cybersecurity, and Human Trafficking Networks Triplett, William J.
Cybersecurity and Innovative Technology Journal Vol 2, No 2 (2024)
Publisher : Gemilang Maju Publikasi Ilmiah (GMPI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53889/citj.v2i2.556

Abstract

This study aimed to examine the role of artificial intelligence (AI) in dealing with human trafficking by analyzing social networks. Human trafficking is a global concern that exists in the anonymity of social connections and online platforms. There are important transformative tools that facilitate the identification and disruption of trafficking networks, including AI techniques like natural language processing, social network analysis, and machine learning.  The study tests AI applications, ethical considerations, and cybersecurity measures that importantly safeguards data integrity and promotes the efficacy of AI-driven systems. The outcomes of the study show the potential of AI in pattern recognition, network mapping, and predictive analytics to support law enforcement and advocacy groups.