cover
Contact Name
R. Ahmad Zaky El Islami
Contact Email
citj.gmpi@gmail.com
Phone
-
Journal Mail Official
citj.gmpi@gmail.com
Editorial Address
Perumahan Citra Gading Blok C5 No.14 RT 05/05 Kel. Cilaku, Kec. Curug, Kota Serang, Provinsi Banten, Indonesia, Post Code 42121
Location
Kota serang,
Banten
INDONESIA
Cybersecurity and Innovative Technology Journal
ISSN : -     EISSN : 30256682     DOI : http://dx.doi.org/10.53889/citj.v2i1.338
Core Subject : Science,
Cybersecurity and Innovative Technology Journal is a peer-reviewed journal that covers research publications and review articles in the field of cybersecurity and innovative technology. Cybersecurity and Innovative Technology Journal is published by Gemilang Maju Publikasi Ilmiah (GMPI). Cybersecurity and Innovative Technology Journal has become a Crossref member since year 2023 with prefix 10.53889. Therefore all articles published by Cybersecurity and Innovative Technology Journal will have uniques DOI numbers since Vol.1, No.1, September 2023. Since Vol.1, No.1, September 2023. Cybersecurity and Innovative Technology Journal uses Anti-Plagiarism Software "Turnitin" to check the authenticity article.
Articles 5 Documents
Search results for , issue "Vol 3, No 1 (2025)" : 5 Documents clear
Digital Divide in Cybersecurity Triplett, William J.
Cybersecurity and Innovative Technology Journal Vol 3, No 1 (2025)
Publisher : Gemilang Maju Publikasi Ilmiah (GMPI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53889/citj.v3i1.622

Abstract

The digital gap actively determines how people obtain varying degrees of access to technological resources, educational opportunities, and job opportunities, specifically within cybersecurity. Research explores digital divide patterns in cybersecurity populations by analyzing unequal opportunities related to cybersecurity education, job opportunities, and security protection levels. This study combines demographic analytics and interview data to reveal how socioeconomic standing, racial background, gender identities, and regional locations simultaneously shape cybersecurity accessibility and workforce take-up. The data reveals systemic obstacles between low-income citizens and minority groups while closing access to awareness regarding entry into cybersecurity roles. The study ends by suggesting policy and educational outreach reforms that might eliminate digital inequalities.
Behavioral Biometrics for Healthcare Cybersecurity McBride, Maurice L.; Young, Kenna L.
Cybersecurity and Innovative Technology Journal Vol 3, No 1 (2025)
Publisher : Gemilang Maju Publikasi Ilmiah (GMPI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53889/citj.v3i1.617

Abstract

With patient records going online, healthcare organizations are facing new-age threats and old-world security solutions. Typing, mouse, and voice dynamics are continuous and non-intrusive user authentication, enhancing security in clinical systems. This paper discusses the application of behavioral biometrics in mitigating insider threats, compromised credentials, and unauthorized access in the healthcare sector. The paper utilizes peer-reviewed articles published between 2020 and 2025 and applies thematic analysis to identify patterns, advantages, and disadvantages. Studies reveal that behavioral biometrics enhances identification, reduces system vulnerabilities, and can be easily integrated into existing systems. However, issues remain regarding algorithm bias, user privacy, and the system's sensitivity. The article concludes that while behavioral biometrics cannot be an effective substitute for conventional security measures, they are a valuable addition to IT security in the rapidly growing field of digital healthcare and can help healthcare facilities meet regulatory requirements.
Cyber Science: Revolutionizing Computer Science in the Digital Age Spencer, Angela D.
Cybersecurity and Innovative Technology Journal Vol 3, No 1 (2025)
Publisher : Gemilang Maju Publikasi Ilmiah (GMPI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53889/citj.v3i1.645

Abstract

The growing demand for cybersecurity specialists motivates employers to find job candidates with relevant expertise and practical cybersecurity experience. Educational institutions can develop successful cybersecurity professionals through complete cyber science programs that merge theoretical knowledge with practical training. This trained workforce stream helps organizations develop professionals who deal professionally with digital landscape challenges that shift over time. Through excellent cyber education, computer science graduates secure better career prospects. The teaching profession requires teachers to adopt creative learning techniques and practical educational activities because students need proper preparation for the latest cybersecurity developments. The need for cyber education funding investments requires policymakers to understand the immediate importance along with implementing projects that advance academic-industry collaborations.
Love, Lies, and Control: A Cyberpsychological Analysis of Technology-Facilitated Abuse in Intimate Relationships Gibbs, Tiphanie
Cybersecurity and Innovative Technology Journal Vol 3, No 1 (2025)
Publisher : Gemilang Maju Publikasi Ilmiah (GMPI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53889/citj.v3i1.649

Abstract

Technology-facilitated abuse is a growing form of intimate partner violence where digital tools are used to control, monitor, and intimidate victims. This study aimed to examine how certain technologies—such as social media, GPS tracking, and messaging apps—are enabling perpetrators to exert coercive control over their victims. Findings showed that when abusers use these technologies, the nature of the resulting psychological and emotional harm is uniquely severe and impactful. Some of the study's victim participants described heightened levels of anxiety, depression, and PTSD as a direct result of their abusive partner using technology against them. The research also identified several troubling legal and ethical gaps in our current societal framework that leave victims vulnerable. Focusing on a blended demographic sample of study participants—across gender and age—it became clear that certain groups are being targeted more than others. The study concludes by applying a cyberpsychological framework to the issue under investigation and making urgent safety recommendations.
Emotional Manipulation in Cyberspace: Examining Digital Deception's Consequences on Intimacy and Trust Gibbs, Tiphanie
Cybersecurity and Innovative Technology Journal Vol 3, No 1 (2025)
Publisher : Gemilang Maju Publikasi Ilmiah (GMPI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53889/citj.v3i1.650

Abstract

The growing digital communication has opened new avenues for emotional manipulation and deception to occur in personal relationships, especially within the context of marriage. This study aimed to investigate the online practices that best exemplify these negative relational dynamics—catfishing, digital infidelity, and emotional blackmail. It examines the impact of these practices on trust and intimacy. To understand the situation, we conducted two parts of research—one quantitative, the other qualitative. The digital deceptions we found are causing significant emotional distress in those being deceived, making them feel (a) excessively anxious, (b) unduly depressed, and (c) dangerously low in self-trust. They also give rise to relational power dynamics that seem far more imbalanced than the traditional marital roles of husband and wife would suggest. Furthermore, through various cyberpsychological frameworks, we've utilized, it is apparent that these enacted deceptions also cause more relation between the deceivers and those being deceived.

Page 1 of 1 | Total Record : 5