cover
Contact Name
R. Ahmad Zaky El Islami
Contact Email
citj.gmpi@gmail.com
Phone
-
Journal Mail Official
citj.gmpi@gmail.com
Editorial Address
Perumahan Citra Gading Blok C5 No.14 RT 05/05 Kel. Cilaku, Kec. Curug, Kota Serang, Provinsi Banten, Indonesia, Post Code 42121
Location
Kota serang,
Banten
INDONESIA
Cybersecurity and Innovative Technology Journal
ISSN : -     EISSN : 30256682     DOI : http://dx.doi.org/10.53889/citj.v2i1.338
Core Subject : Science,
Cybersecurity and Innovative Technology Journal is a peer-reviewed journal that covers research publications and review articles in the field of cybersecurity and innovative technology. Cybersecurity and Innovative Technology Journal is published by Gemilang Maju Publikasi Ilmiah (GMPI). Cybersecurity and Innovative Technology Journal has become a Crossref member since year 2023 with prefix 10.53889. Therefore all articles published by Cybersecurity and Innovative Technology Journal will have uniques DOI numbers since Vol.1, No.1, September 2023. Since Vol.1, No.1, September 2023. Cybersecurity and Innovative Technology Journal uses Anti-Plagiarism Software "Turnitin" to check the authenticity article.
Articles 20 Documents
Digital Divide in Cybersecurity Triplett, William J.
Cybersecurity and Innovative Technology Journal Vol 3, No 1 (2025)
Publisher : Gemilang Maju Publikasi Ilmiah (GMPI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53889/citj.v3i1.622

Abstract

The digital gap actively determines how people obtain varying degrees of access to technological resources, educational opportunities, and job opportunities, specifically within cybersecurity. Research explores digital divide patterns in cybersecurity populations by analyzing unequal opportunities related to cybersecurity education, job opportunities, and security protection levels. This study combines demographic analytics and interview data to reveal how socioeconomic standing, racial background, gender identities, and regional locations simultaneously shape cybersecurity accessibility and workforce take-up. The data reveals systemic obstacles between low-income citizens and minority groups while closing access to awareness regarding entry into cybersecurity roles. The study ends by suggesting policy and educational outreach reforms that might eliminate digital inequalities.
Behavioral Biometrics for Healthcare Cybersecurity McBride, Maurice L.; Young, Kenna L.
Cybersecurity and Innovative Technology Journal Vol 3, No 1 (2025)
Publisher : Gemilang Maju Publikasi Ilmiah (GMPI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53889/citj.v3i1.617

Abstract

With patient records going online, healthcare organizations are facing new-age threats and old-world security solutions. Typing, mouse, and voice dynamics are continuous and non-intrusive user authentication, enhancing security in clinical systems. This paper discusses the application of behavioral biometrics in mitigating insider threats, compromised credentials, and unauthorized access in the healthcare sector. The paper utilizes peer-reviewed articles published between 2020 and 2025 and applies thematic analysis to identify patterns, advantages, and disadvantages. Studies reveal that behavioral biometrics enhances identification, reduces system vulnerabilities, and can be easily integrated into existing systems. However, issues remain regarding algorithm bias, user privacy, and the system's sensitivity. The article concludes that while behavioral biometrics cannot be an effective substitute for conventional security measures, they are a valuable addition to IT security in the rapidly growing field of digital healthcare and can help healthcare facilities meet regulatory requirements.
Cyber Science: Revolutionizing Computer Science in the Digital Age Spencer, Angela D.
Cybersecurity and Innovative Technology Journal Vol 3, No 1 (2025)
Publisher : Gemilang Maju Publikasi Ilmiah (GMPI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53889/citj.v3i1.645

Abstract

The growing demand for cybersecurity specialists motivates employers to find job candidates with relevant expertise and practical cybersecurity experience. Educational institutions can develop successful cybersecurity professionals through complete cyber science programs that merge theoretical knowledge with practical training. This trained workforce stream helps organizations develop professionals who deal professionally with digital landscape challenges that shift over time. Through excellent cyber education, computer science graduates secure better career prospects. The teaching profession requires teachers to adopt creative learning techniques and practical educational activities because students need proper preparation for the latest cybersecurity developments. The need for cyber education funding investments requires policymakers to understand the immediate importance along with implementing projects that advance academic-industry collaborations.
Love, Lies, and Control: A Cyberpsychological Analysis of Technology-Facilitated Abuse in Intimate Relationships Gibbs, Tiphanie
Cybersecurity and Innovative Technology Journal Vol 3, No 1 (2025)
Publisher : Gemilang Maju Publikasi Ilmiah (GMPI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53889/citj.v3i1.649

Abstract

Technology-facilitated abuse is a growing form of intimate partner violence where digital tools are used to control, monitor, and intimidate victims. This study aimed to examine how certain technologies—such as social media, GPS tracking, and messaging apps—are enabling perpetrators to exert coercive control over their victims. Findings showed that when abusers use these technologies, the nature of the resulting psychological and emotional harm is uniquely severe and impactful. Some of the study's victim participants described heightened levels of anxiety, depression, and PTSD as a direct result of their abusive partner using technology against them. The research also identified several troubling legal and ethical gaps in our current societal framework that leave victims vulnerable. Focusing on a blended demographic sample of study participants—across gender and age—it became clear that certain groups are being targeted more than others. The study concludes by applying a cyberpsychological framework to the issue under investigation and making urgent safety recommendations.
Emotional Manipulation in Cyberspace: Examining Digital Deception's Consequences on Intimacy and Trust Gibbs, Tiphanie
Cybersecurity and Innovative Technology Journal Vol 3, No 1 (2025)
Publisher : Gemilang Maju Publikasi Ilmiah (GMPI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53889/citj.v3i1.650

Abstract

The growing digital communication has opened new avenues for emotional manipulation and deception to occur in personal relationships, especially within the context of marriage. This study aimed to investigate the online practices that best exemplify these negative relational dynamics—catfishing, digital infidelity, and emotional blackmail. It examines the impact of these practices on trust and intimacy. To understand the situation, we conducted two parts of research—one quantitative, the other qualitative. The digital deceptions we found are causing significant emotional distress in those being deceived, making them feel (a) excessively anxious, (b) unduly depressed, and (c) dangerously low in self-trust. They also give rise to relational power dynamics that seem far more imbalanced than the traditional marital roles of husband and wife would suggest. Furthermore, through various cyberpsychological frameworks, we've utilized, it is apparent that these enacted deceptions also cause more relation between the deceivers and those being deceived.
Analysis of Teacher Readiness to Implement Bioinformatics to Biology Learning in Senior High School Sari, Indah Juwita; Setiawati, Eli; Aisy, Rihadatul; Bayoh Jr, Alpha
Cybersecurity and Innovative Technology Journal Vol 2, No 2 (2024)
Publisher : Gemilang Maju Publikasi Ilmiah (GMPI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53889/citj.v2i2.454

Abstract

This study aimed to analyze teachers' readiness in applying bioinformatics to biology learning in senior high schools. Bioinformatics is a combination of computer science, statistics, and biology to analyze and interpret complex biological data. The application of bioinformatics into learning can foster students' realization of the real-life commitment of bioinformatics, enhance their understanding, and expand their curiosity about bioinformatics. The application of bioinformatics into biology learning needs to be supported by teacher readiness in terms of understanding, skills and factors that influence teacher readiness in applying bioinformatics. This research used a case study method with a qualitative descriptive approach to analyze the readiness of biology teachers from several senior high schools in Banten province in implementing bioinformatics into biology learning. The results of this study show that most teachers understand and realize the importance of bioinformatics in learning, on the other hand some teachers also feel not fully confident and able to apply bioinformatics into learning effectively. Although most teachers have adequate access to technology, teachers are not familiar with bioinformatics concepts and software such as BLAST and NCBI.  Therefore, to fulfill the aspect of teachers' understanding and skills in applying bioinformatics to learning, focused training is needed that discusses the basic concepts of bioinformatics, the use of bioinformatics software, and its application in learning to improve teacher competence and create interactive and relevant biology learning.
Cyber Science Education within STEM Spencer, Angela
Cybersecurity and Innovative Technology Journal Vol 2, No 2 (2024)
Publisher : Gemilang Maju Publikasi Ilmiah (GMPI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53889/citj.v2i2.330

Abstract

Cyber science education is an essential component within the larger realm of STEM, which encompasses science, technology, engineering, and mathematics. In order to effectively educate and prepare students for future careers in the rapidly-evolving field of technology and digital communication, it is necessary to utilize both quantitative and qualitative research methods. The theoretical framework of constructivism allows educators to actively engage students in hands-on learning experiences that foster critical thinking skills and problem-solving abilities. The importance of cyber science education is evident in the 21 individuals who were interviewed and partcipated for this research study. These participants included educators, administrators, researchers, and industry professionals who all emphasized the need for a strong foundation in cyber science education in order to remain competitive in today's global job market. It is clear that cyber science education is crucial for preparing students for the future workforce and promoting innovation and advancement in various industries.
Ontology Development for SysML-Based Energy Harvester Design Green, Christopher W.
Cybersecurity and Innovative Technology Journal Vol 2, No 2 (2024)
Publisher : Gemilang Maju Publikasi Ilmiah (GMPI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53889/citj.v2i2.540

Abstract

This study presented the development of an ontology for energy harvesting systems, leveraging the Systems Modeling Language (SysML) within a Model-Based Systems Engineering (MBSE). Energy harvesting, which transforms ambient energy into usable electrical power, has gained traction as a sustainable solution for powering low-power devices in applications such as wireless sensors and autonomous systems. This paper explored the diverse sources and components involved in energy harvesting, including transduction mechanisms, power management, and storage, to address the complexity inherent in multi-source energy systems. Using SysML profiles, this study constructs an ontology that formalizes the concepts, relationships, and constraints within the energy harvesting domain, providing a common vocabulary and promoting semantic interoperability among stakeholders. The ontology is developed systematically and structured to facilitate designing and reusing energy harvesting components, supporting increased efficiency and scalability. The results demonstrate how ontology-based design aids in reducing complexity, improving consistency, and fostering collaboration across interdisciplinary teams, offering significant implications for sustainable technology development in energy harvesting applications.
Artificial Intelligence and Cybersecurity in Preventing Sentinel Events Triplett, William J.
Cybersecurity and Innovative Technology Journal Vol 2, No 2 (2024)
Publisher : Gemilang Maju Publikasi Ilmiah (GMPI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53889/citj.v2i2.555

Abstract

The study mainly focused on the impact of artificial intelligence (AI) in addressing sentinel occurrences in healthcare, particularly the unanticipated events that cause intensive patient harm. Through initiatives such as leveraging predictive analytics, machine learning algorithms, and processing of natural language, AI could help promote safety and prevent risks. This article evaluates the uses of AI, drawbacks, and the ethical implications while developing an understanding of how this innovation would boost patient care and cultural safety. Moreover, the paper examines the security issues related to AI-based healthcare to highlight the advantages of enforcing critical information safeguards while enhancing organizational dependability.
Artificial Intelligence, Cybersecurity, and Human Trafficking Networks Triplett, William J.
Cybersecurity and Innovative Technology Journal Vol 2, No 2 (2024)
Publisher : Gemilang Maju Publikasi Ilmiah (GMPI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53889/citj.v2i2.556

Abstract

This study aimed to examine the role of artificial intelligence (AI) in dealing with human trafficking by analyzing social networks. Human trafficking is a global concern that exists in the anonymity of social connections and online platforms. There are important transformative tools that facilitate the identification and disruption of trafficking networks, including AI techniques like natural language processing, social network analysis, and machine learning.  The study tests AI applications, ethical considerations, and cybersecurity measures that importantly safeguards data integrity and promotes the efficacy of AI-driven systems. The outcomes of the study show the potential of AI in pattern recognition, network mapping, and predictive analytics to support law enforcement and advocacy groups.

Page 2 of 2 | Total Record : 20