2024
DOI: 10.1080/10447318.2023.2301264
|View full text |Cite
|
Sign up to set email alerts
|

A Hybrid Soft Computing Approach for Prediction of Cloud-Based Learning Management Systems Determinants

Yakubu Bala Mohammed,
Nadire Cavus,
Abdulsalam Ya’u Gital
et al.
Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 56 publications
0
2
0
Order By: Relevance
“…Nowadays, organization's databases, online computers, smartphones, and other information systems which are created for the betterment of society are becoming more vulnerable to criminal activities. Crimes against computing systems typically involve targeting organizational data, personal computers, emails, servers, bank accounts, websites, and digital records of both public and private institutions [5,6]. These offenses are also referred to as "Online crimes, Computer crimes, Cybercrimes, Online crimes, Internet crimes, or Network crimes" [7].…”
Section: Digital Crimes: Issues and Challengesmentioning
confidence: 99%
See 1 more Smart Citation
“…Nowadays, organization's databases, online computers, smartphones, and other information systems which are created for the betterment of society are becoming more vulnerable to criminal activities. Crimes against computing systems typically involve targeting organizational data, personal computers, emails, servers, bank accounts, websites, and digital records of both public and private institutions [5,6]. These offenses are also referred to as "Online crimes, Computer crimes, Cybercrimes, Online crimes, Internet crimes, or Network crimes" [7].…”
Section: Digital Crimes: Issues and Challengesmentioning
confidence: 99%
“…The shortage of cybersecurity experts is a major obstacle faced by companies, as a sufficient number of these specialists are essential for designing a secure digital environment [2]. However, studies have shown that "AI-based methods offer significant enhancements in detecting phishing and ransomware attacks compared to non-AI methods" [6]. For instance, by leveraging machine learning algorithms, AI can analyse vast datasets and identify subtle patterns indicative of malicious activity.…”
Section: Cybersecurity and Cybercrimesmentioning
confidence: 99%