| Issue | Title | |
| Vol 4, No 1 (2026) | A Comparison of UAF and SysML-Based DODAF Implementations for Cybersecurity Architecture Modeling | Abstract PDF |
| Christopher Green | ||
| Vol 1, No 1 (2023) | AI Trust Framework and Maturity Model: Improving Security, Ethics and Trust in AI | Abstract PDF |
| Michael Mylrea, Nikki Robinson | ||
| Vol 2, No 2 (2024) | Analysis of Teacher Readiness to Implement Bioinformatics to Biology Learning in Senior High School | Abstract PDF |
| Indah Juwita Sari, Eli Setiawati, Rihadatul Aisy, Alpha Bayoh Jr | ||
| Vol 4, No 1 (2026) | Architecture-Driven Integration of Energy Harvesting in Resource-Constrained IoT Systems Using the Unified Architecture Framework (UAF) | Abstract PDF |
| Christopher Green | ||
| Vol 2, No 2 (2024) | Artificial Intelligence and Cybersecurity in Preventing Sentinel Events | Abstract PDF |
| William J. Triplett | ||
| Vol 2, No 2 (2024) | Artificial Intelligence, Cybersecurity, and Human Trafficking Networks | Abstract PDF |
| William J. Triplett | ||
| Vol 1, No 1 (2023) | Artificial Intelligence in STEM Education | Abstract PDF |
| William J. Triplett | ||
| Vol 3, No 2 (2025) | Artificial Intelligence Voice Cloning in Healthcare Cybersecurity: Challenges, Opportunities, and Protective Strategies | Abstract PDF |
| William J. Triplett | ||
| Vol 1, No 1 (2023) | Barriers to Using Mobile Devices in the Classroom | Abstract PDF |
| Angela Triplett, William J. Triplett | ||
| Vol 3, No 1 (2025) | Behavioral Biometrics for Healthcare Cybersecurity | Abstract PDF |
| Maurice L. McBride, Kenna L. Young | ||
| Vol 3, No 2 (2025) | Considerations for the Safety Analysis of AI-Enable Systems | Abstract PDF |
| Christopher W Green | ||
| Vol 2, No 2 (2024) | Cyber Science Education within STEM | Abstract PDF |
| Angela Spencer | ||
| Vol 3, No 1 (2025) | Cyber Science: Revolutionizing Computer Science in the Digital Age | Abstract PDF |
| Angela D. Spencer | ||
| Vol 2, No 1 (2024) | Cybersecurity Vulnerabilities in Healthcare: A Threat to Patient Security | Abstract PDF |
| William J. Triplett | ||
| Vol 3, No 1 (2025) | Digital Divide in Cybersecurity | Abstract PDF |
| William J. Triplett | ||
| Vol 4, No 1 (2026) | Elementary School Students’ Readiness to Adopt Artificial Intelligence (AI)-Based Learning | Abstract PDF |
| Anggun Yulianti, Noening Andrijati, Nanik Wijayati, Decky Avrilianda | ||
| Vol 3, No 1 (2025) | Emotional Manipulation in Cyberspace: Examining Digital Deception's Consequences on Intimacy and Trust | Abstract PDF |
| Tiphanie Gibbs | ||
| Vol 2, No 1 (2024) | Exploring and Mitigating Cybersecurity Challenges in Electronic Health Records | Abstract PDF |
| William J. Triplett | ||
| Vol 1, No 1 (2023) | Impact of Technology Integration in STEM Education | Abstract PDF |
| William J. Triplett | ||
| Vol 3, No 1 (2025) | Love, Lies, and Control: A Cyberpsychological Analysis of Technology-Facilitated Abuse in Intimate Relationships | Abstract PDF |
| Tiphanie Gibbs | ||
| Vol 2, No 2 (2024) | Ontology Development for SysML-Based Energy Harvester Design | Abstract PDF |
| Christopher W. Green | ||
| Vol 2, No 1 (2024) | Predicting Vulnerabilities in the Delivery of Secure Healthcare Supply Chain Services | Abstract PDF |
| Maurice L. McBride | ||
| Vol 3, No 2 (2025) | Role of Data Centers in Healthcare Technology | Abstract PDF |
| William J. Triplett | ||
| Vol 3, No 2 (2025) | System Safety Preliminary Hazard Analysis (PHA) Using Generative Artificial Intelligence | Abstract PDF |
| Christopher W Green | ||
| Vol 3, No 2 (2025) | The Connection Between Hackers and Their Affinity Towards Healthcare | Abstract PDF |
| Maurice L McBride | ||
| 1 - 25 of 30 Items | 1 2 > >> | |

