| Issue | Title | |
| Vol 1, No 1 (2023) | AI Trust Framework and Maturity Model: Improving Security, Ethics and Trust in AI | Abstract PDF |
| Michael Mylrea, Nikki Robinson | ||
| Vol 2, No 2 (2024) | Analysis of Teacher Readiness to Implement Bioinformatics to Biology Learning in Senior High School | Abstract PDF |
| Indah Juwita Sari, Eli Setiawati, Rihadatul Aisy, Alpha Bayoh Jr | ||
| Vol 2, No 2 (2024) | Artificial Intelligence and Cybersecurity in Preventing Sentinel Events | Abstract PDF |
| William J. Triplett | ||
| Vol 2, No 2 (2024) | Artificial Intelligence, Cybersecurity, and Human Trafficking Networks | Abstract PDF |
| William J. Triplett | ||
| Vol 1, No 1 (2023) | Artificial Intelligence in STEM Education | Abstract PDF |
| William J. Triplett | ||
| Vol 3, No 2 (2025) | Artificial Intelligence Voice Cloning in Healthcare Cybersecurity: Challenges, Opportunities, and Protective Strategies | Abstract PDF |
| William J. Triplett | ||
| Vol 1, No 1 (2023) | Barriers to Using Mobile Devices in the Classroom | Abstract PDF |
| Angela Triplett, William J. Triplett | ||
| Vol 3, No 1 (2025) | Behavioral Biometrics for Healthcare Cybersecurity | Abstract PDF |
| Maurice L. McBride, Kenna L. Young | ||
| Vol 3, No 2 (2025) | Considerations for the Safety Analysis of AI-Enable Systems | Abstract PDF |
| Christopher W Green | ||
| Vol 2, No 2 (2024) | Cyber Science Education within STEM | Abstract PDF |
| Angela Spencer | ||
| Vol 3, No 1 (2025) | Cyber Science: Revolutionizing Computer Science in the Digital Age | Abstract PDF |
| Angela D. Spencer | ||
| Vol 2, No 1 (2024) | Cybersecurity Vulnerabilities in Healthcare: A Threat to Patient Security | Abstract PDF |
| William J. Triplett | ||
| Vol 3, No 1 (2025) | Digital Divide in Cybersecurity | Abstract PDF |
| William J. Triplett | ||
| Vol 3, No 1 (2025) | Emotional Manipulation in Cyberspace: Examining Digital Deception's Consequences on Intimacy and Trust | Abstract PDF |
| Tiphanie Gibbs | ||
| Vol 2, No 1 (2024) | Exploring and Mitigating Cybersecurity Challenges in Electronic Health Records | Abstract PDF |
| William J. Triplett | ||
| Vol 1, No 1 (2023) | Impact of Technology Integration in STEM Education | Abstract PDF |
| William J. Triplett | ||
| Vol 3, No 1 (2025) | Love, Lies, and Control: A Cyberpsychological Analysis of Technology-Facilitated Abuse in Intimate Relationships | Abstract PDF |
| Tiphanie Gibbs | ||
| Vol 2, No 2 (2024) | Ontology Development for SysML-Based Energy Harvester Design | Abstract PDF |
| Christopher W. Green | ||
| Vol 2, No 1 (2024) | Predicting Vulnerabilities in the Delivery of Secure Healthcare Supply Chain Services | Abstract PDF |
| Maurice L. McBride | ||
| Vol 3, No 2 (2025) | Role of Data Centers in Healthcare Technology | Abstract PDF |
| William J. Triplett | ||
| Vol 3, No 2 (2025) | System Safety Preliminary Hazard Analysis (PHA) Using Generative Artificial Intelligence | Abstract PDF |
| Christopher W Green | ||
| Vol 3, No 2 (2025) | The Connection Between Hackers and Their Affinity Towards Healthcare | Abstract PDF |
| Maurice L McBride | ||
| Vol 2, No 1 (2024) | The Emerging Obstacles in the Provision of Healthcare Supply Chain Services | Abstract PDF |
| Maurice L. McBride | ||
| Vol 2, No 1 (2024) | The Growing Number of Cybersecurity Vulnerabilities Inside Healthcare Supply Chain | Abstract PDF |
| Maurice L. McBride | ||
| Vol 1, No 1 (2023) | The Role of Technology in Promoting Diversity and Inclusion | Abstract PDF |
| William J. Triplett | ||
| 1 - 25 of 25 Items | ||

