ISSN: 1690-4524 (Online)
Peer Reviewed Journal via three different mandatory reviewing processes, since 2006, and, from September 2020, a fourth mandatory peer-editing has been added.
Indexed byDOAJ (Directory of Open Access Journals)Benefits of supplying DOAJ with metadata:DOAJ's statistics show more than 900 000 page views and 300 000 unique visitors a month to DOAJ from all over the world. Many aggregators, databases, libraries, publishers and search portals collect our free metadata and include it in their products. Examples are Scopus, Serial Solutions and EBSCO . DOAJ is OAI compliant and once an article is in DOAJ, it is automatically harvestable. DOAJ is OpenURL compliant and once an article is in DOAJ, it is automatically linkable. Over 95% of the DOAJ Publisher community said that DOAJ is important for increasing their journal's visibility. DOAJ is often cited as a source of quality, open access journals in research and scholarly publishing circles. JSCI Supplies DOAJ with Meta Data
, Academic Journals Database, and Google Scholar
Listed inCabell Directory of Publishing Opportunities and in Ulrich’s Periodical Directory
Published by
The International Institute of Informatics and Cybernetics
Re-Published in
Academia.edu (A Community of about 40.000.000 Academics)
Utilization of Artificial Intelligence by Students in Interdisciplinary Field of Biomedical Engineering Shigehiro Hashimoto (pages: 1-5) Transdisciplinary Applications of Data Visualization and Data Mining Techniques as Represented for Human Diseases Richard S. Segall (pages: 6-15) Beyond Status Quo: Why is Transdisciplinary Communication Instrumental in Innovation? James Lipuma , Cristo Leon (pages: 16-20) How We Can Locate Validatable Foundations of Life Themes Jeremy Horne (pages: 21-32) Bringing Discipline into Transdisciplinary Communications -The ISO 56000 Family of Innovation Standards- Rick Fernandez , William Swart (pages: 33-39) To AI Is Human: How AI Tools with Their Imperfections Enhance Learning Martin Cwiakala (pages: 40-46) Knowledge, Learning and Transdisciplinary Communication in the Evolution of the Contemporary World Rita Micarelli , Giorgio Pizziolo (pages: 47-52) Human Complexity vs. Machine Linearity: Tug-of-War Between Two Realities Coexisting in Precarious Balance Paolo Barile , Clara Bassano , Paolo Piciocchi (pages: 53-62) A Cybernetic Metric Approach to Course Preparation Russell Jay Hendel (pages: 63-70) The Impact of Artificial Intelligence on Education John Jenq (pages: 71-76) Bridging the Gap: Harnessing the Power of Machine Learning and Big Data for Media Research Li-jing Arthur Chang (pages: 77-84) Image Processing, Computer Vision, Data Visualization, and Data Mining for Transdisciplinary Visual Communication: What Are the Differences and Which Should or Could You Use? Richard S. Segall (pages: 85-92) Identification – The Essence of Education Jeremy Horne (pages: 93-99) The Greek-Roman Theatre in the Mediterranean Area Maria Rosaria D’acierno Canonici Cammino (pages: 100-108) Examination of AI and Conventional Teaching Approaches in Cultivating Critical Thinking Skills in High School Students Luis Castillo (pages: 109-112) Thoughts, Labyrinths, and Torii Maurício Vieira Kritz (pages: 113-119) Can Two Human Intelligences (HIs or Noes ) and Two Artificial Intelligences (AIs) Get Involved in Interlinguistic Communication? – A Transdisciplinary Quest Ekaterini Nikolarea (pages: 120-128)
ABSTRACT
Building a Cybersecurity Strategy Carol Woody, Robert Ellison
A cybersecurity strategy provides a plan for the integration of security controls and security-linked functional requirements that are implemented across the system that is composed to protect the organization’s operational missions. A cybersecurity strategy must include consideration for expected as well as compromised performance, such as when a system is under attack. Implementing this plan requires extensive collaboration across all participants in the lifecycle—within and outside of the organization—as more services and third-party elements are used. This paper focuses primarily on the elements of the cybersecurity strategy that are critical for predicting the desired outcome based on decisions implemented in the early segments of the lifecycle and examines how the available evidence assembled along the way can be structured for software assurance monitoring
Full Text