0% found this document useful (0 votes)
10 views43 pages

Lydia Article

Uploaded by

Udoka Oguchukwu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views43 pages

Lydia Article

Uploaded by

Udoka Oguchukwu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
You are on page 1/ 43

RECORD

S/N ARTICLES YEAR SOURCE CITED BY


DATE
6/27/2024 Fatih Dwi Laksana, & Rizki Suwanda. (2024). Design of a Web-Based 2024 [Link] 16
Self-Reporting Information System for Teacher Professional Education.
Jurnal Minfo Polgan, 13(1). [Link]

1
18/1/2025 Kumari, P., Kumar, C., & Preeyanshi, J. B. (2013). Data security using 2025 Citeseer 19
image steganography and weighing its techniques. International Journal
Of Scientific & Technology Research, 2(11), 238-241.

2
12/1/2019 Then, K. A., & Amaria, P. Factors Related to the Adoption of IT 2019 Research in Higher 12
Emerging Technologies by Research and Non-Research Based Higher Education Journal - ERIC
Education Institutions. Research in Higher Education Journal, 19.

1/4/2025 Heni Wulandari, Suherman, S., Muhammad Irfan Dzaky, & Zahra Balqis. 2025 Infokum 1
(2025). A Developing A Website For Reporting Internship Participants’
Activities At The Medan City Communication And Information Service.
INFOKUM, 13(01), 34-42.
[Link]
4
23/2/2021 Rimadeni, Y., Sofyan, H., Rahman, S., Pramana, S., & Oktari, R. S. 2021 [Link] 0
Development of Website-Based a Health Crisis Reporting System.

16/2/2023 Triwahono, Handi & Rosid, Mochamad & Setiawan, Hamzah & 2023 sciencedirect 0
Hindarto, Hindarto. (2023). Revolutionizing Inventory Management:
Web-Based System for Accurate and Efficient Reporting. Indonesian
Journal of Innovation Studies. 23. 10.21070/ijins.v22i.869.

16/2/2024 An open-sourceinteractivetraveldiary for web-based trip reporting 2024 sciencedirect 0

16/2/2022 A System for Reporting Online Child Abuse and Offenders 2022 [Link] 2

8
16/2/2021 Julia Slupska, Leonie Maria Tanczer, 2021. "Threat Modeling Intimate 2021 [Link] 90
Partner Violence: Tech Abuse as a Cybersecurity Challenge in the
Internet of Things", The Emerald International Handbook of Technology-
Facilitated Violence and Abuse, Jane Bailey, Asher Flynn, Nicola Henry

30/10/2021 Chinoko, V. E., Kalimuthu, R., & Macheso, P. (2021). A Cloud Based 2021 [Link] 3
Android System for Reporting Crimes Against Child Sexual Abuse.
International Journal Of Computer Communication And Informatics,
3(2), 84-93.

10

30/10/2021 Detecting child sexual abuse images: Traits of child sexual exploitation 2021 [Link] 30
hosting and displaying websites

11

15/06/2020 Detecting child sexual abuse images: Traits of child sexual exploitation 2020 [Link] 2
hosting and displaying websites

12

15/02/2022 Design and Development of Child Abuse Detecting System (CADS) 2022 [Link] 0

13

10/10/2024 Salunkhe, Aayushi and Gaikwad, Sumitra and More, Prajakta and Sarule, 2024 [Link] 0
Kamlesh and Talathi, Omkar, Child Abuse Detection System (October 10,
2024). Available at SSRN: [Link] or
[Link]
14
10/10/2018 Stahl, B., Kevin, M., & Mark, R. (2018). Understanding Ethics and 2018 [Link] 2
HumanRights in Smart Information Systems. ORBIT Journal, 2(1).

15

5/18/2013 Kumari, P., Kumar, C., & Preeyanshi, J. B. (2013). Data security using 2013 Citeseer 19
image steganography and weighing its techniques. International Journal
Of Scientific & Technology Research, 2(11), 238-241.

16

23/3/2023 Online reporting platform for e-whistleblowing in Thailand [Link] 6

17
8/14/2015 An Internet-based system for incident reporting and learning in primary [Link] 7
care
18
6/15/202 The WHO Surveillance System of Attacks on Health Care (SSA) 2020- [Link] 2
2023
19
12/2/2024 A Reporting System to Protect the Human Rights of People Living with [Link] 8
HIV and Key Populations
20

4/8/2020 Digital platform for social justice launched by Thuli Madonsela 2020 TimesLIVE / [Link] 5

21

10/30/2021 Digital Governance and the Rule of Law 2021 International Journal of Law, 4
Crime and Justice
22
6/10/2021 The Evaluation of a Web-Based Incident Reporting System 2021 [Link] 3

23

5/17/2022 Liyakat, K. K. S. (2022). Implementation of e-mail security with three 2022 [Link] 16
layers of authentication. Journal of Operating Systems Development and
Trends, 9(2), 29-35.

24

8/14/2015 An Internet-based system for incident reporting and learning in primary 2015 [Link] 7
care
25
KEY WORDS PURPOSE OF STUDY

The purpose of this study is to design and develop a web-based self-


reporting information system for students in the Teacher Professional
Education (PPG) program to address the delays, data inaccuracies,
Information System, Teacher Professional Education, Web and administrative difficulties associated with the manual reporting
Technology, PHP process.
Internship Licensing System; Web Application; Waterfall Model; The purpose of this study was to develop a web-based internship
Laravel; Public Sector Digitalization. licensing system for the Ministry of Law and Human Rights
(Kemenkumham). The system aims to replace manual administrative
processes with a centralized, digital solution to enhance efficiency,
transparency, and user experience.

Human rights; Datafication; Digital technology; Human rights The main objective of the study was to analyze how digital
monitoring; Human rights reporting systems technologies are reshaping human rights monitoring and reporting. It
examines both opportunities (such as real-time documentation and
wider participation) and risks (such as surveillance, data misuse, and
inequalities in access).

Website Development, Internship Reporting, Digital Transformation. The study aimed to develop a website for reporting internship
participants’ activities at the Medan City Communication and
Information Service.
Website Development, Internship Reporting, Digital Transformation. The main objective of this research was to develop and test a web-
based health crisis reporting system that could replace the existing
manual paper-based reporting processes used by health agencies in
Aceh Province, Indonesia.

Mild cognitive impairment (MCI), digital biomarkers, web-based The main objective was to determine the feasibility of a web-based
platform, remote assessment platform for remotely assessing speech, facial features, and cognition
in people with mild cognitive impairment (MCI).

interactive travel diary systems, web-based survey methodologies, The primary objective of this research was to develop and evaluate
travel behavior analysis, data privacy protection, open-source an innovative interactive, web-based travel diary system that
development, GPS tracking alternatives, travel analysis zones (TAZ), significantly improves the trip reporting process for survey
participants while simultaneously reducing the workload and effort
required by survey designers.

Child abuse, cybercrime, reporting system, online offenders, internet The study aims to develop a web-based system that enables
safety, web-based application, security, child protection. individuals, especially children and guardians, to report cases of
online child abuse and offenders in a safe, accessible, and efficient
manner. The objective is to provide a secure platform for data
collection, monitoring, and quick intervention against child abuse
incidents
Digital forensics, cybercrime, social media, cyberbullying, evidence The study aims to design and implement a forensic-based system for
preservation, security, forensic investigation, web-based system. identifying, analyzing, and preserving digital evidence of
cybercrimes—particularly cyberbullying and harmful activities on
social media platforms. The system’s main goal is to help law
enforcement and investigators efficiently gather and preserve digital
evidence that can be used in legal proceedings.

Cloud, Global Positioning System (GPS), Real-Time Database, The study’s main objective is to design and implement a cloud-based
Firebase, and Authentication Android system that enables the real-time reporting of crimes related
to child sexual abuse. It seeks to replace slow, paper-based systems
by offering victims, witnesses, and the public an efficient, fast, and
secure reporting platform accessible through Android devices.

Child sexual exploitation imagesChild sexual abuse imagesChild The study aims to identify structural patterns in website locations and
pornographyLimitation of hash valuesWebsitesAutomated data folder/file naming practices of websites hosting and displaying child
collection sexual abuse images to develop additional detection criteria beyond
traditional hash value databases.

Mobile application, child sexual assault, clinical guidelines, usability The study aims to provide a preliminary evaluation of the usability
testing, acceptability evaluation, mixed methods research design, and acceptability of a mobile application called Sexual Assault Care
Sexual Assault Care Algorithm (SACA), technology acceptance Algorithm (SACA) designed to aid healthcare providers in rapid
model, decision-making for child sexual abuse treatment.

Internet of Things (IoT), E-Textile, wearable sensors, galvanic skin The study aims to design and develop a wearable IoT-based system
response (GSR), heart rate sensor, force sensitive resistor (FSR), child called Child Abuse Detecting System (CADS) that can automatically
abuse detection, sympathetic nervous system monitoring, wireless detect child abuse in real-time by monitoring physiological
sensor networks, parameters and physical force applied to a child's body.

Child abuse detection, ESP8266 microcontroller, Internet of Things The main objective is to develop an IoT-based child abuse detection
(IoT), real-time monitoring, pulse sensor, force sensor, accelerometer, system that can monitor children's safety in real-time using various
GPS tracking, Blynk IoT cloud platform, emergency alert system sensors and provide immediate alerts to caregivers when potentially
abusive situations are detected
Smart Information Systems (SIS), artificial intelligence, machine The main objective is to develop a rigorous empirical methodology
learning, big data analytics, ethics, human rights, case study for investigating ethical and human rights aspects of Smart
methodology, empirical research, policy development Information Systems across multiple domains, providing evidence-
based insights to inform policy development rather than relying on
anecdotal evidence or conceptual considerations.

Cloud Computing; E-education; SaaS; PaaS; IaaS; National Cloud To provide the design of a model for a national CC e-education
Infrastructure. infrastructure as strategy to address the inadequacy of ICT
infrastructure in developing countries.

e-bidding, e-whistleblowing, anti-corruption tools, collective action To determine if an online reporting platform (e-whistleblowing) is an
problems, public procurement effective anti-corruption tool for detecting corruption in Thailand,
considering collective action problems.
patient safety, incident reporting, primary care, web-based system, To identify key requirements for and develop an Internet-based
literature review, expert panel system for incident reporting and learning in primary care.

attacks on healthcare, surveillance, human rights violations, evidence To examine the development and implementation of the WHO SSA
base as a systematic mechanism to collect and disseminate data on attacks
on healthcare in humanitarian crises.
HIV, human rights violations, discrimination, Ghana, legal services, To present findings on a discrimination reporting system in Ghana
case management for people with HIV and key populations and discuss its impact.

social justice, digital platform, think-tank, COVID-19, poverty, To create an "action-oriented digital platform" to assess the impact of
inequality COVID-19 and policy responses from a social justice perspective.

digital governance, rule of law, digital platforms, artificial To explore the evolving relationship between digital power and the
intelligence, big data, legal frameworks rule of law, focusing on how traditional legal frameworks are
adapting.
web-based reporting, anonymity, confidentiality, user satisfaction, To evaluate a web-based incident reporting system for its
non-punitive culture effectiveness in promoting reporting, user satisfaction, and system
security in Taiwan.

E-mail; Security; Mail security; Network; Internet; Web browser The study highlights the need for a secured credentials for
authenticating e-mail received. To this it proposes a framework of E-
mail Vouchasing System.

patient safety, incident reporting, primary care, web-based system, To identify key requirements for and develop an Internet-based
literature review, expert panel system for incident reporting and learning in primary care.
DATA COLLECTION METHOD
(A) Issues: the major problems that motivated the research
The major problems that motivated the research were the inefficiencies and limitations of the
manual self-reporting system used in the Teacher Professional Education (PPG) program. The
traditional process relied on in-person submissions and paper forms, which caused delays, data
inaccuracies, and administrative complexities.

In this study, data collection was carried out through interviews, observations, and document
studies. Interviews were conducted with stakeholders, including administrators and students,
to gather insights into the problems and needs of the existing manual reporting system.
The researchers gathered data through requirement analysis involving interviews, surveys, The study was motivated by several problems in the existing manual system: 1. Data redundancy
and discussions with stakeholders. This helped them identify functional and non-functional and risk of loss. 2. Delays in processing internship permits. 3. Lack of real-time tracking of
requirements. Validation of the system was performed using black-box testing and expert application status. 4. Inefficient communication between students, supervisors, and administrators.
evaluation with a 5-point Likert scale. 5. Vulnerability of printed evaluation rubrics to damage or loss.

The study is conceptual and literature-based, drawing on case studies, policy documents, and The study identifies several pressing issues: i. Over-reliance on digital tools that may expose
reports from human rights organizations. Unlike system development research, this article victims to surveillance. ii. Digital divides that exclude vulnerable populations. iii. Data overload
emphasizes critical analysis of secondary sources rather than primary empirical testing. without mechanisms to ensure accountability. iv. Security concerns in handling sensitive human
rights data.

The researchers used direct field observations and interviews with the institution Key problems identified in manual reporting: [Link]-consuming physical report submission. ii.
(Diskominfo) to gather requirements. System creation followed structured steps: Difficulty in tracking multiple interns spread across locations. Iii. Inefficiencies, delays, and
wireframing, low-fidelity (Lo-Fi) design, high-fidelity (Hi-Fi) mockups, coding (HTML, inaccuracies in progress monitoring.
CSS, PHP, JavaScript), and monitoring.
The researchers employed a comprehensive mixed-methods approach that combined initial The study identified several critical problems with the existing manual reporting system that
observations and stakeholder interviews with officials from the Aceh Provincial Health significantly impacted emergency response effectiveness. These issues included substantial delays
Agency, followed by field investigations of existing manual reporting processes at the in information delivery during health crises due to paper-based processes, poor management and
Municipal Health Agency of Banda Aceh. inadequate database documentation, lack of real-time data updates despite emergency situations
requiring immediate response, manual data entry and archiving causing inefficiencies in crisis
management, and coordination challenges between different health organizations during disasters.

Data was collected remotely using a web-based, multimodal platform with a virtual human Traditional clinical trials in neurodegenerative disorders have used methods like examination-
guide. Participants completed 23 structured exercises across two sessions, one week apart, based outcomes and scales that may not optimally convey therapeutic efficacy. These tools might
which recorded speech, facial movements, and cognitive behaviors. The platform also show "how much" change occurs, but not the "so what," or the personal significance of that
captured unfiltered, verbatim self-reports from participants about bothersome problems and change
their functional consequences.

The researchers implemented their data collection through a comprehensive pilot study The research identified several critical problems plaguing traditional travel diary collection
involving 53 students from the Karlsruhe Institute of Technology, conducted over a complete methods, including the substantial respondent burden that inevitably leads to survey fatigue and
week from Monday to Sunday during November 2021. Their methodology included sending participant attrition during multi-day data collection periods, significantly declining response rates
daily email reminders at 8 PM containing direct links to the survey, utilizing web-based across various demographic groups making representative sampling increasingly difficult, serious
interactive maps for precise location reporting, implementing a two-stage trip reporting privacy concerns associated with GPS tracking methods that require installation of applications on
process that first captured location selection followed by detailed trip information, participants' personal devices, the considerable workload imposed on survey designers for data
administering supplementary questionnaires that covered socio-demographic characteristics preparation and comprehensive plausibility verification processes, systematic under-reporting of
and general mobility patterns, and conducting comparative analysis with official German short-distance trips particularly involving walking and cycling activities, and significant cost
household travel survey data from the MiD 2017 study. barriers created by proprietary survey systems that limit accessibility for research projects with
constrained budgets.

The researchers relied on secondary data obtained from literature on online abuse, cybercrime The major problems that motivated the research include: 1. The rise of online child abuse cases
statistics, and existing child protection agencies. They also analyzed patterns of online child worldwide. [Link] of a reliable, secure, and anonymous reporting mechanism for victims and
abuse to design the reporting framework. guardians. 3. Inadequate tracking and response mechanisms from authorities. 4. Fear of stigma
and victimization that prevents reporting.
The researchers gathered data primarily through secondary sources such as literature reviews, The key problems that motivated the research include: 1. Rising cases of cyberbullying and
documented cases of cyberbullying, and digital forensic standards. The system was tested harmful online activities. [Link] in gathering reliable digital evidence that can stand in court.
using simulated data from social media interactions to demonstrate its forensic capabilities. 3. Lack of tools for proper preservation and analysis of online evidence. 4. Victims’ reluctance to
report due to fear of retaliation and lack of trust.

The researchers employed a systematic literature review of existing research, reports, and The problem motivating this research is the growing prevalence of child sexual abuse cases and
policy documents. They analyzed eight related papers and a base project to identify gaps and the absence of mobile-based applications specifically dedicated to reporting such crimes.
design the proposed system. Data for testing was generated through system prototyping and Traditional methods of reporting, such as police visits or calls, are often slow, inefficient, and
simulation rather than real-world deployment. discourage victims due to stigma and delays in response

The researchers used a custom-designed web crawler with snowball sampling, starting from Traditional CSAI detection methods relying on hash values and keywords have significant
10 seed websites known to distribute CSAM, and analyzed 103 websites containing 8,108 limitations, including inability to detect modified images, new content not yet cataloged, and
known CSAI hash values provided by the Royal Canadian Mounted Police database ineffectiveness for organizations without access to hash databases.

The researchers employed an explanatory sequential mixed methods approach using Healthcare providers face challenges in following complex clinical guidelines for child sexual
quantitative surveys (Post-Study System Usability Questionnaire and Acceptability e-Scale) abuse cases due to the complexity of exams and procedures, making it difficult to locate
followed by qualitative interviews, observations, and documentation with four pediatric appropriate guideline information quickly during critical patient care situations.
Sexual Assault Nurse Examiners.

The researchers collected data from multiple sensors (heart rate, GSR, and FSR) embedded in Child abuse cases often go unreported due to cultural taboos and children's inability to
E-Textile wearable devices, testing on children aged 8-12 years in both normal scenarios and communicate their experiences, with existing detection systems requiring manual activation by
simulated fear-inducing environments to validate system effectiveness. victims and producing false alarms due to limited physiological parameters.

The researchers used experimental testing methods including sensor functionality tests under The study addresses the global problem of child abuse which affects millions of children
different conditions, GPS accuracy measurements in various environments, emergency button worldwide, leading to severe physical, emotional, and psychological consequences. Traditional
response time testing, video streaming performance evaluation, and user acceptance testing detection methods are often reactive rather than proactive, making early intervention difficult.
with caregivers.
The researchers employed a multiple case study approach involving 10 parallel case studies The study addresses the lack of systematic empirical investigation into the ethical and human
across different domains, using semi-structured interviews (minimum one per case), rights implications of Smart Information Systems in real-world environments, with most existing
document analysis, background research, and qualitative data analysis through NVivo research being based on anecdotal evidence or limited to specific technologies without broader
software with thematic analysis techniques. overview.

The study carried out literature of research in CC and proposed a model for a national CC e- The current low funding of HEIs in Nigeria and the inadequacy of ICT infrastructure needed for
education infrastructure Nigerian Higher Education Institutions. HEIs to achieve their economic development mandates. The study attributes the lack of ICT
infrastructure and services to inadequate government funding.

Mixed methods methodology, including in-depth interviews with Thai public authorities and In a country with endemic corruption, digital anti-corruption tools like e-whistleblowing may not
statistical data on corruption cases. be effective on their own to detect corruption and overcome collective action problems.

Systematic literature review and a consensus procedure by an international expert panel. The study notes that incident reporting is a critical first step in learning from errors, but traditional
methods may be prone to under-reporting and biased data.

Thematic analysis of the SSA interface, and informant interviews with key stakeholders. Data The persistence of violence against healthcare, especially in humanitarian crises, has prompted the
was collected from eyewitness and secondary accounts. need for systematic monitoring mechanisms to alleviate these harms.

Mixed methods, including in-depth interviews, capacity assessments, and case analysis data People living with HIV and key populations face human rights violations and discrimination that
from the reporting system. affect their access to health services, housing, and employment.

The document does not specify a data collection method, but the platform is a think-tank. The need to assess the social justice impact of the COVID-19 pandemic on issues like poverty,
inequality, and mental health.

A mixed-methods approach that combines theoretical analysis, case study review, and legal Traditional legal frameworks are struggling to adapt to the fluid, decentralized, and borderless
framework evaluation. nature of digital technologies like AI, big data, and social media. This raises concerns about
individual rights, fairness, and privacy.
A survey answered by 249 nurses and a comparison of reported incidents in paper and Organizational and individual barriers to reporting incidents include time pressure, fear, unknown
electronic systems. consequences, and a lack of awareness.

The study presents augmentation definition, motivation, and taxonomy of augmentation The study notes that university systems are confronted with challenges such as increased demand,
types, including traditional and cloud-based. It analyzes state-of-the-art CMA approaches and higher delivery costs, and reduced budgets, which pressures administrators to find alternative
classifies them into four groups. ways to meet the needs of learning and research.

Systematic literature review and a consensus procedure by an international expert panel. The study notes that incident reporting is a critical first step in learning from errors, but traditional
methods may be prone to under-reporting and biased data.
(B) The solution the study suggests for the issue (C) The type of system design and data analysis
The study suggests developing a web-based self-reporting information system The study employed a Waterfall system development design, which included stages such as
using PHP and MySQL as a solution to the inefficiencies of the manual requirements analysis, system design, implementation, testing, and evaluation. For data analysis
process. This system provides online forms for students, document upload and system structuring, the researchers used Data Flow Diagrams (DFDs) to model data
features, and automated data management with administrator verification, movement and processes, and an Entity Relationship Diagram (ERD) to design and analyze
enabling faster, more accurate, and transparent reporting for the Teacher database relationships, ensuring the system effectively managed reporting data.
Professional Education (PPG) program.

The researchers proposed a web-based licensing system with features such as: System Design: The Waterfall Model was used, consisting of requirement analysis, design,
1. Digital application submission and verification. 2. Role-based dashboards development, testing, and maintenance. UML diagrams (use case, activity, and sequence) guided
for different users (Admin, Student, Operator, Supervisor, Division Head). 3. the design.
Real-time status tracking and notifications. 4. Digital logbook and report Data Analysis: System performance and usability were analyzed through expert validation using
submission. 5. Secure document management. Likert scales, yielding quantitative scores and qualitative feedback

The authors propose a critical, balanced approach to digital human rights System Design: The article does not present a new system design. Instead, it critiques existing
reporting systems, which includes: i. Building safeguards for data privacy and approaches to digital human rights monitoring.
security. ii. Ensuring equitable access across different populations. iii. Using Data Analysis: The analysis is qualitative, focusing on case studies and discourse analysis of
technology to complement—not replace—traditional human rights work. iv. human rights reporting practices.
Developing ethical frameworks for digital evidence gathering.

The solution was a web-based internship reporting system with: i. Activity System Design: Structured SDLC approach: Wireframe → Lo-Fi → Hi-Fi → Coding →
logs. ii. Real-time progress tracking. iii. Automated report generation. iv. Easy Deployment → Monitoring.
communication between interns and supervisors.
Data Analysis: Functionality was validated through direct use in the Medan City Communication
and Information Service.
The researchers developed a comprehensive web-based health crisis reporting The researchers implemented a spiral development methodology consisting of four distinct
system that featured a secure login system with user access controls, three stages: concept development, application design, development and trial, and evaluation. The
main reporting modules covering initial disaster reporting, rapid needs system was constructed using web technologies including Windows OS, XAMPP server, and
assessment, and disaster development tracking. The system included data Notepad++ for development. For data analysis, they employed heuristic review analysis to
entry, editing, and deletion capabilities, automated report generation and evaluate system performance, measuring user satisfaction across multiple usability criteria
printing functions, and a user-friendly interface with help documentation and including interface design, data management features, search functionality, and help system
operational guidelines. effectiveness.

The study suggests a complementary approach that uses of digital biomarkers The system was a web-based, multimodal platform with a virtual human guide that automatically
to detect physical changes and combines them with direct participant self- extracted 238 speech, 1450 facial, and 21 text features. For data analysis, the researchers used
reports on their sources of suffering. This approach is delivered via an easily nonparametric Kruskal-Wallis tests to find statistically significant differences between cohorts
accessible, web-based digital platform that can capture both objective (P<.01). They also performed
measures from multiple modalities and subjective, self-reported data at scale

The research team developed a comprehensive interactive travel diary solution The system architecture employed a modular, web-based design utilizing HTML and JavaScript
featuring a sophisticated web-based interface built using open-source for comprehensive frontend development, the Leaflet library for sophisticated interactive
JavaScript libraries, specifically Leaflet, combined with OpenStreetMap data. mapping functionality, OpenStreetMap as the foundational base map data source, GeoJSON
format for efficient zone polygon data management, and RESTful API integration for real-time
travel time validation processes. The data analysis methodology involved comprehensive
quantitative analysis comparing pilot study results directly with MiD 2017 benchmark data,
including statistical t-tests for significance testing, detailed longitudinal analysis of participant
reporting patterns over time, and advanced spatial analysis utilizing heat maps and Geographic
Information Systems technologies for comprehensive mobility pattern visualization.

The study proposes a web-based reporting system that ensures anonymity, System Design: The system was developed using a web-based architecture with a client-server
secure data handling, and efficient reporting of abuse cases. The system model. It employed a user-friendly interface for reporting abuse, secure login for administrators,
incorporates features for reporting, offender identification, database and a database to store reports.
management, and information sharing with relevant agencies for intervention.
Data Analysis: Reports collected are categorized, validated, and analyzed statistically to detect
trends and monitor offender behavior.
The study proposes a web-based forensic system capable of: 1. Identifying System Design: The system follows a web application architecture that integrates forensic tools
harmful social media interactions.2. Collecting and preserving digital evidence with a backend database for storing collected evidence. It includes modules for data extraction,
securely. 3. Providing structured forensic reports for investigators. evidence hashing, and secure storage.
Data Analysis: The system analyzes user interactions, categorizes abusive content, and applies
forensic standards (e.g., chain of custody) to ensure admissibility of evidence in court.

The study suggests a cloud-based Android application where users (victims, The system follows a Model-View-Controller (MVC) architecture. The Model is implemented in
witnesses, or guardians) can report incidents directly to relevant organizations. Java for processing user inputs, the View is handled through XML files for the interface, and the
The system integrates real-time data storage using Firebase, GPS location Controller links data to Firebase’s real-time database. The analysis includes secure user
tracking, and user authentication to ensure reliability, privacy, and quick authentication, GPS location tagging, and cloud data storage to facilitate traceability and faster
response. case management.

The study proposes using structural website analysis including folder The system design involved a custom web crawler for automated data collection with quantitative
organization patterns (particularly year/month structures), file naming analysis of folder structures and qualitative examination of naming patterns across hosting versus
conventions, and image location patterns as additional detection criteria to displaying websites.
complement existing hash-based methods.

The study proposes SACA, a mobile application that follows CHAMP The system used an explanatory sequential mixed methods design with quantitative analysis of
program guidelines to provide step-by-step decision support, allowing usability and acceptability scores, combined with qualitative thematic analysis of interview
healthcare providers to access relevant clinical information quickly and transcripts, observation notes, and documentation from user interactions with the mobile app.
systematically during child sexual abuse examinations and treatment.

CADS proposes an automatic detection system using a combination of heart The system employs IoT architecture with ESP8266 and ESP32 microcontrollers, cloud-based
rate sensors, GSR sensors, and force sensitive resistors embedded in E-Textile data processing through [Link] platform, statistical analysis using standard deviation
innerwear that monitors sympathetic nervous system activation and physical calculations, and real-time dashboard monitoring with GPS/GSM alert mechanisms for parents.
force to detect abuse without manual intervention

An integrated IoT system combining multiple sensors (pulse, force, The system uses a modular hardware design with ESP8266 as the central processing unit
accelerometer), GPS tracking, ESP32 camera, and emergency push button integrating various sensors. Data analysis involves threshold-based detection algorithms for
connected through ESP8266 microcontroller to Blynk cloud platform for real- sensor readings, real-time data transmission to cloud platform, and mobile app interface for
time monitoring and automated alert generation to caregivers. caregiver monitoring.
[Link] SolutionA comprehensive multiple case study framework The system design follows an interpretive case study methodology with standardized protocol,
covering 10 different application domains (government, healthcare, using NVivo qualitative data analysis software for thematic analysis, weekly progress monitoring,
agriculture, energy, etc.) using standardized case study protocol, interpretive peer review processes, and cross-case analysis to identify common patterns and anomalous issues
research paradigm, and cross-case analysis to provide broader insights into across different domains.
ethical issues across SIS implementations.

The study proposes a model for a national CC e-education infrastructure as a The study conducted a literature review of research in CC and proposed a model for a national
strategy to address the inadequacy of ICT infrastructure in developing CC e-education infrastructure for Nigerian HEIs.
countries. The researchers proposed that the government should adopt CC and
provide a national CC platform for HEIs to access educational and research
materials.

The study proposes that e-whistleblowing platforms could lower the perceived Mixed methods approach combining qualitative (interviews) and quantitative (regressions,
cost of being a whistleblower, thereby facilitating reporting and corruption statistical data analysis) methods.
investigation.
A freely available, web-based reporting system was developed for The design involved a literature review and expert panel consensus to develop the system's
practitioners and researchers to record patient safety incidents and learn from criteria. A small demonstration project created the system.
errors.
The WHO developed the Surveillance System of Attacks on Healthcare (SSA) The system collects and disseminates data concerning attacks, with data being classified as direct
to monitor attacks against healthcare systems and provide a foundation for or indirect, targeted or untargeted. The impact is measured by injuries and deaths.
accountability for human rights violations.
A discrimination reporting system was developed, managed by the The methodology included in-depth interviews and capacity assessments. Data analysis used
Commission on Human Rights and Administrative Justice (CHRAJ) in Ghana, Excel for quantitative scores and thematic coding for interview data. Case data was anonymized.
to link victims to legal services.

A digital platform to act as a think-tank and social justice accelerator to The platform is "action-oriented". No further system design or data analysis details are provided.
address these issues.

The article argues that the rule of law must evolve to address these challenges Mixed-methods approach that combines theoretical analysis, case study review, and legal
and ensure that technological innovation does not come at the expense of framework evaluation.
democratic values, individual rights, and social justice.
A web-based reporting system that provides anonymity and confidentiality to The study evaluated system user satisfaction, willingness to report, and the number of reports by
promote a "Just Culture" of non-punitive reporting. comparing the web-based system to a paper-based one.

The study proposes a framework of an E-mail Vouchasing System. The study presents augmentation definitions, motivations, and taxonomy of augmentation types,
including traditional and cloud-based. It also analyzes state-of-the-art Cloud Maturity Assessment
(CMA) approaches, classifying them into four groups.

A freely available, web-based reporting system was developed for The design involved a literature review and expert panel consensus to develop the system's
practitioners and researchers to record patient safety incidents and learn from criteria. A small demonstration project created the system.
errors.
CONCEPTS

(D) The results: major findings of the study


The major findings of the study show that the web-based self-reporting information system successfully improved the
efficiency, accuracy, and speed of the Teacher Professional Education (PPG) reporting process. Key outcomes include
easier student self-reporting through online forms, streamlined document uploads, effective data verification by
administrators, and automated data export to Excel. Overall, the system reduced administrative workload, enhanced
transparency, and increased student engagement compared to the old manual reporting method

The system met all identified requirements, supporting five distinct user roles.1. Black-box testing confirmed functional
correctness.
2. Expert validation scored the system 94.66% (very feasible). 3. Users praised the system’s intuitive interface and real-
time tracking.

The findings suggest that while digital systems can enhance the speed, reach, and scope of human rights reporting, they
also introduce new risks of surveillance, exclusion, and misuse of data. Thus, technology must be used carefully, with
clear accountability measures.

The website streamlined reporting, saving time and reducing workload.


Enabled supervisors to monitor and evaluate intern progress more effectively .Improved transparency and efficiency in
government documentation.
The system testing revealed highly positive outcomes across all measured parameters. The results showed that 87.5% of
participants found the application interface commands easy to locate, while 91.0% expressed satisfaction with data editing
and deleting features. Additionally, 85.8% found the search and information retrieval functions effective, and 88.3% rated
the help and assistance functions as satisfactory, leading to an overall user acceptance rate of 89.4%, which indicated
strong system viability.

The web-based platform was feasible and easy to use for the MCI veteran cohort, with recruitment completed in six
weeks. Facial features, particularly lip aperture, were the most effective at differentiating MCI from controls, accounting
for 10 of the 13 measures that showed a statistically significant difference

The study produced several significant findings, including a notably higher trip reporting rate of 3.9 trips per person per
day compared to 3.6 in traditional survey methods, substantially improved reporting accuracy for short-distance trips with
walking trips increasing from 27% to 31% and cycling trips from 23% to 31%, dramatically reduced survey completion
time averaging 5-6.5 minutes per day compared to 10 minutes reported in comparable traditional studies, complete
absence of reporting fatigue effects typically observed over extended survey periods, successful capture of detailed spatial
mobility patterns while maintaining strict privacy protection standards, and achievement of a 44% completion rate for
participants completing at least six days of the survey period, though attrition remained a persistent challenge.

The system prototype successfully demonstrated that victims or guardians can report child abuse incidents securely and
anonymously. The design enhanced trust and willingness to report while allowing authorities to access structured data for
prompt action.
The prototype demonstrated the ability to: [Link] abusive interactions on social media. 2. Preserve evidence using
hashing to prevent [Link] forensic reports that could assist in legal processes.

The prototype testing confirmed that the system increases the speed of reporting and managing child sexual abuse cases.
Screenshots from the implementation, such as the user login page, home page, and crime report interface, demonstrated
that the platform is functional and user-friendly.

Key findings show that 61% of displaying websites store CSAI in root folders, 68% of hosting sites use year/month
organization, only 20% of websites both host and display content, and most sites make minimal efforts to conceal their
illegal content.

SACA demonstrated high usability scores (5.05 ± 1.83) and acceptable acceptability scores (3.81 ± 1.22), with users
completing tasks faster using the app (2 minutes) compared to paper guidelines (2.58 minutes) while maintaining similar
accuracy rates (67%).

Testing showed significant differences between normal and fear-inducing scenarios with average standard deviations of
approximately 13 for heart rate, 31 for GSR values, and 950 for FSR readings, demonstrating the system's ability to detect
sympathetic nervous system activation.

Pulse sensor showed 25 BPM increase during simulated distress, force sensor accurately detected pressures above 10N,
accelerometer detected sudden movements within 2 seconds, GPS accuracy was within 5 meters outdoors and 10-15
meters indoors, emergency alerts triggered within 1 second, and 85% user satisfaction was achieved.
The study successfully developed and implemented a robust methodology for conducting 10 case studies across diverse
domains, established a comprehensive case study protocol, created a replicable framework for ethical analysis of SIS, and
demonstrated the feasibility of large-scale empirical research in AI ethics.

The study finds that national education CC infrastructure will empower HEIs to fulfill their mandates by providing
ubiquitous access to educational services and resources for researchers, students, and administrators. It also suggests that
adopting CC for education offers significant cost savings for governments.

The study found that online tip-offs from the e-whistleblowing platform were less effective at assisting with corruption
investigations.

A web-based reporting form was developed that can be modified for local contexts. Pilot studies confirmed it could be
used regardless of how primary care is organized.

The system successfully collected data on 1503 verified attacks in Ukraine, showing that 83% of attacks involved heavy
weapons and 37% occurred in the initial weeks of the war.

The system streamlined case management, improved relationships between civil society and government, and increased
stakeholder knowledge and commitment.

The provided articles do not contain findings or results from the platform's use.

The study focuses on understanding how the rule of law can be adapted to ensure fairness, accountability, and justice in
the digital realm.
The web-based system was used more often than the paper system. Anonymity and confidentiality were key features for
user satisfaction. Incident reporting increased by 33.6% after implementation.

The study proposes a five-stage adoption strategy which includes: 1) developing knowledge about Cloud Computing
(CC), 2) evaluating the current IT needs, structure, and usage of the university, 3) experimenting with CC solutions, 4)
choosing a CC solution, and 5) managing the chosen solution. It also finds that CC enables an organization to implement
services with usage-based billing and dynamically upgrade based on requirements without consulting the provider.

A web-based reporting form was developed that can be modified for local contexts. Pilot studies confirmed it could be
used regardless of how primary care is organized.
(E) The implications of the study
The implications of the study are that implementing a web-based information system can
significantly improve administrative processes in educational institutions by ensuring data
efficiency, accuracy, and transparency. For the Teacher Professional Education (PPG) program,
the system not only simplifies self-reporting for students but also reduces the workload for
administrators and enhances the quality of academic services.

The study demonstrates that a structured development approach can improve administrative
efficiency and transparency in public institutions. It also provides a reference model for digital
transformation in government services, particularly in managing internship and educational
programs.

The research underscores the importance of ethical digital innovation in human rights. It warns
that poorly designed systems could harm the very people they aim to protect, while well-designed
systems can improve justice delivery and global accountability

The study shows how digital transformation in government institutions improves transparency,
accuracy, and efficiency.
This research demonstrates significant potential for improving disaster response capabilities,
particularly in developing countries with limited technological infrastructure. The system could
substantially reduce response times during health emergencies, improve data accuracy and
accessibility, and enhance coordination between health agencies.

The research suggests that remote monitoring technologies combined with patient self-reports can
provide a rich and practical method for assessing MCI. The platform's ease of use and
accessibility holds promise for improving participation in clinical trials for populations that
traditionally have limited access.

The research demonstrates substantial potential for enhancing data quality in transportation
planning through significantly improved capture of short-trip data that is traditionally under-
reported, enabling cost-effective survey implementation particularly beneficial for organizations
operating with limited research budgets, improving survey accessibility for typically under-
represented demographic groups such as students who are difficult to reach through conventional
methods, providing privacy-compliant spatial data collection methodologies suitable for urban
mobility analysis applications, reducing survey designer workload through comprehensive
automated validation processes, and offering open-source availability that enables widespread
adoption and customization across diverse research contexts..

The system provides an effective tool for combating online child abuse by: [Link] more
victims to report incidents without fear. 2. Equipping child protection agencies with timely
information. 3. Reducing the gap between victims and law enforcement. 4. Contributing to safer
online environments for children.
The system has significant implications for:
1. Law enforcement – improved capacity to investigate cyberbullying.
2. Judicial systems – provision of admissible evidence.
3. Victims – encouragement to report cyberbullying, knowing evidence will be preserved
securely.
4. Research – providing a framework for future work on forensic investigation tools.

This research has significant implications for child protection efforts, enabling organizations to
respond faster to cases. It empowers victims and communities to report crimes without fear of
stigma. It also shows how cloud and mobile technologies can improve law enforcement and social
welfare systems in developing countries.

The research provides practical detection criteria for electronic service providers without hash
database access, enables more efficient automated scanning by focusing on high-probability
locations, and supports law enforcement in prioritizing hosting hubs over display sites

The research demonstrates that mobile applications can successfully support evidence-based
nursing practice in child abuse cases, potentially improving guideline adherence, reducing
decision-making time, and enhancing interprofessional team collaboration in emergency
healthcare settings.

The research provides a proactive approach to child protection through automated detection,
enables real-time parental monitoring, reduces dependency on victim reporting, and contributes to
IoT-based safety solutions for vulnerable populations in developing countries.

This research demonstrates the potential of IoT technology in child protection by enabling
proactive abuse detection rather than reactive responses. It could significantly improve early
intervention capabilities and provide continuous monitoring without requiring constant human
supervision.
This research provides a methodological foundation for empirical investigation of AI ethics,
offers policymakers evidence-based insights rather than theoretical speculation, demonstrates how
systematic case study research can inform responsible development of emerging technologies, and
establishes a replicable framework for future research.

Developing countries like Nigeria are realizing that ICT can be used for education, wealth
creation, poverty eradication, job creation, and to achieve global competitiveness. To achieve this,
there is a need to shift focus to implementing Information Technology (IT) policies, especially in
the higher education sector.

Digital technology can enhance public procurement and whistleblowing, but without institutional
preconditions like political will and strong civil society, these direct interventions are less likely
to be effective.
The system can improve patient safety by encouraging a focus on eliminating shortcomings and
highlighting shared responsibility among the entire practice team.

The SSA provides an evidence base for developing protection and mitigation measures and
identifying areas for future in-depth investigation.

The study demonstrates that strong partnerships and mediation tools can be effective even without
a strict legal framework for every violation.

The platform aims to catalyze the process of ending poverty and equalizing life opportunities.
Being on a powerful women list provides a platform for marketing the research work and getting
stakeholder buy-in.

The article highlights the need for legal frameworks that can ensure accountability, fairness, and
transparency in the digital world while respecting individual rights and freedoms.
The study highlights the importance of promoting a non-punitive "Just Culture" combined with a
user-friendly system to increase reporting rates and improve patient safety.

The study implies that adopting a CC strategy in HEIs will transform IT from capital expenditure
(CAPEX) into operational expenditure (OPEX) for provisioning IT infrastructures.

The system can improve patient safety by encouraging a focus on eliminating shortcomings and
highlighting shared responsibility among the entire practice team.
(F) The missing link: the inadequacy of the study
The system was only tested within one department at Malikussaleh University, raising concerns about scalability to larger
or more diverse institutions. Additionally, while the authors highlight improvements in efficiency and accuracy, the study
provides little quantitative data or user satisfaction analysis to validate these claims. The reliance on PHP and MySQL,
though effective, also limits discussion of more modern or scalable technologies. Finally, the study does not compare its
system with alternative solutions, leaving a gap in understanding how it performs against existing platforms.

The study has limitations: 1. Evaluation was conducted in a controlled environment with a limited number of expert
respondents. 2. Lack of integration with national academic portals and government databases.3. Mobile version still needs
full optimization.

Lack of concrete technical frameworks or prototypes for implementing safe reporting systems.
Limited discussion on user-centered design for victims or grassroots communities.
Insufficient exploration of legal and institutional integration (e.g., linking reports to courts or law enforcement)

1. Limited evaluation beyond one institution.

2. No integration with broader government or educational systems.

3. Lacks features for security, privacy, or scalability.


The research scope was limited to the Aceh Tengah region, reducing the generalizability of findings to other contexts.
Furthermore, the study lacked discussion of mobile compatibility or offline functionality for remote areas, showed no
integration with existing national health information systems, provided insufficient details about data security and privacy
protection measures, and failed to address system scalability and maintenance requirements.

The study's limitations include that the findings are exploratory, and the statistically significant differences for the
biomarkers were not corrected for multiplicity. It's unclear how generalizable the results are to more diverse populations,
since the study was conducted on a specific veteran cohort.

The study revealed several important limitations and research gaps, including sample restriction to educated, technology-
savvy students which raises significant concerns about generalizability to broader populations, persistent substantial
attrition rates reaching 56% by the seventh day despite the implementation of interactive features designed to maintain
engagement, lack of comparative analysis with other modern survey methodologies beyond traditional paper-based
approaches, limited evaluation of system usability across different age groups and varying levels of technical competency,
absence of follow-up questionnaires that could have assessed user experience and identified specific usability problems,
and insufficient analysis of potential gender bias toward male participants that might be inherent in technology-based
survey approaches.

Lack of primary data collection (e.g., surveys, interviews with victims, or law enforcement) to validate the system’s
effectiveness. 1. No detailed testing with real-world users (children, guardians, agencies). 2. Limited discussion of ethical
and privacy concerns in handling sensitive reports. 3. Scalability and integration with existing child protection
infrastructures remain unclear
The study relies heavily on simulated data instead of real-world [Link] large-scale usability testing with actual
investigators or [Link] and privacy considerations were not deeply explored.
Limited scalability in terms of handling massive amounts of social media data.

The main limitations of the study are that it requires internet connectivity, which may hinder usage in rural areas.
Moreover, the system has not been tested with real-world users or integrated into official law enforcement frameworks.
Ethical considerations regarding sensitive child data are also not fully addressed.

The study is limited to publicly accessible Surface Web sites, focuses only on known hash values, lacks analysis of Dark
Web operations, and doesn't examine video content or commercial/private platforms requiring registration.

The study is limited by an extremely small sample size (n=4), lack of demographic diversity, absence of real-world
patient testing, unmeasured digital literacy levels, and no evaluation of long-term adoption or effectiveness in actual
clinical environments.

The study lacks comprehensive validation with larger sample sizes, long-term reliability testing, privacy and security
considerations, ethical approval documentation, comparison with existing commercial solutions, and evaluation of false
positive rates in various daily activities

The study lacks discussion of privacy and ethical concerns regarding continuous monitoring of children, has no evaluation
of long-term system reliability, provides insufficient details about false positive rates, and offers no comparison with
existing child protection systems or cost-benefit analysis
The study lacks presentation of actual findings from the 10 case studies, provides limited discussion of cross-case analysis
results, offers insufficient details about specific ethical issues discovered, has no validation of the methodology's
effectiveness in identifying previously unknown ethical concerns, and lacks comparison with other empirical approaches.

The research did not provide empirical or practical application of CC to the current ICT infrastructure situation in the
Nigerian higher education system. The study also notes that the adoption of CC on a national scale has been very low, and
it requires adequate cloud readiness, which is dependent on the availability of reliable internet.

The study lacks a direct evaluation of the system's effectiveness beyond anecdotal evidence and general statistical data on
corruption cases.

The system's feasibility was not extensively tested in practice, and the expert team did not represent all European
countries.

Refinements are needed to strengthen political prioritization, research methodology, and institutional implementation to
ensure accountability for violations.

The study noted challenges with infrastructure (intermittent internet/phone access) and human resource gaps, which
negatively affected the system. The system also required extensive training for staff.

The articles provide very limited information about the platform's features, purpose, or impact. There is no information on
its actual use or outcomes.

The article does not present a new system design or practical prototype.
The study revealed that junior staff had lower satisfaction scores, and it lacked a focus on physician involvement.

The study did not include the implementation effects of Cloud Computing in a specific use case. It also notes that the
risks and benefits of cloud architecture must be properly considered for a fit-for-purpose model. A successful cloud
migration strategy should align the university's architecture with CC features.

The system's feasibility was not extensively tested in practice, and the expert team did not represent all European
countries.
(G) Solution to the study inadequacy/application of knowledge COMMENT
The value added to knowledge on CC & practical guide provided are adaptable to the HEIs' An empirical study. Summary of literature; info on data collection.
structure. CC adoption requires cultural & organisational and technical changes. HEI system must
be Service Oriented Architecture (SOA) [Link] Environment will facilitate the
development of security policies & access control to lessen the security risk. Best practice
suggests five steps adoption strategy include: developing the knowledge base about CC; evaluate
the present state of the HEI's - IT needs, structure & usage; experiment the CC solutions; choose
the CC solution & mgt of the CC solution.

Future improvements could include:1. Broader field testing involving diverse end-users (students, This study is well-structured and methodologically sound, successfully demonstrating the
supervisors, admin staff).2. Integration with government APIs and academic information systems effectiveness of web-based systems in solving administrative inefficiencies. While the scope of
for seamless data validation. [Link] the mobile application for broader accessibility. 4. testing was limited, the system lays a strong foundation for scalable adoption in public
Adding features such as push notifications, analytics dashboards, and onboarding guidance for institutions. It also provides valuable insights for similar projects, including your research on
first-time users. human rights violation reporting systems, since both rely on digital transformation, role-based
access, and real-time tracking mechanisms.

For future development (such as your dissertation project): i. Incorporate secure digital This article is a critical theoretical lens on the challenges and opportunities of digital human
infrastructures with end-to-end encryption and [Link]. Adopt participatory design, rights reporting. While it does not provide technical solutions, it is valuable for my work
involving victims, NGOs, and legal bodies in system [Link]. Ensure legal alignment, so because it highlights ethical, social, and political considerations that should guide the design of
reports can feed directly into judicial and policy processes. your reporting system.

To extend this study’s approach for your dissertation: This article demonstrates how a structured, web-based reporting system can replace inefficient
manual processes and enhance transparency. While it is limited to internship reporting, its
1. Conduct broader user testing across multiple stakeholders (victims, NGOs, legal aid). methodology and outcomes are directly transferable to human rights violation reporting,
2. Ensure integration with national human rights institutions and justice systems. especially in terms of workflow design, stakeholder communication, and real-time progress
3. Provide mobile-first and offline features for accessibility in remote or resource-limited areas. tracking
To address these identified gaps, future research should focus on conducting real-world pilot This study presents a valuable contribution to health informatics and disaster management
testing during actual health emergencies to validate system effectiveness under genuine crisis research, particularly relevant for developing countries facing technological infrastructure
conditions. Researchers should develop mobile-responsive versions with offline capabilities to challenges. While the research demonstrates strong technical competency and achieves
ensure accessibility in areas with poor internet connectivity, implement robust cybersecurity impressive user acceptance rates, the limited scope and controlled testing environment
measures and data protection protocols to safeguard sensitive health information, and design somewhat reduce its immediate practical applicability in real-world emergency situations. The
integration frameworks that allow seamless connection with existing health information systems. authors successfully identified a genuine and pressing problem in health crisis management and
developed a technically sound solution that addresses the core issues effectively.

Future work should address these limitations by conducting larger, longitudinal studies with more This is a well-structured and highly relevant study that effectively demonstrates the potential of
diverse populations to validate the findings and track the progression of MCI over time. combining remote digital biomarkers with patient-centered self-reports. The paper presents a
promising, accessible, and scalable solution to some of the key limitations of traditional clinical
trials in neurodege

Future research improvements should systematically address these identified gaps by expanding This study represents a well-executed and methodologically sound proof-of-concept that
studies to include larger, demographically representative samples that better reflect general successfully demonstrates the practical viability of interactive, web-based travel diaries as a
population characteristics, implementing comprehensive incentive systems specifically designed legitimate alternative to traditional survey collection methods. Th
to reduce participant attrition rates, conducting detailed comparative studies that include other
contemporary survey methodologies beyond traditional approaches, developing adaptive user
interfaces that accommodate different levels of technical skill and experience, incorporating
comprehensive usability evaluations and structured user feedback mechanisms throughout the
survey process, investigating potential applications in Computer-Assisted Telephone Interviewing
contexts, adding graphical trip summary features that allow participants to verify and validate
their reported information, and implementing separate reporting links specifically for non-mobile
days to reduce overall respondent burden.

Future research could: 1. Conduct user trials with children, parents, teachers, and law enforcement This study makes a valuable contribution by addressing a critical social issue—online child
to validate usability and effectiveness.2. Integrate advanced security features like blockchain for abuse—through a technical solution. Its strength lies in proposing a secure and anonymous
tamper-proof reporting. 3. Include AI-driven analysis to identify patterns of offender behavior. 4. platform for reporting. However, the lack of primary user testing and integration strategies limits
Develop partnerships with NGOs, schools, and government agencies for wider adoption. its real-world application. Strengthening empirical validation and ethical frameworks would
make it more impactful.
Future studies could: Test the system with real-world cyberbullying cases. This study provides a practical and timely contribution to the fight against cyberbullying by
Incorporate AI and machine learning for automatic detection of abusive content. focusing on digital forensics. Its strength lies in linking forensic principles with a web-based
Strengthen ethical frameworks and privacy safeguards. reporting system. However, the reliance on simulated data and the lack of empirical testing with
Collaborate with social media platforms for data access and large-scale deployment. real-world stakeholders reduce its immediate applicability. Expanding to real-world trials would
make it more impactful.

Future work should focus on offline functionality (reports syncing when internet is available), The study presents a relevant and timely solution to combat child sexual abuse reporting
real-world deployment with law enforcement and NGOs, and the inclusion of stronger encryption challenges. Its strength lies in leveraging Android and cloud technology for real-time crime
and privacy measures. AI could be introduced to detect patterns of abuse and prioritize urgent management. However, its reliance on internet connectivity and lack of empirical validation
cases. with actual victims or organizations limit its practical impact. Strengthening security, privacy,
and deployment in real environments will enhance its significance.

Future research should extend analysis to Dark Web platforms, include unknown hash values, This research provides valuable practical contributions to CSAI detection by identifying
examine video content patterns, test effectiveness on commercial sites, and develop machine exploitable patterns in criminal website organization, though its limitation to public Surface
learning models trained on these structural patterns. Web sites restricts generalizability to the broader ecosystem of child exploitation material
distribution.

Future research should include larger, more diverse samples, test the application in real clinical This preliminary study provides valuable insights into mobile health application design for
settings with actual patients, measure participants' digital literacy, evaluate long-term adoption sensitive healthcare contexts, though the extremely small sample size and controlled testing
rates, and assess the app's impact on patient outcomes and clinical decision quality. environment significantly limit the generalizability of findings to broader clinical practice
settings.

Future work should include extensive clinical trials with larger diverse populations, integration of This research addresses a critical social problem through innovative IoT technology, though the
machine learning algorithms for improved accuracy, privacy protection mechanisms, ethical limited testing scope and lack of comprehensive validation data raise questions about real-world
framework development, and collaboration with child protection services for practical applicability and the potential for false alarms in normal childhood activities.
deployment.

Future research should address privacy protection mechanisms, conduct longitudinal studies for This study presents an innovative application of IoT technology for child protection with
system reliability, develop machine learning algorithms to reduce false positives, compare promising preliminary results. However, the research would benefit from addressing ethical
effectiveness with traditional methods, and include comprehensive ethical framework for child considerations, conducting more rigorous validation studies, and providing clearer
monitoring systems. implementation guidelines for real-world deployment in child protection services.
Future work should present comprehensive cross-case analysis findings, validate the methodology This methodological paper makes a valuable contribution to AI ethics research by providing a
through comparison with other approaches, develop automated tools for scaling the methodology, rigorous empirical framework, though it functions more as a methodology description than a
create standardized ethical assessment frameworks, and establish longitudinal studies to track substantive research findings report. The systematic approach to case study research in AI ethics
ethical issues over time in SIS implementations is commendable, but the paper would be more impactful with inclusion of actual ethical findings
and cross-case insights.

The study mentions that provisioning and exploring National Cloud Strategies are trends among Not an empirical study. No data collected.
developed countries, citing examples like Japan's Kasumigaseki Cloud and the US Federal Cloud
Computing Initiative (FCCI).

This study highlights the need for a holistic approach, where technical tools are combined with An empirical study.
indirect anti-corruption strategies and institutional reforms to be effective.

Future studies should evaluate the implementation process of the model solution to identify A design and development study.
problems and survey user experiences.

The SSA provides a foundation for monitoring attacks, but needs to be strengthened to ensure An empirical study and analysis of an existing system.
accountability.

Human rights commissions should account for increased infrastructure and training needs for full An empirical case study.
adoption of a system.

Future work would require more information on the platform's design, functionality, and how it is A news announcement about a new platform. Limited details available.
used to assess impact.

This study provides a valuable theoretical framework for understanding the legal challenges that a A theoretical and legal analysis.
human rights reporting system would face and how to design it with legal principles in mind.
System implementation needs to be combined with a just culture, timely feedback, and more focus An empirical study.
on junior staff and physicians to improve satisfaction and reporting rates.

The study's value is added through knowledge on CC and a practical guide that is adaptable to An empirical study. Summary of literature; info on data collection.
HEIs' structures. It states that CC adoption requires cultural, organizational, and technical
changes, and that the HEI system must be Service-Oriented Architecture (SOA) compliant to
facilitate security policies and access control.

Future studies should evaluate the implementation process of the model solution to identify A design and development study.
problems and survey user experiences.
S/N DATABASE
1 African Journal Online
2 Research Gate
3 Biomedcentral.
4 Directory of Open Access Books (DOAB)
5 Directory Open Access Journals (DOAJ)

S/N DATABASE
1 Jstor
2 Ebscohost
3 Heinonline
4 ScienceDirect
5 Research4life
6 Agora
7 Oare
8 Ardi
9 Goali
URL
[Link]
https:[Link].

[Link]
[Link]

URL
[Link]
http//[Link]
[Link]

[Link]

[Link]
[Link]
[Link]
[Link]
[Link]
USERNAME PASSWORD
nasarawa library
ns016073 NSU2021@
Nsuk n2qbwc
abdulaliyu@[Link] nB#dKU3e@aGU74U

ag-nga053 AkwcWnhF

You might also like