{"id":"https://openalex.org/W4388938413","doi":"https://doi.org/10.1109/icccnt56998.2023.10306725","title":"Cyber Protection &amp; Awareness For Females in Bangladesh","display_name":"Cyber Protection &amp; Awareness For Females in Bangladesh","publication_year":2023,"publication_date":"2023-07-06","ids":{"openalex":"https://openalex.org/W4388938413","doi":"https://doi.org/10.1109/icccnt56998.2023.10306725"},"language":"en","primary_location":{"id":"doi:10.1109/icccnt56998.2023.10306725","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icccnt56998.2023.10306725","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5087763135","display_name":"Md Abrar Hamim","orcid":null},"institutions":[{"id":"https://openalex.org/I200606013","display_name":"Daffodil International University","ror":"https://ror.org/052t4a858","country_code":"BD","type":"education","lineage":["https://openalex.org/I200606013"]}],"countries":["BD"],"is_corresponding":true,"raw_author_name":"Md Abrar Hamim","raw_affiliation_strings":["Daffodil International University,Computer Science and Engineering,Dhaka,Bangladesh","Computer Science and Engineering, Daffodil International University, Dhaka, Bangladesh"],"affiliations":[{"raw_affiliation_string":"Daffodil International University,Computer Science and Engineering,Dhaka,Bangladesh","institution_ids":["https://openalex.org/I200606013"]},{"raw_affiliation_string":"Computer Science and Engineering, Daffodil International University, Dhaka, Bangladesh","institution_ids":["https://openalex.org/I200606013"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036411188","display_name":"Israt Jahan Tasnova","orcid":null},"institutions":[{"id":"https://openalex.org/I200606013","display_name":"Daffodil International University","ror":"https://ror.org/052t4a858","country_code":"BD","type":"education","lineage":["https://openalex.org/I200606013"]}],"countries":["BD"],"is_corresponding":false,"raw_author_name":"Israt Jahan Tasnova","raw_affiliation_strings":["Daffodil International University,Computer Science and Engineering,Dhaka,Bangladesh","Computer Science and Engineering, Daffodil International University, Dhaka, Bangladesh"],"affiliations":[{"raw_affiliation_string":"Daffodil International University,Computer Science and Engineering,Dhaka,Bangladesh","institution_ids":["https://openalex.org/I200606013"]},{"raw_affiliation_string":"Computer Science and Engineering, Daffodil International University, Dhaka, Bangladesh","institution_ids":["https://openalex.org/I200606013"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076856164","display_name":"Sharmin Sultana Mim","orcid":null},"institutions":[{"id":"https://openalex.org/I200606013","display_name":"Daffodil International University","ror":"https://ror.org/052t4a858","country_code":"BD","type":"education","lineage":["https://openalex.org/I200606013"]}],"countries":["BD"],"is_corresponding":false,"raw_author_name":"Sharmin Sultana Mim","raw_affiliation_strings":["Daffodil International University,Computer Science and Engineering,Dhaka,Bangladesh","Computer Science and Engineering, Daffodil International University, Dhaka, Bangladesh"],"affiliations":[{"raw_affiliation_string":"Daffodil International University,Computer Science and Engineering,Dhaka,Bangladesh","institution_ids":["https://openalex.org/I200606013"]},{"raw_affiliation_string":"Computer Science and Engineering, Daffodil International University, Dhaka, Bangladesh","institution_ids":["https://openalex.org/I200606013"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111079110","display_name":"Subrina Ferdous Khan","orcid":null},"institutions":[{"id":"https://openalex.org/I200606013","display_name":"Daffodil International University","ror":"https://ror.org/052t4a858","country_code":"BD","type":"education","lineage":["https://openalex.org/I200606013"]}],"countries":["BD"],"is_corresponding":false,"raw_author_name":"Subrina Ferdous Khan","raw_affiliation_strings":["Daffodil International University,Computer Science and Engineering,Dhaka,Bangladesh","Computer Science and Engineering, Daffodil International University, Dhaka, Bangladesh"],"affiliations":[{"raw_affiliation_string":"Daffodil International University,Computer Science and Engineering,Dhaka,Bangladesh","institution_ids":["https://openalex.org/I200606013"]},{"raw_affiliation_string":"Computer Science and Engineering, Daffodil International University, Dhaka, Bangladesh","institution_ids":["https://openalex.org/I200606013"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5093324573","display_name":"F. M. Tanmoy","orcid":null},"institutions":[{"id":"https://openalex.org/I200606013","display_name":"Daffodil International University","ror":"https://ror.org/052t4a858","country_code":"BD","type":"education","lineage":["https://openalex.org/I200606013"]}],"countries":["BD"],"is_corresponding":false,"raw_author_name":"F. M. Tanmoy","raw_affiliation_strings":["Daffodil International University,Computer Science and Engineering,Dhaka,Bangladesh","Computer Science and Engineering, Daffodil International University, Dhaka, Bangladesh"],"affiliations":[{"raw_affiliation_string":"Daffodil International University,Computer Science and Engineering,Dhaka,Bangladesh","institution_ids":["https://openalex.org/I200606013"]},{"raw_affiliation_string":"Computer Science and Engineering, Daffodil International University, Dhaka, Bangladesh","institution_ids":["https://openalex.org/I200606013"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5087763135"],"corresponding_institution_ids":["https://openalex.org/I200606013"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.26903078,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9096999764442444,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9096999764442444,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cybercrime","display_name":"Cybercrime","score":0.8240969777107239},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6838270425796509},{"id":"https://openalex.org/keywords/cyber-threats","display_name":"Cyber threats","score":0.5617640018463135},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.5218052864074707},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5180423259735107},{"id":"https://openalex.org/keywords/social-media","display_name":"Social media","score":0.4156220555305481},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.354783833026886},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.21705684065818787},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.15903326869010925}],"concepts":[{"id":"https://openalex.org/C2779390178","wikidata":"https://www.wikidata.org/wiki/Q29137","display_name":"Cybercrime","level":3,"score":0.8240969777107239},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6838270425796509},{"id":"https://openalex.org/C3018725008","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber threats","level":2,"score":0.5617640018463135},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5218052864074707},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5180423259735107},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.4156220555305481},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.354783833026886},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.21705684065818787},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.15903326869010925}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccnt56998.2023.10306725","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icccnt56998.2023.10306725","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/5","display_name":"Gender equality","score":0.7599999904632568}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4396897946","https://openalex.org/W3110311961","https://openalex.org/W4304189927","https://openalex.org/W3040950835","https://openalex.org/W4386804727","https://openalex.org/W4386107585","https://openalex.org/W2552246019","https://openalex.org/W2508779374","https://openalex.org/W4399917864","https://openalex.org/W4385452110"],"abstract_inverted_index":{"Cybersecurity":[0],"is":[1,16,105,172],"the":[2,25,39,78,99,106,113,135,142,145,149,165],"application":[3],"of":[4,62,66,80,85,98,102,109,125,148,170],"technologies":[5],"to":[6,24,38,48,77,118,141],"protect":[7],"data":[8],"from":[9],"attack,":[10],"damage,":[11],"or":[12],"unauthorized":[13],"access,":[14],"and":[15,55,69,152,158],"a":[17,33],"major":[18,34],"cyber":[19,35],"threat":[20,36],"for":[21],"women":[22,54,70,126],"due":[23,37,76],"revolution":[26,40],"in":[27,41,57,92],"Information":[28,42],"Technology.":[29],"Women":[30],"are":[31,116],"facing":[32],"Technology,":[43],"which":[44],"has":[45,71,89],"caused":[46],"them":[47],"lose":[49],"their":[50],"privacy.":[51],"Alarmingly,":[52],"young":[53,67],"girls":[56,68],"Bangladesh":[58,88],"have":[59],"been":[60,72],"victims":[61],"cybercrime.":[63],"The":[64,96,120,168],"privacy":[65],"put":[73],"at":[74],"risk":[75],"accessibility":[79],"social":[81],"media":[82],"without":[83],"knowledge":[84],"security":[86],"measures.":[87],"fallen":[90],"behind":[91],"raising":[93],"youth":[94],"awareness.":[95],"measurement":[97],"present":[100],"degree":[101],"cyber-security":[103],"awareness":[104],"main":[107],"emphasis":[108],"this":[110],"research.":[111],"Moreover,":[112],"primary":[114],"results":[115],"according":[117],"statistics.":[119],"authorities":[121],"claim":[122],"that":[123],"70%":[124],"experience":[127],"cyberbullying":[128],"but":[129],"do":[130],"not":[131],"report":[132],"it.":[133],"When":[134],"machine":[136],"learning":[137],"algorithms":[138],"were":[139,155],"applied":[140],"cybersecurity":[143],"dataset,":[144],"accuracy":[146],"scores":[147],"SVM,":[150],"XGBoost,":[151],"Catboost":[153],"methods":[154],"93.6%,":[156],"93.7%,":[157],"94.07%,":[159],"respectively.":[160],"Our":[161],"CatBoost":[162,171],"classifier":[163],"produces":[164],"best":[166],"outcome.":[167],"precision":[169],"94.87%.":[173]},"counts_by_year":[],"updated_date":"2025-12-21T01:58:51.020947","created_date":"2025-10-10T00:00:00"}
