Volume 28, Issue 2

Redefining Advertising in the Arithmetical Budget: Publishing 3.0

Dibya Jyoti, Kumpatla Sihu*
DOI:   10.1654/zkdx.2023.28.2-4
Pages:   16-20

Abstract
Publishing 3.0 is a publishing strategy that integrates online and physical interactions between businesses and customers. It is an approach which more effectively takes into account the convergence of the offline and on line worlds of businesses and customers. The concept focuses on how, in the times of a digital economy  boom,  offline  touch  serves  as  a  major  differentiation  in  an increasingly  online  world.  It  also encompasses how style blends with substance, in that even as brands need to adopt flexible and adaptive styles in  view  of  fast-changing  technological  developments,  the  brand’s  core,  authentic  character is  ever more important.  Publishing  3.0  is  about  balancing  machine-to-machine  (M2M)  with  human-to-human  (H2H).  As connected devices become more commonplace on the back of artificial intelligence and Internet of Things (IoT), resulting in greater publishing productivity, they need to go hand-in-hand with human-to-human connectivity in order to strengthen customer engagement. This study explores the conceptual understanding of Publishing 3.0 and move from publishing 1.0 to publishing 3.0, i.e. traditional to digital publishing.

Keywords: Publishing 3.0, Traditional Publishing, Digital Publishing

Macroeconomic and Firm-Specific Elements of Group Routine: A one-step system GMM dynamic section ideal

Abass Cetradze*, Asep Aprianto
DOI:   10.1654/zkdx.2023.28.2-3
Pages:   8-15

Abstract
The  study  investigated  the  macroeconomic  and  bank-specific  determinants  of  Ethiopian  banks’ performance  from  2011  to 2020. All the 14  commercial banks that were operational during the study period were included. We employed a one-step system GMM dynamic panel data approach owing to its lower bias and higher efficiency than other approaches such as the standard first-difference GMM estimator. The dynamic character of the model specification has been manifested through significant coefficients of lagged performance indicators. The lag of ROE, credit growth, and interest rate showed a positive and significant effect on bank performance while branch expansion, economic growth, and capital adequacy ratio exhibited a negative and significant impact on the outcome variable. However, three   macroeconomic   factors:   deposit   growth,   exchange   rate,   and   inflation   rate   found   to   be insignificant   to   influence   bank   performance.   The   research   concludes   bank-specific   factors predominantly influence the performance of the Ethiopian banking industry.

Keywords: Bank Presentation, Self-motivated Panel Data, Macroeconomic issues, Bank-specific influences

Collected works Analysis on the Application of Develops in Automatic Learning Systems

Devinder Samrtah*, Esraa Kolkaila
DOI:   10.1654/zkdx.2023.28.2-2
Pages:   4-7

Abstract
The main purpose of this research was to explore recent  studies  on  the  application  of  Develops  in  E-learning.  E-learning  has  become  an  essential  tool  for  many  people  in  the current technological environment. The integration of seeks  to  provide  comprehensive  technological  training  and processes for users. The application of Develops in E-learning is common  in  education,  marketing,  sales,  and  other  electronic sharing operations.   Develops   environment   combines development  and  operations  to  make  sure  there  is  a  quick efficient  and  continuous  workflow  of  processes.  Building  an understanding  of  Develops  best  practices  is  necessary  in  an  E-learning environment. Develops combines    cultural philosophies tools and practices to ensure that applications and created faster and therefore assist organizations in evolving and developing quality products. The main aspect of Develops is the high velocity when creating applications and services which is faster    than    the    traditional    infrastructure    and    software development  processes.  Additionally,  the  high  velocity  in Develops  helps  organizations  to  compete  effectively  in  the market and serve their end users well.

Keywords: Develops, e-learning, Micro learning, Revolutionizing

Machine Scientific Reverse Engineering in Quark

Anas Jamwal*
DOI:   10.1654/zkdx.2023.28.2-1
Pages:   1-3

Abstract
Android forensic reverse engineering is the process of analyzing the internal structure of Android applications  and  the  underlying  operating  system  to  extract  useful  information  and  detect potential  security  threats.  This  involves  disassembling  the  binary  code  of  an  Android  app, identifying   its   components   and functionalities,   and   uncovering   any   hidden   or   malicious activities. Forensic reverse engineering can be used to investigate a variety of security incidents, including data breaches, malware attacks, and intellectual property theft. It can help identify thesource  of  a  security  breach,  determine  the  scope  of  the  damage,  and  provide  insights  intothe methods  and  tools  used  by  attackers  .Some  of  the  key  techniques  used  in  Android  forensic reverse engineering include dynamic analysis, static analysis, and reverse engineering tools such as disassemblesand decompilers. These tools can help extract information from an Android app such  as  its  file  system,  network  traffic,  and  memory  usage.  Overall,  Android  forensic  reverse engineering  is  an  important  field  for  enhancing  the  security  of  Android-based  devices  and applications,  and  for  detecting  and  mitigating  potential  threats.In  the  era  of  smartphones, Android  has  become  one  of  the  most  popular  mobile  operating  systems,  powering  millions  of devices  worldwide.  With  the  rise  of  mobile  devices,  the  need  for  mobile  security  has  become increasingly  important.  In  this  context,  Android  forensic  and  reverse  engineering  are  important techniques  to  identify  potential  security  risks  in  Android  applications.  Quark  is  a  powerful tool that  can  be  used  to  analyze  the  behavior  of  Android  applications  and  identify  potential vulnerabilities. This includes decompiling APK files, monitoring network traffic, and extracting data  from  Android  devices.  By  using  Quark  in  combination  with  other  forensic  tools  and techniques,  investigators  can  gain  a  comprehensive  understanding  of  the  behavior  of  Android applications  and  identify  potential  security  risks.  In  this  article,  we  will  explore  the  various aspects of Android forensic and reverse engineering in the context of cyber security, with a focus on using Quark to analyze and extract data from Android devices.

Keywords: Cyber security, Quark, Android forensic

Scroll to Top