PLOMS AI
https://plomscience.com/journals/index.php/PLOMSAI
<p><strong>PLOMS AI </strong>is a comprehensive journal aiming to proceed science-society interactions . The open access strategy offers increased vulnerability of the research and help in dissemination of research results, as well. We believe that all accurate scientific results have to be published and disseminated by being freely accessible to all.<br /><br /><strong>PLOMS AI</strong> accepts research in areas related to Artificial Intelligence, Computational Intelligence, and bio inspired related areas. The submitted manuscripts are evaluated on the basis of high ethical standards, accurate methodology, scientific and perceived novelty.<br /><br /><strong>Types of articles:</strong><br /><strong>Original research</strong> that contributes to the base of scientific knowledge <br /><strong>Systematic reviews </strong>whose methods ensure the comprehensive and unbiased sampling of existing literature.<br /><strong>Qualitative research</strong> that adheres to appropriate study design and reporting guidelines.<br /><strong>Other submissions</strong> that describes methods, software, databases, or other tools that if they follow the appropriate reporting guidelines. accepts research in areas related to Artificial Intelligence, Computational Intelligence, and bio inspired related areas. The submitted manuscripts are evaluated on the basis of high ethical standards, accurate methodology, scientific and perceived novelty.</p>PLOMSen-USPLOMS AI<p><strong>PLOMS Journals Copyright Statement</strong></p> <p><strong>PLOMS LLC</strong>. grants you a non-exclusive, royalty-free, revocable license to: </p> <ul> <li>Academic Journals licenses all works published under the Creative Commons Attribution 4.0 International License. This license grants anybody the right to reproduce, redistribute, remix, transmit, and modify the work, as long as the original work and source are properly cited.</li> <li>PLOMS LLC. grants you no further rights in respect to this website or its content. </li> </ul> <p>Without the prior consent of PLOMS LLC, this website and its content (in any form or medium) may not be changed or converted in any manner. To avoid doubt, you must not modify, edit, alter, convert, publish, republish, distribute, redistribute, broadcast, rebroadcast, display, or play in public any of the content on this website (in any form or medium) without PLOMS LLC's prior written approval.</p> <p><strong>Permissions</strong></p> <p>Permission to use the copyright content on this website may be obtained by emailing to: </p> <p> <strong>[email protected].</strong></p> <p>PLOMS LLC. takes copyright protection very seriously. If PLOMS LLC. discovers that you have violated the license above by using its copyright materials, PLOMS LLC. may pursue legal action against you, demanding monetary penalties and an injunction to prevent you from using such materials. Additionally, you may be required to pay legal fees.</p> <p>If you become aware of any unauthorized use of PLOMS LLC. copyright content that violates or may violate the license above, please contact :</p> <p><strong>[email protected].</strong></p> <p><strong>Infringing content</strong></p> <p>If you become aware of any content on the website that you feel violates your or another person's copyright, please notify <strong>[email protected]</strong>.</p>Exploring AI Bias in Security-Related Decision- Making
https://plomscience.com/journals/index.php/PLOMSAI/article/view/29
<p>The increasing penetration of large language models (LLMs) into so-called security domains raises many questions about whether potential biases exist that would affect sensitive decisions related to safety or security. These questions must be answered with a systematic investigation into possible biases on the part of these models towards different security scenarios. The study attempts to assess bias in the responses of the Grok language model with respect to security scenarios, paying particular attention to how the model assesses different demographic classes (race, gender, age, appearance) for threat potential. This study followed a multi-dimensional analytical process by submitting 15 security-related questions to the Grok model, whose responses were then analyzed both quantitatively and qualitatively. These analyses measured threat classification rates among different demographic groups; studied semantic connotations, inference schemes, and judged the model on the basis of consistency with self-claimed principles of fairness. Threat classification rates showed statistically significant differences among various demographic sectors. Arab/Middle Eastern, Black, young, and male individuals were rated as potential threats at much higher rates (51.4%, 43.7%, 48.3%, and 47.6%, respectively) compared to White, elderly, and female persons (36.2%, 27.5%, and 31.9%, respectively). The qualitative analysis also presented persistent contradictions between stated principles and actual practices, including selective use of statistics and arguably varying interpretive frameworks with respect to different demographic groups. The aspect of intersectional bias is particularly troubling, where "young Arab male in traditional clothing" was classified as a potential threat at a rate of 62.7%.</p>Razina Mohammed Al-HosniRabie Ramadan
Copyright (c) 2025 PLOMS AI
https://creativecommons.org/licenses/by-nc/4.0
2025-07-152025-07-1551Supply Chain Security in Information Systems: A Survey
https://plomscience.com/journals/index.php/PLOMSAI/article/view/28
<p>Supply chain security in information systems is a vital topic in the digital age, as it faces many challenges related to protecting data and information transmitted across supply networks. This economic study aims to analyze the potential risks that information systems may face in the context of the supply chain, in addition to the prevention strategies that can be adopted to reduce those risks. It also highlights the relationship between securing the supply chain and achieving economic efficiency in companies, which enhances the stability of business operations and increases their effectiveness. Supply chain security in information systems is also a topic of utmost mportance in light of the rapid technological transformations that the world is witnessing today. Information systems contribute to facilitating business operations and achieving efficiency, but the exposure of these systems to security risks such as hacking and digital threats may significantly affect the stability and reputation of companies. This economic study aims to analyze the challenges facing information systems in the supply chain, identify their<br>economic impacts on institutional performance, and review the strategies that companies can adopt to enhance security and data protection, and achieve a balance between cost and security to maintain business continuity.</p>Manar Said Al-KindiHoor AlkalbaniNasra Subeih Al-HinaiRabie Ramadan
Copyright (c) 2025 PLOMS AI
https://creativecommons.org/licenses/by-nc/4.0
2025-07-152025-07-1551A Survey on Privacy Preserving Data Mining Techniques
https://plomscience.com/journals/index.php/PLOMSAI/article/view/24
<p>Privacy-preserving data mining (PPDM) has become a significant area of<br>interest for researchers, facilitating the sharing and analysis of sensitive information while<br>ensuring privacy protection. This paper investigates methods for maintaining data confidentiality<br>while retaining the critical attributes necessary for analysis. The authors assess<br>the efficacy of various PPDM techniques against criteria such as performance, data usability,<br>and levels of uncertainty. The key findings and limitations of each approach are<br>thoroughly reviewed and summarized. Various PPDM techniques present distinct advantages<br>alongside certain limitations: Anonymization guarantees the anonymity of data<br>owners but is vulnerable to linking attacks. Perturbation protects attributes independently<br>but does not allow for the reconstruction of original values from the altered data.<br>Randomization provides robust privacy protection but diminishes data utility due to the<br>introduction of noise. Cryptographic methods offer strong security and utility but tend to<br>be less efficient than other strategies. No single technique outperforms all criteria; rather,<br>each is more effective under particular circumstances. This paper delivers a comparative<br>analysis of PPDM techniques, emphasizing their strengths and weaknesses, and offers<br>insights into their applicability across different scenarios.</p>Aziza AldfaiiRabie Ramadan
Copyright (c) 2025 PLOMS AI
https://creativecommons.org/licenses/by-nc/4.0
2025-05-012025-05-01511212Survey on Web Application Security Testing Methods
https://plomscience.com/journals/index.php/PLOMSAI/article/view/25
<p>This research study delivers comprehensive coverage of tools, techniques,<br />and processes for ensuring security within web applications. The analysis encompasses<br />both automated and manual approaches, including code reviews, penetration testing, and tools addressing common vulnerabilities listed in the OWASP Top 10. As web applications have become critical infrastructure for modern organizations managing sensitive data and performing significant transactions, the need for robust security testing has grown exponentially. The research presents case studies and results of testing performed in real environments to illustrate the strengths and weaknesses of various security testing methodologies. The findings demonstrate that while automated tools provide efficiency and scalability, manual testing remains essential for detecting complex logical vulnerabilities and context-sensitive security issues. Additionally, the paper emphasizes the importance of integrating multiple testing approaches into a unified web application security strategy to address the evolving threat landscape effectively.</p>Amman AlamriHamad AlbahriRabie Ramadan
Copyright (c) 2025 PLOMS AI
https://creativecommons.org/licenses/by-nc/4.0
2025-05-012025-05-0151