https://puirp.com/index.php/research/issue/feedPartners Universal Innovative Research Publication2026-05-08T12:29:03+00:00Editoreditor@puirp.comOpen Journal Systemshttps://puirp.com/index.php/research/article/view/162Digital Dependency and Temporal Distortion: A Critical Review of Smartphone Use, Cognitive Impact, and Behavioral Intervention in PostPandemic Society2026-05-08T12:14:05+00:00Dr. A. Shaji Georgeeditor@puirp.comA. S. Hovan Georgeeditor@puirp.comDr. T. Baskareditor@puirp.comDr. Digvijay Pandeyeditor@puirp.com<p>A muted yet more structural crisis has infiltrated the routines of billions of individuals of every age group around the world six years into the COVID-19 pandemic that compelled the world to pause. The addictive, pointless scrolling of algorithmically developed social media feeds through the smartphone device has fundamentally changed the way human beings experience, perceive and attach value to time. This paper explores the psychological and neurological processes that cause the perceived time to accelerate in the post-pandemic, explores the behavioral design of digital platforms aimed at capturing and keeping attention forever, and uses the contrasting richness of the social experience before the digital age to suggest that the destruction of meaningful human time was more than incidental but a design. The article also discusses how mass distraction has impacted society, such as the loss of civic participation, dissolution of parental involvement, the decline of mental well-being, and repression of the creative culture. An evidence-based, practical framework of reclaiming intentional living is proposed, and a larger argument that time, which is the only resource that is given equally to all of humanity irrespective of wealth or status, should be given equal seriousness of purpose as people have traditionally given their most urgent duties. The key point is simple the actual pandemic of the modern era is not a virus but a small glowing screen.</p>2026-04-25T00:00:00+00:00Copyright (c) 2026 https://puirp.com/index.php/research/article/view/163The Grammar of Icons: Decoding the Origins, Meanings, and Cognitive Power of Everyday Digital and Cultural Symbols2026-05-08T12:18:46+00:00Dr. A. Shaji Georgeeditor@puirp.comDr. T. Baskareditor@puirp.comDr. M. M. Karthikeyaneditor@puirp.com<p>The bindrune of Bluetooth and the peace sign are just two symbols that convey more meaning than their simple appearance might imply. This article offers a semiotic analysis of common digital and cultural symbols, tracing their historical development, symbolic content, and functional development in today's technological and cultural environments. Using insights from semiotics, psychology and design, the analysis shows that symbols operate as compact meaning bearers that alleviate the cognitive burden of communication, enable cross-cultural understanding, and foster human behavior in ways that are often not explicitly considered by users. The research is structured around four groups of symbols: symbols in technological interface, symbols of communication and interaction, symbols of navigation and spatial, and symbols of culture and environment. For each category, the origins are examined, the processes of meaning formation are identified and the dynamic changes in symbol function are assessed. The main factors of symbolic efficacy are identified as the properties of abstraction, standardization and encoding of function. Recent developments such as globalisation of emoji, computerized icon design, and accessibility guidelines are also discussed. Design, evaluation and standardization guidelines are offered for designers, technologists, educators and corporate communicators. This article concludes that symbolic literacy is practical literacy with real and tangible application in the workplace.</p>2026-04-25T00:00:00+00:00Copyright (c) 2026 https://puirp.com/index.php/research/article/view/164Security Service Edge (SSE) and SASE: A Complete Guide to Cloud-Native Zero Trust Architecture for Enterprise Security2026-05-08T12:23:33+00:00Dr. A. Shaji Georgeeditor@puirp.com<p>The advancement of cloud computing and hybrid work arrangements and the adaptation of software-as-a-service (SaaS) has essentially disturbed the standard enterprise security perimeter. Past strategies based on physical network boundaries, on-premise firewalls, and virtual private networks were created in a world where users, data, and applications were all in known and controlled corporate settings. The vast majority of the contemporary organizations no longer have that world. Security Service Edge (SSE) and Secure Access Service Edge (SASE) have become the architectural solution to this fact, providing cloud-native, inline security solutions that accompany users and data wherever they go. This paper offers an in-depth discussion of both SSE and SASE technologies, based on published research on the industry and analyst models to put these platforms into the context of the overall development of enterprise cybersecurity. The article addresses the historical failure points of the legacy security architecture, the fundamental technical capabilities that make modern SSE platforms distinctive, the criticality of artificial intelligence and machine learning to real-time threat detection, organizational and technical challenges of adoption, and the future of the market in the next few years. The analysis ends with a strategic model, which will guide the security and network architects to conduct an analysis and implement SSE solutions that provide authentic, quantifiable protection in a world where threats are becoming more and more likely to emanate out of the very platforms that the enterprises rely on day by day.</p>2026-04-25T00:00:00+00:00Copyright (c) 2026 https://puirp.com/index.php/research/article/view/165Architectural Convergence in Security Operations: A Technical Framework for AI-Augmented Threat Detection, Automated Response, and Organizational Cyber Resilience2026-05-08T12:26:24+00:00Dr. A. Shaji Georgeeditor@puirp.com<p>Today's cybersecurity environment has grown beyond the capabilities of conventional, disjointed security systems to adequately protect it. This article explores the technological development of security operations, from the current tool-centric, siloed state of security operations to integrated, intelligence-driven platforms that unify network and security operations into a holistic, adaptive system. The study explores the architectural concepts behind security data lakes, behavior-based detection engines, real-time correlation engines and artificial intelligence (AI) powered investigation workflows. It also examines the role of Security Orchestration, Automation and Response (SOAR) systems, Extended Detection and Response (XDR) systems and generative AI in accelerating investigation times and removing the human bottlenecks found in most security operations centers today. This article offers a maturity model that can be used to gauge an organisation's current state of security and advance towards fully integrated and automated security operations, without the need to hire more staff or replace existing tools. The article leverages published research, industry standards, and technical frameworks to demonstrate that the key to making an organization cyber resilient is not to buy more tools, but to build better architectures that can make existing intelligence usable at machine speed.</p>2026-04-25T00:00:00+00:00Copyright (c) 2026 https://puirp.com/index.php/research/article/view/166Additive Property of Cubic Expectation 2026-05-08T12:29:03+00:00Dhritikesh Chakrabarty editor@puirp.com<p>The concept of cubic expectation had been introduced in an earlier study, and its definition was formulated in the case of random variables (both discrete and continuous). The additive property of cubic expectation has here been derived in the case of a random variable and in the case of a function of a random variable. Derivation of the property has been presented in this article.</p>2026-04-25T00:00:00+00:00Copyright (c) 2026