http://172.19.1.196:8983/solr/secweb/select?q=Egotistical sophisticated OR "egotistical sophisticated" OR "arrogant advanced" OR "arrogant refined" OR "self-centered advanced" OR "self-centered refined"&wt=json&indent=true&facet=true&facet.field=key_filetype&facet.field=key_sitemap&facet.field=system_name&facet.field=key_keywords&hl=on&hl.fragsize=200&hl.fl=id,title_th,searchcontent_th&defType=edismax&qf=searchcontent_th&qf=id&qf=title_th^1000000&pf=title_th~5^1&pf=searchcontent_th~5^10000&ps=2&mm=100&qf=title_th_default&fq=system_name%3ASEC_News&start=0&rows=10
(1) the changing IT usage in business practices, (2) the increasingly sophisticated technical approaches and mechanisms of cyber threats, (3) the revisions to preventive measures for addressing