(1) Shine Bunnag, (2) Pataman Buranasin, (3) Supichaya Chaimueanvong, (4) Meesak Makbumroong, (5) Apinunthakan Pongsathabordee, (6) Tepparit Sihisarapisit, (7) Tree Bunpradphai, (8) Phawit Natapintu
(1) the changing IT usage in business practices, (2) the increasingly sophisticated technical approaches and mechanisms of cyber threats, (3) the revisions to preventive measures for addressing