Advances in hospitality, tourism and the services industry (AHTSI) book series,
Journal Year:
2024,
Volume and Issue:
unknown, P. 133 - 160
Published: Oct. 18, 2024
Cryptocurrency,
based
on
block-chain
technology
is
defined
as
a
decentralized
digital
peer-to-peer
currency.
The
emergence
of
cryptocurrency
boon
for
future
economy;
it
has
been
tagged
along
with
innumerable
practical
and
legal
issues
including
risks
associated
consumer's
protection
such
theft,
misinformation,
unpredictability;
complexity
surrounding
the
characterization
cryptocurrencies,
illegal
activities
driven
through
cryptocurrencies
lack
uniform
comprehensive
global
legislation
to
address
challenges
it.
Though
valiant
efforts
have
made
by
few
countries
like
Canada,
United
Kingdom,
Switzerland,
El
Salvador
etc.
formulate
broad
range
rules
regulations
currency
but
other
developed
developing
economies
largely
remained
silent
debate
regulation
cryptocurrencies.
This
chapter
seeks
explore
into
risk
posed
provide
need
formulation
structure
appropriate
regulating
Magna Scientia Advanced Research and Reviews,
Journal Year:
2024,
Volume and Issue:
10(2), P. 256 - 264
Published: April 27, 2024
In
today's
fast-paced
and
highly
competitive
business
environment,
digital
transformation
has
emerged
as
a
crucial
driver
of
organizational
success.
This
paper
presents
comprehensive
review
the
intersection
between
model
innovation,
examining
impact
implementation
strategies
associated
with
this
transformative
process.
The
study
begins
by
elucidating
concept
its
significance
in
reshaping
traditional
models.
It
explores
how
advancements
technologies,
such
artificial
intelligence,
big
data
analytics,
Internet
Things,
have
revolutionized
various
aspects
operations,
including
customer
engagement,
operational
efficiency,
revenue
generation.
Furthermore,
critically
evaluates
on
emphasizing
need
for
organizations
to
adapt
evolve
response
changing
market
dynamics
consumer
preferences.
Through
systematic
analysis
relevant
literature
case
studies,
highlights
key
drivers,
challenges,
opportunities
inherent
leveraging
technologies
drive
innovation.
Moreover,
examines
different
adopted
effectively
integrate
initiatives
into
their
existing
discusses
importance
strategic
planning,
culture,
leadership
commitment
driving
successful
initiatives.
Overall,
critical
contributes
deeper
understanding
role
catalyst
provides
valuable
insights
practitioners,
policymakers,
researchers
seeking
navigate
complex
landscape
disruption
capitalize
emerging
growth
competitiveness.
Journal of Economy and Technology,
Journal Year:
2023,
Volume and Issue:
1, P. 222 - 241
Published: Nov. 1, 2023
Artificial
Intelligence
(AI)
algorithms
can
be
employed
to
enhance
the
security
of
blockchain
networks
in
era
industry
4.0.
Smart
contracts,
powered
by
blockchain,
developed
using
AI
capabilities.
These
contracts
execute
themselves
based
on
predefined
conditions,
automating
various
processes
and
reducing
need
for
intermediaries.
Blockchain
provides
a
transparent
immutable
ledger
supply
chain
transactions.
integrated
analyze
this
data,
providing
insights
into
entire
chain.
This
helps
tracking
tracing
products,
ensuring
authenticity,
optimizing
data-driven
decisions.
data
from
manufacturing
process
recorded
blockchain.
allows
predictive
maintenance
quality
control,
helping
identify
address
issues
before
they
result
defects
or
downtime.
work
together
secure
massive
amount
generated
IoT
devices
an
Industry
4.0
setting.
ensures
integrity
immutability
while
optimization.
facilitate
creation
decentralized
energy
grids
where
optimize
distribution
trading
through
smart
contracts.
support
collaborative
different
entities
securely
efficiently
collaborate
production
processes.
enables
individuals
organizations
monetize
their
data.
help
determine
value
fair
compensation
tokenized
ecosystems.
In
paper,
applications
AI-Powered
Technology
is
reviewed
discussed
future
research
works
are
also
suggested.
As
result,
efficiency,
transparency,
across
industrial
enhanced
analyzing
recent
achievements
Advances in business strategy and competitive advantage book series,
Journal Year:
2024,
Volume and Issue:
unknown, P. 319 - 352
Published: Aug. 28, 2024
The
spread
of
cyberthreats
in
the
digital
age
presents
serious
concerns
to
national
security,
stability
economy,
and
personal
privacy.
Traditional
security
methods
are
unable
keep
up
with
increasing
sophistication
size
cyberattacks.
With
facilitating
quick
identification
mitigation
cyberthreats,
machine
learning
(ML)
has
revolutionary
potential
improve
cybersecurity
measures.
But
applying
ML
this
field
also
brings
important
moral
legal
issues,
particularly
light
international
cybercrimes.
This
chapter
comprehensively
explores
learning's
dual
nature
cybersecurity,
emphasizing
both
its
advantages
disadvantages.
It
talk
about
state
cyber
threats
today,
how
is
being
incorporated
into
ramifications
using
investigations.
IET Networks,
Journal Year:
2024,
Volume and Issue:
unknown
Published: Nov. 16, 2024
Abstract
The
Industrial
Internet
of
Things
(IIoT)
has
transformed
industrial
operations
with
real‐time
monitoring
and
control,
enhancing
efficiency
productivity.
However,
this
connectivity
brings
significant
security
challenges.
This
study
addresses
these
challenges
by
identifying
abnormal
sensor
data
patterns
using
machine
learning‐based
anomaly
detection
models.
proposed
framework
employs
advanced
algorithms
to
strengthen
defences
against
cyber
threats
disruptions.
Focusing
on
temperature
anomalies,
a
critical
yet
often
overlooked
aspect
security,
research
fills
gap
in
the
literature
evaluating
learning
models
for
purpose.
A
novel
variance‐based
model
is
introduced,
demonstrating
high
efficacy
accuracy
scores
0.92
0.82
NAB
AnoML‐IOT
datasets,
respectively.
Additionally,
achieved
F1
0.96
0.89
underscoring
its
effectiveness
IIoT
optimising
cybersecurity
processes.
not
only
identifies
vulnerabilities
but
also
presents
concrete
solutions
improve
posture
systems.
Frontiers in Communications and Networks,
Journal Year:
2025,
Volume and Issue:
6
Published: Feb. 4, 2025
Introduction
The
Internet
of
Things
(IoT)
is
a
new
technology
that
connects
billions
devices.
Despite
offering
many
advantages,
the
diversified
architecture
and
wide
connectivity
IoT
make
it
vulnerable
to
various
cyberattacks,
potentially
leading
data
breaches
financial
loss.
Preventing
such
attacks
on
ecosystem
essential
ensuring
its
security.
Methods
This
paper
introduces
software-defined
network
(SDN)-enabled
solution
for
vulnerability
discovery
in
systems,
leveraging
deep
learning.
Specifically,
Cuda-deep
neural
(Cu-DNN),
Cuda-bidirectional
long
short-term
memory
(Cu-BLSTM),
Cuda-gated
recurrent
unit
(Cu-DNNGRU)
classifiers
are
utilized
effective
threat
detection.
approach
includes
10-fold
cross-validation
process
ensure
impartiality
findings.
most
recent
publicly
available
CICIDS2021
dataset
was
used
train
hybrid
model.
Results
proposed
method
achieves
an
impressive
recall
rate
99.96%
accuracy
99.87%,
demonstrating
effectiveness.
model
also
compared
benchmark
classifiers,
including
Cuda-Deep
Neural
Network,
Cuda-Gated
Recurrent
Unit,
(Cu-DNNLSTM
Cu-GRULSTM).
Discussion
Our
technique
outperforms
existing
based
evaluation
criteria
as
F1-score,
speed
efficiency,
accuracy,
precision.
shows
strength
detection
highlights
potential
combining
SDN
with
learning
assessment.
The TQM Journal,
Journal Year:
2025,
Volume and Issue:
unknown
Published: March 20, 2025
Purpose
This
study
aims
to
identify
the
factors
influencing
blockchain
adoption
and
assess
its
impact
on
financial
market
performance
of
small
medium-sized
enterprises
(SMEs)
in
Oman,
utilizing
Technology–Organization–Environment
(TOE)
framework.
Design/methodology/approach
The
nature
is
explanatory
based
data
gathered
from
282
SME
owners
managers/employees
using
a
convenience
sampling
method.
After
examining
construct
validity
reliability,
Partial
Least
Squares
with
Structural
Equation
Modelling
was
used
examine
proposed
model
study.
Findings
results
indicate
that
all
determinants,
including
Cost
Concerns,
Top
Management
Support,
Relative
Advantage,
Technology
Compatibility,
Security
Concerns
Technological
Readiness
are
significant
load-on
drivers
for
adoption.
However,
Government
Policy
Vendor
Support
were
deemed
insignificant
contributors
Moreover,
has
favourable
effect
both
as
well
performance.
Practical
implications
finds
there
great
possibility
technology
transforming
SMEs
Oman
by
boosting
security,
transparency
efficiency
processes.
supports
Vision
2040
towards
advancing
technology,
economic
development
job
creation.
Managers
policy
makers
should,
therefore,
encourage
this
innovation.
Originality/value
highlights
importance
firms
line
national
authorities'
plans
2040.
findings
will
add
significantly
existing
body
knowledge
providing
holistic
understanding
determinants
perspective
TOE
framework
influence
Advances in information security, privacy, and ethics book series,
Journal Year:
2025,
Volume and Issue:
unknown, P. 369 - 404
Published: Feb. 14, 2025
In
the
era
of
digitization,
Artificial
Intelligence
(AI)
integration
in
healthcare
has
become
a
necessity
to
ensure
patient
identification
&
privacy.
With
rise
digitalisation
health
systems,
it
also
increasingly
important
have
more
stringent
data
protection
requirements.
This
transformation
is
heavily
facilitated
by
AI-driven
technologies
that
reinforce
security,
identify
real-time
threats
and
streamline
compliance
with
regulations.
By
utilizing
Machine
Learning
(ML)
algorithms
comb
through
big
data,
outliers
can
be
pinpointed
filtered
out
so
unauthorized
access
prevented
assistance
advanced
forms
encryption
which
protect
information
while
transit
or
at
rest.
But
fast
pace
AI
development
creates
as
many
opportunities
challenges,
especially
when
comes
marrying
availability
These
ethical
concerns,
for
effective
regulatory
frameworks,
are
critical
an
evolving
ecosystem
technologies.