Advances in computational intelligence and robotics book series,
Journal Year:
2025,
Volume and Issue:
unknown, P. 55 - 90
Published: Feb. 21, 2025
Industrial
Internet
of
Things
(IIoT)
networks,
essential
to
modern
manufacturing,
logistics,
and
critical
infrastructure,
face
unprecedented
cybersecurity
challenges.
As
IIoT
networks
expand,
integrating
countless
interconnected
devices,
they
are
increasingly
exposed
cyber
threats
that
exploit
system
vulnerabilities,
jeopardizing
data
integrity,
operational
continuity,
safety.
Traditional
security
measures,
while
effective
in
standard
IT
environments,
often
lack
the
adaptability
real-time
responsiveness
needed
for
IIoT's
unique
requirements.
In
response,
Artificial
Intelligence
(AI)
has
emerged
as
a
transformative
solution,
offering
enhanced
detection,
prediction,
response
capabilities
tailored
complex
landscape.
This
chapter
explores
role
AI-driven
approaches
advancing
networks.
2022 IEEE 11th International Conference on Communication Systems and Network Technologies (CSNT),
Journal Year:
2024,
Volume and Issue:
22, P. 525 - 531
Published: April 6, 2024
The
Internet
of
Things
(IoT)
has
come
out
as
a
transformative
technology
paradigm
which
enables
the
seamless
integration
physical
objects
into
digital
world.
With
rapid
increase
connected
devices
and
increasing
availability
data,
IoT
found
numerous
applications
across
various
domains
such
buildings/homes,
agriculture,
healthcare,
environment,
industries,
etc.
However,
along
with
its
promises,
also
presents
certain
limitations
challenges
that
require
to
be
addressed
for
global
adoption.
Lack
security
privacy,
storage
problems,
trash
disposal,
energy
requirements,
need
open
standards,
novel
use
cases
are
few
difficulties.
In
paper,
an
overview
is
provided,
discussed,
tools
technologies
employed
in
development
explored,
research
directions
can
shape
future
presented.
Journal of Science and Technology Policy Management,
Journal Year:
2024,
Volume and Issue:
unknown
Published: Aug. 1, 2024
Purpose
This
qualitative
case
study
aims
to
identify
and
analyse
the
factors
influencing
implementation
effectiveness
of
electronic
health
record
systems
(EHRS)
in
primary
health-care
(PHC)
facilities
Tanzania.
explore
ways
optimize
use
EHRS
for
better
service
delivery.
Design/methodology/approach
The
uses
a
design.
Data
were
collected
through
interviews
focus
groups
conducted
with
workers
information
communication
technology
officers
at
PHC
Purposive
sampling
data
source
triangulation
used
address
potential
biases
limitations
associated
study’s
small
sample
size.
Findings
identifies
several
key
findings
related
Tanzanian
facilities.
obstacles
include
inadequate
technical
infrastructure,
poor
internet
connectivity
insufficient
financial
resources.
suggests
comprehensive
strategy
improving
EHRS,
emphasizing
patient
professional
involvement
system
design,
investments
infrastructure
connectivity,
quality
accuracy
ongoing
support
training.
Originality/value
research
contributes
existing
body
knowledge
by
offering
nuanced
understanding
context.
It
emphasizes
need
tailored
solutions
strategies
specific
region’s
challenges
opportunities.
originality
lies
its
on
context,
providing
valuable
insights
future
initiatives.
A
policy
implication
underscores
importance
supportive
regulatory
framework,
dedicated
resources
consistent
stakeholder
successful
implementation.
2022 9th International Conference on Computing for Sustainable Global Development (INDIACom),
Journal Year:
2024,
Volume and Issue:
unknown, P. 111 - 117
Published: Feb. 28, 2024
One
of
the
key
facets
this
paradigm
shift
is
outsourcing
data
storage
and
management
to
third-party
cloud
service
providers
(CSPs).
The
auditing
outsourced
a
crucial
component
since
it
essential
upholding
accountability
confidence.
Verification
validation
integrity,
access
control,
regulatory
compliance
are
all
part
auditing.
loss
physical
control
over
storage,
opaqueness
provider
operations,
worries
about
privacy
confidentiality
some
difficulties
associated
with
data.
This
paper
examines
potential
avenues
for
growth
in
field
computing.
As
more
businesses
rely
on
services,
critical
guarantee
accuracy,
safety,
their
also
provides
an
in-depth
overview
concept
computing,
delving
into
challenges,
existing
solutions,
future
directions
pivotal
field.
Advances in business strategy and competitive advantage book series,
Journal Year:
2024,
Volume and Issue:
unknown, P. 319 - 352
Published: Aug. 28, 2024
The
spread
of
cyberthreats
in
the
digital
age
presents
serious
concerns
to
national
security,
stability
economy,
and
personal
privacy.
Traditional
security
methods
are
unable
keep
up
with
increasing
sophistication
size
cyberattacks.
With
facilitating
quick
identification
mitigation
cyberthreats,
machine
learning
(ML)
has
revolutionary
potential
improve
cybersecurity
measures.
But
applying
ML
this
field
also
brings
important
moral
legal
issues,
particularly
light
international
cybercrimes.
This
chapter
comprehensively
explores
learning's
dual
nature
cybersecurity,
emphasizing
both
its
advantages
disadvantages.
It
talk
about
state
cyber
threats
today,
how
is
being
incorporated
into
ramifications
using
investigations.