Advances in information security, privacy, and ethics book series,
Journal Year:
2024,
Volume and Issue:
unknown, P. 257 - 292
Published: Sept. 27, 2024
Social
engineering
in
social
media
and
online
interactions
has
emerged
as
a
critical
concern
the
digital
age,
driven
by
increasing
interconnectivity
sharing
of
personal
information
online.
This
study
is
motivated
growing
prevalence
cyberattacks
that
exploit
human
psychology
rather
than
technical
vulnerabilities,
targeting
individuals
through
platforms
where
they
share
details.
By
examining
various
techniques
such
phishing,
pretexting,
baiting.
research
highlights
methods
attackers
use
to
manipulate
specific
vulnerabilities
environments.
The
leverages
data
from
recent
cases
surveys
analyze
effectiveness
these
impact
on
both
organizations.
findings
underscore
significant
risks
posed
attacks,
revealing
psychological
underpinnings
make
tactics
so
effective.
Advances in environmental engineering and green technologies book series,
Journal Year:
2024,
Volume and Issue:
unknown, P. 31 - 62
Published: Nov. 1, 2024
This
chapter,
titled
“Eco-Intelligence:
AI's
Contribution
to
a
Sustainable
World,”
explores
the
significant
influence
of
artificial
intelligence
(AI)
on
environmental
sustainability.
The
text
examines
impact
AI
in
several
areas
such
as
climate
change
mitigation,
biodiversity
protection,
smart
agriculture,
urban
sustainability,
and
circular
economy
projects.
chapter
focuses
use
predictive
modeling
for
scenarios,
optimization
renewable
energy
systems,
real-time
monitoring
emissions.
These
applications
together
contribute
reduction
greenhouse
gas
emphasis
conservation
is
skills
species
identification,
habitat
mapping,
anti-poaching
initiatives.
also
augmenting
precision
farming,
boosting
crop
monitoring,
managing
sustainable
fisheries.
integration
technology
revolutionizes
planning
waste
management
by
enhancing
resource
efficiency.
Advances in electronic government, digital divide, and regional development book series,
Journal Year:
2024,
Volume and Issue:
unknown, P. 123 - 136
Published: Oct. 25, 2024
Deep
Learning
(DL)
is
an
area
of
artificial
intelligence
(AI),
wherein
machine
learning
(ML)
using
convolutional
neural
networks
to
detect
patterns
in
data
and
forecast
its
worth.
It
excels
tough
settings
like
climate
change
can
handle
sophisticated
jobs
such
as
image
speech
recognition,
natural
language
processing,
others.
models
have
found
applications
a
variety
fields
due
their
ability
reflect
complicated
data.
the
capacity
analyze
automatically
classify
large
volumes
Internet
traffic.
learning-based
solutions
that
automate
detection
attacks
address
cybersecurity
issues
are
gaining
popularity.
This
study
extensively
describes
promising
uses
deep
learning,
which
based
on
many
layers
networks,
wide
range
security
challenges.
Before
critically
comparatively
reviewing
state-of-the-art
from
literature,
we
will
highlight
main
properties
typical
architectures
used
applications.
highlights
developing
concepts
provides
overview
required
resources,
general
framework
appropriate
datasets.
The
limits
evaluated
works
highlighted,
well
vision
present
challenges
field,
providing
useful
insights
best
practices
for
researchers
developers
working
related
problems.
Advances in electronic government, digital divide, and regional development book series,
Journal Year:
2024,
Volume and Issue:
unknown, P. 137 - 150
Published: Oct. 25, 2024
India
is
fast
advancing
its
digital
goals,
with
initiatives
like
Make
in
and
Digital
benefiting
the
economy.
However,
because
of
reliance
on
interconnected
networks
systems,
cyber
security
challenging
to
implement.
As
one
most
often
targeted
countries
cyberspace,
India's
cybersecurity
resilience
critical
safeguarding
vital
assets.
has
taken
a
variety
legislative
organizational
efforts
bolster
defences
respond
cybercrime
more
effectively.
The
Ministry
Electronics
Information
Technology
(MeitY)
administers
cybersecurity.
Computer
Emergency
Response
Team
(CERT-IN),
an
institution
within
MeitY
primary
body
charge
dealing
issues.
CERT-IN
also
increases
Indian
Internet's
defences.The
government
must
act
as
facilitator,
forming
public-private
partnership
focusing
user
awareness
education.
Most
significantly,
privacy
should
be
balanced
while
promoting
R&D
order
preserve
superiority
cyberspace.
Advances in electronic government, digital divide, and regional development book series,
Journal Year:
2024,
Volume and Issue:
unknown, P. 87 - 106
Published: Oct. 25, 2024
Machine
learning
(ML)
does
an
excellent
job
of
enhancing
traffic
management,
object
detection
and
collision
avoidance
in
autonomous
driving
which
has
direct
real-world
impact
on
smart
city
governance.
These
algorithms
process
a
vast
stream
real-time
data
coming
from
sensors,
cameras,
IoT
devices
to
facilitate
flow
by
minimizing
congestion
optimizing
routes.
ML
automatically
detects
pedestrians,
vehicles,
obstacles
with
great
accuracy
ensuring
that
safety
is
increased.
driven
systems
prevent
accidents
predicting
hazards
reacting
potential
ones
before
they
happen.
When
integrated
driving,
enables
cities
create
more
level
efficiency
transportation
foster
sustainable
urban
mobility.
This
technology
helps
improve
the
performance
vehicles
ties
aims
reduce
emissions,
energy
consumption
while
improving
overall
life.
Advances in information security, privacy, and ethics book series,
Journal Year:
2024,
Volume and Issue:
unknown, P. 257 - 292
Published: Sept. 27, 2024
Social
engineering
in
social
media
and
online
interactions
has
emerged
as
a
critical
concern
the
digital
age,
driven
by
increasing
interconnectivity
sharing
of
personal
information
online.
This
study
is
motivated
growing
prevalence
cyberattacks
that
exploit
human
psychology
rather
than
technical
vulnerabilities,
targeting
individuals
through
platforms
where
they
share
details.
By
examining
various
techniques
such
phishing,
pretexting,
baiting.
research
highlights
methods
attackers
use
to
manipulate
specific
vulnerabilities
environments.
The
leverages
data
from
recent
cases
surveys
analyze
effectiveness
these
impact
on
both
organizations.
findings
underscore
significant
risks
posed
attacks,
revealing
psychological
underpinnings
make
tactics
so
effective.