Green Investments Promotions and Future Trends in Neuromarketing and Sustainable Finance DOI
Harshi Garg, Mohammad Kashif,

Priyank Sharma

et al.

Advances in business strategy and competitive advantage book series, Journal Year: 2024, Volume and Issue: unknown, P. 245 - 284

Published: Oct. 18, 2024

Green investments provide a major effect on neuromarketing by increasing consumer engagement in sustainable companies selecting for activities that improve permanent ecosystem and fiscal resilience. It analyzes the application of investment, to carry out studies finance green investment. This chapter offers an extensive context while describing neuromarketing, how it might help investors, researchers enable beginning new era. The findings showed positive correlation between age promotion investment trends. tries find these complex intricacies encourage discussion educate general people, researchers, scholars, advertisers since they offer understanding several applications tools, along with their importance making choices; such awareness may commercial efficacy finance.

Language: Английский

Security paradigms for IoT in telecom networks: Conceptual challenges and solution pathways DOI Creative Commons

Godwin Nzeako,

Chukwuekem David Okeke,

Michael Oladipo Akinsanya

et al.

Engineering Science & Technology Journal, Journal Year: 2024, Volume and Issue: 5(5), P. 1606 - 1626

Published: May 5, 2024

The concept paper explores the critical security challenges posed by Internet of Things (IoT) in telecom networks and proposes solution pathways to address them. As IoT devices proliferate networks, they introduce new vulnerabilities threats that must be mitigated ensure integrity, confidentiality, availability network resources data. begins highlighting unique devices, including their large attack surface, resource constraints, diverse communication protocols. These are further exacerbated due scale complexity infrastructure. To these challenges, a multi-faceted approach combines technical, organizational, regulatory measures. Technical solutions include use secure protocols, device authentication mechanisms, encryption techniques protect data transit at rest. Organizational measures focus on improving awareness training among operators ensuring development deployment devices. Regulatory advocate for implementation standards regulations promote privacy deployments. also discusses importance collaboration stakeholders, operators, manufacturers, bodies, effectively. By working together, stakeholders can develop implement best practices enhance networks. In conclusion, highlights urgent need robust paradigms deployments within implementing proposed fostering mitigate risks safe Keywords: IoT, Telecom, Networks, Security.

Language: Английский

Citations

34

RegTech innovations streamlining compliance, reducing costs in the financial sector DOI Creative Commons

Olufunke Olawale,

Funmilayo Aribidesi Ajayi,

Chioma Ann Udeh

et al.

GSC Advanced Research and Reviews, Journal Year: 2024, Volume and Issue: 19(1), P. 114 - 131

Published: April 26, 2024

Regulatory Technology (RegTech) innovations are reshaping the landscape of compliance within financial sector, presenting opportunities for institutions to enhance efficiency and reduce operational costs. This paper examines impact RegTech solutions by focusing on their capacity streamline processes mitigate expenses associated with regulatory adherence. Through a qualitative research methodology that includes case studies expert interviews, study explores various dimensions applications, ranging from identity verification risk management fraud prevention reporting. Key findings indicate tools leverage advanced technologies such as artificial intelligence, machine learning, blockchain automate complex tasks, thereby reducing need manual intervention minimizing human error. These facilitate real-time monitoring analysis transactions, which enhances accuracy efficiency. Furthermore, reveals adoption significantly lowers costs optimizing resource allocation time labor traditionally required compliance-related activities. The concludes hold potential transform sector's approach management. By embracing these technologies, can not only ensure more effectively but also achieve considerable cost savings. calls further into long-term impacts industry's suggests bodies collaborate foster an environment conducive innovation implementation.

Language: Английский

Citations

29

PREDICTIVE ANALYTICS FOR PROACTIVE SUPPORT IN TRAFFICKING PREVENTION AND VICTIM REINTEGRATION DOI Creative Commons

Ayo Amen Ediae,

Chidinma Favour Chikwe,

Kevin Namiiro Kuteesa

et al.

Engineering Science & Technology Journal, Journal Year: 2024, Volume and Issue: 5(4), P. 1502 - 1523

Published: April 26, 2024

Human trafficking is a pervasive and complex crime that affects millions of people worldwide. In recent years, there has been growing recognition the need for proactive approaches to prevention victim reintegration. Predictive analytics, data-driven technology uses algorithms analyze patterns predict future outcomes, holds great promise in this regard. This review explores application predictive analytics reintegration, highlighting its potential enhance support victims improve overall outcomes. can play crucial role by identifying trends may indicate activities. By analyzing data from various sources, such as social media, financial transactions, law enforcement records, help identify high-risk areas individuals, enabling agencies NGOs take measures prevent trafficking. For example, vulnerable populations, runaway youth or migrants, target efforts accordingly. context outcomes factors influence victim's likelihood successful reintegration into society. on education, employment, support, interventions are most likely rebuild their lives. types services, housing assistance job training, effective helping reintegrate Overall, revolutionize tailored specific needs victims. However, it important recognize not without challenges, including concerns about privacy ethical implications. Therefore, essential ensure used responsibly accordance with guidelines maximize benefits Keywords: Analytics, Trafficking, Prevention, Victim Reintegration, Systematic Review.

Language: Английский

Citations

20

VIRTUAL PRIVATE NETWORKS (VPN): A CONCEPTUAL REVIEW OF SECURITY PROTOCOLS AND THEIR APPLICATION IN MODERN NETWORKS DOI Creative Commons

Michael Oladipo Akinsanya,

Cynthia Chizoba Ekechi,

Chukwuekem David Okeke

et al.

Engineering Science & Technology Journal, Journal Year: 2024, Volume and Issue: 5(4), P. 1452 - 1472

Published: April 26, 2024

Virtual Private Networks (VPNs) play a crucial role in ensuring secure communication over public networks. This concept paper provides comprehensive review of security protocols used VPNs and their application modern The begins by defining explaining importance securing data transmission untrusted It then discusses the evolution VPN technology, highlighting transition from traditional IPSec SSL/TLS to more approaches such as WireGuard QUIC. also examines VPNs, including IPSec, SSL/TLS, newer like Each protocol is analyzed terms its features, performance, suitability for different use cases. Furthermore, explores networks, remote access, site-to-site connectivity, cloud-based services. challenges considerations involved deploying managing today's complex network environments. In conclusion, emphasizes highlights need organizations carefully evaluate requirements choose appropriate technologies protect Keywords: VPN, Security, Applications, Network.

Language: Английский

Citations

19

THEORETICAL UNDERPINNINGS AND PRACTICAL IMPLICATIONS OF SD-WAN TECHNOLOGIES IN TELECOMMUNICATIONS DOI Creative Commons

Michael Oladipo Akinsanya,

Cynthia Chizoba Ekechi,

Chukwuekem David Okeke

et al.

Computer Science & IT Research Journal, Journal Year: 2024, Volume and Issue: 5(4), P. 950 - 971

Published: April 26, 2024

The concept paper explores the transformative impact of Software-Defined Wide Area Network (SD-WAN) technologies on telecommunications industry. SD-WAN has emerged as a game-changer, offering more flexible, agile, and cost-effective alternative to traditional (WAN) solutions. begins by providing theoretical foundation for SD-WAN, discussing its key principles, architectural components, underlying technologies. It how leverages software-defined networking (SDN) principles dynamically manage optimize network traffic across geographically dispersed locations, improving performance reducing costs. practical implications in industry are then examined. discusses enables organizations enhance performance, reduce latency, improve application their networks. also can simplify management, security, support growing demand cloud-based applications services. Furthermore, challenges considerations associated with implementing such ensuring compatibility existing infrastructure, managing security risks, compliance regulatory requirements. potential service providers, highlighting opportunities new revenue streams business models. Overall, this provides comprehensive overview underpinnings telecommunications. aims inform professionals, researchers, policymakers about future Keywords: Technology, Telecom, Security.

Language: Английский

Citations

14

Empowering youth through sexuality and leadership education: Approaches and outcomes DOI Creative Commons

Ayo Amen Ediae,

Chidinma Favour Chikwe,

Kevin Namiiro Kuteesa

et al.

World Journal of Advanced Research and Reviews, Journal Year: 2024, Volume and Issue: 22(1), P. 1250 - 1265

Published: April 26, 2024

Empowering youth through sexuality and leadership education is crucial for their holistic development well-being. This paper provides an overview of approaches outcomes related to empowering in these areas. Effective include comprehensive (CSE), youth-friendly services, peer education, training. CSE equips young people with accurate, age-appropriate information about sexuality, relationships, reproductive health, enabling them make informed decisions. Youth-friendly services provide confidential, nonjudgmental health tailored people's needs. Peer involves teaching peers sexual encouraging open dialogue. Leadership training fosters skills such as communication, decision-making, advocacy, become leaders communities. leads various positive outcomes. It improves outcomes, including reduced rates unintended pregnancies, sexually transmitted infections (STIs), HIV/AIDS. also promotes gender equality empowerment, learn rights how challenge harmful norms. Additionally, enhance self-esteem, communication skills, ability decisions, preparing future roles. essential By providing support, we can help navigate challenges, healthy choices, empowered

Language: Английский

Citations

13

Integrated public health and migration policy: Crafting effective responses to migrant crises DOI Creative Commons

Ayo Amen Ediae,

Chidinma Favour Chikwe,

Kevin Namiiro Kuteesa

et al.

World Journal of Advanced Research and Reviews, Journal Year: 2024, Volume and Issue: 22(1), P. 1234 - 1249

Published: April 26, 2024

The intersection of public health and migration policy presents complex challenges in the context migrant crises. This abstract provides an overview analysis on integrated policy, focusing crafting effective responses to By examining key findings implications, it highlights critical importance addressing needs within frameworks. reveals that crises often exacerbate existing vulnerabilities, including limited access healthcare, inadequate sanitation facilities, heightened risks infectious diseases. Integrated approaches prioritize migrants are essential for mitigating these ensuring well-being both populations host communities. Key underscore adopting a comprehensive rights-based approach policy. involves recognizing migrants' right equitable healthcare services, regardless legal status or nationality. Furthermore, requires social determinants health, such as poverty, discrimination, exclusion, which disproportionately affect populations. Implications future research development include need greater collaboration coordination among stakeholders, government agencies, civil society organizations, international partners. Research gaps identified further investigation into specific groups, refugees, asylum seekers, undocumented migrants, well effectiveness different interventions meeting needs. In conclusion, is prioritizing approach, policymakers can mitigate negative impacts promote all individuals affected by urgency frameworks calls commitment equity human rights.

Language: Английский

Citations

13

SECURITY PARADIGMS FOR IOT IN TELECOM NETWORKS: CONCEPTUAL CHALLENGES AND SOLUTION PATHWAYS DOI Creative Commons

Michael Oladipo Akinsanya,

Cynthia Chizoba Ekechi,

Chukwuekem David Okeke

et al.

Engineering Science & Technology Journal, Journal Year: 2024, Volume and Issue: 5(4), P. 1431 - 1451

Published: April 26, 2024

The concept paper explores the critical security challenges posed by Internet of Things (IoT) in telecom networks and proposes solution pathways to address them. As IoT devices proliferate networks, they introduce new vulnerabilities threats that must be mitigated ensure integrity, confidentiality, availability network resources data. begins highlighting unique devices, including their large attack surface, resource constraints, diverse communication protocols. These are further exacerbated due scale complexity infrastructure. To these challenges, a multi-faceted approach combines technical, organizational, regulatory measures. Technical solutions include use secure protocols, device authentication mechanisms, encryption techniques protect data transit at rest. Organizational measures focus on improving awareness training among operators ensuring development deployment devices. Regulatory advocate for implementation standards regulations promote privacy deployments. also discusses importance collaboration stakeholders, operators, manufacturers, bodies, effectively. By working together, stakeholders can develop implement best practices enhance networks. In conclusion, highlights urgent need robust paradigms deployments within implementing proposed fostering mitigate risks safe Keywords: Security, IoT, Telecom, Solutions, Network.

Language: Английский

Citations

10

Digitalization and Corporate Social Responsibility: A Case Study of the Moroccan Auto Insurance Sector DOI Creative Commons
Soukaina Abdallah-Ou-Moussa, Martín Wynn, Omar Kharbouch

et al.

Administrative Sciences, Journal Year: 2024, Volume and Issue: 14(11), P. 282 - 282

Published: Nov. 2, 2024

The aim of this article is to explore the impact digitalization on corporate social responsibility (CSR) in automobile insurance sector Morocco. This first explores theoretical and conceptual foundations digital transformation CSR. A mixed methods approach then used, combining qualitative interviews with a wider quantitative survey, investigate how innovations influence CSR practices. Interview analysis provides basis for development framework eight hypotheses, which are tested using techniques analyze survey data. results reveal several links between benefits Claims management platforms, roadside assistance tools, vehicle assessment inspection all positively policyholders’ well-being terms compensation asset preservation, thereby enhancing profile insurers. Similarly, augmented reality (AR) virtual (VR) training simulation, as well repair assistance, have positive impacts advance positioning has limitations it based narrow industrial single country, but nonetheless highlights certain relevant interrelationships CSR, contributing theory practice these research areas.

Language: Английский

Citations

3

Eco-Virtual as the Role of Virtual Reality Transformations in Environmental Engineering DOI

A. Ashwini,

G. Preemi,

P. M. Ansho

et al.

Advances in computer and electrical engineering book series, Journal Year: 2024, Volume and Issue: unknown, P. 82 - 102

Published: June 30, 2024

With the emergence of VR, a new opportunity was opened for discussion in many sectors, including environmental engineering. This chapter addresses integration virtual reality within sustainability, and how application VR technology has disrupted engineering field by aiding architects engineers their designs assessments any built environment. empowers to work through tagged models make eco-friendly decisions. It is also worth mentioning that contrast real world, capable simulating complex interactions with environment visualizing real-time effects, which can be regarded as an advantage. evident use platforms, it possible mimic some settings are risky students professionals enact on while practice. The concludes highlighting further development research industry way more sophisticated engineering, thereby global sustainable goals.

Language: Английский

Citations

1