Sustainability,
Journal Year:
2024,
Volume and Issue:
17(1), P. 49 - 49
Published: Dec. 25, 2024
This
study
utilized
mixed
(qualitative
and
quantitative)
methods
to
discover
the
current
research
trends
for
AI
in
sustainable
Fintech
validate
a
model
through
empirical
analysis.
The
primary
purpose
of
this
is
explore
factors
influencing
acceptance
tools
within
industry
cross-national
perspective,
identifying
key
benefit
sacrifice
dimensions,
along
with
sustainability
considerations,
that
affect
users’
intentions
adopt
tools.
Drawing
on
bibliometric
keywords
approach,
we
first
conducted
an
overall
review
academic
literature
using
Web
Science
VOSviewer
(version
1.6.17),
covering
areas
related
applications
practices.
Additionally,
study,
built
validated
conceptual
framework
intention
use
by
selecting
subjects
from
Republic
Korea
China.
As
core
theoretical
premises
framework,
drew
Value-Based
Adoption
Model
(VAM)
Technology
Acceptance
(TAM).
Furthermore,
extended
TAM
embrace
dimensions
(perceived
responsibility
perceived
transparency).
Overall,
concludes
not
only
improves
efficiency
but
also
significantly
contributes
development,
suggesting
collaboration
between
experts
AI,
finance,
sustainability,
other
relevant
fields
more
integration
management.
existing
highlighting
synergistic
benefits
combining
offers
practical
insights
practitioners
policymakers.
Engineering Science & Technology Journal,
Journal Year:
2024,
Volume and Issue:
5(5), P. 1606 - 1626
Published: May 5, 2024
The
concept
paper
explores
the
critical
security
challenges
posed
by
Internet
of
Things
(IoT)
in
telecom
networks
and
proposes
solution
pathways
to
address
them.
As
IoT
devices
proliferate
networks,
they
introduce
new
vulnerabilities
threats
that
must
be
mitigated
ensure
integrity,
confidentiality,
availability
network
resources
data.
begins
highlighting
unique
devices,
including
their
large
attack
surface,
resource
constraints,
diverse
communication
protocols.
These
are
further
exacerbated
due
scale
complexity
infrastructure.
To
these
challenges,
a
multi-faceted
approach
combines
technical,
organizational,
regulatory
measures.
Technical
solutions
include
use
secure
protocols,
device
authentication
mechanisms,
encryption
techniques
protect
data
transit
at
rest.
Organizational
measures
focus
on
improving
awareness
training
among
operators
ensuring
development
deployment
devices.
Regulatory
advocate
for
implementation
standards
regulations
promote
privacy
deployments.
also
discusses
importance
collaboration
stakeholders,
operators,
manufacturers,
bodies,
effectively.
By
working
together,
stakeholders
can
develop
implement
best
practices
enhance
networks.
In
conclusion,
highlights
urgent
need
robust
paradigms
deployments
within
implementing
proposed
fostering
mitigate
risks
safe
Keywords:
IoT,
Telecom,
Networks,
Security.
Engineering Science & Technology Journal,
Journal Year:
2024,
Volume and Issue:
5(4), P. 1502 - 1523
Published: April 26, 2024
Human
trafficking
is
a
pervasive
and
complex
crime
that
affects
millions
of
people
worldwide.
In
recent
years,
there
has
been
growing
recognition
the
need
for
proactive
approaches
to
prevention
victim
reintegration.
Predictive
analytics,
data-driven
technology
uses
algorithms
analyze
patterns
predict
future
outcomes,
holds
great
promise
in
this
regard.
This
review
explores
application
predictive
analytics
reintegration,
highlighting
its
potential
enhance
support
victims
improve
overall
outcomes.
can
play
crucial
role
by
identifying
trends
may
indicate
activities.
By
analyzing
data
from
various
sources,
such
as
social
media,
financial
transactions,
law
enforcement
records,
help
identify
high-risk
areas
individuals,
enabling
agencies
NGOs
take
measures
prevent
trafficking.
For
example,
vulnerable
populations,
runaway
youth
or
migrants,
target
efforts
accordingly.
context
outcomes
factors
influence
victim's
likelihood
successful
reintegration
into
society.
on
education,
employment,
support,
interventions
are
most
likely
rebuild
their
lives.
types
services,
housing
assistance
job
training,
effective
helping
reintegrate
Overall,
revolutionize
tailored
specific
needs
victims.
However,
it
important
recognize
not
without
challenges,
including
concerns
about
privacy
ethical
implications.
Therefore,
essential
ensure
used
responsibly
accordance
with
guidelines
maximize
benefits
Keywords:
Analytics,
Trafficking,
Prevention,
Victim
Reintegration,
Systematic
Review.
Engineering Science & Technology Journal,
Journal Year:
2024,
Volume and Issue:
5(4), P. 1452 - 1472
Published: April 26, 2024
Virtual
Private
Networks
(VPNs)
play
a
crucial
role
in
ensuring
secure
communication
over
public
networks.
This
concept
paper
provides
comprehensive
review
of
security
protocols
used
VPNs
and
their
application
modern
The
begins
by
defining
explaining
importance
securing
data
transmission
untrusted
It
then
discusses
the
evolution
VPN
technology,
highlighting
transition
from
traditional
IPSec
SSL/TLS
to
more
approaches
such
as
WireGuard
QUIC.
also
examines
VPNs,
including
IPSec,
SSL/TLS,
newer
like
Each
protocol
is
analyzed
terms
its
features,
performance,
suitability
for
different
use
cases.
Furthermore,
explores
networks,
remote
access,
site-to-site
connectivity,
cloud-based
services.
challenges
considerations
involved
deploying
managing
today's
complex
network
environments.
In
conclusion,
emphasizes
highlights
need
organizations
carefully
evaluate
requirements
choose
appropriate
technologies
protect
Keywords:
VPN,
Security,
Applications,
Network.
Computer Science & IT Research Journal,
Journal Year:
2024,
Volume and Issue:
5(4), P. 950 - 971
Published: April 26, 2024
The
concept
paper
explores
the
transformative
impact
of
Software-Defined
Wide
Area
Network
(SD-WAN)
technologies
on
telecommunications
industry.
SD-WAN
has
emerged
as
a
game-changer,
offering
more
flexible,
agile,
and
cost-effective
alternative
to
traditional
(WAN)
solutions.
begins
by
providing
theoretical
foundation
for
SD-WAN,
discussing
its
key
principles,
architectural
components,
underlying
technologies.
It
how
leverages
software-defined
networking
(SDN)
principles
dynamically
manage
optimize
network
traffic
across
geographically
dispersed
locations,
improving
performance
reducing
costs.
practical
implications
in
industry
are
then
examined.
discusses
enables
organizations
enhance
performance,
reduce
latency,
improve
application
their
networks.
also
can
simplify
management,
security,
support
growing
demand
cloud-based
applications
services.
Furthermore,
challenges
considerations
associated
with
implementing
such
ensuring
compatibility
existing
infrastructure,
managing
security
risks,
compliance
regulatory
requirements.
potential
service
providers,
highlighting
opportunities
new
revenue
streams
business
models.
Overall,
this
provides
comprehensive
overview
underpinnings
telecommunications.
aims
inform
professionals,
researchers,
policymakers
about
future
Keywords:
Technology,
Telecom,
Security.
World Journal of Advanced Research and Reviews,
Journal Year:
2024,
Volume and Issue:
22(1), P. 1250 - 1265
Published: April 26, 2024
Empowering
youth
through
sexuality
and
leadership
education
is
crucial
for
their
holistic
development
well-being.
This
paper
provides
an
overview
of
approaches
outcomes
related
to
empowering
in
these
areas.
Effective
include
comprehensive
(CSE),
youth-friendly
services,
peer
education,
training.
CSE
equips
young
people
with
accurate,
age-appropriate
information
about
sexuality,
relationships,
reproductive
health,
enabling
them
make
informed
decisions.
Youth-friendly
services
provide
confidential,
nonjudgmental
health
tailored
people's
needs.
Peer
involves
teaching
peers
sexual
encouraging
open
dialogue.
Leadership
training
fosters
skills
such
as
communication,
decision-making,
advocacy,
become
leaders
communities.
leads
various
positive
outcomes.
It
improves
outcomes,
including
reduced
rates
unintended
pregnancies,
sexually
transmitted
infections
(STIs),
HIV/AIDS.
also
promotes
gender
equality
empowerment,
learn
rights
how
challenge
harmful
norms.
Additionally,
enhance
self-esteem,
communication
skills,
ability
decisions,
preparing
future
roles.
essential
By
providing
support,
we
can
help
navigate
challenges,
healthy
choices,
empowered
World Journal of Advanced Research and Reviews,
Journal Year:
2024,
Volume and Issue:
22(1), P. 1234 - 1249
Published: April 26, 2024
The
intersection
of
public
health
and
migration
policy
presents
complex
challenges
in
the
context
migrant
crises.
This
abstract
provides
an
overview
analysis
on
integrated
policy,
focusing
crafting
effective
responses
to
By
examining
key
findings
implications,
it
highlights
critical
importance
addressing
needs
within
frameworks.
reveals
that
crises
often
exacerbate
existing
vulnerabilities,
including
limited
access
healthcare,
inadequate
sanitation
facilities,
heightened
risks
infectious
diseases.
Integrated
approaches
prioritize
migrants
are
essential
for
mitigating
these
ensuring
well-being
both
populations
host
communities.
Key
underscore
adopting
a
comprehensive
rights-based
approach
policy.
involves
recognizing
migrants'
right
equitable
healthcare
services,
regardless
legal
status
or
nationality.
Furthermore,
requires
social
determinants
health,
such
as
poverty,
discrimination,
exclusion,
which
disproportionately
affect
populations.
Implications
future
research
development
include
need
greater
collaboration
coordination
among
stakeholders,
government
agencies,
civil
society
organizations,
international
partners.
Research
gaps
identified
further
investigation
into
specific
groups,
refugees,
asylum
seekers,
undocumented
migrants,
well
effectiveness
different
interventions
meeting
needs.
In
conclusion,
is
prioritizing
approach,
policymakers
can
mitigate
negative
impacts
promote
all
individuals
affected
by
urgency
frameworks
calls
commitment
equity
human
rights.
Engineering Science & Technology Journal,
Journal Year:
2024,
Volume and Issue:
5(4), P. 1431 - 1451
Published: April 26, 2024
The
concept
paper
explores
the
critical
security
challenges
posed
by
Internet
of
Things
(IoT)
in
telecom
networks
and
proposes
solution
pathways
to
address
them.
As
IoT
devices
proliferate
networks,
they
introduce
new
vulnerabilities
threats
that
must
be
mitigated
ensure
integrity,
confidentiality,
availability
network
resources
data.
begins
highlighting
unique
devices,
including
their
large
attack
surface,
resource
constraints,
diverse
communication
protocols.
These
are
further
exacerbated
due
scale
complexity
infrastructure.
To
these
challenges,
a
multi-faceted
approach
combines
technical,
organizational,
regulatory
measures.
Technical
solutions
include
use
secure
protocols,
device
authentication
mechanisms,
encryption
techniques
protect
data
transit
at
rest.
Organizational
measures
focus
on
improving
awareness
training
among
operators
ensuring
development
deployment
devices.
Regulatory
advocate
for
implementation
standards
regulations
promote
privacy
deployments.
also
discusses
importance
collaboration
stakeholders,
operators,
manufacturers,
bodies,
effectively.
By
working
together,
stakeholders
can
develop
implement
best
practices
enhance
networks.
In
conclusion,
highlights
urgent
need
robust
paradigms
deployments
within
implementing
proposed
fostering
mitigate
risks
safe
Keywords:
Security,
IoT,
Telecom,
Solutions,
Network.
Scientific Reports,
Journal Year:
2025,
Volume and Issue:
15(1)
Published: March 12, 2025
In
recent
years,
artificial
intelligence
(AI)
technology
has
rapidly
advanced
and
found
widespread
application
in
corporate
management.
Leveraging
AI
to
enhance
Environmental,
Social,
Governance
(ESG)
performance
promote
sustainable
development
become
a
focal
point
for
both
academia
industry.
This
study
aims
explore
the
impact
of
AI-driven
ESG
practices
on
central
state-owned
enterprises
China.
It
analyzes
specific
effects
governance,
environmental
protection,
social
responsibility,
evaluates
its
contribution
overall
enterprises.
The
employs
survey
method,
targeting
200
managers
employees
from
Central
questionnaire
comprises
15
questions
covering
three
dimensions:
responsibility.
Descriptive
statistics
correlation
analysis
are
used
conduct
an
in-depth
collected
data.
results
indicate
that
respondents
positively
assess
terms
with
particularly
strong
Additionally,
regression
model
is
constructed.
demonstrate
can
foster
Furthermore,
serves
as
mediating
factor
between
adoption
improvements
performance.
findings
provide
practical
insights
improving
management
efficiency,
enhancing
transparency,
boosting
image
brand
value.
Journal of Organizational and End User Computing,
Journal Year:
2025,
Volume and Issue:
37(1), P. 1 - 29
Published: March 21, 2025
The
paper
focuses
on
how
technology
readiness
affects
the
desire
of
bank
workers
in
China
to
use
artificial
intelligence
(AI)
finance
sector.
It
aims
show
what
factors
are
important
and
they
relate
each
other.
study
used
SMART
PLS
4
analyze
connections
between
these
factors.
Data
was
collected
from
374
employees
working
at
various
levels
banking
financial
sector
organizations
situation
provinces
China.
Trust
also
plays
a
big
role
this
connection.
For
future
studies,
it
would
be
good
look
gender
diversity
policies
career
paths
change
over
time
improve
we
measure
things
by
including
new
like
negative
sides
technology.
Advances in finance, accounting, and economics book series,
Journal Year:
2024,
Volume and Issue:
unknown, P. 449 - 480
Published: Dec. 13, 2024
Financial
inclusion
is
crucial
for
both
economic
growth
and
decreasing
poverty
levels,
however,
around
1.7
billion
adults
worldwide
still
do
not
have
access
to
banking
services.
AI-driven
financial
technologies
offer
creative
solutions
close
this
divide
through
offering
easy,
cost-effective,
effective
This
chapter
delves
into
the
present
situation
of
inclusion,
main
AI
driving
changes,
successful
examples,
obstacles,
future
outlook.
Through
use
artificial
intelligence,
we
ability
develop
a
system
that
more
inclusive,
giving
power
individuals
promoting
growth.