Published: Dec. 9, 2024
Language: Английский
Published: Dec. 9, 2024
Language: Английский
Computers & Security, Journal Year: 2025, Volume and Issue: 151, P. 104317 - 104317
Published: Jan. 6, 2025
Language: Английский
Citations
1International Journal of Religion, Journal Year: 2024, Volume and Issue: 5(10), P. 4766 - 4782
Published: July 26, 2024
Artificial intelligence (AI) is a powerful technology that helps cybersecurity teams automate repetitive tasks, accelerate threat detection and response, improve the accuracy of their actions to strengthen security posture against various issues cyberattacks. This objective focuses on analysing how AI-based cyber (CS) solutions performance in financial transactions banking sectors. It also aims identify latest advancements AI-driven CS) research enhance operational efficiency sector. article presents systematic literature review detailed analysis AI use cases for transactions. The resulted 800 studies, which 225 articles remain. paper will provide readers with comprehensive overview potential identifies future opportunities examining application areas, advanced methods, data representation, development new infrastructures successful adoption might increase systems’ by increasing defence approaches machine learning deep learning, fraud detection, this makes sure secure safe transaction. study make safer security. highlights vital role evaluation continuous adaptation AI. In near future, topic should focus more collaboration among AI, security, system developers better secured outcomes.
Language: Английский
Citations
5Perkara., Journal Year: 2025, Volume and Issue: 2(4), P. 603 - 614
Published: Jan. 5, 2025
The rapid advancement of digital technology has posed significant challenges, particularly concerning the protection children from online exploitation. This study examines effectiveness child regulations in Indonesia, addressing critical issues increasing cases exploitation cyberspace. research aims to evaluate regulatory framework's strengths and limitations while providing actionable recommendations enhance system's efficiency. A normative approach was employed, incorporating content analysis relevant legal documents, comparative law with international regulations, secondary data government reports scholarly literature. revealed a consistent increase reported exploitation, limited progress resolving these cases. Despite existing systemic such as low literacy, weak inter-agency coordination, inadequate resources significantly hinder their implementation. Additionally, Indonesia lags behind developed nations adopting modern technologies, artificial intelligence, for early detection findings emphasize urgent need strategic investments literacy programs, enhanced enforcement capabilities, integration advanced technologies into mechanisms. Furthermore, this highlights role collaboration cross-border implications extend policymakers, practitioners, developers, offering comprehensive perspective on strengthening age. contributes theoretical discourse offers practical solutions developing more robust policies beyond. Future studies are encouraged explore longitudinal impacts partnerships mitigating
Language: Английский
Citations
0Urban Governance, Journal Year: 2025, Volume and Issue: unknown
Published: Jan. 1, 2025
Language: Английский
Citations
0SSRN Electronic Journal, Journal Year: 2025, Volume and Issue: unknown
Published: Jan. 1, 2025
This study investigates the frameworks and challenges of real-time data governance compliance in cloud-native robotics systems, focusing on integrity, cloud security, regulatory adherence, cybersecurity risks. Using extensive datasets from Amazon AWS Open Data Registry, EU GDPR Enforcement Tracker, Kaggle's IoT dataset, analysis explores systems' accuracy, governance. were extracted through a standardized process: performance metrics, including latency error rates, gathered to assess system efficiency, violation records analyzed Tracker understand trends, volume metrics dataset correlated identify challenges. Together, these sources provide comprehensive insights into how systems can be optimized for realtime operations. The highlights security benefits advantages inherent frameworks, such as monitoring, automated threat detection, encryption, which collectively reduce unauthorized access risks while supporting operational efficiency. Findings indicate high accuracy (0.51% rate) low (mean 48.96 ms) across systems; however, processing time variability (standard deviation 28.61 signals need further optimization time-sensitive environments. regression violations reveals substantial penalty increase €53,789.41 per violation, emphasizing financial non-compliance. Correlation (r = 0.083 failures) suggests that external threats have greater impact than internal underscoring importance adaptive support both integrity systems.
Language: Английский
Citations
0Computers & Security, Journal Year: 2025, Volume and Issue: unknown, P. 104329 - 104329
Published: Jan. 1, 2025
Language: Английский
Citations
0Smart and Sustainable Built Environment, Journal Year: 2025, Volume and Issue: unknown
Published: Feb. 3, 2025
Purpose As cities increasingly embrace smart technologies to enhance efficiency, sustainability and quality of life, integrating cybersecurity data protection measures becomes paramount. This paper analyzes practices based on the existing strategies projects in cities. Design/methodology/approach A research methodology involving searching for resources, content analysis Delphi method was developed select sample cities, identify relevant analyze categorize their content, validate relevance transform them into a list recommendations. Findings The findings include validated 39 recommendations categorized 6 categories implementing robust We found that employ various address protection, including technical solutions, organizational practices, policies human resources initiatives. economy governance components are prioritized regarding measures, while living environments receive less attention than others. There regional differences implementation with Asia Europe demonstrating higher levels engagement. Originality/value provides an approach different contexts gather best practices. identified contribute building sustainable resilient urban governance.
Language: Английский
Citations
0Environmental Hazards, Journal Year: 2025, Volume and Issue: unknown, P. 1 - 27
Published: March 6, 2025
Language: Английский
Citations
0Journal of Cybersecurity and Privacy, Journal Year: 2025, Volume and Issue: 5(2), P. 19 - 19
Published: April 28, 2025
While security frameworks like the NIST CSF and ISO 27001 provide organizations with standardized best practices for cybersecurity, these must be implemented in by people necessary skills knowledge supported effective technological solutions. This article explores challenges opportunities of building sustainable cybersecurity capabilities resource-constrained organizations, specifically Norwegian municipalities. The research introduces concept capabilities, emphasizing importance a socio-technical approach that integrates technology, people, organizational structure. A mixed-methods study was employed, combining document analysis relevant modified Delphi semi-structured interviews municipal practitioners. Findings highlight six core within municipalities, along key implementing sustaining capabilities. These include ambiguities role formalization, gaps, difficulties deploying advanced technologies, communication barriers between central IT functional areas. Furthermore, potential artificial intelligence cooperative strategies to enhance is considered. Ultimately, highlights need holistic perspective developing offering implications both practice municipalities local government.
Language: Английский
Citations
0Applied Sciences, Journal Year: 2024, Volume and Issue: 14(24), P. 12036 - 12036
Published: Dec. 23, 2024
The number of vulnerabilities identified annually has increased substantially, thereby raising the risks associated with online services. implementation cybersecurity management measures in accordance European NIS2 Directive is optional at local authority level. This study analyzes external perimeter nearly 7000 municipalities and proposes a simplified security framework that provides comprehensive view across regions. A complete data set was assembled on Technological Competence profiles all Spain over two-year period. were gathered from relation to security, availability SEO posture areas. survey conducted determine level concern among citizens regarding issues municipal services, 188 respondents. Some regions as exhibiting particularly high homogeneous levels security. In contrast, other found be below expected presence supra-local entities, such “Diputaciones”, been demonstrated facilitate harmonization regional while simultaneously reducing technological fragmentation operational expenditure.
Language: Английский
Citations
2