Exploring Privacy Leakage in Platform-Based Enterprises: A Tripartite Evolutionary Game Analysis and Multilateral Co-Regulation Framework
Peng Xu,
No information about this author
Jiaxin Li,
No information about this author
Zhuo Sun
No information about this author
et al.
Information,
Journal Year:
2025,
Volume and Issue:
16(3), P. 193 - 193
Published: March 2, 2025
Currently,
some
platform-based
enterprises
are
selling
users’
private
information
to
capture
high
revenue,
which
poses
a
great
threat
privacy
and
security
also
challenge
the
work
of
regulators.
This
paper
constructs
tripartite
evolutionary
game
model
among
enterprises,
users,
regulators
by
combining
theories
daily
activities.
explores
equilibrium
strategy
for
leakage
on
online
platforms
under
concept
multiparty
governance
designs
four
simulation
experiments
based
revenue
intervals
enterprises’
decisions.
Finally,
is
validated
means
simulation.
The
results
show
that
when
make
less
profit
from
compromising
privacy,
users
motivated
participate
in
shared
with
minimal
incentives
regulator.
Regulators
can
effectively
deter
fining
leaking
user
requiring
them
compensate
their
losses.
At
this
point,
they
achieve
effective
control
over
using
traditional
regulation.
When
profits
will
adhere
strategy.
at
its
most
serious,
rights
not
protected.
Users
tend
cooperate
form
regulatory
system,
but
does
influence
choice
enterprises.
Language: Английский
Strengthening Cybersecurity Resilience: An Investigation of Customers’ Adoption of Emerging Security Tools in Mobile Banking Apps
Irfan Riasat,
No information about this author
Mahmood Shah,
No information about this author
M. Sinan Gönül
No information about this author
et al.
Computers,
Journal Year:
2025,
Volume and Issue:
14(4), P. 129 - 129
Published: April 1, 2025
The
rise
in
internet-based
services
has
raised
risks
of
data
exposure.
manipulation
and
exploitation
sensitive
significantly
impact
individuals’
resilience—the
ability
to
protect
prepare
against
cyber
incidents.
Emerging
technologies
seek
enhance
cybersecurity
resilience
by
developing
various
security
tools.
This
study
aims
explore
the
adoption
tools
using
a
qualitative
research
approach.
Twenty-two
semi-structured
interviews
were
conducted
with
users
mobile
banking
apps
from
Pakistan.
Data
analyzed
thematic
analysis,
which
revealed
that
biometric
authentication
SMS
alerts
are
commonly
used.
Limited
use
multifactor
been
observed,
mainly
due
lack
awareness
or
implementation
knowledge.
Passwords
still
regarded
as
trusted
secure
mechanism.
findings
indicate
is
based
on
perceptions
usefulness,
perceived
trust,
ease
use,
while
knowledge
play
moderating
role.
also
proposes
framework
extending
TAM
include
multiple
introducing
moderator
influencing
users’
perceptions.
inform
practical
implications
for
financial
institutions,
application
developers,
policymakers
ensure
standardized
policy
online
platforms,
thereby
enhancing
overall
resilience.
Language: Английский
AI Integration in Public Administration
Andi Asrifan,
No information about this author
Akbar Akbar,
No information about this author
Muhammad Nur
No information about this author
et al.
Advances in public policy and administration (APPA) book series,
Journal Year:
2025,
Volume and Issue:
unknown, P. 95 - 122
Published: Feb. 14, 2025
This
chapter
examines
how
AI
might
alter
public
administration
by
improving
efficiency,
accessibility,
and
decision-making.
automates
ordinary
jobs,
freeing
up
servants
for
high-impact
work.
Predictive
analytics
improve
government
operations
offering
data-driven
insights
resource
allocation
preemptive
actions
in
healthcare,
urban
planning,
safety.
Chatbots
virtual
assistants
make
services
more
accessible
to
different
populations,
especially
those
with
linguistic
or
physical
obstacles.
The
also
highlights
the
ethical
operational
issues
of
administration.
Due
data
privacy,
security,
algorithmic
bias,
deployment
must
be
transparent,
accountable,
fair.
Public
entities
can
ethically
use
following
governance
guidelines
gaining
trust.
emphasizes
balanced
establish
an
inclusive,
efficient,
citizen-centered,
adaptable
sector.
Language: Английский
What Hinders Adoption of Artificial Intelligence for Cybersecurity in the Banking Sector
Information,
Journal Year:
2024,
Volume and Issue:
15(12), P. 760 - 760
Published: Nov. 29, 2024
AI-enabled
cybersecurity
systems
are
becoming
common,
but
their
effectiveness
is
reported
to
be
mixed
at
best
due
some
barriers.
The
primary
objective
of
this
systematic
literature
review
find
barriers
associated
with
the
use
systems.
A
comprehensive
approach
was
implemented
in
study.
Literature
sampled
from
different
databases
(Scopus
and
WOS)
synthesised
synthesise
using
an
system,
a
total
41
papers
were
selected
inclusion
criteria.
study
identified
several
barriers,
such
as
complexity
systems,
lack
top
management
support,
AI-proficient
employees,
regulatory
support
for
AI.
These
classified
into
technological,
organisational,
environmental.
This
paper
unique
it
focuses
on
advanced
technologies
expert
cybersecurity.
Thus,
current
research
makes
novel
contribution,
arguing
that
attention
required
toward
organisational-level
issues
protect
system
cyberattacks.
will
establish
way
researchers
evaluate
these
opening
new
avenues
empirical
practitioners
utilise
more
effectively.
Language: Английский