Approaches to global sustainability, markets, and governance, Journal Year: 2024, Volume and Issue: unknown, P. 149 - 164
Published: Jan. 1, 2024
Language: Английский
Approaches to global sustainability, markets, and governance, Journal Year: 2024, Volume and Issue: unknown, P. 149 - 164
Published: Jan. 1, 2024
Language: Английский
Advances in information security, privacy, and ethics book series, Journal Year: 2024, Volume and Issue: unknown, P. 236 - 290
Published: Jan. 26, 2024
The widespread use of drones across various industries is leading to significant transformations. However, the resulting concerns about data security and privacy are quite significant. This section offers a thorough exploration these important issues, providing insights into challenges they pose potential ways address them. Starting with an overview increasing utility drones, this chapter highlights importance strong protocols for privacy. By examining complexities collection storage, it reveals different types that gather, delves storage techniques, vulnerabilities, setting stage effective countermeasures. At core discussion cybersecurity risks, which range from cyberattacks on drone systems unauthorized access tampering data. To sum up, serves as comprehensive guide understanding, addressing, mitigating related in operations.
Language: Английский
Citations
18Advances in information security, privacy, and ethics book series, Journal Year: 2024, Volume and Issue: unknown, P. 405 - 451
Published: Jan. 26, 2024
The rapid proliferation of drones across various industries necessitates a comprehensive examination the privacy and ethical implications in their cybersecurity landscape. This chapter aims to dissect address these concerns, providing valuable resource for scholars, policymakers, industry practitioners. objectives are clearly outlined, emphasizing exploration challenges considerations within context drone cybersecurity. begins by delving into associated with operations, focusing on surveillance concerns responsible collection storage sensitive data. Ethical then scrutinized, highlighting dual-use nature intricacies autonomous decision-making. A critical evaluation existing regulatory landscape governing operations frameworks is presented, shedding light effectiveness limitations.
Language: Английский
Citations
12Advances in information security, privacy, and ethics book series, Journal Year: 2024, Volume and Issue: unknown, P. 148 - 195
Published: Jan. 26, 2024
The rapid proliferation of drone technology has ushered in a new era innovation and convenience across various industries. However, this technological advancement also given rise to host cybersecurity challenges that demand proactive attention. This chapter delves into the dynamic landscape security, exploring evolving trends emerging threats shape field. Beginning with an overview advancements, including integration artificial intelligence machine learning, examines their implications for cybersecurity. It then scrutinizes growing influence swarms autonomous operations, pinpointing associated strategies securing these systems. explores expansion operations beyond visual line sight (BVLOS) risks involved, emphasizing importance secure communications legal considerations.
Language: Английский
Citations
11Advances in information security, privacy, and ethics book series, Journal Year: 2024, Volume and Issue: unknown, P. 42 - 87
Published: Jan. 26, 2024
The rapid proliferation of drones, coupled with their increasing integration into various aspects our lives, has brought to the forefront a myriad ethical considerations in realm cybersecurity. This chapter delves deep intricate web challenges surrounding drone cybersecurity, aiming provide comprehensive understanding this critical issue. introduction sets stage by highlighting essential role ethics emphasizing need for responsible decision-making an age where drones are omnipresent. It lays out scope, objectives, and key concepts research, underscoring contributions it makes field. core explores principles underpinning cybersecurity elucidates how these can be applied domain technology. authors delve delicate balance between security privacy, discussing implications data collection, retention, surveillance context drones.
Language: Английский
Citations
10Published: Sept. 2, 2024
Ransomware, a combination of "ransom" and "malware," is type malicious software designed to encrypt or block access victim's data system, demanding ransom for its release Initially targeting individuals, ransomware has evolved attack businesses greater financial gain. It mainly exists in two forms: encrypting ransomware, which holds hostage, non-encrypting blocks system displays note. The energy sector been notably targeted by exemplified the 2021 on Colonial Pipeline DarkSide group, led temporary shutdown significant fuel shortage US East Coast. Similarly, 2023, Russian hackers using LockBit disrupted Royal Mail, halting international deliveries incurring millions recovery costs despite no payment. These incidents underscore need comprehensive cybersecurity strategies that combine human vigilance with advanced technologies like AI machine learning. By adopting multi-layered protection approach, organizations can better prepare mitigate risks posed attacks safeguarding sensitive ensuring business continuity.
Language: Английский
Citations
8Advances in information security, privacy, and ethics book series, Journal Year: 2024, Volume and Issue: unknown, P. 281 - 332
Published: July 26, 2024
Protecting AI in web applications is necessary. This domain a composite of technology and huge scope with good prospects immense difficulties. chapter covers the landscape security issues advancing generative techniques for integration into development frameworks. The initial section on development—a conversation subtleties AI-based methods. In literal stance, offers 13 ways to approach it. Among threats are those that introduce related deployments, which illustrate why it vital defenders infrastructure owners implement mitigation measures proactively. pertains privacy data lessons securing preventing vulnerability. explores attacks, model poisoning, bias issues, defence mechanisms, long-term strategies. Additionally, Service A promotes transparency, explainability, compliance applicable laws while structuring methodology deployment methods/operation. text outlines how respond recover from incidents as provides response frameworks everyone involved managing breaches. Finally, addresses trends, possible threats, learned real-world case studies. order contribute addressing these research needs, this sheds light considerations associated suggests recommendations can help researchers, practitioners, policymakers enhance posture popular advancements used generating applications.
Language: Английский
Citations
2Advances in logistics, operations, and management science book series, Journal Year: 2024, Volume and Issue: unknown, P. 89 - 132
Published: Jan. 19, 2024
This chapter explores the convergence of Industry 4.0 technologies and sustainable supply chain practices, presenting a comprehensive overview these digital advancements' transformative potential. The begins by defining intersection between sustainability 4.0, emphasizing pivotal role in fostering environmentally socially responsible chains. With clear objectives mind, exploration delves into impact key on practices. discussion spans utilization internet things (IoT) for real-time monitoring, big data analytics informed decision-making, integration robotics to enhance ethical manufacturing.
Language: Английский
Citations
2Advances in logistics, operations, and management science book series, Journal Year: 2024, Volume and Issue: unknown, P. 176 - 233
Published: Jan. 19, 2024
The rapid advancement of Industry 4.0 technologies has ushered in a new era supply chain management (SCM) that places sustainability at its core. This chapter goes deep into the critical intersection metrics and measurement 4.0-enabled SCM, exploring dynamic landscape where cutting-edge technology meets environmental, social, economic responsibility. Beginning with an introduction to 4.0's transformative role authors elucidate importance this context. research's scope objectives are outlined, emphasizing need decipher intricacies ecosystem. provide comprehensive elucidation key concepts, definitions, unique contributions research endeavour. A central focus is alignment SCM United Nations' Sustainable Development Goals (SDGs), illuminating how emerging can act as catalysts for achieving these global objectives.
Language: Английский
Citations
2Advances in systems analysis, software engineering, and high performance computing book series, Journal Year: 2024, Volume and Issue: unknown, P. 110 - 124
Published: May 2, 2024
Artificial intelligence in healthcare has the potential to enhance diagnostics, patient care, and medical research. However, trust AI-driven decision-making processes is crucial as AI systems become more complex. Explainable artificial (XAI) a strategy ensure solutions are efficient understandable professionals patients. XAI can improve practitioners' processes, increase recommendations, boost patient-doctor communication. Applications include imaging, predictive analytics, drug development, tailored treatment plans. The chapter discusses ethical regulatory implications of healthcare, focusing on data privacy security. Future trends will focus improving outcomes service quality by making accessible consistent with norms.
Language: Английский
Citations
1Advances in digital crime, forensics, and cyber terrorism book series, Journal Year: 2024, Volume and Issue: unknown, P. 235 - 286
Published: Sept. 12, 2024
Cyber threats are becoming more advanced, and so is cybersecurity, which getting intellectual better at hiding its presence. The requirement to achieve the balance between proactive resistive threat-hunting measures in this dynamic environment very high. Part four outlines how new AI techniques enable design of existing processes for hunting potential threats. main objective digress into core principles threat hunting, starting from being including scenarios deducing clues based on hypothesis. Then, authors will highlight limitations conventional methods detecting gimmicks that fool even skilled hunters with an unseen smoking hiddenly a never-ending evolutionary process. Two well-studied approaches tackling these challenges generative models like adversarial networks (GANs) variational autoencoders (VAEs).
Language: Английский
Citations
1