International Journal of Computations Information and Manufacturing (IJCIM),
Journal Year:
2022,
Volume and Issue:
2(2)
Published: Nov. 20, 2022
Numerous
opportunities
are
emerging
due
to
the
Internet
of
Things'
(IoT)
rapid
development,
which
has
potential
significantly
improve
human
quality
life
in
many
areas.
The
healthcare
industry
is
main
place
where
IoT
can
enhance
our
lives.
Security
and
privacy
concerns,
however,
take
center
stage
electronic
health
(eHealth)
systems,
incorporation
makes
them
increasingly
difficult
address.
Due
numerous
stakeholders
its
broader
ecosystem,
majority
IoMT
raises
security
concerns.
IoT-based
system
various
features.
This
search
provides
an
Identity-Based
Cryptography
cornerstone
management
technique
that
uses
collaborative
authentication
a
secret
passcode
protect
transformation
data
between
any
device
other
entity
from
different
company
or
domain
(IBC).
International Journal of Technology Innovation and Management (IJTIM),
Journal Year:
2022,
Volume and Issue:
2(2)
Published: Oct. 27, 2022
Purpose:
The
research
explored
empirical
evidence
to
assess
the
impact
of
cyber
security
and
supply
chain
risk
on
digital
operations
in
UAE
pharmaceutical
industry.
Methodology/Design/Approach:
Based
responses
from
243
personnel
working
at
14
manufacturing
companies
Dubai,
data
were
examined
for
normality,
instrument
validity
regression
analysis.
Cyber
SC
by
applying
convenient
sampling
descriptive
analytical
design.
Findings:
findings
validated
significant
positive
association
between
with
operations.
Research
implications
Limitations:
model
was
developed
three
variables
evaluated
only
industry
Dubai.
Future
should
focus
multiple
industries
covering
a
larger
geographic
area.
Practical
implications:
When
suppliers
are
highly
concentrated,
customer-focused
organisations
uncertain
levels
transformation
could
improve
their
ability
manage
diversifying
clients.
Pharmaceutical
firms
may
require
greater
technology-based
build
maintain
customer
trust.
Originality
Value:
To
illustrate
how
has
relationship
security,
operations,
highlights
convoluted
consequences
that
have
not
been
previously
considered.
International Journal of Technology Innovation and Management (IJTIM),
Journal Year:
2022,
Volume and Issue:
2(2)
Published: Oct. 27, 2022
There
has
been
a
lot
of
media
debate
about
“Artificial
Intelligence
(AI)
Ethics”
nowadays
and
many
scientists
researchers
have
shared
their
views
on
this
topic.
As
technology
is
evolving,
security
issues
are
also
emerging
in
new
forms.
Machines
should
be
ethical,
the
“Build
Design”
such
machines
based
ethics.
Infact,
AI
must
Ethics
as
part
design
within
software
code,
just
like
measures
encoded
within.
In
review
paper,
statistics
incidents
areas
presented
along
with
social
impact.
Using
online
Incident
Database,
some
applications
identified,
which
shows
unethical
use
AI.
Applications
Language
Computer
vision
models,
intelligent
robots
autonomous
driving
top
ranking.
Ethical
appear
various
forms
incorrect
technology,
racism,
non-safety
malicious
algorithms
biasness.
Data
collection
helped
to
identify
ethical
Time,
Geographic
Locations,
Application
Areas,
Classifications
Crypto
currency
is
subject
to
persistent
and
dynamic
cyber
security
risks.
As
with
all
types
of
online
assets,
digital
wallets,
exchanges
even
individual
user
accounts
are
often
both
malicious
attacks
other
vulnerabilities.
Blockchain
technology,
due
its
distributed
nature,
more
secure
provides
a
strong
platform
on
which
build
platforms.
This
paper
seeks
examine
the
performance
technology
for
improving
crypto
transactions.
To
assess
system's
in
this
regard,
we
conduct
series
tests
evaluate
resilience
against
various
attacks,
including
denial
service
(DDoS)
specialized
attacks.
We
measures
employed
by
platforms,
multi-signature
identity
solutions,
data
encryption
approaches.
The
proposed
model
achieved
86.82
%
hit
rate,
87.05
%
miss
rate
88.57%
fall
out.
Our
results,
based
an
extensive
empirical
study
transactions
records,
indicate
that
significantly
enhances
compared
technologies.
findings
offer
quantitative
evidence
Blockchain-secured
networks
less
vulnerable
attack
than
conventional
payment
systems.
International Journal of Computations Information and Manufacturing (IJCIM),
Journal Year:
2022,
Volume and Issue:
2(2)
Published: Nov. 21, 2022
For
every
sector,
managing
supply
chains
is
a
difficult
task,
but
the
healthcare
sector
faces
risks
and
complication
since
disrupted
chain
could
have
direct
impact
on
patient
security
medical
results.
In
this
assignment
we
will
discuss
how
Blockchain
technology
one
possible
method
for
enhancing
health
E-supply
chain's
security,
integrity,
data
provenance,
usefulness.
The
supply,
product
Internet
of
Medical
Things
(IOMT),
care
are
all
given
such
priority,
goal
research
to
provide
description
advantages
drawbacks
using
blockchain
in
distribution
network.
unfulfilled
potential
increase
requires
greater
research,
analysis,
integration
with
regulatory
frameworks
has
been
discussed.
2022 International Conference on Business Analytics for Technology and Security (ICBATS),
Journal Year:
2023,
Volume and Issue:
unknown, P. 1 - 7
Published: March 7, 2023
The
COVID-19
pandemic
has
accelerated
the
shift
from
traditional
office
setups
to
remote
working,
driven
by
information
and
communication
technology
advancements.
As
a
result,
metaverse
concept
is
gaining
popularity
in
modern
organizations,
allowing
users
create
avatars
for
virtual
work,
socializing,
other
activities.
While
its
corporate
adoption
rising,
managers
must
acquire
necessary
skills
integrate
utilize
successfully.
However,
technological
progress
can
be
disruptive,
making
it
essential
weigh
benefits
drawbacks.Methodology:
This
proposal
aims
investigate
that
require
working
using
realities,
assessing
positive
negative
risks
employees
management
within
business
organizations.
Using
secondary
data
reliable
online
databases,
qualitative
research
approach
was
used
understand
pros
cons
of
work.Purpose:
study
examines
need
adopt
realities
how
organizations
implement
while
maintaining
work
environment.
Keywords
such
as
metaverse,
reality,
are
critical.
evolves,
consider
metaverse's
inherent
advantages
disadvantages
ensure
successful
transition
remote.Research
Questions:
What
needed
towards
working?
How
adapt
implementing
sustain
environment?
International Journal of Computations Information and Manufacturing (IJCIM),
Journal Year:
2022,
Volume and Issue:
2(2)
Published: Nov. 20, 2022
And
here's
a
summary
of
latest
developments
in
Internet
Things
(IoT)
integrated
devices,
wireless
connections,
and
biosensing
which
have
contributed
the
fast
development
wearable
sensor
implantation.
This
study
also
discusses
applications
internet
medical
things
(IoMT),
now
has
attracted
considerable
interest
as
an
environment
networked
clinical
systems,
computational
capabilities,
sensors
designed
to
improve
quality
healthcare
services.
The
perspective
lifestyle
can
indeed
be
totally
transformed
by
AI
technology
based
on
5G.
aim
this
proposed
research
design
is
investigate
risks
might
undermine
credibility,
confidentiality,
security
IoMT
platforms
consideration
relevance
IoT
5G
networks.
Moreover,
there
been
cutting-edge
blockchain-based
techniques
aid
enhancing
network
security.
discovered
vulnerable
range
attacks,
notably
malware,
DoS
wiretapping
attacks.
additionally
prone
issues,
involving
safety,
privacy,
anonymity.
There
are
revolutionary
cryptography
solutions,
such
password
protection,
authentication
protocols,
data
encryption,
improving
trustworthiness
devices
despite
different
risks.