INVESTIGATING THE IMPORTANCE OF ETHICS AND SECURITY ON INTERNET OF MEDICAL THINGS (IoMT) DOI Open Access
Asaad Ali Karam

International Journal of Computations Information and Manufacturing (IJCIM), Journal Year: 2022, Volume and Issue: 2(2)

Published: Nov. 20, 2022

Numerous opportunities are emerging due to the Internet of Things' (IoT) rapid development, which has potential significantly improve human quality life in many areas. The healthcare industry is main place where IoT can enhance our lives. Security and privacy concerns, however, take center stage electronic health (eHealth) systems, incorporation makes them increasingly difficult address. Due numerous stakeholders its broader ecosystem, majority IoMT raises security concerns. IoT-based system various features. This search provides an Identity-Based Cryptography cornerstone management technique that uses collaborative authentication a secret passcode protect transformation data between any device other entity from different company or domain (IBC).

Language: Английский

Impacts of Cyber Security and Supply Chain Risk on Digital Operations: Evidence from the Pharmaceutical Industry DOI Open Access
Federico Del Giorgio Solfa

International Journal of Technology Innovation and Management (IJTIM), Journal Year: 2022, Volume and Issue: 2(2)

Published: Oct. 27, 2022

Purpose: The research explored empirical evidence to assess the impact of cyber security and supply chain risk on digital operations in UAE pharmaceutical industry. Methodology/Design/Approach: Based responses from 243 personnel working at 14 manufacturing companies Dubai, data were examined for normality, instrument validity regression analysis. Cyber SC by applying convenient sampling descriptive analytical design. Findings: findings validated significant positive association between with operations. Research implications Limitations: model was developed three variables evaluated only industry Dubai. Future should focus multiple industries covering a larger geographic area. Practical implications: When suppliers are highly concentrated, customer-focused organisations uncertain levels transformation could improve their ability manage diversifying clients. Pharmaceutical firms may require greater technology-based build maintain customer trust. Originality Value: To illustrate how has relationship security, operations, highlights convoluted consequences that have not been previously considered.

Language: Английский

Citations

48

Artificial Intelligence Incidents & Ethics A Narrative Review DOI Open Access

Syeda Faiza Nasim,

Muhammad Ali,

Umme Kulsoom

et al.

International Journal of Technology Innovation and Management (IJTIM), Journal Year: 2022, Volume and Issue: 2(2)

Published: Oct. 27, 2022

There has been a lot of media debate about “Artificial Intelligence (AI) Ethics” nowadays and many scientists researchers have shared their views on this topic. As technology is evolving, security issues are also emerging in new forms. Machines should be ethical, the “Build Design” such machines based ethics. Infact, AI must Ethics as part design within software code, just like measures encoded within. In review paper, statistics incidents areas presented along with social impact. Using online Incident Database, some applications identified, which shows unethical use AI. Applications Language Computer vision models, intelligent robots autonomous driving top ranking. Ethical appear various forms incorrect technology, racism, non-safety malicious algorithms biasness. Data collection helped to identify ethical Time, Geographic Locations, Application Areas, Classifications

Language: Английский

Citations

46

The Smart Performance Analysis of Cyber Security Issues in Crypto Currency Using Blockchain DOI
J. Logeshwaran,

Venkata Ashok K Gorantla,

Venkataramaiah Gude

et al.

Published: Sept. 14, 2023

Crypto currency is subject to persistent and dynamic cyber security risks. As with all types of online assets, digital wallets, exchanges even individual user accounts are often both malicious attacks other vulnerabilities. Blockchain technology, due its distributed nature, more secure provides a strong platform on which build platforms. This paper seeks examine the performance technology for improving crypto transactions. To assess system's in this regard, we conduct series tests evaluate resilience against various attacks, including denial service (DDoS) specialized attacks. We measures employed by platforms, multi-signature identity solutions, data encryption approaches. The proposed model achieved 86.82 % hit rate, 87.05 % miss rate 88.57% fall out. Our results, based an extensive empirical study transactions records, indicate that significantly enhances compared technologies. findings offer quantitative evidence Blockchain-secured networks less vulnerable attack than conventional payment systems.

Language: Английский

Citations

29

A SYSTEMATIC REVIEW OF BLOCKCHAIN TECHNOLOGY USE IN E-SUPPLY CHAIN IN INTERNET OF MEDICAL THINGS (IOMT) DOI Open Access
Romil Rawat

International Journal of Computations Information and Manufacturing (IJCIM), Journal Year: 2022, Volume and Issue: 2(2)

Published: Nov. 21, 2022

For every sector, managing supply chains is a difficult task, but the healthcare sector faces risks and complication since disrupted chain could have direct impact on patient security medical results. In this assignment we will discuss how Blockchain technology one possible method for enhancing health E-supply chain's security, integrity, data provenance, usefulness. The supply, product Internet of Medical Things (IOMT), care are all given such priority, goal research to provide description advantages drawbacks using blockchain in distribution network. unfulfilled potential increase requires greater research, analysis, integration with regulatory frameworks has been discussed.

Language: Английский

Citations

24

The Impact of Social Media Marketing on Online Buying Behavior via the Mediating Role of Customer Perception: Evidence from the Abu Dhabi Retail Industry DOI
Barween Al Kurdi, Mohammed T. Nuseir, Muhammad Turki Alshurideh

et al.

Studies in big data, Journal Year: 2024, Volume and Issue: unknown, P. 431 - 449

Published: Jan. 1, 2024

Language: Английский

Citations

3

Impact of Cyber Security Strategy and Integrated Strategy on E-Logistics Performance: An Empirical Evidence from the UAE Petroleum Industry DOI
Mohammed T. Nuseir,

Enass Khalil Alquqa,

Ata Al Shraah

et al.

Studies in big data, Journal Year: 2024, Volume and Issue: unknown, P. 89 - 108

Published: Jan. 1, 2024

Language: Английский

Citations

3

Metaverse Skills for Executives and Senior Managers: The Pros and Cons DOI

Mounir El Khatib,

Ali Khayat,

Sultan Al Mansoori

et al.

2022 International Conference on Business Analytics for Technology and Security (ICBATS), Journal Year: 2023, Volume and Issue: unknown, P. 1 - 7

Published: March 7, 2023

The COVID-19 pandemic has accelerated the shift from traditional office setups to remote working, driven by information and communication technology advancements. As a result, metaverse concept is gaining popularity in modern organizations, allowing users create avatars for virtual work, socializing, other activities. While its corporate adoption rising, managers must acquire necessary skills integrate utilize successfully. However, technological progress can be disruptive, making it essential weigh benefits drawbacks.Methodology: This proposal aims investigate that require working using realities, assessing positive negative risks employees management within business organizations. Using secondary data reliable online databases, qualitative research approach was used understand pros cons of work.Purpose: study examines need adopt realities how organizations implement while maintaining work environment. Keywords such as metaverse, reality, are critical. evolves, consider metaverse's inherent advantages disadvantages ensure successful transition remote.Research Questions: What needed towards working? How adapt implementing sustain environment?

Language: Английский

Citations

8

A SYSTEMATIC REVIEW ON SECURITY VULNERABILITIES TO PREVENY TYPES OF ATTACKS IN IOMT DOI Open Access
Ahmed Bouriche, Sihem Bouriche

International Journal of Computations Information and Manufacturing (IJCIM), Journal Year: 2022, Volume and Issue: 2(2)

Published: Nov. 20, 2022

And here's a summary of latest developments in Internet Things (IoT) integrated devices, wireless connections, and biosensing which have contributed the fast development wearable sensor implantation. This study also discusses applications internet medical things (IoMT), now has attracted considerable interest as an environment networked clinical systems, computational capabilities, sensors designed to improve quality healthcare services. The perspective lifestyle can indeed be totally transformed by AI technology based on 5G. aim this proposed research design is investigate risks might undermine credibility, confidentiality, security IoMT platforms consideration relevance IoT 5G networks. Moreover, there been cutting-edge blockchain-based techniques aid enhancing network security. discovered vulnerable range attacks, notably malware, DoS wiretapping attacks. additionally prone issues, involving safety, privacy, anonymity. There are revolutionary cryptography solutions, such password protection, authentication protocols, data encryption, improving trustworthiness devices despite different risks.

Language: Английский

Citations

11

Stock Market Price Prediction Using Machine Learning Techniques DOI
Mohammed T. Nuseir, Iman Akour, Muhammad Turki Alshurideh

et al.

Studies in big data, Journal Year: 2024, Volume and Issue: unknown, P. 323 - 334

Published: Jan. 1, 2024

Language: Английский

Citations

2

Impact of the Internet of Things (IoT) on the E-Supply Chain with the Mediating Role of Information Technology Capabilities: An Empirical Evidence from the UAE Automotive Manufacturing Industry DOI
Ala’a Ahmad, Mohammed T. Nuseir, Haitham M. Alzoubi

et al.

Studies in big data, Journal Year: 2024, Volume and Issue: unknown, P. 409 - 429

Published: Jan. 1, 2024

Language: Английский

Citations

2