Assessing the Public Health Consequences of Terrorist Attacks on Telecommunications Infrastructure: A Global Analysis DOI
Zakaria A. Mani, Krzysztof Goniewicz

Disaster Medicine and Public Health Preparedness, Journal Year: 2024, Volume and Issue: 18

Published: Jan. 1, 2024

Abstract Objectives This study investigates the public health implications of terrorist attacks on telecommunications infrastructure globally, assessing direct and indirect impacts emergency response medical services. Methods Utilizing retrospective analysis, this research delves into incidents recorded in Global Terrorism Database (GTD) from 1970 to 2020. The employs descriptive statistical methods identify patterns examine regional distribution frequency these attacks, alongside types weaponry used casualties involved. Results analysis underscores a significant focus by groups, revealing frequent use high-impact weapons like explosives incendiary devices aimed at maximizing disruption. highlights considerable variations nature emphasizing strategic importance infrastructures safety systems. Conclusions findings demonstrate critical need for robust security enhancements tailored threats integration advanced technologies strategies. advocates enhanced international cooperation policymaking mitigate ensuring resilience face global terrorism.

Language: Английский

Ballots and Padlocks: Building Digital Trust and Security in Democracy through Information Governance Strategies and Blockchain Technologies DOI Open Access
Oluwaseun Oladeji Olaniyi

Asian Journal of Research in Computer Science, Journal Year: 2024, Volume and Issue: 17(5), P. 172 - 189

Published: March 15, 2024

This research explores the integration of Information Governance (IG) strategies and Blockchain Technologies (BT) in enhancing digital trust security within democratic processes. Amid concerns about integrity vulnerability electoral systems era, this study examines how these technologies can collectively safeguard democracy. Utilizing Partial Least Squares Structural Equation Modeling (PLS-SEM), bootstrapping analysis for mediation effects, Fornell-Larcker Criterion discriminant validity, was conducted on data from 934 participants involved process. Key findings demonstrate that IG significantly impact trust, indicating importance robust management, legal compliance, privacy measures public confidence systems. positively affect processes due to their decentralized immutable characteristics. Furthermore, is identified as a critical mediator between strategies, BT, processes, highlighting effectiveness technologies. Based insights gained, three actionable recommendations are proposed: Electoral authorities should adopt comprehensive frameworks enhance transparency; Pilot blockchain projects be expanded refine understand broader implementation implications election security; Efforts increased foster literacy among electorate, emphasizing role securing integrity.

Language: Английский

Citations

25

CyberFusion Protocols: Strategic Integration of Enterprise Risk Management, ISO 27001, and Mobile Forensics for Advanced Digital Security in the Modern Business Ecosystem DOI Open Access
Oluwaseun Oladeji Olaniyi, Olajide Oyebola Omogoroye, Folashade Gloria Olaniyi

et al.

Journal of Engineering Research and Reports, Journal Year: 2024, Volume and Issue: 26(6), P. 31 - 49

Published: May 4, 2024

This research paper explores the integration of Enterprise Risk Management (ERM), ISO 27001 standard, and mobile forensics methodologies as a comprehensive framework for enhancing digital security measures within modern business ecosystems. Employing quantitative design, this utilized survey methodology, gathering data from 372 professionals across various sectors including risk management, IT/security, forensic analysis. The analysis was conducted using Partial Least Squares Structural Equation Modeling (PLS-SEM) to test hypotheses assess impact integrated approach on organizational capabilities. findings reveal significant positive effect integrating ERM, 27001, an organization’s ability manage risks effectively. Specifically, found enhance strategic improve identification, assessment, mitigation risks, strengthen information management practices, elevate effectiveness efficiency crime investigation processes. These outcomes underscore value cohesive strategy that leverages strengths in addressing complex interconnected threat landscape. Based results, study recommends adopting holistic framework, investing continuous professional development, leveraging technological advancements proactive fostering culture collaboration. Such are crucial organizations aiming their resilience against cyber threats protect assets face sophisticated cyber-attacks. contributes field cybersecurity by providing empirical evidence benefits security, offering practical guidelines seeking measures, highlighting need adaptation collaboration fight threats.

Language: Английский

Citations

20

Bridging the Digital Divide: Exploring the Role of Artificial Intelligence and Automation in Enhancing Connectivity in Developing Nations DOI Open Access
Amaka Debie Samuel-Okon, Oluwatotan Olaperi Abejide

Journal of Engineering Research and Reports, Journal Year: 2024, Volume and Issue: 26(6), P. 165 - 177

Published: May 17, 2024

This research paper explores the potential of artificial intelligence (AI) and automation to reduce digital divide in developing countries. The study investigates how these technologies can enhance accessibility efficiency critical sectors such as education, healthcare, agriculture, economic development, thereby contributing social progress. Key findings indicate that AI significantly improve educational outcomes by providing personalized learning experiences, enhancing healthcare delivery through better diagnostics patient care, increasing agricultural productivity with precision farming, stimulating growth creating new job opportunities improving market access. However, deploying faces substantial challenges, including inadequate infrastructure, significant skills gaps, cultural resistance, policy constraints. adopts a mixed-methods approach, combining quantitative data analysis qualitative case studies comprehensively understand impacts challenges associated implementing less developed regions. scope spans several countries, offering insights relevant policymakers, NGOs, private sector engaged technology deployment for development. underscores necessity collaborative approach overcome identified barriers suggests strategic recommendations stakeholders leverage practical tools closing divide. contributes broader discourse on technology’s role global highlighting both transformative need inclusive context-sensitive governance.

Language: Английский

Citations

18

Towards Sustainable IT Infrastructure: Integrating Green Computing with Data Warehouse and Big Data Technologies to Enhance Efficiency and Environmental Responsibility DOI Open Access
Jennifer Chinelo Ugonnia, Oluwaseun Oladeji Olaniyi, Folashade Gloria Olaniyi

et al.

Journal of Engineering Research and Reports, Journal Year: 2024, Volume and Issue: 26(5), P. 247 - 261

Published: April 23, 2024

.

Citations

17

Formulating Global Policies and Strategies for Combating Criminal Use and Abuse of Artificial Intelligence DOI Open Access

Amaka Debie Samuel-Okon,

Omobolaji Olufunmilayo Olateju,

Samuel Ufom Okon

et al.

Archives of Current Research International, Journal Year: 2024, Volume and Issue: 24(5), P. 612 - 629

Published: June 15, 2024

This study investigates the criminal use and abuse of artificial intelligence (AI), exploring effectiveness various mitigation strategies. It employs a mixed-methods approach, combining quantitative data from survey 211 experts with qualitative insights academic, governmental, industrial publications. The research examines four key hypotheses: impact public organizational awareness, role advanced detection technologies, ethical guidelines, influence penalties enforcement. findings reveal that technology, ethics, enforcement all contribute to mitigating AI misuse. concludes by proposing comprehensive strategies, including targeted awareness campaigns, investment in robust strengthened legal frameworks, effectively combat AI.

Language: Английский

Citations

11

Smart Media or Biased Media: The Impacts and Challenges of AI and Big Data on the Media Industry DOI Open Access
Amaka Debie Samuel-Okon

Asian Journal of Research in Computer Science, Journal Year: 2024, Volume and Issue: 17(7), P. 128 - 144

Published: July 6, 2024

This study critically analyzes the impact of artificial intelligence (AI) and big data on media industry, focusing ethical challenges biases introduced by these technologies. The research aims to uncover extent which AI influence content personalization, creation, marketing, ramifications influences cultural diversity societal norms. A mixed-methods approach was employed, combining quantitative analysis through a survey 532 respondents qualitative thematic 10 academic literatures. findings reveal significant associations between automated creation tools biases, personalized recommendation systems echo chambers, algorithmic recommendations homogenization. Conversely, no association found analytics privacy concerns. highlights need for guidelines, enhanced diversity, strengthened measures, increased transparency mitigate in AI-driven platforms. These insights contribute broader understanding data's role shaping offering valuable implications future research, policy-making, industry practices.

Language: Английский

Citations

6

Assessing the Effectiveness of Network Security Tools in Mitigating the Impact of Deepfakes AI on Public Trust in Media DOI Open Access
Amaka Debie Samuel-Okon,

Oluwaseun Ibrahim Akinola,

Oluwaseun Oladeji Olaniyi

et al.

Archives of Current Research International, Journal Year: 2024, Volume and Issue: 24(6), P. 355 - 375

Published: July 27, 2024

The rising threat of deepfake technology challenges public trust in media, necessitating robust countermeasures. This study proposes the Anti-DFK framework, a comprehensive strategy to mitigate spread deepfakes on major social platforms such as Instagram, Facebook, YouTube, and Twitter. framework integrates deep learning-based detection engines, digital watermarking, advanced network access controls, including URL filtering, domain reputation content-type Geo-IP blocking. Analyzing historical data, user engagement metrics, sentiment from Kaggle Datasets, employed learning models—CNNs, LSTMs, Transformer-based—to evaluate capabilities, achieving highest controlled environment accuracy 0.97. Digital watermarking techniques were tested for robustness against various attacks, with DCT method displaying significant resilience. Network controls assessed their effectiveness curtailing deepfakes, content filtering proving most effective by reducing dissemination nearly 80%. Findings indicate critical negative impact trust, underscoring need integrated approach offered framework. concludes that implementing these sophisticated tools, combined stringent can significantly enhance integrity media restore confidence.

Language: Английский

Citations

6

Overcoming Remote Workforce Cyber Threats: A Comprehensive Ransomware and Bot Net Defense Strategy Utilizing VPN Networks DOI Open Access

Olumide Samuel Ogungbemi,

Favour Amarachi Ezeugwa,

Oluwaseun Oladeji Olaniyi

et al.

Journal of Engineering Research and Reports, Journal Year: 2024, Volume and Issue: 26(8), P. 161 - 184

Published: July 31, 2024

This study investigates endpoint security strategies for remote workforces utilizing VPN networks, focusing on mitigating ransomware and botnet attacks. A mixed-methods approach was employed, analyzing the effectiveness of existing solutions simulating network segmentation strategies. The highlights enhanced traditional when augmented with advanced technologies specific applications including email filtering to block phishing attempts, MFA verify user identities, EDR systems detect unauthorized access tools, encryption secure data during cloud services. introduction zero-trust architectures further secured centers by limiting lateral movements requiring continuous re-authentication. Results demonstrate that while remain essential, their can be through a multi-layered incorporating this research showing quick response times, high containment efficiency, fast recovery speeds across all segments, Finance Department notably achieving time 5 minutes efficiency 95%. Specifically, our cost-benefit analysis shows Strategy 1, despite higher cost, offers superior improvements in throughput latency reduction, providing more value per dollar spent. These results underscore plan’s capability rapidly detecting, containing, recovering from User education significantly improved cybersecurity awareness reduced susceptibility provides practical recommendations organizations strengthen posture protect workforce combination technologies, proactive measures, education.

Language: Английский

Citations

5

Evaluating the Integration of Edge Computing and Serverless Architectures for Enhancing Scalability and Sustainability in Cloud-based Big Data Management DOI Open Access

Favour Amarachi Ezeugwa

Journal of Engineering Research and Reports, Journal Year: 2024, Volume and Issue: 26(7), P. 347 - 365

Published: July 4, 2024

This study evaluates the integration of edge computing and serverless architectures to enhance scalability sustainability in cloud-based big data management systems. With exponential increase from internet-connected devices, traditional cloud faces challenges scalability, cost-efficiency, environmental impact. research utilized a simulated environment compare setups with integrated under conditions typical for smart city applications. The simulation focused on four key performance metrics: latency, operational costs, energy consumption, throughput. Results indicated substantial decrease reduction 149.73 ms 88.94 during peak hours, enhancing real-time processing capabilities essential time-sensitive Operational costs were significantly lowered by approximately 30%, attributed dynamic resource allocation that reduce financial waste. Additionally, showed notable consumption carbon emissions, highlighting potential these technologies contribute positively sustainability. Lastly, enhanced system was evident, throughput increasing 50%, proving its effectiveness handling large volumes user requests efficiently. findings suggest synergistic use could revolutionize across various sectors, offering improvements performance,

Language: Английский

Citations

4

Adaptive Location-based Routing Protocols for Dynamic Wireless Sensor Networks in Urban Cyber-physical Systems DOI Open Access

Oluwaseun Ibrahim Akinola

Journal of Engineering Research and Reports, Journal Year: 2024, Volume and Issue: 26(7), P. 424 - 443

Published: July 16, 2024

This study investigates the development and enhancement of adaptive location-based routing protocols within dynamic wireless sensor networks (WSNs) in urban cyber-physical systems, recommending implementation study’s innovative Urban Adaptive Location-based Routing Protocol (UALRP). protocol integrates real-time data analytics machine learning models into its algorithmic framework to dynamically optimize decisions based on continuously changing conditions. Through utilization data-driven simulation techniques, research sought significantly improve efficiency, reliability, scalability WSNs. Existing such as Geographic Fidelity (GAF), Greedy Perimeter Stateless (GPSR), Dynamic Source (DSR) were critically assessed under settings using extensive datasets detailing New York City's traffic patterns environmental variables. The analysis demonstrated that while GPSR showed superior performance terms latency, throughput, energy efficiency among traditional protocols, introduction UALRP, with advanced predictive capabilities, can further these metrics. affirms critical role enhancing location accuracy ongoing advancement protocols. These insights advocate for broader strategies like UALRP foster more resilient efficient systems.

Language: Английский

Citations

4