Published: Aug. 16, 2024
Language: Английский
Published: Aug. 16, 2024
Language: Английский
Asian Journal of Research in Computer Science, Journal Year: 2024, Volume and Issue: 17(5), P. 172 - 189
Published: March 15, 2024
This research explores the integration of Information Governance (IG) strategies and Blockchain Technologies (BT) in enhancing digital trust security within democratic processes. Amid concerns about integrity vulnerability electoral systems era, this study examines how these technologies can collectively safeguard democracy. Utilizing Partial Least Squares Structural Equation Modeling (PLS-SEM), bootstrapping analysis for mediation effects, Fornell-Larcker Criterion discriminant validity, was conducted on data from 934 participants involved process. Key findings demonstrate that IG significantly impact trust, indicating importance robust management, legal compliance, privacy measures public confidence systems. positively affect processes due to their decentralized immutable characteristics. Furthermore, is identified as a critical mediator between strategies, BT, processes, highlighting effectiveness technologies. Based insights gained, three actionable recommendations are proposed: Electoral authorities should adopt comprehensive frameworks enhance transparency; Pilot blockchain projects be expanded refine understand broader implementation implications election security; Efforts increased foster literacy among electorate, emphasizing role securing integrity.
Language: Английский
Citations
25Journal of Engineering Research and Reports, Journal Year: 2024, Volume and Issue: 26(6), P. 31 - 49
Published: May 4, 2024
This research paper explores the integration of Enterprise Risk Management (ERM), ISO 27001 standard, and mobile forensics methodologies as a comprehensive framework for enhancing digital security measures within modern business ecosystems. Employing quantitative design, this utilized survey methodology, gathering data from 372 professionals across various sectors including risk management, IT/security, forensic analysis. The analysis was conducted using Partial Least Squares Structural Equation Modeling (PLS-SEM) to test hypotheses assess impact integrated approach on organizational capabilities. findings reveal significant positive effect integrating ERM, 27001, an organization’s ability manage risks effectively. Specifically, found enhance strategic improve identification, assessment, mitigation risks, strengthen information management practices, elevate effectiveness efficiency crime investigation processes. These outcomes underscore value cohesive strategy that leverages strengths in addressing complex interconnected threat landscape. Based results, study recommends adopting holistic framework, investing continuous professional development, leveraging technological advancements proactive fostering culture collaboration. Such are crucial organizations aiming their resilience against cyber threats protect assets face sophisticated cyber-attacks. contributes field cybersecurity by providing empirical evidence benefits security, offering practical guidelines seeking measures, highlighting need adaptation collaboration fight threats.
Language: Английский
Citations
20Journal of Engineering Research and Reports, Journal Year: 2024, Volume and Issue: 26(5), P. 247 - 261
Published: April 23, 2024
.
Citations
16Journal of Engineering Research and Reports, Journal Year: 2024, Volume and Issue: 26(6), P. 165 - 177
Published: May 17, 2024
This research paper explores the potential of artificial intelligence (AI) and automation to reduce digital divide in developing countries. The study investigates how these technologies can enhance accessibility efficiency critical sectors such as education, healthcare, agriculture, economic development, thereby contributing social progress. Key findings indicate that AI significantly improve educational outcomes by providing personalized learning experiences, enhancing healthcare delivery through better diagnostics patient care, increasing agricultural productivity with precision farming, stimulating growth creating new job opportunities improving market access. However, deploying faces substantial challenges, including inadequate infrastructure, significant skills gaps, cultural resistance, policy constraints. adopts a mixed-methods approach, combining quantitative data analysis qualitative case studies comprehensively understand impacts challenges associated implementing less developed regions. scope spans several countries, offering insights relevant policymakers, NGOs, private sector engaged technology deployment for development. underscores necessity collaborative approach overcome identified barriers suggests strategic recommendations stakeholders leverage practical tools closing divide. contributes broader discourse on technology’s role global highlighting both transformative need inclusive context-sensitive governance.
Language: Английский
Citations
16Archives of Current Research International, Journal Year: 2024, Volume and Issue: 24(5), P. 612 - 629
Published: June 15, 2024
This study investigates the criminal use and abuse of artificial intelligence (AI), exploring effectiveness various mitigation strategies. It employs a mixed-methods approach, combining quantitative data from survey 211 experts with qualitative insights academic, governmental, industrial publications. The research examines four key hypotheses: impact public organizational awareness, role advanced detection technologies, ethical guidelines, influence penalties enforcement. findings reveal that technology, ethics, enforcement all contribute to mitigating AI misuse. concludes by proposing comprehensive strategies, including targeted awareness campaigns, investment in robust strengthened legal frameworks, effectively combat AI.
Language: Английский
Citations
11Journal of Engineering Research and Reports, Journal Year: 2024, Volume and Issue: 26(7), P. 244 - 268
Published: June 27, 2024
The increasing integration of Artificial Intelligence (AI) systems in diverse sectors has raised concerns regarding transparency, trust, and ethical data handling. This study investigates the impact Explainable AI (XAI) models robust information governance standards on enhancing use customer data. A mixed-methods approach was employed, combining a comprehensive literature review with survey 342 respondents across various industries. findings reveal that implementation XAI significantly increases user trust compared to black-box models. Additionally, strong positive correlation found between adoption data, highlighting importance transparency frameworks mechanisms. Furthermore, underscores critical role education fostering facilitating informed decision-making interactions. results emphasize need for organizations prioritize techniques, establish frameworks, invest education, foster culture use. These recommendations provide roadmap harness benefits while mitigating potential risks ensuring responsible trustworthy practices.
Language: Английский
Citations
11Archives of Current Research International, Journal Year: 2024, Volume and Issue: 24(6), P. 355 - 375
Published: July 27, 2024
The rising threat of deepfake technology challenges public trust in media, necessitating robust countermeasures. This study proposes the Anti-DFK framework, a comprehensive strategy to mitigate spread deepfakes on major social platforms such as Instagram, Facebook, YouTube, and Twitter. framework integrates deep learning-based detection engines, digital watermarking, advanced network access controls, including URL filtering, domain reputation content-type Geo-IP blocking. Analyzing historical data, user engagement metrics, sentiment from Kaggle Datasets, employed learning models—CNNs, LSTMs, Transformer-based—to evaluate capabilities, achieving highest controlled environment accuracy 0.97. Digital watermarking techniques were tested for robustness against various attacks, with DCT method displaying significant resilience. Network controls assessed their effectiveness curtailing deepfakes, content filtering proving most effective by reducing dissemination nearly 80%. Findings indicate critical negative impact trust, underscoring need integrated approach offered framework. concludes that implementing these sophisticated tools, combined stringent can significantly enhance integrity media restore confidence.
Language: Английский
Citations
6Journal of Engineering Research and Reports, Journal Year: 2024, Volume and Issue: 26(8), P. 161 - 184
Published: July 31, 2024
This study investigates endpoint security strategies for remote workforces utilizing VPN networks, focusing on mitigating ransomware and botnet attacks. A mixed-methods approach was employed, analyzing the effectiveness of existing solutions simulating network segmentation strategies. The highlights enhanced traditional when augmented with advanced technologies specific applications including email filtering to block phishing attempts, MFA verify user identities, EDR systems detect unauthorized access tools, encryption secure data during cloud services. introduction zero-trust architectures further secured centers by limiting lateral movements requiring continuous re-authentication. Results demonstrate that while remain essential, their can be through a multi-layered incorporating this research showing quick response times, high containment efficiency, fast recovery speeds across all segments, Finance Department notably achieving time 5 minutes efficiency 95%. Specifically, our cost-benefit analysis shows Strategy 1, despite higher cost, offers superior improvements in throughput latency reduction, providing more value per dollar spent. These results underscore plan’s capability rapidly detecting, containing, recovering from User education significantly improved cybersecurity awareness reduced susceptibility provides practical recommendations organizations strengthen posture protect workforce combination technologies, proactive measures, education.
Language: Английский
Citations
5Advances in marketing, customer relationship management, and e-services book series, Journal Year: 2025, Volume and Issue: unknown, P. 257 - 282
Published: Jan. 10, 2025
This study investigates the criminal use and abuse of artificial intelligence (AI), exploring effectiveness various mitigation strategies. It employs a mixed-methods approach, combining quantitative data from survey 211 experts with qualitative insights academic, governmental, industrial publications. The research examines four key hypotheses: impact public organizational awareness, role advanced detection technologies, ethical guidelines, influence penalties enforcement. findings reveal that technology, ethics, enforcement all contribute to mitigating AI misuse. concludes by proposing comprehensive strategies, including targeted awareness campaigns, investment in robust strengthened legal frameworks, effectively combat AI.
Language: Английский
Citations
0SSRN Electronic Journal, Journal Year: 2024, Volume and Issue: unknown
Published: Jan. 1, 2024
Language: Английский
Citations
4