International Journal of Research in Business and Social Science (2147-4478),
Год журнала:
2024,
Номер
13(6), С. 23 - 37
Опубликована: Окт. 14, 2024
This
study
advances
research
and
practice
related
to
adopting
artificial
intelligence
(AI)
in
the
context
of
South
Africa
(SA).
The
evaluated
AI
adoption
by
African
manufacturing
Small
Medium
Enterprises
(SMEs);
established
challenges
faced
SMEs
AI;
developed
a
framework
for
SMEs’
growth
survival.
adopted
systematic
literature
review
approach.
Articles
from
Scopus
Google
scholar
databases,
ranging
years
2018
2024,
were
used.
Of
206
articles
found,
54
shortlisted.
analysis
was
performed
using
PRISMA
framework.
results
identified
is
low,
limiting
their
innovation
productivity.
also
show,
despite
numerous
benefits
can
offer
country,
major
constraint
lack
enhance
implementation.
Hence,
this
conducted
develop
improve
SMEs.
findings
contribute
body
knowledge
provide
new
insights
SME
owners/managers,
policymakers
practitioners
into
ability
compete
on
global
stage.
Engineering Science & Technology Journal,
Год журнала:
2024,
Номер
5(5), С. 1606 - 1626
Опубликована: Май 5, 2024
The
concept
paper
explores
the
critical
security
challenges
posed
by
Internet
of
Things
(IoT)
in
telecom
networks
and
proposes
solution
pathways
to
address
them.
As
IoT
devices
proliferate
networks,
they
introduce
new
vulnerabilities
threats
that
must
be
mitigated
ensure
integrity,
confidentiality,
availability
network
resources
data.
begins
highlighting
unique
devices,
including
their
large
attack
surface,
resource
constraints,
diverse
communication
protocols.
These
are
further
exacerbated
due
scale
complexity
infrastructure.
To
these
challenges,
a
multi-faceted
approach
combines
technical,
organizational,
regulatory
measures.
Technical
solutions
include
use
secure
protocols,
device
authentication
mechanisms,
encryption
techniques
protect
data
transit
at
rest.
Organizational
measures
focus
on
improving
awareness
training
among
operators
ensuring
development
deployment
devices.
Regulatory
advocate
for
implementation
standards
regulations
promote
privacy
deployments.
also
discusses
importance
collaboration
stakeholders,
operators,
manufacturers,
bodies,
effectively.
By
working
together,
stakeholders
can
develop
implement
best
practices
enhance
networks.
In
conclusion,
highlights
urgent
need
robust
paradigms
deployments
within
implementing
proposed
fostering
mitigate
risks
safe
Keywords:
IoT,
Telecom,
Networks,
Security.
Engineering Science & Technology Journal,
Год журнала:
2024,
Номер
5(4), С. 1502 - 1523
Опубликована: Апрель 26, 2024
Human
trafficking
is
a
pervasive
and
complex
crime
that
affects
millions
of
people
worldwide.
In
recent
years,
there
has
been
growing
recognition
the
need
for
proactive
approaches
to
prevention
victim
reintegration.
Predictive
analytics,
data-driven
technology
uses
algorithms
analyze
patterns
predict
future
outcomes,
holds
great
promise
in
this
regard.
This
review
explores
application
predictive
analytics
reintegration,
highlighting
its
potential
enhance
support
victims
improve
overall
outcomes.
can
play
crucial
role
by
identifying
trends
may
indicate
activities.
By
analyzing
data
from
various
sources,
such
as
social
media,
financial
transactions,
law
enforcement
records,
help
identify
high-risk
areas
individuals,
enabling
agencies
NGOs
take
measures
prevent
trafficking.
For
example,
vulnerable
populations,
runaway
youth
or
migrants,
target
efforts
accordingly.
context
outcomes
factors
influence
victim's
likelihood
successful
reintegration
into
society.
on
education,
employment,
support,
interventions
are
most
likely
rebuild
their
lives.
types
services,
housing
assistance
job
training,
effective
helping
reintegrate
Overall,
revolutionize
tailored
specific
needs
victims.
However,
it
important
recognize
not
without
challenges,
including
concerns
about
privacy
ethical
implications.
Therefore,
essential
ensure
used
responsibly
accordance
with
guidelines
maximize
benefits
Keywords:
Analytics,
Trafficking,
Prevention,
Victim
Reintegration,
Systematic
Review.
Engineering Science & Technology Journal,
Год журнала:
2024,
Номер
5(4), С. 1452 - 1472
Опубликована: Апрель 26, 2024
Virtual
Private
Networks
(VPNs)
play
a
crucial
role
in
ensuring
secure
communication
over
public
networks.
This
concept
paper
provides
comprehensive
review
of
security
protocols
used
VPNs
and
their
application
modern
The
begins
by
defining
explaining
importance
securing
data
transmission
untrusted
It
then
discusses
the
evolution
VPN
technology,
highlighting
transition
from
traditional
IPSec
SSL/TLS
to
more
approaches
such
as
WireGuard
QUIC.
also
examines
VPNs,
including
IPSec,
SSL/TLS,
newer
like
Each
protocol
is
analyzed
terms
its
features,
performance,
suitability
for
different
use
cases.
Furthermore,
explores
networks,
remote
access,
site-to-site
connectivity,
cloud-based
services.
challenges
considerations
involved
deploying
managing
today's
complex
network
environments.
In
conclusion,
emphasizes
highlights
need
organizations
carefully
evaluate
requirements
choose
appropriate
technologies
protect
Keywords:
VPN,
Security,
Applications,
Network.
World Journal of Advanced Research and Reviews,
Год журнала:
2024,
Номер
22(1), С. 1250 - 1265
Опубликована: Апрель 26, 2024
Empowering
youth
through
sexuality
and
leadership
education
is
crucial
for
their
holistic
development
well-being.
This
paper
provides
an
overview
of
approaches
outcomes
related
to
empowering
in
these
areas.
Effective
include
comprehensive
(CSE),
youth-friendly
services,
peer
education,
training.
CSE
equips
young
people
with
accurate,
age-appropriate
information
about
sexuality,
relationships,
reproductive
health,
enabling
them
make
informed
decisions.
Youth-friendly
services
provide
confidential,
nonjudgmental
health
tailored
people's
needs.
Peer
involves
teaching
peers
sexual
encouraging
open
dialogue.
Leadership
training
fosters
skills
such
as
communication,
decision-making,
advocacy,
become
leaders
communities.
leads
various
positive
outcomes.
It
improves
outcomes,
including
reduced
rates
unintended
pregnancies,
sexually
transmitted
infections
(STIs),
HIV/AIDS.
also
promotes
gender
equality
empowerment,
learn
rights
how
challenge
harmful
norms.
Additionally,
enhance
self-esteem,
communication
skills,
ability
decisions,
preparing
future
roles.
essential
By
providing
support,
we
can
help
navigate
challenges,
healthy
choices,
empowered
World Journal of Advanced Research and Reviews,
Год журнала:
2024,
Номер
22(1), С. 1234 - 1249
Опубликована: Апрель 26, 2024
The
intersection
of
public
health
and
migration
policy
presents
complex
challenges
in
the
context
migrant
crises.
This
abstract
provides
an
overview
analysis
on
integrated
policy,
focusing
crafting
effective
responses
to
By
examining
key
findings
implications,
it
highlights
critical
importance
addressing
needs
within
frameworks.
reveals
that
crises
often
exacerbate
existing
vulnerabilities,
including
limited
access
healthcare,
inadequate
sanitation
facilities,
heightened
risks
infectious
diseases.
Integrated
approaches
prioritize
migrants
are
essential
for
mitigating
these
ensuring
well-being
both
populations
host
communities.
Key
underscore
adopting
a
comprehensive
rights-based
approach
policy.
involves
recognizing
migrants'
right
equitable
healthcare
services,
regardless
legal
status
or
nationality.
Furthermore,
requires
social
determinants
health,
such
as
poverty,
discrimination,
exclusion,
which
disproportionately
affect
populations.
Implications
future
research
development
include
need
greater
collaboration
coordination
among
stakeholders,
government
agencies,
civil
society
organizations,
international
partners.
Research
gaps
identified
further
investigation
into
specific
groups,
refugees,
asylum
seekers,
undocumented
migrants,
well
effectiveness
different
interventions
meeting
needs.
In
conclusion,
is
prioritizing
approach,
policymakers
can
mitigate
negative
impacts
promote
all
individuals
affected
by
urgency
frameworks
calls
commitment
equity
human
rights.
Engineering Science & Technology Journal,
Год журнала:
2024,
Номер
5(4), С. 1431 - 1451
Опубликована: Апрель 26, 2024
The
concept
paper
explores
the
critical
security
challenges
posed
by
Internet
of
Things
(IoT)
in
telecom
networks
and
proposes
solution
pathways
to
address
them.
As
IoT
devices
proliferate
networks,
they
introduce
new
vulnerabilities
threats
that
must
be
mitigated
ensure
integrity,
confidentiality,
availability
network
resources
data.
begins
highlighting
unique
devices,
including
their
large
attack
surface,
resource
constraints,
diverse
communication
protocols.
These
are
further
exacerbated
due
scale
complexity
infrastructure.
To
these
challenges,
a
multi-faceted
approach
combines
technical,
organizational,
regulatory
measures.
Technical
solutions
include
use
secure
protocols,
device
authentication
mechanisms,
encryption
techniques
protect
data
transit
at
rest.
Organizational
measures
focus
on
improving
awareness
training
among
operators
ensuring
development
deployment
devices.
Regulatory
advocate
for
implementation
standards
regulations
promote
privacy
deployments.
also
discusses
importance
collaboration
stakeholders,
operators,
manufacturers,
bodies,
effectively.
By
working
together,
stakeholders
can
develop
implement
best
practices
enhance
networks.
In
conclusion,
highlights
urgent
need
robust
paradigms
deployments
within
implementing
proposed
fostering
mitigate
risks
safe
Keywords:
Security,
IoT,
Telecom,
Solutions,
Network.
Advances in finance, accounting, and economics book series,
Год журнала:
2025,
Номер
unknown, С. 105 - 120
Опубликована: Янв. 8, 2025
The
available
Financial
Technology
or
more
commonly
known
as
FinTech
has
simplified
ways
that
the
small
businesses
can
access
financial
services
for
their
growth
solutions.
Out
of
these,
leading
forms
finance
technology
such
third-party
payment
systems,
peer-to-peer
online
lending,
crowdfunding
have
promoted
cross
border
electronic
trade,
credit
processes
and
sources
availing
backing
to
ideas.
These
technologies
enhance
efficiency,
speed
convenience
hence
attracting
which
issues
high
cost
collateral
training
costs.
In
this
way,
platforms
use
big
data
algorithms
fill
existing
funding
gap
conventional
failed
provide.
differs
some
extent
around
world,
mobile
money
is
most
used
in
developing
countries
while
P2P
lending
widely
developed
countries.
Advances in business strategy and competitive advantage book series,
Год журнала:
2024,
Номер
unknown, С. 215 - 246
Опубликована: Дек. 18, 2024
The
modern
human
society
has
seen
the
drastic
impact
of
technologies
and
it
is
an
undeniable
fact
that
these
new
tools
have
significantly
affected
all
facets
interaction
tremendously
impacted
activities,
either
by
causing
mild
alteration
in
nature
structure
contemporary
world,
or
directly
revolutionizing
sections
sectors
endeavors.
In
fact,
one
area
effects
been
felt
economy
commercial
sector.
Technologies
continued
improve
businesses
across
activities
drifted
towards
power
whims
technological
realities.
Hence,
many
big
are
adjusting
their
operations
to
utilise
for
productivity
profitability;
affording
them
enormous
competitive
advantages.
However,
studies
showed
SMEs
cannot
afford
expensive
lack
financial
wherewithal
adopt
innovations.
Worse
still,
developing
nations
contend
with
several
challenges,
determined
more
than
80%
collapse
die
during
first
three
years.
informal
sector
every
nation
key
survival
country,
if
struggling
continue
experience
high
business
mortality
sector,
then
countries
will
nosedive.
Therefore,
this
work
recognizes
transformative
artificial
intelligence
its
potentials
SMEs.
seeks
examine
how
can
AIs
productivity,
performance,
engagement,
optimization
profitability
amidst
stiff
challenges
overwhelming
influences
multinationals.
Journal of Social Sciences and Management Studies,
Год журнала:
2024,
Номер
3(2), С. 26 - 45
Опубликована: Май 7, 2024
Due
to
the
inconclusive
situation
of
empirical
studies
on
Small
and
Medium
Enterprises
(
SMEs)
economic
growth
in
Nigeria
need
promote
accompanied
by
poverty
alleviation,
this
study
examined
SMEs
financing
from
1999
2021.
The
hypotheses
formulated
tested
included
that
there
is
no
significant
relationship
between
commercial
bank
loans,
total
credit
private
sector
(which
captures
other
means
lending
rate.
Annual
data
was
collected
Central
Bank
Statistical
Bulletin.
augmented
Dickey-Fuller
unit
root
test
revealed
variables
were
stationary
at
first
difference,
while
Johansen
co-integration
indicated
a
long-run
among
variables.
Vector
Error
Correction
Mechanism
(VECM)
loans
have
weak
negative
effect
growth.
Total
has
positive
growth,
rates
It
concluded
effects
Nigeria.
recommended
government
encourage
more
guaranteeing
such
development
branches
should
be
established;
rate
lowered.