Data Security and Privacy Concerns in Drone Operations
Advances in information security, privacy, and ethics book series,
Год журнала:
2024,
Номер
unknown, С. 236 - 290
Опубликована: Янв. 26, 2024
The
widespread
use
of
drones
across
various
industries
is
leading
to
significant
transformations.
However,
the
resulting
concerns
about
data
security
and
privacy
are
quite
significant.
This
section
offers
a
thorough
exploration
these
important
issues,
providing
insights
into
challenges
they
pose
potential
ways
address
them.
Starting
with
an
overview
increasing
utility
drones,
this
chapter
highlights
importance
strong
protocols
for
privacy.
By
examining
complexities
collection
storage,
it
reveals
different
types
that
gather,
delves
storage
techniques,
vulnerabilities,
setting
stage
effective
countermeasures.
At
core
discussion
cybersecurity
risks,
which
range
from
cyberattacks
on
drone
systems
unauthorized
access
tampering
data.
To
sum
up,
serves
as
comprehensive
guide
understanding,
addressing,
mitigating
related
in
operations.
Язык: Английский
Eyes in the Sky
Advances in information security, privacy, and ethics book series,
Год журнала:
2024,
Номер
unknown, С. 405 - 451
Опубликована: Янв. 26, 2024
The
rapid
proliferation
of
drones
across
various
industries
necessitates
a
comprehensive
examination
the
privacy
and
ethical
implications
in
their
cybersecurity
landscape.
This
chapter
aims
to
dissect
address
these
concerns,
providing
valuable
resource
for
scholars,
policymakers,
industry
practitioners.
objectives
are
clearly
outlined,
emphasizing
exploration
challenges
considerations
within
context
drone
cybersecurity.
begins
by
delving
into
associated
with
operations,
focusing
on
surveillance
concerns
responsible
collection
storage
sensitive
data.
Ethical
then
scrutinized,
highlighting
dual-use
nature
intricacies
autonomous
decision-making.
A
critical
evaluation
existing
regulatory
landscape
governing
operations
frameworks
is
presented,
shedding
light
effectiveness
limitations.
Язык: Английский
Future Trends and Emerging Threats in Drone Cybersecurity
Advances in information security, privacy, and ethics book series,
Год журнала:
2024,
Номер
unknown, С. 148 - 195
Опубликована: Янв. 26, 2024
The
rapid
proliferation
of
drone
technology
has
ushered
in
a
new
era
innovation
and
convenience
across
various
industries.
However,
this
technological
advancement
also
given
rise
to
host
cybersecurity
challenges
that
demand
proactive
attention.
This
chapter
delves
into
the
dynamic
landscape
security,
exploring
evolving
trends
emerging
threats
shape
field.
Beginning
with
an
overview
advancements,
including
integration
artificial
intelligence
machine
learning,
examines
their
implications
for
cybersecurity.
It
then
scrutinizes
growing
influence
swarms
autonomous
operations,
pinpointing
associated
strategies
securing
these
systems.
explores
expansion
operations
beyond
visual
line
sight
(BVLOS)
risks
involved,
emphasizing
importance
secure
communications
legal
considerations.
Язык: Английский
Ethical Considerations in Drone Cybersecurity
Advances in information security, privacy, and ethics book series,
Год журнала:
2024,
Номер
unknown, С. 42 - 87
Опубликована: Янв. 26, 2024
The
rapid
proliferation
of
drones,
coupled
with
their
increasing
integration
into
various
aspects
our
lives,
has
brought
to
the
forefront
a
myriad
ethical
considerations
in
realm
cybersecurity.
This
chapter
delves
deep
intricate
web
challenges
surrounding
drone
cybersecurity,
aiming
provide
comprehensive
understanding
this
critical
issue.
introduction
sets
stage
by
highlighting
essential
role
ethics
emphasizing
need
for
responsible
decision-making
an
age
where
drones
are
omnipresent.
It
lays
out
scope,
objectives,
and
key
concepts
research,
underscoring
contributions
it
makes
field.
core
explores
principles
underpinning
cybersecurity
elucidates
how
these
can
be
applied
domain
technology.
authors
delve
delicate
balance
between
security
privacy,
discussing
implications
data
collection,
retention,
surveillance
context
drones.
Язык: Английский
Sustainability Metrics and Measurement in Industry 4.0-Enabled SCM
Advances in logistics, operations, and management science book series,
Год журнала:
2024,
Номер
unknown, С. 176 - 233
Опубликована: Янв. 19, 2024
The
rapid
advancement
of
Industry
4.0
technologies
has
ushered
in
a
new
era
supply
chain
management
(SCM)
that
places
sustainability
at
its
core.
This
chapter
goes
deep
into
the
critical
intersection
metrics
and
measurement
4.0-enabled
SCM,
exploring
dynamic
landscape
where
cutting-edge
technology
meets
environmental,
social,
economic
responsibility.
Beginning
with
an
introduction
to
4.0's
transformative
role
authors
elucidate
importance
this
context.
research's
scope
objectives
are
outlined,
emphasizing
need
decipher
intricacies
ecosystem.
provide
comprehensive
elucidation
key
concepts,
definitions,
unique
contributions
research
endeavour.
A
central
focus
is
alignment
SCM
United
Nations'
Sustainable
Development
Goals
(SDGs),
illuminating
how
emerging
can
act
as
catalysts
for
achieving
these
global
objectives.
Язык: Английский
The effect of technology-based service characteristics on relationship quality in metaverse exercise services: a questionnaire survey of bicycle simulator users in Korea
BMC Psychology,
Год журнала:
2024,
Номер
12(1)
Опубликована: Сен. 2, 2024
Язык: Английский
Security Considerations in Generative AI for Web Applications
Advances in information security, privacy, and ethics book series,
Год журнала:
2024,
Номер
unknown, С. 281 - 332
Опубликована: Июль 26, 2024
Protecting
AI
in
web
applications
is
necessary.
This
domain
a
composite
of
technology
and
huge
scope
with
good
prospects
immense
difficulties.
chapter
covers
the
landscape
security
issues
advancing
generative
techniques
for
integration
into
development
frameworks.
The
initial
section
on
development—a
conversation
subtleties
AI-based
methods.
In
literal
stance,
offers
13
ways
to
approach
it.
Among
threats
are
those
that
introduce
related
deployments,
which
illustrate
why
it
vital
defenders
infrastructure
owners
implement
mitigation
measures
proactively.
pertains
privacy
data
lessons
securing
preventing
vulnerability.
explores
attacks,
model
poisoning,
bias
issues,
defence
mechanisms,
long-term
strategies.
Additionally,
Service
A
promotes
transparency,
explainability,
compliance
applicable
laws
while
structuring
methodology
deployment
methods/operation.
text
outlines
how
respond
recover
from
incidents
as
provides
response
frameworks
everyone
involved
managing
breaches.
Finally,
addresses
trends,
possible
threats,
learned
real-world
case
studies.
order
contribute
addressing
these
research
needs,
this
sheds
light
considerations
associated
suggests
recommendations
can
help
researchers,
practitioners,
policymakers
enhance
posture
popular
advancements
used
generating
applications.
Язык: Английский
Sustainability in the Digital Age
Advances in logistics, operations, and management science book series,
Год журнала:
2024,
Номер
unknown, С. 89 - 132
Опубликована: Янв. 19, 2024
This
chapter
explores
the
convergence
of
Industry
4.0
technologies
and
sustainable
supply
chain
practices,
presenting
a
comprehensive
overview
these
digital
advancements'
transformative
potential.
The
begins
by
defining
intersection
between
sustainability
4.0,
emphasizing
pivotal
role
in
fostering
environmentally
socially
responsible
chains.
With
clear
objectives
mind,
exploration
delves
into
impact
key
on
practices.
discussion
spans
utilization
internet
things
(IoT)
for
real-time
monitoring,
big
data
analytics
informed
decision-making,
integration
robotics
to
enhance
ethical
manufacturing.
Язык: Английский
Overview of Generative AI Techniques for Cybersecurity
Advances in information security, privacy, and ethics book series,
Год журнала:
2024,
Номер
unknown, С. 1 - 52
Опубликована: Июль 26, 2024
Generative
AI
techniques
have
been
popular
since
they
can
generate
data
or
content
that
could
be
hardly
distinguished
from
genuine
ones.
This
chapter
comprehensively
reviews
generative
for
cybersecurity
and
its
definition,
history,
applications
in
different
fields.
It
covers
basic
ideas
such
as
models,
probability
distributions,
latent
spaces.
Also,
it
goes
into
more
detail
on
some
of
the
approaches
like
GANs,
VAEs,
combination
RL.
The
explores
structure
training
processes
GANs
VAEs
demonstrates
their
application
tasks
image
synthesis,
enhancement,
novelty
detection.
interaction
between
RL
models
challenges,
including
exploration-exploitation
trade-off.
focuses
development
with
help
DL
analyses
benefits
deep
usage
various
Evaluation
measures
problems
measuring
are
discussed,
focusing
methods
improving
measurement
accuracy.
Finally,
new
directions,
transformer-based
self-supervised
learning,
to
look
at
future
AI.
emphasis
is
made
understanding
these
due
versatility,
about
possible
further
developments
findings
other
fields
studies
provided.
Язык: Английский
Generative AI for Secure User Interface (UI) Design
Advances in information security, privacy, and ethics book series,
Год журнала:
2024,
Номер
unknown, С. 333 - 394
Опубликована: Июль 26, 2024
Generative
AI,
which
is
equipped
with
unique
capabilities,
about
to
put
the
world
of
secure
user
interface
(UI)
design
upside
down
and
turn
it
into
something
full
endless
possibilities
in
users
will
be
able
use
same
opportunities
experienced
solutions
protect
their
interaction
digital
from
any
future
security
threats.
This
chapter
takes
a
deep
plunge
merger
generative
AI
design,
on
whole,
presenting
complete
exposition
principals
involved,
methodologies
applied,
practical
embodiment,
ultimate
ramifications.
The
beginning
explore
building
blocks
UI
principles
user-centred
iterative
approach,
wherein
robust
framework
for
understanding
as
critical
part
secure,
intuitive,
engaging
experiences
implemented.
Further,
provides
an
overview
different
types
approaches
that
could
deployed
such
GANs,
VAEs,
autoregressive
models,
capabilities
expanding
scope
measures,
include
authentication
protocols,
encryption,
access
rights
while
retaining
usability
aesthetic
appeal.
Moreover,
surveys
instance
applications
support
Secure
GUI,
among
automatic
generation
safe
layout
patterns,
dynamic
change
according
emerging
threats,
creation
cryptographic
keys
symbols.
Язык: Английский