The Governance Landscape DOI
Ot van Daalen

Information technology and law series/Information technology & law series, Год журнала: 2024, Номер unknown, С. 85 - 147

Опубликована: Сен. 1, 2024

This chapter is about the governance relating to information security cycle, encryption and quantum computing. It starts out with providing an overview of rules taking measures in continues a discussion breaking those measures. then focuses on different approaches regard encryption. ends limited exercise all intended create inventory gaps these three domains, which can be used for further assessment under relevant human rights frameworks.

Язык: Английский

Building security and resilience: a guide to implementing effective cybersecurity and data protection measures in smart cities DOI
Martin Lněnička,

Tomas Kysela,

Oldřich Horák

и другие.

Smart and Sustainable Built Environment, Год журнала: 2025, Номер unknown

Опубликована: Фев. 3, 2025

Purpose As cities increasingly embrace smart technologies to enhance efficiency, sustainability and quality of life, integrating cybersecurity data protection measures becomes paramount. This paper analyzes practices based on the existing strategies projects in cities. Design/methodology/approach A research methodology involving searching for resources, content analysis Delphi method was developed select sample cities, identify relevant analyze categorize their content, validate relevance transform them into a list recommendations. Findings The findings include validated 39 recommendations categorized 6 categories implementing robust We found that employ various address protection, including technical solutions, organizational practices, policies human resources initiatives. economy governance components are prioritized regarding measures, while living environments receive less attention than others. There regional differences implementation with Asia Europe demonstrating higher levels engagement. Originality/value provides an approach different contexts gather best practices. identified contribute building sustainable resilient urban governance.

Язык: Английский

Процитировано

1

A Comprehensive Review on Cybersecurity Issues and Their Mitigation Measures in FinTech DOI Creative Commons
Guma Ali, Maad M. Mijwil, Bosco Apparatus Buruga

и другие.

Iraqi Journal for Computer Science and Mathematics, Год журнала: 2024, Номер 5(3)

Опубликована: Янв. 6, 2024

The fourth industrial revolution has seen the evolution and wide adoption of game-changing disruptive innovation, "financial technologies (FinTech), around globe. However, security FinTech systems networks remains critical. This research paper comprehensively reviews cybersecurity issues their mitigation measures in FinTech. Four independent researchers reviewed relevant literature from IEEE Xplore, ScienceDirect, Taylor & Francis, Emerald Insight, Springer, SAGE, WILEY, Hindawi, MDPI, ACM, Google Scholar. key findings analysis identified privacy issues, data breaches, malware attacks, hacking, insider threats, identity theft, social engineering distributed denial-of-service cryptojacking, supply chain advanced persistent zero-day salami man-in-the-middle SQL injection, brute-force attacks as some significant experienced by industry. review also suggested authentication access control mechanisms, cryptography, regulatory compliance, intrusion detection prevention systems, regular backup, basic training, big analytics, use artificial intelligence machine learning, sandboxes, cloud computing technologies, blockchain fraud for issues. tackling will be paramount if is to realize its full potential. Ultimately, this help develop robust mechanisms achieve sustainable financial inclusion.

Язык: Английский

Процитировано

6

Optimal Time Window Selection in the Wavelet Signal Domain for Brain–Computer Interfaces in Wheelchair Steering Control DOI
Z.T. Al-Qaysi,

M. S Suzani,

Nazre Bin Abdul Rashid

и другие.

Applied Data Science and Analysis, Год журнала: 2024, Номер 2024, С. 69 - 81

Опубликована: Июнь 15, 2024

Background and objective: Principally, the procedure of pattern recognition in terms segmentation plays a significant role BCI-based wheelchair control system for avoiding errors, which can lead to initiation wrong command that will put user unsafe situations. Arguably, each subject might have different motor-imagery signal powers at times trial because he or she could start (or end) performing task slightly time intervals due differences complexities his her brain. Therefore, primary goal this research is develop generic model (GPRM)-based EEG-MI brain-computer interface steering control. Additionally, having simplified well generalized essential based BCI applications. Methods: Initially, bandpass filtering using multiple windows were used denoising finding best duration contains MI feature components. Then, extraction was performed five statistical features, namely minimum, maximum, mean, median, standard deviation, extracting components from wavelet coefficient. seven machine learning methods adopted evaluated find classifiers. Results: The results study showed that, durations time-frequency domain range (4-7 s). Interestingly, GPRM on LR classifier highly accurate, achieved an impressive classification accuracy 85.7%.

Язык: Английский

Процитировано

5

The Future of Virology Diagnostics Using Wearable Devices Driven by Artificial Intelligence DOI
Malik Sallam, Maad M. Mijwil, Mostafa Abotaleb

и другие.

Advances in computational intelligence and robotics book series, Год журнала: 2025, Номер unknown, С. 473 - 504

Опубликована: Янв. 10, 2025

The utilization of the wearable devices (WDs) that are enhanced by artificial intelligence (AI) can have a notable potential in healthcare. This chapter aimed to provide an overview applications AI-driven WDs enhancing early detection and management virus infections. First, we presented examples highlight capabilities very monitoring infections such as COVID-19. In addition, provided on utility machine learning algorithms analyze large data for signs We also overviewed enable real-time surveillance effective outbreak management. showed how this be achieved via collection analysis diverse WDs' across various populations. Finally, discussed challenges ethical issues comes with virology diagnostics, including concerns about privacy security well issue equitable access.

Язык: Английский

Процитировано

0

A hybrid blockchain and AI-based approach for attack protection to secure internet of medical things networks DOI

Hadeel Alsolai,

Fahd N. Al‐Wesabi,

Ali M. Al-Sharafi

и другие.

Alexandria Engineering Journal, Год журнала: 2025, Номер 128, С. 223 - 230

Опубликована: Май 28, 2025

Язык: Английский

Процитировано

0

Cybersecurity Awareness among Special Needs Students: The Role of Parental Control DOI Creative Commons

Hapini Awang,

Nur Suhaili Mansor, Mohamad Fadli Zolkipli

и другие.

Deleted Journal, Год журнала: 2024, Номер 4(2), С. 63 - 73

Опубликована: Июнь 10, 2024

The awareness of cybersecurity among special needs students is necessary to help them stay safe while using technology. Recently, a good amount interest has been drawn toward understanding the concepts and cybersecurity, institutions have made efforts introduce campaigns understand cybersafety, particularly for students. prior literature focused primarily on exploring students' preferences, readiness, experiences with cybersecurity. However, little attention given measuring level needs. To bridge this knowledge gap, present study conducted an online survey analyse parental control secondary school aged 13 19 years in Malaysia. revealed that moderate awareness, no significant difference genders or academic streams. age does play role awareness. Students better are more satisfied their activities. Educating monitoring cyberattacks, password management, phishing crucial. In addition, was found be reasonable most parents This contributes new by emphasizing importance as moderating variable explanatory studies. It also highlights need further research area expand how it can implemented specific environments.

Язык: Английский

Процитировано

2

Generalized Time Domain Prediction Model for Motor Imagery-based Wheelchair Movement Control DOI Creative Commons
Z.T. Al-Qaysi,

Mohamad Suzani,

Nazre bin Abdul Rashid

и другие.

Mesopotamian Journal of Big Data, Год журнала: 2024, Номер 2024, С. 68 - 81

Опубликована: Июнь 15, 2024

Brain-computer interface (BCI-MI)-based wheelchair control is, in principle, an appropriate method for completely paralyzed people with a healthy brain. In BCI-based system, pattern recognition terms of preprocessing, feature extraction, and classification plays significant role avoiding errors, which can lead to the initiation wrong command that will put user unsafe condition. Therefore, this research's goal is create time-domain generic model (GPRM) two-class EEG-MI signals use system.This GPRM has advantage having applicable unknown subjects, not just one. This been developed, evaluated, validated by utilizing two datasets, namely, BCI Competition IV Emotive EPOC datasets. Initially, fifteen-time windows were investigated seven machine learning methods determine optimal time window as well best strong generalizability. Evidently, experimental results study revealed duration signal range 4–6 seconds (4–6 s) high impact on accuracy while extracting features using five statistical methods. Additionally, demonstrate one-second latency after each cue when eight-second Graz protocol used study. inevitable because it practically impossible subjects imagine their MI hand movement instantly. at least one second required prepare initiate motor imagery movement. Practically, are efficient viable decoding domain. based LR classifier showed its ability achieve impressive 90%, was dataset. The developed highly adaptable recommended deployment real-time EEG-MI-based systems.

Язык: Английский

Процитировано

1

Secure Healthcare Systems and Big Data: A Bibliometrics Analysis DOI Creative Commons
Rasha Talal Hameed, Saad Ahmed Dheyab, Saba Abdulbaqi Salman

и другие.

Iraqi Journal for Computer Science and Mathematics, Год журнала: 2024, Номер 5(4)

Опубликована: Дек. 16, 2024

This study conducts a bibliometrics analysis of research on secure healthcare systems and big data, aiming to identify trends, key contributors, thematic areas within the field. By examining comprehensive database academic publications, we highlight evolution from foundational concepts contemporary innovations in data security privacy management healthcare. Key metrics such as publication volume, citation impact, co-authorship networks are analyzed uncover most influential authors institutions. Additionally, explore integration analytics enhancing delivery while addressing challenges. The findings provide valuable insights for researchers practitioners, emphasizing importance developing robust, frameworks that leverage improve patient outcomes operational efficiency systems. serves resource future studies strategic initiatives securing health information amid growing reliance technologies.

Язык: Английский

Процитировано

1

The Governance Landscape DOI
Ot van Daalen

Information technology and law series/Information technology & law series, Год журнала: 2024, Номер unknown, С. 85 - 147

Опубликована: Сен. 1, 2024

This chapter is about the governance relating to information security cycle, encryption and quantum computing. It starts out with providing an overview of rules taking measures in continues a discussion breaking those measures. then focuses on different approaches regard encryption. ends limited exercise all intended create inventory gaps these three domains, which can be used for further assessment under relevant human rights frameworks.

Язык: Английский

Процитировано

0