Building security and resilience: a guide to implementing effective cybersecurity and data protection measures in smart cities
Smart and Sustainable Built Environment,
Год журнала:
2025,
Номер
unknown
Опубликована: Фев. 3, 2025
Purpose
As
cities
increasingly
embrace
smart
technologies
to
enhance
efficiency,
sustainability
and
quality
of
life,
integrating
cybersecurity
data
protection
measures
becomes
paramount.
This
paper
analyzes
practices
based
on
the
existing
strategies
projects
in
cities.
Design/methodology/approach
A
research
methodology
involving
searching
for
resources,
content
analysis
Delphi
method
was
developed
select
sample
cities,
identify
relevant
analyze
categorize
their
content,
validate
relevance
transform
them
into
a
list
recommendations.
Findings
The
findings
include
validated
39
recommendations
categorized
6
categories
implementing
robust
We
found
that
employ
various
address
protection,
including
technical
solutions,
organizational
practices,
policies
human
resources
initiatives.
economy
governance
components
are
prioritized
regarding
measures,
while
living
environments
receive
less
attention
than
others.
There
regional
differences
implementation
with
Asia
Europe
demonstrating
higher
levels
engagement.
Originality/value
provides
an
approach
different
contexts
gather
best
practices.
identified
contribute
building
sustainable
resilient
urban
governance.
Язык: Английский
A Comprehensive Review on Cybersecurity Issues and Their Mitigation Measures in FinTech
Iraqi Journal for Computer Science and Mathematics,
Год журнала:
2024,
Номер
5(3)
Опубликована: Янв. 6, 2024
The
fourth
industrial
revolution
has
seen
the
evolution
and
wide
adoption
of
game-changing
disruptive
innovation,
"financial
technologies
(FinTech),
around
globe.
However,
security
FinTech
systems
networks
remains
critical.
This
research
paper
comprehensively
reviews
cybersecurity
issues
their
mitigation
measures
in
FinTech.
Four
independent
researchers
reviewed
relevant
literature
from
IEEE
Xplore,
ScienceDirect,
Taylor
&
Francis,
Emerald
Insight,
Springer,
SAGE,
WILEY,
Hindawi,
MDPI,
ACM,
Google
Scholar.
key
findings
analysis
identified
privacy
issues,
data
breaches,
malware
attacks,
hacking,
insider
threats,
identity
theft,
social
engineering
distributed
denial-of-service
cryptojacking,
supply
chain
advanced
persistent
zero-day
salami
man-in-the-middle
SQL
injection,
brute-force
attacks
as
some
significant
experienced
by
industry.
review
also
suggested
authentication
access
control
mechanisms,
cryptography,
regulatory
compliance,
intrusion
detection
prevention
systems,
regular
backup,
basic
training,
big
analytics,
use
artificial
intelligence
machine
learning,
sandboxes,
cloud
computing
technologies,
blockchain
fraud
for
issues.
tackling
will
be
paramount
if
is
to
realize
its
full
potential.
Ultimately,
this
help
develop
robust
mechanisms
achieve
sustainable
financial
inclusion.
Язык: Английский
Optimal Time Window Selection in the Wavelet Signal Domain for Brain–Computer Interfaces in Wheelchair Steering Control
Applied Data Science and Analysis,
Год журнала:
2024,
Номер
2024, С. 69 - 81
Опубликована: Июнь 15, 2024
Background
and
objective:
Principally,
the
procedure
of
pattern
recognition
in
terms
segmentation
plays
a
significant
role
BCI-based
wheelchair
control
system
for
avoiding
errors,
which
can
lead
to
initiation
wrong
command
that
will
put
user
unsafe
situations.
Arguably,
each
subject
might
have
different
motor-imagery
signal
powers
at
times
trial
because
he
or
she
could
start
(or
end)
performing
task
slightly
time
intervals
due
differences
complexities
his
her
brain.
Therefore,
primary
goal
this
research
is
develop
generic
model
(GPRM)-based
EEG-MI
brain-computer
interface
steering
control.
Additionally,
having
simplified
well
generalized
essential
based
BCI
applications.
Methods:
Initially,
bandpass
filtering
using
multiple
windows
were
used
denoising
finding
best
duration
contains
MI
feature
components.
Then,
extraction
was
performed
five
statistical
features,
namely
minimum,
maximum,
mean,
median,
standard
deviation,
extracting
components
from
wavelet
coefficient.
seven
machine
learning
methods
adopted
evaluated
find
classifiers.
Results:
The
results
study
showed
that,
durations
time-frequency
domain
range
(4-7
s).
Interestingly,
GPRM
on
LR
classifier
highly
accurate,
achieved
an
impressive
classification
accuracy
85.7%.
Язык: Английский
The Future of Virology Diagnostics Using Wearable Devices Driven by Artificial Intelligence
Advances in computational intelligence and robotics book series,
Год журнала:
2025,
Номер
unknown, С. 473 - 504
Опубликована: Янв. 10, 2025
The
utilization
of
the
wearable
devices
(WDs)
that
are
enhanced
by
artificial
intelligence
(AI)
can
have
a
notable
potential
in
healthcare.
This
chapter
aimed
to
provide
an
overview
applications
AI-driven
WDs
enhancing
early
detection
and
management
virus
infections.
First,
we
presented
examples
highlight
capabilities
very
monitoring
infections
such
as
COVID-19.
In
addition,
provided
on
utility
machine
learning
algorithms
analyze
large
data
for
signs
We
also
overviewed
enable
real-time
surveillance
effective
outbreak
management.
showed
how
this
be
achieved
via
collection
analysis
diverse
WDs'
across
various
populations.
Finally,
discussed
challenges
ethical
issues
comes
with
virology
diagnostics,
including
concerns
about
privacy
security
well
issue
equitable
access.
Язык: Английский
A hybrid blockchain and AI-based approach for attack protection to secure internet of medical things networks
Alexandria Engineering Journal,
Год журнала:
2025,
Номер
128, С. 223 - 230
Опубликована: Май 28, 2025
Язык: Английский
Cybersecurity Awareness among Special Needs Students: The Role of Parental Control
Deleted Journal,
Год журнала:
2024,
Номер
4(2), С. 63 - 73
Опубликована: Июнь 10, 2024
The
awareness
of
cybersecurity
among
special
needs
students
is
necessary
to
help
them
stay
safe
while
using
technology.
Recently,
a
good
amount
interest
has
been
drawn
toward
understanding
the
concepts
and
cybersecurity,
institutions
have
made
efforts
introduce
campaigns
understand
cybersafety,
particularly
for
students.
prior
literature
focused
primarily
on
exploring
students'
preferences,
readiness,
experiences
with
cybersecurity.
However,
little
attention
given
measuring
level
needs.
To
bridge
this
knowledge
gap,
present
study
conducted
an
online
survey
analyse
parental
control
secondary
school
aged
13
19
years
in
Malaysia.
revealed
that
moderate
awareness,
no
significant
difference
genders
or
academic
streams.
age
does
play
role
awareness.
Students
better
are
more
satisfied
their
activities.
Educating
monitoring
cyberattacks,
password
management,
phishing
crucial.
In
addition,
was
found
be
reasonable
most
parents
This
contributes
new
by
emphasizing
importance
as
moderating
variable
explanatory
studies.
It
also
highlights
need
further
research
area
expand
how
it
can
implemented
specific
environments.
Язык: Английский
Generalized Time Domain Prediction Model for Motor Imagery-based Wheelchair Movement Control
Mesopotamian Journal of Big Data,
Год журнала:
2024,
Номер
2024, С. 68 - 81
Опубликована: Июнь 15, 2024
Brain-computer
interface
(BCI-MI)-based
wheelchair
control
is,
in
principle,
an
appropriate
method
for
completely
paralyzed
people
with
a
healthy
brain.
In
BCI-based
system,
pattern
recognition
terms
of
preprocessing,
feature
extraction,
and
classification
plays
significant
role
avoiding
errors,
which
can
lead
to
the
initiation
wrong
command
that
will
put
user
unsafe
condition.
Therefore,
this
research's
goal
is
create
time-domain
generic
model
(GPRM)
two-class
EEG-MI
signals
use
system.This
GPRM
has
advantage
having
applicable
unknown
subjects,
not
just
one.
This
been
developed,
evaluated,
validated
by
utilizing
two
datasets,
namely,
BCI
Competition
IV
Emotive
EPOC
datasets.
Initially,
fifteen-time
windows
were
investigated
seven
machine
learning
methods
determine
optimal
time
window
as
well
best
strong
generalizability.
Evidently,
experimental
results
study
revealed
duration
signal
range
4–6
seconds
(4–6
s)
high
impact
on
accuracy
while
extracting
features
using
five
statistical
methods.
Additionally,
demonstrate
one-second
latency
after
each
cue
when
eight-second
Graz
protocol
used
study.
inevitable
because
it
practically
impossible
subjects
imagine
their
MI
hand
movement
instantly.
at
least
one
second
required
prepare
initiate
motor
imagery
movement.
Practically,
are
efficient
viable
decoding
domain.
based
LR
classifier
showed
its
ability
achieve
impressive
90%,
was
dataset.
The
developed
highly
adaptable
recommended
deployment
real-time
EEG-MI-based
systems.
Язык: Английский
Secure Healthcare Systems and Big Data: A Bibliometrics Analysis
Iraqi Journal for Computer Science and Mathematics,
Год журнала:
2024,
Номер
5(4)
Опубликована: Дек. 16, 2024
This
study
conducts
a
bibliometrics
analysis
of
research
on
secure
healthcare
systems
and
big
data,
aiming
to
identify
trends,
key
contributors,
thematic
areas
within
the
field.
By
examining
comprehensive
database
academic
publications,
we
highlight
evolution
from
foundational
concepts
contemporary
innovations
in
data
security
privacy
management
healthcare.
Key
metrics
such
as
publication
volume,
citation
impact,
co-authorship
networks
are
analyzed
uncover
most
influential
authors
institutions.
Additionally,
explore
integration
analytics
enhancing
delivery
while
addressing
challenges.
The
findings
provide
valuable
insights
for
researchers
practitioners,
emphasizing
importance
developing
robust,
frameworks
that
leverage
improve
patient
outcomes
operational
efficiency
systems.
serves
resource
future
studies
strategic
initiatives
securing
health
information
amid
growing
reliance
technologies.
Язык: Английский
The Governance Landscape
Information technology and law series/Information technology & law series,
Год журнала:
2024,
Номер
unknown, С. 85 - 147
Опубликована: Сен. 1, 2024
This
chapter
is
about
the
governance
relating
to
information
security
cycle,
encryption
and
quantum
computing.
It
starts
out
with
providing
an
overview
of
rules
taking
measures
in
continues
a
discussion
breaking
those
measures.
then
focuses
on
different
approaches
regard
encryption.
ends
limited
exercise
all
intended
create
inventory
gaps
these
three
domains,
which
can
be
used
for
further
assessment
under
relevant
human
rights
frameworks.
Язык: Английский