Protecting Autonomous UAVs from GPS Spoofing and Jamming: A Comparative Analysis of Detection and Mitigation Techniques DOI
Princess Chimmy Joeaneke,

Onyinye Obioha-Val,

Oluwaseun Oladeji Olaniyi

и другие.

SSRN Electronic Journal, Год журнала: 2024, Номер unknown

Опубликована: Янв. 1, 2024

Язык: Английский

Data Governance in AI - Enabled Healthcare Systems: A Case of the Project Nightingale DOI Open Access
Aisha Temitope Arigbabu, Oluwaseun Oladeji Olaniyi, Chinasa Susan Adigwe

и другие.

Asian Journal of Research in Computer Science, Год журнала: 2024, Номер 17(5), С. 85 - 107

Опубликована: Март 8, 2024

The study investigates data governance challenges within AI-enabled healthcare systems, focusing on Project Nightingale as a case to elucidate the complexities of balancing technological advancements with patient privacy and trust. Utilizing survey methodology, were collected from 843 service users employing structured questionnaire designed measure perceptions AI in healthcare, trust providers, concerns about privacy, impact regulatory frameworks adoption technologies. reliability instrument was confirmed Cronbach's Alpha 0.81, indicating high internal consistency. multiple regression analysis revealed significant findings: positive relationship between awareness projects countered by negative Additionally, familiarity perceived effectiveness positively correlated data, while constraints issues identified barriers effective technologies healthcare. highlights critical need for enhanced transparency, public awareness, robust navigate ethical associated recommends adopting flexible, principle-based approaches fostering multi-stakeholder collaboration ensure deployment that prioritize welfare

Язык: Английский

Процитировано

32

Ballots and Padlocks: Building Digital Trust and Security in Democracy through Information Governance Strategies and Blockchain Technologies DOI Open Access
Oluwaseun Oladeji Olaniyi

Asian Journal of Research in Computer Science, Год журнала: 2024, Номер 17(5), С. 172 - 189

Опубликована: Март 15, 2024

This research explores the integration of Information Governance (IG) strategies and Blockchain Technologies (BT) in enhancing digital trust security within democratic processes. Amid concerns about integrity vulnerability electoral systems era, this study examines how these technologies can collectively safeguard democracy. Utilizing Partial Least Squares Structural Equation Modeling (PLS-SEM), bootstrapping analysis for mediation effects, Fornell-Larcker Criterion discriminant validity, was conducted on data from 934 participants involved process. Key findings demonstrate that IG significantly impact trust, indicating importance robust management, legal compliance, privacy measures public confidence systems. positively affect processes due to their decentralized immutable characteristics. Furthermore, is identified as a critical mediator between strategies, BT, processes, highlighting effectiveness technologies. Based insights gained, three actionable recommendations are proposed: Electoral authorities should adopt comprehensive frameworks enhance transparency; Pilot blockchain projects be expanded refine understand broader implementation implications election security; Efforts increased foster literacy among electorate, emphasizing role securing integrity.

Язык: Английский

Процитировано

25

Evolving Access Control Paradigms: A Comprehensive Multi-Dimensional Analysis of Security Risks and System Assurance in Cyber Engineering DOI Open Access
Nanyeneke Ravana Mayeke, Aisha Temitope Arigbabu, Oluwaseun Oladeji Olaniyi

и другие.

Asian Journal of Research in Computer Science, Год журнала: 2024, Номер 17(5), С. 108 - 124

Опубликована: Март 8, 2024

This study evaluates the effectiveness of traditional access control paradigms—Role-Based Access Control (RBAC), Policy-Based (PBAC), and Attribute-Based (ABAC)—against ransomware threats in critical infrastructures examines potential benefits integrating machine learning (ML) artificial intelligence (AI) technologies. Utilizing a quantitative research design, investigation collected data from 383 cybersecurity professionals across various sectors through systematically structured questionnaire. The questionnaire, which demonstrated excellent internal consistency with reliability score 0.81, featured Likert scale questions aimed at assessing perceptions experiences concerning efficacy different models combating ransomware. Employing multiple regression analysis, explored relationship between paradigms their capability to mitigate risks, while also considering impact awareness among employees. findings indicate that methods are less effective against dynamic nature attacks, primarily due static configurations. In contrast, integration ML AI into systems significantly enhances adaptability detecting preventing incidents. Additionally, highlights crucial role training employees fortifying cyber threats. adoption layered security strategy, incorporating advanced technological solutions comprehensive practices, was found markedly improve resilience attacks. Based on these insights, recommends embrace technologies systems, prioritization for all organizational members, implementation multifaceted approach better defend evolving threat These strategies essential safeguarding continuity services an increasingly digital interconnected world.

Язык: Английский

Процитировано

21

The Evolution of Terrorism in the Digital Age: Investigating the Adaptation of Terrorist Groups to Cyber Technologies for Recruitment, Propaganda, and Cyberattacks DOI Creative Commons
Chinasa Susan Adigwe, Nanyeneke Ravana Mayeke, Samuel Oladiipo Olabanji

и другие.

Asian Journal of Economics Business and Accounting, Год журнала: 2024, Номер 24(3), С. 289 - 306

Опубликована: Фев. 20, 2024

This paper delves into the critical and evolving challenge posed by terrorist organizations' adaptation to cyber technologies, as proliferation of these technologies significantly impacts societal security dynamics globally. The highlights case ISIS a prime example, illustrating group's sophisticated use cyberspace for purposes ranging from global recruitment attack planning, thereby demonstrating complexity reach modern cyberterrorism. Aiming investigate groups study primarily focuses on methods used recruitment, propaganda, execution cyberattacks. research employs quantitative methodology, relying survey strategy gather data, it engages with consultants policy specialists in counter-terrorism, alongside cybersecurity experts. findings reveal substantial impact digital platforms influence groups, increasing sophistication cyberattacks, extensive socio-economic repercussions digital-age terrorism. culminates offering insightful recommendations, urging multifaceted response integrating technological, social, international measures. It emphasizes enhancing literacy public awareness combat extremist narratives misinformation. necessity cooperation intelligence sharing is underscored, highlighting nature threat need unified standards regulating spaces. Additionally, advocates stringent regulatory measures advanced detection counter misuse drones 3D-printed weapons, pointing collaborative efforts across various sectors strike balance between innovation.

Язык: Английский

Процитировано

16

Towards Sustainable IT Infrastructure: Integrating Green Computing with Data Warehouse and Big Data Technologies to Enhance Efficiency and Environmental Responsibility DOI Open Access
Jennifer Chinelo Ugonnia, Oluwaseun Oladeji Olaniyi, Folashade Gloria Olaniyi

и другие.

Journal of Engineering Research and Reports, Год журнала: 2024, Номер 26(5), С. 247 - 261

Опубликована: Апрель 23, 2024

.

Процитировано

16

Advancing occupational and system safety in Industry 5.0: Effective HAZID, risk analysis frameworks, and human-AI interaction management DOI
Kamran Gholamizadeh, Esmaeil Zarei, Luca Gualtieri

и другие.

Safety Science, Год журнала: 2025, Номер 184, С. 106770 - 106770

Опубликована: Янв. 5, 2025

Язык: Английский

Процитировано

2

Evaluating the Trade-offs between Wireless Security and Performance in IoT Networks: A Case Study of Web Applications in AI-Driven Home Appliances DOI Open Access
Christopher Uzoma Asonze,

Olumide Samuel Ogungbemi,

Favour Amarachi Ezeugwa

и другие.

Journal of Engineering Research and Reports, Год журнала: 2024, Номер 26(8), С. 411 - 432

Опубликована: Авг. 16, 2024

The integration of the Internet Things (IoT) with artificial intelligence (AI) is transforming home appliances into smarter, more responsive tools that enhance daily living. However, this technological fusion introduces significant security challenges, necessitating a careful balance between and performance within IoT networks. First, study answers question trade-offs measures metrics in web applications for AI-driven appliances, second, how can these be optimized to ensure both robust high system performance? Using qualitative content analysis, identified key flaws application architectures, while quantitative analysis assessed impact protocols on such as latency, throughput, CPU usage. Atlas.ti Cisco’s Packet Tracer were utilized thematic coding network simulation, respectively, multivariate regression quantified influences protocols. results revealed enhanced protocols, encryption authentication, significantly performance, increasing latency by an average 50 milliseconds reducing throughput 10% under peak loads. Additionally, usage increased up 75% high-threat scenarios. proposed security-performance optimization framework dynamically adjusts based current threat assessments operational demands, aiming sustain ensuring security. These findings have real-world design implementation offering roadmap manufacturers device without compromising performance. By adopting adaptive leveraging edge computing, improve user satisfaction trust smart technologies.

Язык: Английский

Процитировано

4

AI in Higher Education DOI
Mustafa Kayyali

Advances in educational technologies and instructional design book series, Год журнала: 2025, Номер unknown, С. 31 - 62

Опубликована: Янв. 3, 2025

The incorporation of Artificial Intelligence (AI) into higher education is altering both curriculum design and administrative operations. This chapter investigates how AI being exploited to tailor learning experiences, expedite chores, enhance decision-making in educational institutions. AI-driven encourages adaptive environments, allowing students individualized routes based on their unique requirements preferences. Meanwhile, boosts efficiency by automating routine activities, optimizing resource allocation, boosting student support services. Despite the transformational potential, adoption also creates obstacles linked ethical considerations, data protection, need for faculty training. By reviewing case studies effective integration universities, this gives a forward-looking picture future administration era AI.

Язык: Английский

Процитировано

0

The Impact of Artificial Intelligence on Cyber Security in Digital Currency Transactions DOI

Adekunbi Justina Ajayi,

Sunday Abayomi Joseph,

Olufunke Cynthia Metibemu

и другие.

SSRN Electronic Journal, Год журнала: 2025, Номер unknown

Опубликована: Янв. 1, 2025

Язык: Английский

Процитировано

0

From Theory to Practice: Implementing Effective Role-Based Access Control Strategies to Mitigate Insider Risks in Diverse Organizational Contexts DOI Open Access
Yewande Alice Marquis

Journal of Engineering Research and Reports, Год журнала: 2024, Номер 26(5), С. 138 - 154

Опубликована: Апрель 10, 2024

This study investigates the effectiveness of Role-Based Access Control (RBAC) systems in mitigating insider threats to database security within various organizational environments. Insider represent a significant challenge for security, necessitating robust and adaptive measures. By delineating access based on users' roles an organization, RBAC emerges as critical tool against such threats. Employing quantitative research methodology, this work gathered data through survey targeting professionals directly involved management databases across technology, finance, healthcare, government industries. The utilized Confirmatory Factor Analysis (CFA) Structural Equation Modeling (SEM) validate measurement model analyze relationships between effectiveness, implementation challenges, enhancements, their collective impact threat reduction. Findings indicate that effectively reduces unauthorized breaches, significantly However, challenges role definition complexity adapting dynamic needs emerge notable obstacles. Enhancements RBAC, mainly integrating technologies like machine learning controls, are identified mediators enhance RBAC's effectiveness. concludes while is vital its success depends continuous improvement customization specific contexts. It recommends developing enhancement programs systems, specialized training administrators, strategies meet unique industry needs. These measures crucial optimizing

Язык: Английский

Процитировано

1