SSRN Electronic Journal, Год журнала: 2024, Номер unknown
Опубликована: Янв. 1, 2024
Язык: Английский
SSRN Electronic Journal, Год журнала: 2024, Номер unknown
Опубликована: Янв. 1, 2024
Язык: Английский
Asian Journal of Research in Computer Science, Год журнала: 2024, Номер 17(5), С. 85 - 107
Опубликована: Март 8, 2024
The study investigates data governance challenges within AI-enabled healthcare systems, focusing on Project Nightingale as a case to elucidate the complexities of balancing technological advancements with patient privacy and trust. Utilizing survey methodology, were collected from 843 service users employing structured questionnaire designed measure perceptions AI in healthcare, trust providers, concerns about privacy, impact regulatory frameworks adoption technologies. reliability instrument was confirmed Cronbach's Alpha 0.81, indicating high internal consistency. multiple regression analysis revealed significant findings: positive relationship between awareness projects countered by negative Additionally, familiarity perceived effectiveness positively correlated data, while constraints issues identified barriers effective technologies healthcare. highlights critical need for enhanced transparency, public awareness, robust navigate ethical associated recommends adopting flexible, principle-based approaches fostering multi-stakeholder collaboration ensure deployment that prioritize welfare
Язык: Английский
Процитировано
32Asian Journal of Research in Computer Science, Год журнала: 2024, Номер 17(5), С. 172 - 189
Опубликована: Март 15, 2024
This research explores the integration of Information Governance (IG) strategies and Blockchain Technologies (BT) in enhancing digital trust security within democratic processes. Amid concerns about integrity vulnerability electoral systems era, this study examines how these technologies can collectively safeguard democracy. Utilizing Partial Least Squares Structural Equation Modeling (PLS-SEM), bootstrapping analysis for mediation effects, Fornell-Larcker Criterion discriminant validity, was conducted on data from 934 participants involved process. Key findings demonstrate that IG significantly impact trust, indicating importance robust management, legal compliance, privacy measures public confidence systems. positively affect processes due to their decentralized immutable characteristics. Furthermore, is identified as a critical mediator between strategies, BT, processes, highlighting effectiveness technologies. Based insights gained, three actionable recommendations are proposed: Electoral authorities should adopt comprehensive frameworks enhance transparency; Pilot blockchain projects be expanded refine understand broader implementation implications election security; Efforts increased foster literacy among electorate, emphasizing role securing integrity.
Язык: Английский
Процитировано
25Asian Journal of Research in Computer Science, Год журнала: 2024, Номер 17(5), С. 108 - 124
Опубликована: Март 8, 2024
This study evaluates the effectiveness of traditional access control paradigms—Role-Based Access Control (RBAC), Policy-Based (PBAC), and Attribute-Based (ABAC)—against ransomware threats in critical infrastructures examines potential benefits integrating machine learning (ML) artificial intelligence (AI) technologies. Utilizing a quantitative research design, investigation collected data from 383 cybersecurity professionals across various sectors through systematically structured questionnaire. The questionnaire, which demonstrated excellent internal consistency with reliability score 0.81, featured Likert scale questions aimed at assessing perceptions experiences concerning efficacy different models combating ransomware. Employing multiple regression analysis, explored relationship between paradigms their capability to mitigate risks, while also considering impact awareness among employees. findings indicate that methods are less effective against dynamic nature attacks, primarily due static configurations. In contrast, integration ML AI into systems significantly enhances adaptability detecting preventing incidents. Additionally, highlights crucial role training employees fortifying cyber threats. adoption layered security strategy, incorporating advanced technological solutions comprehensive practices, was found markedly improve resilience attacks. Based on these insights, recommends embrace technologies systems, prioritization for all organizational members, implementation multifaceted approach better defend evolving threat These strategies essential safeguarding continuity services an increasingly digital interconnected world.
Язык: Английский
Процитировано
21Asian Journal of Economics Business and Accounting, Год журнала: 2024, Номер 24(3), С. 289 - 306
Опубликована: Фев. 20, 2024
This paper delves into the critical and evolving challenge posed by terrorist organizations' adaptation to cyber technologies, as proliferation of these technologies significantly impacts societal security dynamics globally. The highlights case ISIS a prime example, illustrating group's sophisticated use cyberspace for purposes ranging from global recruitment attack planning, thereby demonstrating complexity reach modern cyberterrorism. Aiming investigate groups study primarily focuses on methods used recruitment, propaganda, execution cyberattacks. research employs quantitative methodology, relying survey strategy gather data, it engages with consultants policy specialists in counter-terrorism, alongside cybersecurity experts. findings reveal substantial impact digital platforms influence groups, increasing sophistication cyberattacks, extensive socio-economic repercussions digital-age terrorism. culminates offering insightful recommendations, urging multifaceted response integrating technological, social, international measures. It emphasizes enhancing literacy public awareness combat extremist narratives misinformation. necessity cooperation intelligence sharing is underscored, highlighting nature threat need unified standards regulating spaces. Additionally, advocates stringent regulatory measures advanced detection counter misuse drones 3D-printed weapons, pointing collaborative efforts across various sectors strike balance between innovation.
Язык: Английский
Процитировано
16Journal of Engineering Research and Reports, Год журнала: 2024, Номер 26(5), С. 247 - 261
Опубликована: Апрель 23, 2024
.
Процитировано
16Safety Science, Год журнала: 2025, Номер 184, С. 106770 - 106770
Опубликована: Янв. 5, 2025
Язык: Английский
Процитировано
2Journal of Engineering Research and Reports, Год журнала: 2024, Номер 26(8), С. 411 - 432
Опубликована: Авг. 16, 2024
The integration of the Internet Things (IoT) with artificial intelligence (AI) is transforming home appliances into smarter, more responsive tools that enhance daily living. However, this technological fusion introduces significant security challenges, necessitating a careful balance between and performance within IoT networks. First, study answers question trade-offs measures metrics in web applications for AI-driven appliances, second, how can these be optimized to ensure both robust high system performance? Using qualitative content analysis, identified key flaws application architectures, while quantitative analysis assessed impact protocols on such as latency, throughput, CPU usage. Atlas.ti Cisco’s Packet Tracer were utilized thematic coding network simulation, respectively, multivariate regression quantified influences protocols. results revealed enhanced protocols, encryption authentication, significantly performance, increasing latency by an average 50 milliseconds reducing throughput 10% under peak loads. Additionally, usage increased up 75% high-threat scenarios. proposed security-performance optimization framework dynamically adjusts based current threat assessments operational demands, aiming sustain ensuring security. These findings have real-world design implementation offering roadmap manufacturers device without compromising performance. By adopting adaptive leveraging edge computing, improve user satisfaction trust smart technologies.
Язык: Английский
Процитировано
4Advances in educational technologies and instructional design book series, Год журнала: 2025, Номер unknown, С. 31 - 62
Опубликована: Янв. 3, 2025
The incorporation of Artificial Intelligence (AI) into higher education is altering both curriculum design and administrative operations. This chapter investigates how AI being exploited to tailor learning experiences, expedite chores, enhance decision-making in educational institutions. AI-driven encourages adaptive environments, allowing students individualized routes based on their unique requirements preferences. Meanwhile, boosts efficiency by automating routine activities, optimizing resource allocation, boosting student support services. Despite the transformational potential, adoption also creates obstacles linked ethical considerations, data protection, need for faculty training. By reviewing case studies effective integration universities, this gives a forward-looking picture future administration era AI.
Язык: Английский
Процитировано
0SSRN Electronic Journal, Год журнала: 2025, Номер unknown
Опубликована: Янв. 1, 2025
Язык: Английский
Процитировано
0Journal of Engineering Research and Reports, Год журнала: 2024, Номер 26(5), С. 138 - 154
Опубликована: Апрель 10, 2024
This study investigates the effectiveness of Role-Based Access Control (RBAC) systems in mitigating insider threats to database security within various organizational environments. Insider represent a significant challenge for security, necessitating robust and adaptive measures. By delineating access based on users' roles an organization, RBAC emerges as critical tool against such threats. Employing quantitative research methodology, this work gathered data through survey targeting professionals directly involved management databases across technology, finance, healthcare, government industries. The utilized Confirmatory Factor Analysis (CFA) Structural Equation Modeling (SEM) validate measurement model analyze relationships between effectiveness, implementation challenges, enhancements, their collective impact threat reduction. Findings indicate that effectively reduces unauthorized breaches, significantly However, challenges role definition complexity adapting dynamic needs emerge notable obstacles. Enhancements RBAC, mainly integrating technologies like machine learning controls, are identified mediators enhance RBAC's effectiveness. concludes while is vital its success depends continuous improvement customization specific contexts. It recommends developing enhancement programs systems, specialized training administrators, strategies meet unique industry needs. These measures crucial optimizing
Язык: Английский
Процитировано
1