Incorporating Privacy by Design Principles in the Modification of AI Systems in Preventing Breaches across Multiple Environments, Including Public Cloud, Private Cloud, and On-prem DOI

Samuel Ufom Okon,

Omobolaji Olufunmilayo Olateju,

Olumide Samuel Ogungbemi

и другие.

SSRN Electronic Journal, Год журнала: 2024, Номер unknown

Опубликована: Янв. 1, 2024

Язык: Английский

Data Governance in AI - Enabled Healthcare Systems: A Case of the Project Nightingale DOI Open Access
Aisha Temitope Arigbabu, Oluwaseun Oladeji Olaniyi, Chinasa Susan Adigwe

и другие.

Asian Journal of Research in Computer Science, Год журнала: 2024, Номер 17(5), С. 85 - 107

Опубликована: Март 8, 2024

The study investigates data governance challenges within AI-enabled healthcare systems, focusing on Project Nightingale as a case to elucidate the complexities of balancing technological advancements with patient privacy and trust. Utilizing survey methodology, were collected from 843 service users employing structured questionnaire designed measure perceptions AI in healthcare, trust providers, concerns about privacy, impact regulatory frameworks adoption technologies. reliability instrument was confirmed Cronbach's Alpha 0.81, indicating high internal consistency. multiple regression analysis revealed significant findings: positive relationship between awareness projects countered by negative Additionally, familiarity perceived effectiveness positively correlated data, while constraints issues identified barriers effective technologies healthcare. highlights critical need for enhanced transparency, public awareness, robust navigate ethical associated recommends adopting flexible, principle-based approaches fostering multi-stakeholder collaboration ensure deployment that prioritize welfare

Язык: Английский

Процитировано

32

Ballots and Padlocks: Building Digital Trust and Security in Democracy through Information Governance Strategies and Blockchain Technologies DOI Open Access
Oluwaseun Oladeji Olaniyi

Asian Journal of Research in Computer Science, Год журнала: 2024, Номер 17(5), С. 172 - 189

Опубликована: Март 15, 2024

This research explores the integration of Information Governance (IG) strategies and Blockchain Technologies (BT) in enhancing digital trust security within democratic processes. Amid concerns about integrity vulnerability electoral systems era, this study examines how these technologies can collectively safeguard democracy. Utilizing Partial Least Squares Structural Equation Modeling (PLS-SEM), bootstrapping analysis for mediation effects, Fornell-Larcker Criterion discriminant validity, was conducted on data from 934 participants involved process. Key findings demonstrate that IG significantly impact trust, indicating importance robust management, legal compliance, privacy measures public confidence systems. positively affect processes due to their decentralized immutable characteristics. Furthermore, is identified as a critical mediator between strategies, BT, processes, highlighting effectiveness technologies. Based insights gained, three actionable recommendations are proposed: Electoral authorities should adopt comprehensive frameworks enhance transparency; Pilot blockchain projects be expanded refine understand broader implementation implications election security; Efforts increased foster literacy among electorate, emphasizing role securing integrity.

Язык: Английский

Процитировано

25

Evolving Access Control Paradigms: A Comprehensive Multi-Dimensional Analysis of Security Risks and System Assurance in Cyber Engineering DOI Open Access
Nanyeneke Ravana Mayeke, Aisha Temitope Arigbabu, Oluwaseun Oladeji Olaniyi

и другие.

Asian Journal of Research in Computer Science, Год журнала: 2024, Номер 17(5), С. 108 - 124

Опубликована: Март 8, 2024

This study evaluates the effectiveness of traditional access control paradigms—Role-Based Access Control (RBAC), Policy-Based (PBAC), and Attribute-Based (ABAC)—against ransomware threats in critical infrastructures examines potential benefits integrating machine learning (ML) artificial intelligence (AI) technologies. Utilizing a quantitative research design, investigation collected data from 383 cybersecurity professionals across various sectors through systematically structured questionnaire. The questionnaire, which demonstrated excellent internal consistency with reliability score 0.81, featured Likert scale questions aimed at assessing perceptions experiences concerning efficacy different models combating ransomware. Employing multiple regression analysis, explored relationship between paradigms their capability to mitigate risks, while also considering impact awareness among employees. findings indicate that methods are less effective against dynamic nature attacks, primarily due static configurations. In contrast, integration ML AI into systems significantly enhances adaptability detecting preventing incidents. Additionally, highlights crucial role training employees fortifying cyber threats. adoption layered security strategy, incorporating advanced technological solutions comprehensive practices, was found markedly improve resilience attacks. Based on these insights, recommends embrace technologies systems, prioritization for all organizational members, implementation multifaceted approach better defend evolving threat These strategies essential safeguarding continuity services an increasingly digital interconnected world.

Язык: Английский

Процитировано

21

CyberFusion Protocols: Strategic Integration of Enterprise Risk Management, ISO 27001, and Mobile Forensics for Advanced Digital Security in the Modern Business Ecosystem DOI Open Access
Oluwaseun Oladeji Olaniyi, Olajide Oyebola Omogoroye, Folashade Gloria Olaniyi

и другие.

Journal of Engineering Research and Reports, Год журнала: 2024, Номер 26(6), С. 31 - 49

Опубликована: Май 4, 2024

This research paper explores the integration of Enterprise Risk Management (ERM), ISO 27001 standard, and mobile forensics methodologies as a comprehensive framework for enhancing digital security measures within modern business ecosystems. Employing quantitative design, this utilized survey methodology, gathering data from 372 professionals across various sectors including risk management, IT/security, forensic analysis. The analysis was conducted using Partial Least Squares Structural Equation Modeling (PLS-SEM) to test hypotheses assess impact integrated approach on organizational capabilities. findings reveal significant positive effect integrating ERM, 27001, an organization’s ability manage risks effectively. Specifically, found enhance strategic improve identification, assessment, mitigation risks, strengthen information management practices, elevate effectiveness efficiency crime investigation processes. These outcomes underscore value cohesive strategy that leverages strengths in addressing complex interconnected threat landscape. Based results, study recommends adopting holistic framework, investing continuous professional development, leveraging technological advancements proactive fostering culture collaboration. Such are crucial organizations aiming their resilience against cyber threats protect assets face sophisticated cyber-attacks. contributes field cybersecurity by providing empirical evidence benefits security, offering practical guidelines seeking measures, highlighting need adaptation collaboration fight threats.

Язык: Английский

Процитировано

20

The Evolution of Terrorism in the Digital Age: Investigating the Adaptation of Terrorist Groups to Cyber Technologies for Recruitment, Propaganda, and Cyberattacks DOI Creative Commons
Chinasa Susan Adigwe, Nanyeneke Ravana Mayeke, Samuel Oladiipo Olabanji

и другие.

Asian Journal of Economics Business and Accounting, Год журнала: 2024, Номер 24(3), С. 289 - 306

Опубликована: Фев. 20, 2024

This paper delves into the critical and evolving challenge posed by terrorist organizations' adaptation to cyber technologies, as proliferation of these technologies significantly impacts societal security dynamics globally. The highlights case ISIS a prime example, illustrating group's sophisticated use cyberspace for purposes ranging from global recruitment attack planning, thereby demonstrating complexity reach modern cyberterrorism. Aiming investigate groups study primarily focuses on methods used recruitment, propaganda, execution cyberattacks. research employs quantitative methodology, relying survey strategy gather data, it engages with consultants policy specialists in counter-terrorism, alongside cybersecurity experts. findings reveal substantial impact digital platforms influence groups, increasing sophistication cyberattacks, extensive socio-economic repercussions digital-age terrorism. culminates offering insightful recommendations, urging multifaceted response integrating technological, social, international measures. It emphasizes enhancing literacy public awareness combat extremist narratives misinformation. necessity cooperation intelligence sharing is underscored, highlighting nature threat need unified standards regulating spaces. Additionally, advocates stringent regulatory measures advanced detection counter misuse drones 3D-printed weapons, pointing collaborative efforts across various sectors strike balance between innovation.

Язык: Английский

Процитировано

16

Towards Sustainable IT Infrastructure: Integrating Green Computing with Data Warehouse and Big Data Technologies to Enhance Efficiency and Environmental Responsibility DOI Open Access
Jennifer Chinelo Ugonnia, Oluwaseun Oladeji Olaniyi, Folashade Gloria Olaniyi

и другие.

Journal of Engineering Research and Reports, Год журнала: 2024, Номер 26(5), С. 247 - 261

Опубликована: Апрель 23, 2024

.

Процитировано

16

Bridging the Digital Divide: Exploring the Role of Artificial Intelligence and Automation in Enhancing Connectivity in Developing Nations DOI Open Access
Amaka Debie Samuel-Okon, Oluwatotan Olaperi Abejide

Journal of Engineering Research and Reports, Год журнала: 2024, Номер 26(6), С. 165 - 177

Опубликована: Май 17, 2024

This research paper explores the potential of artificial intelligence (AI) and automation to reduce digital divide in developing countries. The study investigates how these technologies can enhance accessibility efficiency critical sectors such as education, healthcare, agriculture, economic development, thereby contributing social progress. Key findings indicate that AI significantly improve educational outcomes by providing personalized learning experiences, enhancing healthcare delivery through better diagnostics patient care, increasing agricultural productivity with precision farming, stimulating growth creating new job opportunities improving market access. However, deploying faces substantial challenges, including inadequate infrastructure, significant skills gaps, cultural resistance, policy constraints. adopts a mixed-methods approach, combining quantitative data analysis qualitative case studies comprehensively understand impacts challenges associated implementing less developed regions. scope spans several countries, offering insights relevant policymakers, NGOs, private sector engaged technology deployment for development. underscores necessity collaborative approach overcome identified barriers suggests strategic recommendations stakeholders leverage practical tools closing divide. contributes broader discourse on technology’s role global highlighting both transformative need inclusive context-sensitive governance.

Язык: Английский

Процитировано

16

Digital Collaborative Tools, Strategic Communication, and Social Capital: Unveiling the Impact of Digital Transformation on Organizational Dynamics DOI Open Access
Oluwaseun Oladeji Olaniyi, Jennifer Chinelo Ugonnia, Folashade Gloria Olaniyi

и другие.

Asian Journal of Research in Computer Science, Год журнала: 2024, Номер 17(5), С. 140 - 156

Опубликована: Март 11, 2024

The rapid advancement of digitalization has significantly impacted how organizations operate, with collaborative tools like Asana, Trello, and Slack becoming integral to fostering internal communication, collaboration, social capital. Despite their widespread adoption, the comprehensive impact these on organizational culture, employee engagement, capital remains underexplored. This study aims bridge this gap by examining potential digital enhance exploring role strategic communication inclusivity in process. Utilizing a quantitative research approach, data were collected from 557 professionals through survey distributed via LinkedIn. questionnaire, designed Likert scale closed-ended questions, focused utilization perceived within organizations. Multiple regression analysis was employed test four hypotheses related effects tool usage dynamics. findings reveal that collaboration organizations, frequency purpose being key factors. Moreover, for networking quality interactions facilitated found positively development However, challenges integrating shown negatively affect development, though technical support training could mitigate effects. Interestingly, introduction 'social score' feature positively, indicating its further engage users enrich underscores importance adopting approach implementing tools, emphasizing beyond operational efficiency include enhancement culture. Recommendations networking, providing adequate training, integration features incentivize engagement collaboration.

Язык: Английский

Процитировано

15

Intention to Use Cryptocurrencies for Business Transactions: The Case of North Carolina DOI Open Access
Shakir Ullah

Journal of risk and financial management, Год журнала: 2025, Номер 18(2), С. 58 - 58

Опубликована: Янв. 27, 2025

Financial technologies and payment applications have revolutionized money flow recently, with cryptocurrencies offering decentralization, though still limited in transactional use. This study investigates the factors influencing use of for business transactions North Carolina (NC). exploratory research utilizes an extended technology acceptance model (TAM) using survey data collected from 228 residents applying Partial Least Squares Structural Equation Modeling (PLS-SEM) to find relationship between independent dependent variables. Our results indicate that perceived usefulness, social influence, personal innovativeness significantly impact users’ intentions adopt as a medium exchange. A surprising finding is ownership has negative effect on intention cryptos transactions. The findings imply regulators cryptocurrency issuers should make system more useful, take full advantage media promote cryptos, encourage crypto holders their intended utility rather than just speculative instruments.

Язык: Английский

Процитировано

0

Adaptive Location-based Routing Protocols for Dynamic Wireless Sensor Networks in Urban Cyber-physical Systems DOI Open Access

Oluwaseun Ibrahim Akinola

Journal of Engineering Research and Reports, Год журнала: 2024, Номер 26(7), С. 424 - 443

Опубликована: Июль 16, 2024

This study investigates the development and enhancement of adaptive location-based routing protocols within dynamic wireless sensor networks (WSNs) in urban cyber-physical systems, recommending implementation study’s innovative Urban Adaptive Location-based Routing Protocol (UALRP). protocol integrates real-time data analytics machine learning models into its algorithmic framework to dynamically optimize decisions based on continuously changing conditions. Through utilization data-driven simulation techniques, research sought significantly improve efficiency, reliability, scalability WSNs. Existing such as Geographic Fidelity (GAF), Greedy Perimeter Stateless (GPSR), Dynamic Source (DSR) were critically assessed under settings using extensive datasets detailing New York City's traffic patterns environmental variables. The analysis demonstrated that while GPSR showed superior performance terms latency, throughput, energy efficiency among traditional protocols, introduction UALRP, with advanced predictive capabilities, can further these metrics. affirms critical role enhancing location accuracy ongoing advancement protocols. These insights advocate for broader strategies like UALRP foster more resilient efficient systems.

Язык: Английский

Процитировано

4