The Role of Artificial Intelligence (AI) in Enhancing Cybersecurity for Educational Technologies in US Public Schools DOI Open Access

Onyinye Obioha-Val

Asian Journal of Research in Computer Science, Год журнала: 2024, Номер 17(11), С. 114 - 133

Опубликована: Ноя. 25, 2024

This study investigates the role of Artificial Intelligence (AI) in enhancing cybersecurity for U.S. public schools, with primary objective evaluating AI's effectiveness reducing cyber threats and safeguarding student privacy. Specifically, assesses AI-driven security systems such as threat detection anomaly algorithms, which help schools monitor network traffic identify potential breaches real-time. Using logistic regression on data from K-12 Cybersecurity Resource Center, findings reveal that implementing AI solutions are 75% less likely to experience (p < 0.001), highlighting protective impact. Furthermore, a comparative analysis FERPA COPPA compliance reports highlights substantial reduction privacy violations among AI-using an average 0.57 per school, compared 1.50 without AI. A K-means cluster identified budget constraints (65.75%) IT staff shortages (55.25%) barriers adoption. To address these obstacles, recommends phased technology upgrades increased funding workforce training critical strategies facilitate integration enhance across educational institutions. These strategic interventions essential optimizing systems, making it feasible resource-constrained adopt maintain advanced measures. The study’s contribute growing body knowledge provide actionable insights policymakers administrators seeking strengthen protection school environments.

Язык: Английский

CyberFusion Protocols: Strategic Integration of Enterprise Risk Management, ISO 27001, and Mobile Forensics for Advanced Digital Security in the Modern Business Ecosystem DOI Open Access
Oluwaseun Oladeji Olaniyi, Olajide Oyebola Omogoroye, Folashade Gloria Olaniyi

и другие.

Journal of Engineering Research and Reports, Год журнала: 2024, Номер 26(6), С. 31 - 49

Опубликована: Май 4, 2024

This research paper explores the integration of Enterprise Risk Management (ERM), ISO 27001 standard, and mobile forensics methodologies as a comprehensive framework for enhancing digital security measures within modern business ecosystems. Employing quantitative design, this utilized survey methodology, gathering data from 372 professionals across various sectors including risk management, IT/security, forensic analysis. The analysis was conducted using Partial Least Squares Structural Equation Modeling (PLS-SEM) to test hypotheses assess impact integrated approach on organizational capabilities. findings reveal significant positive effect integrating ERM, 27001, an organization’s ability manage risks effectively. Specifically, found enhance strategic improve identification, assessment, mitigation risks, strengthen information management practices, elevate effectiveness efficiency crime investigation processes. These outcomes underscore value cohesive strategy that leverages strengths in addressing complex interconnected threat landscape. Based results, study recommends adopting holistic framework, investing continuous professional development, leveraging technological advancements proactive fostering culture collaboration. Such are crucial organizations aiming their resilience against cyber threats protect assets face sophisticated cyber-attacks. contributes field cybersecurity by providing empirical evidence benefits security, offering practical guidelines seeking measures, highlighting need adaptation collaboration fight threats.

Язык: Английский

Процитировано

20

Towards Sustainable IT Infrastructure: Integrating Green Computing with Data Warehouse and Big Data Technologies to Enhance Efficiency and Environmental Responsibility DOI Open Access
Jennifer Chinelo Ugonnia, Oluwaseun Oladeji Olaniyi, Folashade Gloria Olaniyi

и другие.

Journal of Engineering Research and Reports, Год журнала: 2024, Номер 26(5), С. 247 - 261

Опубликована: Апрель 23, 2024

.

Процитировано

16

Formulating Global Policies and Strategies for Combating Criminal Use and Abuse of Artificial Intelligence DOI Open Access

Amaka Debie Samuel-Okon,

Omobolaji Olufunmilayo Olateju,

Samuel Ufom Okon

и другие.

Archives of Current Research International, Год журнала: 2024, Номер 24(5), С. 612 - 629

Опубликована: Июнь 15, 2024

This study investigates the criminal use and abuse of artificial intelligence (AI), exploring effectiveness various mitigation strategies. It employs a mixed-methods approach, combining quantitative data from survey 211 experts with qualitative insights academic, governmental, industrial publications. The research examines four key hypotheses: impact public organizational awareness, role advanced detection technologies, ethical guidelines, influence penalties enforcement. findings reveal that technology, ethics, enforcement all contribute to mitigating AI misuse. concludes by proposing comprehensive strategies, including targeted awareness campaigns, investment in robust strengthened legal frameworks, effectively combat AI.

Язык: Английский

Процитировано

11

Exploring the Concept of Explainable AI and Developing Information Governance Standards for Enhancing Trust and Transparency in Handling Customer Data DOI Open Access

Omobolaji Olufunmilayo Olateju,

Samuel Ufom Okon,

Oluwaseun Oladeji Olaniyi

и другие.

Journal of Engineering Research and Reports, Год журнала: 2024, Номер 26(7), С. 244 - 268

Опубликована: Июнь 27, 2024

The increasing integration of Artificial Intelligence (AI) systems in diverse sectors has raised concerns regarding transparency, trust, and ethical data handling. This study investigates the impact Explainable AI (XAI) models robust information governance standards on enhancing use customer data. A mixed-methods approach was employed, combining a comprehensive literature review with survey 342 respondents across various industries. findings reveal that implementation XAI significantly increases user trust compared to black-box models. Additionally, strong positive correlation found between adoption data, highlighting importance transparency frameworks mechanisms. Furthermore, underscores critical role education fostering facilitating informed decision-making interactions. results emphasize need for organizations prioritize techniques, establish frameworks, invest education, foster culture use. These recommendations provide roadmap harness benefits while mitigating potential risks ensuring responsible trustworthy practices.

Язык: Английский

Процитировано

11

Smart Media or Biased Media: The Impacts and Challenges of AI and Big Data on the Media Industry DOI Open Access
Amaka Debie Samuel-Okon

Asian Journal of Research in Computer Science, Год журнала: 2024, Номер 17(7), С. 128 - 144

Опубликована: Июль 6, 2024

This study critically analyzes the impact of artificial intelligence (AI) and big data on media industry, focusing ethical challenges biases introduced by these technologies. The research aims to uncover extent which AI influence content personalization, creation, marketing, ramifications influences cultural diversity societal norms. A mixed-methods approach was employed, combining quantitative analysis through a survey 532 respondents qualitative thematic 10 academic literatures. findings reveal significant associations between automated creation tools biases, personalized recommendation systems echo chambers, algorithmic recommendations homogenization. Conversely, no association found analytics privacy concerns. highlights need for guidelines, enhanced diversity, strengthened measures, increased transparency mitigate in AI-driven platforms. These insights contribute broader understanding data's role shaping offering valuable implications future research, policy-making, industry practices.

Язык: Английский

Процитировано

6

Assessing the Effectiveness of Network Security Tools in Mitigating the Impact of Deepfakes AI on Public Trust in Media DOI Open Access
Amaka Debie Samuel-Okon,

Oluwaseun Ibrahim Akinola,

Oluwaseun Oladeji Olaniyi

и другие.

Archives of Current Research International, Год журнала: 2024, Номер 24(6), С. 355 - 375

Опубликована: Июль 27, 2024

The rising threat of deepfake technology challenges public trust in media, necessitating robust countermeasures. This study proposes the Anti-DFK framework, a comprehensive strategy to mitigate spread deepfakes on major social platforms such as Instagram, Facebook, YouTube, and Twitter. framework integrates deep learning-based detection engines, digital watermarking, advanced network access controls, including URL filtering, domain reputation content-type Geo-IP blocking. Analyzing historical data, user engagement metrics, sentiment from Kaggle Datasets, employed learning models—CNNs, LSTMs, Transformer-based—to evaluate capabilities, achieving highest controlled environment accuracy 0.97. Digital watermarking techniques were tested for robustness against various attacks, with DCT method displaying significant resilience. Network controls assessed their effectiveness curtailing deepfakes, content filtering proving most effective by reducing dissemination nearly 80%. Findings indicate critical negative impact trust, underscoring need integrated approach offered framework. concludes that implementing these sophisticated tools, combined stringent can significantly enhance integrity media restore confidence.

Язык: Английский

Процитировано

6

Overcoming Remote Workforce Cyber Threats: A Comprehensive Ransomware and Bot Net Defense Strategy Utilizing VPN Networks DOI Open Access

Olumide Samuel Ogungbemi,

Favour Amarachi Ezeugwa,

Oluwaseun Oladeji Olaniyi

и другие.

Journal of Engineering Research and Reports, Год журнала: 2024, Номер 26(8), С. 161 - 184

Опубликована: Июль 31, 2024

This study investigates endpoint security strategies for remote workforces utilizing VPN networks, focusing on mitigating ransomware and botnet attacks. A mixed-methods approach was employed, analyzing the effectiveness of existing solutions simulating network segmentation strategies. The highlights enhanced traditional when augmented with advanced technologies specific applications including email filtering to block phishing attempts, MFA verify user identities, EDR systems detect unauthorized access tools, encryption secure data during cloud services. introduction zero-trust architectures further secured centers by limiting lateral movements requiring continuous re-authentication. Results demonstrate that while remain essential, their can be through a multi-layered incorporating this research showing quick response times, high containment efficiency, fast recovery speeds across all segments, Finance Department notably achieving time 5 minutes efficiency 95%. Specifically, our cost-benefit analysis shows Strategy 1, despite higher cost, offers superior improvements in throughput latency reduction, providing more value per dollar spent. These results underscore plan’s capability rapidly detecting, containing, recovering from User education significantly improved cybersecurity awareness reduced susceptibility provides practical recommendations organizations strengthen posture protect workforce combination technologies, proactive measures, education.

Язык: Английский

Процитировано

5

Real-Time Data Governance and Compliance in Cloud-Native Robotics Systems DOI

Onyinye Obioha-Val,

Oluwatosin Selesi-Aina,

Titilayo Modupe Kolade

и другие.

SSRN Electronic Journal, Год журнала: 2025, Номер unknown

Опубликована: Янв. 1, 2025

This study investigates the frameworks and challenges of real-time data governance compliance in cloud-native robotics systems, focusing on integrity, cloud security, regulatory adherence, cybersecurity risks. Using extensive datasets from Amazon AWS Open Data Registry, EU GDPR Enforcement Tracker, Kaggle's IoT dataset, analysis explores systems' accuracy, governance. were extracted through a standardized process: performance metrics, including latency error rates, gathered to assess system efficiency, violation records analyzed Tracker understand trends, volume metrics dataset correlated identify challenges. Together, these sources provide comprehensive insights into how systems can be optimized for realtime operations. The highlights security benefits advantages inherent frameworks, such as monitoring, automated threat detection, encryption, which collectively reduce unauthorized access risks while supporting operational efficiency. Findings indicate high accuracy (0.51% rate) low (mean 48.96 ms) across systems; however, processing time variability (standard deviation 28.61 signals need further optimization time-sensitive environments. regression violations reveals substantial penalty increase €53,789.41 per violation, emphasizing financial non-compliance. Correlation (r = 0.083 failures) suggests that external threats have greater impact than internal underscoring importance adaptive support both integrity systems.

Язык: Английский

Процитировано

0

Strategies for Combating Criminal Use and Abuse of Artificial Intelligence DOI
A. Kathirvel, Naren Kathirvel,

Maria Manuel Vianny

и другие.

Advances in marketing, customer relationship management, and e-services book series, Год журнала: 2025, Номер unknown, С. 257 - 282

Опубликована: Янв. 10, 2025

This study investigates the criminal use and abuse of artificial intelligence (AI), exploring effectiveness various mitigation strategies. It employs a mixed-methods approach, combining quantitative data from survey 211 experts with qualitative insights academic, governmental, industrial publications. The research examines four key hypotheses: impact public organizational awareness, role advanced detection technologies, ethical guidelines, influence penalties enforcement. findings reveal that technology, ethics, enforcement all contribute to mitigating AI misuse. concludes by proposing comprehensive strategies, including targeted awareness campaigns, investment in robust strengthened legal frameworks, effectively combat AI.

Язык: Английский

Процитировано

0

The Impact of Artificial Intelligence on Cyber Security in Digital Currency Transactions DOI

Adekunbi Justina Ajayi,

Sunday Abayomi Joseph,

Olufunke Cynthia Metibemu

и другие.

SSRN Electronic Journal, Год журнала: 2025, Номер unknown

Опубликована: Янв. 1, 2025

Язык: Английский

Процитировано

0