|
|
|
Hamed Taherdoost and Mitra Madanchian
Blockchain technology has become a powerful disruptive force that upends established ideas in several industries. A fascinating point of convergence is that of blockchain technology and Business Process Management (BPM), where the distributed and immutab...
ver más
|
|
|
|
|
|
|
Carlos Blanco, Antonio Santos-Olmo and Luis Enrique Sánchez
As the Internet of Things (IoT) becomes more integral across diverse sectors, including healthcare, energy provision and industrial automation, the exposure to cyber vulnerabilities and potential attacks increases accordingly. Facing these challenges, th...
ver más
|
|
|
|
|
|
|
Hassan H. H. Aldboush and Marah Ferdous
This research paper explores the ethical considerations in using financial technology (fintech), focusing on big data, artificial intelligence (AI), and privacy. Using a systematic literature-review methodology, the study identifies ethical and privacy i...
ver más
|
|
|
|
|
|
|
Frank Moses,Kurt Sandkuhl
Pág. 54 - 68
The increasing digitalization of enterprises and public authorities has resulted in the growing importance of information technology in everyday operations. In this context, an information security management system (ISMS) has become an essential aspect ...
ver más
|
|
|
|
|
|
|
Amjad Alraizza and Abdulmohsen Algarni
Ransomware attacks pose significant security threats to personal and corporate data and information. The owners of computer-based resources suffer from verification and privacy violations, monetary losses, and reputational damage due to successful ransom...
ver más
|
|
|
|
|
|
|
Peter R. J. Trim and Yang-Im Lee
Although artificial intelligence (AI) and machine learning (ML) can be deployed to improve cyber security management, not all managers understand the different types of AI/ML and how they are to be deployed alongside the benefits associated with sociocul...
ver más
|
|
|
|
|
|
|
Iosif Progoulakis, Nikitas Nikitakos, Paul Rohmeyer, Barry Bunin, Dimitrios Dalaklis and Stavros Karamperidis
In an ever-evolving technological industry, the oil and gas sector is already moving forward through the adaptation of Industry 4.0 and the adaptation of advanced cyber technologies through Oil and Gas 4.0. As IT/OT (information technology/operational te...
ver más
|
|
|
|
|
|
|
Konstantinos Rantos, Arnolnt Spyros, Alexandros Papanikolaou, Antonios Kritsas, Christos Ilioudis and Vasilios Katos
Threat intelligence helps businesses and organisations make the right decisions in their fight against cyber threats, and strategically design their digital defences for an optimised and up-to-date security situation. Combined with advanced security anal...
ver más
|
|
|
|
|
|
|
Qurban A Memon
Pág. pp. 222 - 230
As technological advances in smartphone domain increase, so are the issues that pertain to security and privacy. In current literature, multimodal biometric approach is addressed at length for purpose of improving secured access into personal devices. Mo...
ver más
|
|
|
|
|
|
|
Alexander V. Ilyin,Vladimir D. Ilyin
Pág. 81 - 84
The review describes three technologies of commodity-money circulation (CMC-technologies) implemented on the basis of personal e-banks (PEBs) owned by individuals and corporate e-banks (CEBs) owned by legal entities. The technology of designated payments...
ver más
|
|
|
|