Sunday Tubokirifuruar Tula, Azeez Jason Kess-Momoh, Ganiyu Bolawale Omotoye, Binaebi Gloria Bello, Andrew Ifesinachi Daraojimba
{"title":"AI-ENABLED CUSTOMER EXPERIENCE ENHANCEMENT IN BUSINESS","authors":"Sunday Tubokirifuruar Tula, Azeez Jason Kess-Momoh, Ganiyu Bolawale Omotoye, Binaebi Gloria Bello, Andrew Ifesinachi Daraojimba","doi":"10.51594/csitrj.v5i2.789","DOIUrl":"https://doi.org/10.51594/csitrj.v5i2.789","url":null,"abstract":"This scholarly investigation delves into the transformative impact of Artificial Intelligence (AI) on enhancing customer experience in the business realm. The study's purpose was to meticulously examine the integration, evolution, and strategic implications of AI in business operations, particularly in customer engagement. A comprehensive literature review and detailed case study analysis constituted the core methodology, focusing on peer-reviewed articles and practical examples from diverse business sectors. This approach facilitated a multi-dimensional exploration, capturing both the technological advancements in AI and the associated implementation challenges within various business contexts. Central findings from this research underscore AI's evolution from an emerging technological tool to a fundamental component in customer-centric business strategies. AI's capabilities in personalizing customer interactions, automating support systems, and leveraging predictive analytics have revolutionized business-customer dynamics. However, this evolution is not without its challenges, including data privacy concerns, ethical considerations, and the need for skilled AI expertise. The study concludes that AI is a strategic asset, necessitating thoughtful integration into business models. It emphasizes the importance of a collaborative approach, where AI specialists and industry experts work synergistically to tailor AI solutions to specific business needs. Ethical considerations and maintaining customer trust are highlighted as pivotal in AI deployment strategies. The study recommends continuous innovation, investment in AI infrastructure and talent, and adherence to ethical AI practices. These measures are essential for businesses to enhance customer experiences and drive sustainable growth in the digital age \u0000Keywords: Artificial Intelligence, Customer Experience, Business Strategy, AI Integration, Ethical Considerations.","PeriodicalId":282796,"journal":{"name":"Computer Science & IT Research Journal","volume":"175 8","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140457269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Oluwatosin Reis, Johnson Sunday Oliha, Femi Osasona, Ogugua Chimezie Obi
{"title":"CYBERSECURITY DYNAMICS IN NIGERIAN BANKING: TRENDS AND STRATEGIES REVIEW","authors":"Oluwatosin Reis, Johnson Sunday Oliha, Femi Osasona, Ogugua Chimezie Obi","doi":"10.51594/csitrj.v5i2.761","DOIUrl":"https://doi.org/10.51594/csitrj.v5i2.761","url":null,"abstract":"This paper provides an in-depth review of the cybersecurity dynamics within the Nigerian banking sector, emphasizing recent trends and strategic approaches to address emerging challenges. As a review paper, it synthesizes existing literature, reports, and case studies to offer a comprehensive understanding of the current cybersecurity landscape in Nigerian banks. The focus is on identifying the predominant cyber threats, analyzing the sector's response strategies, and evaluating the effectiveness of these measures in the context of Nigeria's unique socio-economic and regulatory environment. Our analysis reveals a notable escalation in cyber threats, particularly phishing, ransomware, and insider attacks, which have been intensified by the rapid digital transformation in banking services. The review identifies key factors contributing to these challenges, such as the increasing sophistication of cybercriminals, the digital literacy gap among customers, and the evolving nature of cyber threats. It also examines the strategic responses of Nigerian banks, including the adoption of advanced security technologies, enhanced staff training, and collaboration with government and international cybersecurity bodies.The paper concludes that Nigerian banks have made significant strides in fortifying their cybersecurity defenses. However, it also highlights the need for more robust regulatory frameworks, increased customer awareness initiatives, and a shift towards more integrated and proactive cybersecurity strategies. The findings of this review underscore the critical need for continuous evolution and investment in cybersecurity measures to effectively counter the dynamic and complex nature of cyber threats in the Nigerian banking sector. \u0000Keywords: Cybersecurity, Cybersecurity Dynamics, Nigerian Banking Sector, Digital Transformation, Cyber Threats, Phishing Attacks, Ransomware, Insider Threats, Regulatory Framework, Central Bank of Nigeria (CBN), Compliance Challenges, Security Technologies, Cybersecurity Awareness, Artificial Intelligence (AI), Machine Learning (ML), Blockchain Technology.","PeriodicalId":282796,"journal":{"name":"Computer Science & IT Research Journal","volume":"63 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140460841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Odunayo Adewunmi Adelekan, Olawale Adisa, Bamidele Segun Ilugbusi, Ogugua Chimezie Obi, Kehinde Feranmi Awonuga, Onyeka Franca Asuzu, Ndubuisi Leonard Ndubuisi
{"title":"EVOLVING TAX COMPLIANCE IN THE DIGITAL ERA: A COMPARATIVE ANALYSIS OF AI-DRIVEN MODELS AND BLOCKCHAIN TECHNOLOGY IN U.S. TAX ADMINISTRATION","authors":"Odunayo Adewunmi Adelekan, Olawale Adisa, Bamidele Segun Ilugbusi, Ogugua Chimezie Obi, Kehinde Feranmi Awonuga, Onyeka Franca Asuzu, Ndubuisi Leonard Ndubuisi","doi":"10.51594/csitrj.v5i2.759","DOIUrl":"https://doi.org/10.51594/csitrj.v5i2.759","url":null,"abstract":"This paper aims to provide a comprehensive review of the integration of artificial intelligence (AI) and blockchain technology in U.S. tax administration. It explores how these technologies are revolutionizing tax compliance and fraud detection, offering a comparative analysis with traditional methods. The paper highlights the potential benefits of these technologies in enhancing efficiency, accuracy, and transparency in tax administration, aligning with the U.S. government's objectives of ensuring fiscal integrity and public trust. The review also examines international best practices and proposes how the U.S. can leverage these technologies to maintain its global leadership in financial governance and innovation. The study is structured around four key objectives: assessing the current integration of AI and blockchain in tax administration, evaluating their effectiveness in enhancing tax compliance, identifying implementation challenges, and developing strategic recommendations. Employing a comprehensive literature review approach, the study synthesizes findings from various sources to provide an in-depth understanding of the role and impact of these technologies in modern tax systems. The results reveal that AI and blockchain significantly improve tax compliance and administration efficiency but also introduce challenges such as data privacy concerns and the need for robust regulatory frameworks. In conclusion, the study underscores the transformative potential of AI and blockchain in tax administration, recommending continuous research and development, coupled with stakeholder education and engagement. These efforts are crucial for overcoming operational challenges and fully harnessing the benefits of these technologies in modernizing tax systems. The paper concludes with strategic recommendations for policymakers, tax authorities, and researchers, emphasizing the importance of a balanced approach that fosters technological innovation while maintaining legal compliance and adherence to fundamental principles. \u0000Keywords: Artificial Intelligence, Blockchain, Tax Administration, Tax Compliance, Digital Transformation, Financial Governance.","PeriodicalId":282796,"journal":{"name":"Computer Science & IT Research Journal","volume":"33 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139867672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Islam Ahmad Ibrahim Ahmad, Anthony Chigozie Anyanwu, Shedrack Onwusinkwue, Samuel Onimisi Dawodu, Onyinyechi Vivian Akagha, Emuesiri Ejairu
{"title":"CYBERSECURITY CHALLENGES IN SMART CITIES: A CASE REVIEW OF AFRICAN METROPOLISES","authors":"Islam Ahmad Ibrahim Ahmad, Anthony Chigozie Anyanwu, Shedrack Onwusinkwue, Samuel Onimisi Dawodu, Onyinyechi Vivian Akagha, Emuesiri Ejairu","doi":"10.51594/csitrj.v5i2.756","DOIUrl":"https://doi.org/10.51594/csitrj.v5i2.756","url":null,"abstract":"The rapid urbanization and digital transformation of cities across Africa have given rise to the concept of Smart Cities, where advanced technologies are integrated to enhance efficiency, sustainability, and the overall quality of urban life. However, this paradigm shift towards interconnected and technology-driven urban environments brings forth a host of cybersecurity challenges that demand careful consideration. This paper explores the cybersecurity challenges in Smart Cities, focusing on a case review of African metropolises. African cities, emblematic of the global urbanization trend, are embracing Smart City initiatives to address urban challenges and foster economic development. While these initiatives promise improved services and enhanced connectivity, they concurrently expose cities to a myriad of cybersecurity threats. The interconnectedness of devices and systems in Smart Cities creates a vast attack surface, making them susceptible to cyber-attacks ranging from data breaches to infrastructure disruptions. This case review delves into specific instances of cybersecurity challenges faced by African metropolises in their quest for technological advancement. It analyzes the vulnerabilities in critical infrastructure, such as energy grids, transportation systems, and healthcare networks, highlighting the potential risks associated with inadequate cybersecurity measures. Moreover, the paper sheds light on the socio-economic implications of cyber threats in Smart Cities, emphasizing the importance of resilient cybersecurity frameworks in safeguarding citizen data and urban functionality. In conclusion, the paper underscores the urgent need for comprehensive cybersecurity strategies tailored to the unique challenges faced by Smart Cities in Africa. The findings aim to contribute to a better understanding of the intricate relationship between urbanization, technology, and cybersecurity, offering insights that can inform policy decisions, technological implementations, and collaborative efforts to build secure and resilient Smart Cities in the African context. \u0000Keywords: Cybersecurity, Smart Cities, Africa, Metropolis, Review.","PeriodicalId":282796,"journal":{"name":"Computer Science & IT Research Journal","volume":"41 s1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139809869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ogugua Chimezie Obi, Samuel Onimisi Dawodu, Andrew Ifesinachi Daraojimba, Shedrack Onwusinkwue, Onyinyechi Vivian Akagha, Islam Ahmad Ibrahim Ahmad
{"title":"REVIEW OF EVOLVING CLOUD COMPUTING PARADIGMS: SECURITY, EFFICIENCY, AND INNOVATIONS","authors":"Ogugua Chimezie Obi, Samuel Onimisi Dawodu, Andrew Ifesinachi Daraojimba, Shedrack Onwusinkwue, Onyinyechi Vivian Akagha, Islam Ahmad Ibrahim Ahmad","doi":"10.51594/csitrj.v5i2.757","DOIUrl":"https://doi.org/10.51594/csitrj.v5i2.757","url":null,"abstract":"The paper provides a comprehensive analysis of the dynamic landscape of cloud computing, with a focus on security, efficiency, and innovative trends. It delves into the evolving paradigms that shape the current state of cloud computing, offering insights into the challenges and opportunities that arise as the technology continues to advance. Security is a central theme in the review, addressing the critical concerns associated with data privacy, integrity, and access control in cloud environments. The study explores the latest security measures and protocols implemented to safeguard sensitive information, emphasizing the importance of robust security frameworks in an era marked by cyber threats and vulnerabilities. Efficiency is another key aspect under scrutiny, with the review evaluating performance optimization strategies, resource allocation mechanisms, and scalability solutions. The authors examine how cloud providers are adapting to meet the growing demand for efficient and sustainable computing resources, highlighting best practices and emerging trends that contribute to enhanced performance. Furthermore, the review sheds light on the innovative trends shaping the future of cloud computing. It explores cutting-edge technologies, such as edge computing, serverless architectures, and containerization, and their impact on reshaping the cloud landscape. The paper concludes by summarizing the key takeaways and emphasizing the importance of understanding and adapting to the evolving paradigms in cloud computing to ensure a secure, efficient, and innovative digital future. \u0000Keywords: Cloud Computing, Information Technology, Computing, Security, Innovations, Review.","PeriodicalId":282796,"journal":{"name":"Computer Science & IT Research Journal","volume":"18 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139810488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ogugua Chimezie Obi, Samuel Onimisi Dawodu, Andrew Ifesinachi Daraojimba, Shedrack Onwusinkwue, Onyinyechi Vivian Akagha, Islam Ahmad Ibrahim Ahmad
{"title":"REVIEW OF EVOLVING CLOUD COMPUTING PARADIGMS: SECURITY, EFFICIENCY, AND INNOVATIONS","authors":"Ogugua Chimezie Obi, Samuel Onimisi Dawodu, Andrew Ifesinachi Daraojimba, Shedrack Onwusinkwue, Onyinyechi Vivian Akagha, Islam Ahmad Ibrahim Ahmad","doi":"10.51594/csitrj.v5i2.757","DOIUrl":"https://doi.org/10.51594/csitrj.v5i2.757","url":null,"abstract":"The paper provides a comprehensive analysis of the dynamic landscape of cloud computing, with a focus on security, efficiency, and innovative trends. It delves into the evolving paradigms that shape the current state of cloud computing, offering insights into the challenges and opportunities that arise as the technology continues to advance. Security is a central theme in the review, addressing the critical concerns associated with data privacy, integrity, and access control in cloud environments. The study explores the latest security measures and protocols implemented to safeguard sensitive information, emphasizing the importance of robust security frameworks in an era marked by cyber threats and vulnerabilities. Efficiency is another key aspect under scrutiny, with the review evaluating performance optimization strategies, resource allocation mechanisms, and scalability solutions. The authors examine how cloud providers are adapting to meet the growing demand for efficient and sustainable computing resources, highlighting best practices and emerging trends that contribute to enhanced performance. Furthermore, the review sheds light on the innovative trends shaping the future of cloud computing. It explores cutting-edge technologies, such as edge computing, serverless architectures, and containerization, and their impact on reshaping the cloud landscape. The paper concludes by summarizing the key takeaways and emphasizing the importance of understanding and adapting to the evolving paradigms in cloud computing to ensure a secure, efficient, and innovative digital future. \u0000Keywords: Cloud Computing, Information Technology, Computing, Security, Innovations, Review.","PeriodicalId":282796,"journal":{"name":"Computer Science & IT Research Journal","volume":"13 12","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139870159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ogugua Chimezie Obi, Onyinyechi Vivian Akagha, Samuel Onimisi Dawodu, Anthony Chigozie Anyanwu, Shedrack Onwusinkwue, Islam Ahmad Ibrahim Ahmad
{"title":"COMPREHENSIVE REVIEW ON CYBERSECURITY: MODERN THREATS AND ADVANCED DEFENSE STRATEGIES","authors":"Ogugua Chimezie Obi, Onyinyechi Vivian Akagha, Samuel Onimisi Dawodu, Anthony Chigozie Anyanwu, Shedrack Onwusinkwue, Islam Ahmad Ibrahim Ahmad","doi":"10.51594/csitrj.v5i2.758","DOIUrl":"https://doi.org/10.51594/csitrj.v5i2.758","url":null,"abstract":"In the rapidly evolving landscape of cyberspace, the prevalence of sophisticated cyber threats has escalated, posing formidable challenges to individuals, organizations, and nations. This comprehensive review explores the contemporary panorama of cybersecurity, focusing on the latest threats and the advanced defense strategies employed to mitigate them. The analysis encompasses a wide spectrum of cyber threats, including malware, ransomware, phishing attacks, and advanced persistent threats (APTs), shedding light on their evolving tactics, techniques, and procedures. The review delves into the intricate world of cybercrime, emphasizing the motives behind attacks and the diverse range of threat actors involved, from individual hackers to state-sponsored entities. By examining recent case studies and real-world incidents, the review provides valuable insights into the dynamic nature of cyber threats, emphasizing the need for proactive and adaptive cybersecurity measures. Furthermore, the review critically evaluates cutting-edge defense mechanisms and strategies deployed to counteract these threats. It explores advancements in artificial intelligence, machine learning, and behavioral analytics, showcasing their pivotal roles in bolstering cybersecurity defenses. Additionally, the review discusses the importance of threat intelligence sharing, collaborative efforts, and international cooperation to fortify the global cyber defense ecosystem. As cybersecurity extends beyond technical measures, the review also addresses the human element, emphasizing the significance of cybersecurity awareness training and the role of employees in fortifying organizational resilience. It scrutinizes regulatory frameworks and compliance standards that play a crucial role in shaping cybersecurity policies and practices. By synthesizing the latest research, industry best practices, and expert insights, this comprehensive review aims to provide a holistic understanding of the current state of cybersecurity, offering practitioners, policymakers, and researchers a valuable resource to navigate the intricate challenges posed by modern cyber threats and to develop effective defense strategies for the digital age. \u0000Keywords: Cybersecurity, Threats, Defense Strategy, Cyber Threats, Review.","PeriodicalId":282796,"journal":{"name":"Computer Science & IT Research Journal","volume":"54 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139871054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ogugua Chimezie Obi, Onyinyechi Vivian Akagha, Samuel Onimisi Dawodu, Anthony Chigozie Anyanwu, Shedrack Onwusinkwue, Islam Ahmad Ibrahim Ahmad
{"title":"COMPREHENSIVE REVIEW ON CYBERSECURITY: MODERN THREATS AND ADVANCED DEFENSE STRATEGIES","authors":"Ogugua Chimezie Obi, Onyinyechi Vivian Akagha, Samuel Onimisi Dawodu, Anthony Chigozie Anyanwu, Shedrack Onwusinkwue, Islam Ahmad Ibrahim Ahmad","doi":"10.51594/csitrj.v5i2.758","DOIUrl":"https://doi.org/10.51594/csitrj.v5i2.758","url":null,"abstract":"In the rapidly evolving landscape of cyberspace, the prevalence of sophisticated cyber threats has escalated, posing formidable challenges to individuals, organizations, and nations. This comprehensive review explores the contemporary panorama of cybersecurity, focusing on the latest threats and the advanced defense strategies employed to mitigate them. The analysis encompasses a wide spectrum of cyber threats, including malware, ransomware, phishing attacks, and advanced persistent threats (APTs), shedding light on their evolving tactics, techniques, and procedures. The review delves into the intricate world of cybercrime, emphasizing the motives behind attacks and the diverse range of threat actors involved, from individual hackers to state-sponsored entities. By examining recent case studies and real-world incidents, the review provides valuable insights into the dynamic nature of cyber threats, emphasizing the need for proactive and adaptive cybersecurity measures. Furthermore, the review critically evaluates cutting-edge defense mechanisms and strategies deployed to counteract these threats. It explores advancements in artificial intelligence, machine learning, and behavioral analytics, showcasing their pivotal roles in bolstering cybersecurity defenses. Additionally, the review discusses the importance of threat intelligence sharing, collaborative efforts, and international cooperation to fortify the global cyber defense ecosystem. As cybersecurity extends beyond technical measures, the review also addresses the human element, emphasizing the significance of cybersecurity awareness training and the role of employees in fortifying organizational resilience. It scrutinizes regulatory frameworks and compliance standards that play a crucial role in shaping cybersecurity policies and practices. By synthesizing the latest research, industry best practices, and expert insights, this comprehensive review aims to provide a holistic understanding of the current state of cybersecurity, offering practitioners, policymakers, and researchers a valuable resource to navigate the intricate challenges posed by modern cyber threats and to develop effective defense strategies for the digital age. \u0000Keywords: Cybersecurity, Threats, Defense Strategy, Cyber Threats, Review.","PeriodicalId":282796,"journal":{"name":"Computer Science & IT Research Journal","volume":"51 11","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139811483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Islam Ahmad Ibrahim Ahmad, Anthony Chigozie Anyanwu, Shedrack Onwusinkwue, Samuel Onimisi Dawodu, Onyinyechi Vivian Akagha, Emuesiri Ejairu
{"title":"CYBERSECURITY CHALLENGES IN SMART CITIES: A CASE REVIEW OF AFRICAN METROPOLISES","authors":"Islam Ahmad Ibrahim Ahmad, Anthony Chigozie Anyanwu, Shedrack Onwusinkwue, Samuel Onimisi Dawodu, Onyinyechi Vivian Akagha, Emuesiri Ejairu","doi":"10.51594/csitrj.v5i2.756","DOIUrl":"https://doi.org/10.51594/csitrj.v5i2.756","url":null,"abstract":"The rapid urbanization and digital transformation of cities across Africa have given rise to the concept of Smart Cities, where advanced technologies are integrated to enhance efficiency, sustainability, and the overall quality of urban life. However, this paradigm shift towards interconnected and technology-driven urban environments brings forth a host of cybersecurity challenges that demand careful consideration. This paper explores the cybersecurity challenges in Smart Cities, focusing on a case review of African metropolises. African cities, emblematic of the global urbanization trend, are embracing Smart City initiatives to address urban challenges and foster economic development. While these initiatives promise improved services and enhanced connectivity, they concurrently expose cities to a myriad of cybersecurity threats. The interconnectedness of devices and systems in Smart Cities creates a vast attack surface, making them susceptible to cyber-attacks ranging from data breaches to infrastructure disruptions. This case review delves into specific instances of cybersecurity challenges faced by African metropolises in their quest for technological advancement. It analyzes the vulnerabilities in critical infrastructure, such as energy grids, transportation systems, and healthcare networks, highlighting the potential risks associated with inadequate cybersecurity measures. Moreover, the paper sheds light on the socio-economic implications of cyber threats in Smart Cities, emphasizing the importance of resilient cybersecurity frameworks in safeguarding citizen data and urban functionality. In conclusion, the paper underscores the urgent need for comprehensive cybersecurity strategies tailored to the unique challenges faced by Smart Cities in Africa. The findings aim to contribute to a better understanding of the intricate relationship between urbanization, technology, and cybersecurity, offering insights that can inform policy decisions, technological implementations, and collaborative efforts to build secure and resilient Smart Cities in the African context. \u0000Keywords: Cybersecurity, Smart Cities, Africa, Metropolis, Review.","PeriodicalId":282796,"journal":{"name":"Computer Science & IT Research Journal","volume":"2 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139870086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Anthony Anyanwu, Temidayo Olorunsogo, Temitayo Oluwaseun Abrahams, Odunayo Josephine Akindote, Oluwatosin Reis
{"title":"DATA CONFIDENTIALITY AND INTEGRITY: A REVIEW OF ACCOUNTING AND CYBERSECURITY CONTROLS IN SUPERANNUATION ORGANIZATIONS","authors":"Anthony Anyanwu, Temidayo Olorunsogo, Temitayo Oluwaseun Abrahams, Odunayo Josephine Akindote, Oluwatosin Reis","doi":"10.51594/csitrj.v5i1.735","DOIUrl":"https://doi.org/10.51594/csitrj.v5i1.735","url":null,"abstract":"In an era dominated by digital transformation, superannuation organizations face unprecedented challenges in safeguarding the confidentiality and integrity of sensitive financial data. This review explores the intricate relationship between accounting practices and cybersecurity controls within the context of superannuation entities. By examining the existing literature, regulatory frameworks, and industry best practices, this paper synthesizes the key considerations essential for ensuring robust data protection. The study delves into the critical role of accounting systems in managing financial information and the subsequent implications for data confidentiality. It investigates how evolving accounting standards and practices intersect with cybersecurity protocols to fortify the integrity of financial records within superannuation organizations. The dynamic nature of cyber threats necessitates a comprehensive analysis of technological safeguards, risk management frameworks, and compliance measures to uphold data confidentiality. Furthermore, the review underscores the imperative for a multidimensional approach to cybersecurity in the superannuation sector. It discusses the integration of advanced technologies such as encryption, blockchain, and anomaly detection alongside traditional accounting controls to create a resilient defense against emerging threats. The exploration extends to the examination of employee training programs, incident response strategies, and third-party risk assessments as integral components of a comprehensive cybersecurity posture. As superannuation organizations navigate the complex landscape of data management, a holistic understanding of the interplay between accounting and cybersecurity controls becomes paramount. This review contributes to the existing body of knowledge by providing insights into the challenges and opportunities presented by the evolving technological landscape, offering practitioners and policymakers a foundation for enhancing data confidentiality and integrity in the superannuation sector. \u0000Keywords: Data Confidentiality; Accounting; Cybersecurity; Superannuation Organization; Data Integrity. ","PeriodicalId":282796,"journal":{"name":"Computer Science & IT Research Journal","volume":"142 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140501123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}