Handbook of Research on Advancing Cybersecurity for Digital Transformation最新文献

筛选
英文 中文
Digital Transformation of E-Commerce Services and Cybersecurity for Modernizing the Banking Sector of Pakistan 巴基斯坦银行业现代化的电子商务服务和网络安全数字化转型
Handbook of Research on Advancing Cybersecurity for Digital Transformation Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-6975-7.ch018
T. Rehman
{"title":"Digital Transformation of E-Commerce Services and Cybersecurity for Modernizing the Banking Sector of Pakistan","authors":"T. Rehman","doi":"10.4018/978-1-7998-6975-7.ch018","DOIUrl":"https://doi.org/10.4018/978-1-7998-6975-7.ch018","url":null,"abstract":"The practice of protecting computers, websites, mobile devices, electronic services, networks, and digital data from malicious attacks is known as cybersecurity. Since political, military, private, financial, and medical institutions collect, process, and maintain massive volumes of data on computers and other devices, cybersecurity is critical. Sensitive data, such as intellectual property, financial data, personal records, or other forms of data, can make up a large amount of the data. Improper access or disclosure to that data can have profound implications. Technology has undoubtedly made a significant change in every aspect of life in Pakistan, whether it is a financial or non-financial sphere. Technology's usage is thoroughly utilized by banks worldwide. They have started adopting it frequently because of the immense need to achieve goals and satisfy customer needs more efficiently. Almost all leading banks have now provided e-commerce facilities. Over time, more and more services and facilities are offered to bank customers conveniently via e-commerce products.","PeriodicalId":382999,"journal":{"name":"Handbook of Research on Advancing Cybersecurity for Digital Transformation","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130551484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital Transformation and Cybersecurity Challenges 数字化转型与网络安全挑战
Handbook of Research on Advancing Cybersecurity for Digital Transformation Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-6975-7.ch011
Fatimah Al Obaidan, Saqib Saeed
{"title":"Digital Transformation and Cybersecurity Challenges","authors":"Fatimah Al Obaidan, Saqib Saeed","doi":"10.4018/978-1-7998-6975-7.ch011","DOIUrl":"https://doi.org/10.4018/978-1-7998-6975-7.ch011","url":null,"abstract":"Digital transformation has revolutionized human life but also brought many cybersecurity challenges for users and enterprises. The major threats that affect computers and communication systems by damaging devices and stealing sensitive information are malicious attacks. Traditional anti-virus software fails to detect advanced kind of malware. Current research focuses on developing machine learning techniques for malware detection to respond in a timely manner. Many systems have been evolved and improved to distinguish the malware based on analysis behavior. The analysis behavior is considered a robust technique to detect, analyze, and classify malware, categorized into two models: a static and dynamic analysis. Both types of previous analysis have advantages and limitations. Therefore, the hybrid method combines the strength of static and dynamic analyses. This chapter conducted a systematic literature review (SLR) to summarize and analyze the quality of published studies in malware detection using machine learning techniques and hybrid analysis that range from 2016 to 2021.","PeriodicalId":382999,"journal":{"name":"Handbook of Research on Advancing Cybersecurity for Digital Transformation","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132326531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Advanced Cyber Security and Internet of Things for Digital Transformations of the Indian Healthcare Sector 印度医疗保健部门数字化转型的先进网络安全和物联网
Handbook of Research on Advancing Cybersecurity for Digital Transformation Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-6975-7.ch017
Jonika Lamba, Esha Jain
{"title":"Advanced Cyber Security and Internet of Things for Digital Transformations of the Indian Healthcare Sector","authors":"Jonika Lamba, Esha Jain","doi":"10.4018/978-1-7998-6975-7.ch017","DOIUrl":"https://doi.org/10.4018/978-1-7998-6975-7.ch017","url":null,"abstract":"Cybersecurity is not just about fortification of data. It has wide implications such as maintaining safety, privacy, integrity, and trust of the patients in the healthcare sector. This study methodically reviews the need for cybersecurity amid digital transformation with the help of emerging technologies and focuses on the application and incorporation of blockchain and the internet of things (IoT) to ensure cybersecurity in the well-being of the business. It was found in the study that worldwide, advanced technology has been used in managing the flow of data and information, India should focus on maintaining the same IT-enabled infrastructure to reduce causalities in the nation and on the other hand improve administration, privacy, and security in the hospital sector. Depending on the network system, resource allocation, and mobile devices, there is a need to prioritize the resources and efforts in the era of digitalization.","PeriodicalId":382999,"journal":{"name":"Handbook of Research on Advancing Cybersecurity for Digital Transformation","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114688457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cybersecurity in Europe 欧洲的网络安全
Handbook of Research on Advancing Cybersecurity for Digital Transformation Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-6975-7.ch002
J. A. Amorim, José Macario de Siqueria Rocha, T. Magal-Royo
{"title":"Cybersecurity in Europe","authors":"J. A. Amorim, José Macario de Siqueria Rocha, T. Magal-Royo","doi":"10.4018/978-1-7998-6975-7.ch002","DOIUrl":"https://doi.org/10.4018/978-1-7998-6975-7.ch002","url":null,"abstract":"Information security is increasingly necessary between citizens and public services. In a nearby environment, such as cities, there are digital services and infrastructures that help improve our quality of life. Secure access to services must be regulated and offer trust to the user. Initiatives like the Regulation from European Union, (EU) N° 910/2014 of the European Parliament and the Council intend to favour solutions for problems like interoperability and cybersecurity. In this chapter, two European countries are considered so that implementations of the electronic identification, authentication, and trust services are presented and discussed. The main contribution is a description of relevant European projects, a first step necessary to propel further research on this topic. The chapter also presents the current challenges for the consolidation of the technology used and for the adaptation of the electronic services offered by public administration bodies to citizens.","PeriodicalId":382999,"journal":{"name":"Handbook of Research on Advancing Cybersecurity for Digital Transformation","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126135681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybersecurity for E-Banking and E-Commerce in Pakistan 巴基斯坦电子银行和电子商务的网络安全
Handbook of Research on Advancing Cybersecurity for Digital Transformation Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-6975-7.ch009
Tansif ur Rehman
{"title":"Cybersecurity for E-Banking and E-Commerce in Pakistan","authors":"Tansif ur Rehman","doi":"10.4018/978-1-7998-6975-7.ch009","DOIUrl":"https://doi.org/10.4018/978-1-7998-6975-7.ch009","url":null,"abstract":"Digital banking allows banks to make their new products more readily available, as they can package them with their essential software that has implications for cybersecurity. Internet presence also allows banks to extend their geographical reach without overbearing costs. In Pakistan, most internet offerings currently used by banks are more based on information than transactions; therefore, the issues for cybersecurity have gained high interest. The offerings on the websites by banks generally seem like electronic brochures. As they mainly offer company events, product information, along with a list of services rendered. Pakistan has various barriers to e-commerce, such as relatively few internet users, inadequate infrastructure (i.e., frequent power failures, fewer phone lines), and lack of cybersecurity for online transactions being hacked. The Government of Pakistan is rigorously working on these areas to overcome respective problems and progress in this sphere. This research focuses on the challenges for e-banking and e-commerce in Pakistan and issues relating to cybersecurity.","PeriodicalId":382999,"journal":{"name":"Handbook of Research on Advancing Cybersecurity for Digital Transformation","volume":"169 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129865351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Advancing Cybersecurity for Business Transformation and Enterprise Architecture Projects 推进业务转型和企业架构项目的网络安全
Handbook of Research on Advancing Cybersecurity for Digital Transformation Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-6975-7.ch015
A. Trad
{"title":"Advancing Cybersecurity for Business Transformation and Enterprise Architecture Projects","authors":"A. Trad","doi":"10.4018/978-1-7998-6975-7.ch015","DOIUrl":"https://doi.org/10.4018/978-1-7998-6975-7.ch015","url":null,"abstract":"In this chapter, the author bases his research project on his authentic mixed multidisciplinary applied mathematical model for transformation projects. His mathematical model, named the applied holistic mathematical model for projects (AHMM4P), is supported by a tree-based heuristics structure. The AHMM4P is similar to the human empirical decision-making process and is applicable to any type of project; it is aimed to support the evolution of organisational, national, or enterprise transformation initiatives. The AHMM4P can be used for the development of the cybersecurity subsystems, enterprise information systems, and their decision-making systems, based on artificial intelligence, data sciences, enterprise architecture, big data, deep learning, and machine learning. The author attempts to prove that an AHMM4P-based action research approach can unify the currently frequently-used siloed MLI4P and DLI4P trends.","PeriodicalId":382999,"journal":{"name":"Handbook of Research on Advancing Cybersecurity for Digital Transformation","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124958067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study of Advancing E-Banking and Cybersecurity for Digital Enterprise Transformation in Pakistan 巴基斯坦数字化企业转型推进电子银行与网络安全研究
Handbook of Research on Advancing Cybersecurity for Digital Transformation Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-6975-7.ch014
Tansif ur Rehman
{"title":"A Study of Advancing E-Banking and Cybersecurity for Digital Enterprise Transformation in Pakistan","authors":"Tansif ur Rehman","doi":"10.4018/978-1-7998-6975-7.ch014","DOIUrl":"https://doi.org/10.4018/978-1-7998-6975-7.ch014","url":null,"abstract":"In this technological era, almost all renowned banks have equipped themselves with the latest technology significantly pertinent to enhance their services and have provided e-banking facilities to their customers. Nevertheless, cybersecurity has been the focus of many organizations. Banks are offering more facilities to facilitate their customers with ease and convenience regarding e-banking. However, in Pakistan this is not the case. As people still refrain from using e-banking in Pakistan because of various issues, the e-banking sector has exponentially grown in the last decade. It has more chances of growth as enterprises such as banks still encourage clients to carry out e-transactions, like utility bill payments, access to account information, and money transfer. During this process, cybercriminals attempt to steal customer data and hack their online sessions. With regards to e-banking fraud, digitization has caused a revolution. Cybercriminals have employed various tools to steal crucial information through identity theft, trojans, viruses, and phishing.","PeriodicalId":382999,"journal":{"name":"Handbook of Research on Advancing Cybersecurity for Digital Transformation","volume":"187 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124747274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber Security and Cyber Resilience for the Australian E-Health Records 澳大利亚电子健康记录的网络安全和网络弹性
Handbook of Research on Advancing Cybersecurity for Digital Transformation Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-6975-7.ch004
Nagarajan Venkatachalam, Peadar O'Connor, Shailesh Palekar
{"title":"Cyber Security and Cyber Resilience for the Australian E-Health Records","authors":"Nagarajan Venkatachalam, Peadar O'Connor, Shailesh Palekar","doi":"10.4018/978-1-7998-6975-7.ch004","DOIUrl":"https://doi.org/10.4018/978-1-7998-6975-7.ch004","url":null,"abstract":"Cybersecurity is a critical consideration for all users of electronic health records (EHR), particularly for patients. With the advent of Healthcare 4.0, which is based on the internet of things (IoT) and sensors, cyber resilience has become a key requirement in ensuring the protection of patient data across devices. Blockchain offers crypto-enforced security, data immutability, and smart contracts-based business logic features to all the users in the network. This study explores how blockchain can be a single digital option that can address both the cybersecurity and cyber resilience needs of EHR. The effective use lens is adopted to analyze how blockchain can be leveraged to meet cybersecurity needs while the novel use lens is adopted to analyze how blockchain can be leveraged to address cyber resilience needs originating from IoT. Based on the analysis, this study proposes two Hyperledger-based security models that contribute to individual privacy and information security needs.","PeriodicalId":382999,"journal":{"name":"Handbook of Research on Advancing Cybersecurity for Digital Transformation","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133939874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Advancement of Cybersecurity and Information Security Awareness to Facilitate Digital Transformation 提高网络安全和信息安全意识,促进数字化转型
Handbook of Research on Advancing Cybersecurity for Digital Transformation Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-6975-7.ch006
Hamed Taherdoost, Mitra Madanchian, Mona Ebrahimi
{"title":"Advancement of Cybersecurity and Information Security Awareness to Facilitate Digital Transformation","authors":"Hamed Taherdoost, Mitra Madanchian, Mona Ebrahimi","doi":"10.4018/978-1-7998-6975-7.ch006","DOIUrl":"https://doi.org/10.4018/978-1-7998-6975-7.ch006","url":null,"abstract":"As the pace of changes in the digital world is increasing exponentially, the appeal to shift from traditional platforms to digital ones is increasing as well. Accomplishing digital transformation objectives is impossible without information security considerations. Business leaders should rethink information security challenges associated with digital transformation and consider solutions to seize existing opportunities. When it comes to information security, human beings play a critical role. Raising users' awareness is a meaningful approach to avoid or neutralize the likelihood of unwanted security consequences that may occur during transforming a system digitally. This chapter will discuss cybersecurity and information security awareness and examine how digital transformation will be affected by implementing information security awareness. This chapter will discuss the digital transformation advantages and serious challenges associated with cybersecurity, how to enhance cybersecurity, and the role of information security awareness to mitigate cybersecurity risks.","PeriodicalId":382999,"journal":{"name":"Handbook of Research on Advancing Cybersecurity for Digital Transformation","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127246485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cybersecurity and Electronic Services Oriented to E-Government in Europe 面向欧洲电子政务的网络安全和电子服务
Handbook of Research on Advancing Cybersecurity for Digital Transformation Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-6975-7.ch016
T. Magal-Royo, José Macário de Siqueira Rocha, Cristina Santandreu Mascarell, Rebeca Diez Somavilla, Jose Luis Giménez López
{"title":"Cybersecurity and Electronic Services Oriented to E-Government in Europe","authors":"T. Magal-Royo, José Macário de Siqueira Rocha, Cristina Santandreu Mascarell, Rebeca Diez Somavilla, Jose Luis Giménez López","doi":"10.4018/978-1-7998-6975-7.ch016","DOIUrl":"https://doi.org/10.4018/978-1-7998-6975-7.ch016","url":null,"abstract":"Cybersecurity in Europe as the rest of the world has been legislated for only 20 years. Numerous governmental institutions such as councils offer electronic services through their recently created electronic offices. In all of them, the volume of citizens who register temporarily or permanently to request online services related to the processing of documents and services with the government has increased significantly since the pandemic. Confinement has forced users to request numerous online services where authentication is one of the most relevant aspects to access safely and securely. European Union through the Connecting Europe Mechanism, CEF projects of the European Health Executive Agency, and Digital HaDEA has allowed numerous institutions to connect through the eIDAS created to establish trust in electronic transactions between individuals, organizations, and government entities across European member states.","PeriodicalId":382999,"journal":{"name":"Handbook of Research on Advancing Cybersecurity for Digital Transformation","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126229251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信