36,29 €
This reference reviews the architectural requirements of IT systems that are designed to digitally transform business operations. It is a compilation of 7 timely reviews that demonstrate how adopting emerging technologies and examining the security-based concerns can lead to innovation in the business sector. The aim of the book is to guide scholars and business consultants on IT and business frameworks that can help new and existing organizations navigate the challenges posed by disruptive technologies to create a competitive advantage. The reviews are contributed by experts in business and information technology.
The chapters cover diverse topics related to technological advancements and digital security measures. Chapter 1 offers insights into accessing and securing patient medical records through a blockchain-based framework, detailing research methodology, scalability, and standards. Chapter 2 discusses cyber threats in IoT-connected cars, addressing vulnerabilities, attack methods, and defense strategies. Chapter 3 focuses on malware analysis and detection using machine learning techniques. Chapter 4 emphasizes on securing IoT-based home automation. Chapter 5 presents an IoT policy and governance reference architecture to ensure integrity and security across devices. Chapter 6 explores organizational security improvements to prevent deepfake ransomware. Finally, Chapter 7 examines the use of machine learning in credit card fraud detection, discussing challenges and control layers.
Readership
Scholars, academics, business consultants, entrepreneurs.
Das E-Book können Sie in Legimi-Apps oder einer beliebigen App lesen, die das folgende Format unterstützen:
Veröffentlichungsjahr: 2024
This is an agreement between you and Bentham Science Publishers Ltd. Please read this License Agreement carefully before using the ebook/echapter/ejournal (“Work”). Your use of the Work constitutes your agreement to the terms and conditions set forth in this License Agreement. If you do not agree to these terms and conditions then you should not use the Work.
Bentham Science Publishers agrees to grant you a non-exclusive, non-transferable limited license to use the Work subject to and in accordance with the following terms and conditions. This License Agreement is for non-library, personal use only. For a library / institutional / multi user license in respect of the Work, please contact: [email protected].
3. The unauthorised use or distribution of copyrighted or other proprietary content is illegal and could subject you to liability for substantial money damages. You will be liable for any damage resulting from your misuse of the Work or any violation of this License Agreement, including any infringement by you of copyrights or proprietary rights.
Bentham Science Publishers does not guarantee that the information in the Work is error-free, or warrant that it will meet your requirements or that access to the Work will be uninterrupted or error-free. The Work is provided "as is" without warranty of any kind, either express or implied or statutory, including, without limitation, implied warranties of merchantability and fitness for a particular purpose. The entire risk as to the results and performance of the Work is assumed by you. No responsibility is assumed by Bentham Science Publishers, its staff, editors and/or authors for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or operation of any methods, products instruction, advertisements or ideas contained in the Work.
In no event will Bentham Science Publishers, its staff, editors and/or authors, be liable for any damages, including, without limitation, special, incidental and/or consequential damages and/or damages for lost data and/or profits arising out of (whether directly or indirectly) the use or inability to use the Work. The entire liability of Bentham Science Publishers shall be limited to the amount actually paid by you for the Work.
Bentham Science Publishers Ltd. Executive Suite Y - 2 PO Box 7917, Saif Zone Sharjah, U.A.E. Email: [email protected]
I am delighted to write this foreword because I believe deeply in the importance of the topics and of high quality of the contents. There is latest and so much useful information being delivered into its 15 chapters which should not be missed. Thus it gives me a great pleasure to contribute this foreword.
As I reviewed the manuscript prior to writing this foreword, I was impressed by many unique features that I would like to share with you. The book explores the important aspect of the architectural requirements including emerging technologies and security-based concerns for digital innovation adoption. This work would be an important resource of exposure towards the Internet-of-Thing (IoT) and Artificial Intelligence (AI) in various important application domains.
Smart Cities and 5G Networks highlighted the advantages and disadvantages of radio and device-to-device in the context of multiple IoT use cases. IoT in Waste Management introduced an intelligent smart bin system to automate waste handling and management to contribute to green technology. Stock Monitoring System Using IoT Based Automation provided a set of recommendations for a hypermarket stock monitoring system using IoT automation. Secure Healthcare Using Blockchain Technology reviewed blockchain architecture in a health domain in order to secure patients’ medical records. E-Voting System Using Blockchain Technology implemented blockchain for e-voting systems of medium and large-scale size.
Decentralised News Using Blockchain Technology explained the implementation of blockchain via a decentralised application to combat misinformation. Cyber Threats in IoT-based Connected Cars exposed vulnerabilities for IoT-based connected cars and their implications. The use of IoT in Contact Tracing: Vulnerabilities and Countermeasures reviewed contact tracing application with IoT. AI-based Intrusion Detection System for IoT Security proposed a solution for security treats for IoT network with Intrusion Detection System. Fake News Detection Using Data Mining Approaches introduced a data mining as a technique to predict fake news.
EEG Signal Classification Using AI Techniques analysed the classification methods for EEG signals. Malware Analysis and Malicious Activity Detection Using Machine Learning reviewed AI techniques to protect and prevent security threats in the IT infrastructure. Interestingly the authors have proposed a machine-learning based detection system to classify suspicious objects. Security Vulnerabilities and Threats for IoT-based Home revealed the security vulnerabilities for the smart home concept and its protection. IoT Policy and Governance Reference Architecture discussed IoT reference architecture, policy and governance for the integrity and security of the information being transmitted within the IoT ecosystem. Organizational Security Improvement in Preventing Deepfake Ransomware highlighted the impact of deep fake ransomware to the organisation and its protection.
The content provides a widely useful compilation of ideas, cases, innovative approaches, and practical strategies for enhancing digital innovation adoption mainly covering the architecture and security. This book should be read by anyone including researchers, educators, industry practitioners and technology specialists who intend to learn, practice, and adopt innovative technology in their respective areas of interest to bring digital transformation by indulging in the architectural requirements and security concerns.
Digital innovation assists organizations in innovating and driving services to bespoke clients that leverage high value. The integration of major disruptive technologies such as cloud, big data, IoT and blockchain has ignited the retransformation of the entire industrial arena. As a result of this convergence of technologies, organisations need to go through a mandatory process of change at a rapid pace. Every industry, from agriculture to manufacturing, transportation to education, pharmaceutical to health services, is forced to be revolutionised using innovative approaches. Organisation's products, services, and operations need to embrace a technological shift to differentiate themselves in the competitive arena and satisfy their customers' ever-increasing needs. Billions of digitally enabled devices will create the dawn of a whole new era by utilising their sensing, processing, and connectivity power through the use of the Internet of Things (IoT). Consumer-based companies rely heavily on mobile devices to deliver personal experiences. Cloud is redefining the way businesses were previously done. It is a paradigm shift from traditional IT to a more efficient, scalable, and secure infrastructure. Blockchain offers a decentralised structure that demonstrates transparency and trust and provides individual control of data. Organisations need to lay down the sophisticated architectural requirements of the proposed solutions to take advantage of the evolving digital technology. The extensive reliance on these technologies has also possessed some security challenges for providers and consumers. The ubiquitous data access via multiple end-user devices has paved the way for security and cyber threats. As information security is critical for contemporary businesses, organisations have an essential role in protecting the information to deal with highly augmented security and privacy threats. This book is intended to explore the architectural requirements of these digitally transformed systems by adopting emerging technologies and examining security-based concerns considering the vulnerabilities and countermeasures for these systems.