| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9911009256703321 |
|
|
Autore |
Rana Muhammad Ehsan |
|
|
Titolo |
Digital Innovation Adoption |
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Sharjah : , : Bentham Science Publishers, , 2024 |
|
©2024 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (114 pages) |
|
|
|
|
|
|
Altri autori (Persone) |
|
|
|
|
|
|
Soggetti |
|
Computer security |
Internet of things |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di contenuto |
|
Cover -- Title -- Copyright -- End User License Agreement -- Contents -- Foreword -- Preface -- List of Contributors -- Access and Secure Patient Medical Records using Blockchain Technology based Framework: A Review -- Daniel Mago Vistro1,*, Muhammad Shoaib Farooq2, Attique Ur Rehman2 and Waleed Zafar2 -- 1. INTRODUCTION -- 2. RELATED WORK -- 3. RESEARCH METHODOLOGY -- 4. RESEARCH OBJECTIVE -- 5. RESEARCH QUESTION -- 6. CONDUCTING SEARCH -- 7. INCLUSION AND EXCLUSION CRITERIA -- 8. SEARCH AND RESULTS AND COLLECTION -- 9. KEYWORDING -- 10. QUALITY ASSESSMENT -- 11. DATA EXTRACTION AND CLASSIFICATION -- 12. ASSESSMENTS OF RESEARCH QUESTIONS -- 13. SCALABILITY -- 14. STANDARDS -- 15. TRANSFORMATION -- 16. COMPLEXITY DISCUSSION -- CONCLUSION -- REFERENCES -- Identifying Cyber Threats in IoT based Connected Cars for Enhanced Security -- Ainkaran Doraisamy1, Nor Azlina Abdul Rahman2,* and Khalida Shajaratuddur Harun1 |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This reference reviews the architectural requirements of IT systems that are designed to digitally transform business operations. It is a compilation of 7 timely reviews that demonstrate how adopting emerging technologies and examining the security-based concerns can lead to innovation in the business sector. The aim of the book is to guide scholars and business consultants on IT and business |
|
|
|
|
|
|
|
|
|
|
frameworks that can help new and existing organizations navigate the challenges posed by disruptive technologies to create a competitive advantage. The reviews are contributed by experts in business and information technology. The chapters cover diverse topics related to technological advancements and digital security measures. Chapter 1 offers insights into accessing and securing patient medical records through a blockchain-based framework, detailing research methodology, scalability, and standards. Chapter 2 discusses cyber threats in IoT-connected cars, addressing vulnerabilities, attack methods, and defense strategies. Chapter 3 focuses on malware analysis and detection using machine learning techniques. Chapter 4 emphasizes on securing IoT-based home automation. Chapter 5 presents an IoT policy and governance reference architecture to ensure integrity and security across devices. Chapter 6 explores organizational security improvements to prevent deepfake ransomware. Finally, Chapter 7 examines the use of machine learning in credit card fraud detection, discussing challenges and control layers. Readership Scholars, academics, business consultants, entrepreneurs. |
|
|
|
|
|
| |