LEADER 03948nam 22005053 450 001 9911009256703321 005 20240616090237.0 010 $a981-5079-66-2 035 $a(MiAaPQ)EBC31477288 035 $a(Au-PeEL)EBL31477288 035 $a(CKB)32291994100041 035 $a(Exl-AI)31477288 035 $a(DE-B1597)730060 035 $a(DE-B1597)9789815079661 035 $a(Perlego)4454711 035 $a(OCoLC)1441721403 035 $a(EXLCZ)9932291994100041 100 $a20240616d2024 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aDigital Innovation Adoption 205 $a1st ed. 210 1$aSharjah :$cBentham Science Publishers,$d2024. 210 4$dİ2024. 215 $a1 online resource (114 pages) 311 08$a981-5079-68-9 311 08$a981-5079-67-0 327 $aCover -- Title -- Copyright -- End User License Agreement -- Contents -- Foreword -- Preface -- List of Contributors -- Access and Secure Patient Medical Records using Blockchain Technology based Framework: A Review -- Daniel Mago Vistro1,*, Muhammad Shoaib Farooq2, Attique Ur Rehman2 and Waleed Zafar2 -- 1. INTRODUCTION -- 2. RELATED WORK -- 3. RESEARCH METHODOLOGY -- 4. RESEARCH OBJECTIVE -- 5. RESEARCH QUESTION -- 6. CONDUCTING SEARCH -- 7. INCLUSION AND EXCLUSION CRITERIA -- 8. SEARCH AND RESULTS AND COLLECTION -- 9. KEYWORDING -- 10. QUALITY ASSESSMENT -- 11. DATA EXTRACTION AND CLASSIFICATION -- 12. ASSESSMENTS OF RESEARCH QUESTIONS -- 13. SCALABILITY -- 14. STANDARDS -- 15. TRANSFORMATION -- 16. COMPLEXITY DISCUSSION -- CONCLUSION -- REFERENCES -- Identifying Cyber Threats in IoT based Connected Cars for Enhanced Security -- Ainkaran Doraisamy1, Nor Azlina Abdul Rahman2,* and Khalida Shajaratuddur Harun1$7Generated by AI. 330 $aThis reference reviews the architectural requirements of IT systems that are designed to digitally transform business operations. It is a compilation of 7 timely reviews that demonstrate how adopting emerging technologies and examining the security-based concerns can lead to innovation in the business sector. The aim of the book is to guide scholars and business consultants on IT and business frameworks that can help new and existing organizations navigate the challenges posed by disruptive technologies to create a competitive advantage. The reviews are contributed by experts in business and information technology. The chapters cover diverse topics related to technological advancements and digital security measures. Chapter 1 offers insights into accessing and securing patient medical records through a blockchain-based framework, detailing research methodology, scalability, and standards. Chapter 2 discusses cyber threats in IoT-connected cars, addressing vulnerabilities, attack methods, and defense strategies. Chapter 3 focuses on malware analysis and detection using machine learning techniques. Chapter 4 emphasizes on securing IoT-based home automation. Chapter 5 presents an IoT policy and governance reference architecture to ensure integrity and security across devices. Chapter 6 explores organizational security improvements to prevent deepfake ransomware. Finally, Chapter 7 examines the use of machine learning in credit card fraud detection, discussing challenges and control layers. Readership Scholars, academics, business consultants, entrepreneurs. 606 $aComputer security$7Generated by AI 606 $aInternet of things$7Generated by AI 615 0$aComputer security 615 0$aInternet of things 700 $aRana$b Muhammad Ehsan$01826838 701 $aJayabalan$b Manoj$01826839 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9911009256703321 996 $aDigital Innovation Adoption$94394840 997 $aUNINA