首页 > 最新文献

Handbook of Research on Advancing Cybersecurity for Digital Transformation最新文献

英文 中文
Digital Transformation of E-Commerce Services and Cybersecurity for Modernizing the Banking Sector of Pakistan 巴基斯坦银行业现代化的电子商务服务和网络安全数字化转型
Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-6975-7.ch018
T. Rehman
The practice of protecting computers, websites, mobile devices, electronic services, networks, and digital data from malicious attacks is known as cybersecurity. Since political, military, private, financial, and medical institutions collect, process, and maintain massive volumes of data on computers and other devices, cybersecurity is critical. Sensitive data, such as intellectual property, financial data, personal records, or other forms of data, can make up a large amount of the data. Improper access or disclosure to that data can have profound implications. Technology has undoubtedly made a significant change in every aspect of life in Pakistan, whether it is a financial or non-financial sphere. Technology's usage is thoroughly utilized by banks worldwide. They have started adopting it frequently because of the immense need to achieve goals and satisfy customer needs more efficiently. Almost all leading banks have now provided e-commerce facilities. Over time, more and more services and facilities are offered to bank customers conveniently via e-commerce products.
保护计算机、网站、移动设备、电子服务、网络和数字数据免受恶意攻击的做法被称为网络安全。由于政治、军事、私人、金融和医疗机构在计算机和其他设备上收集、处理和维护大量数据,因此网络安全至关重要。敏感数据,如知识产权、财务数据、个人记录或其他形式的数据,可以构成大量的数据。对这些数据的不当访问或披露可能会产生深远的影响。毫无疑问,技术在巴基斯坦生活的各个方面都产生了重大变化,无论是金融领域还是非金融领域。技术的使用被世界各地的银行充分利用。他们已经开始频繁地采用它,因为实现目标和更有效地满足客户需求的巨大需求。现在几乎所有主要银行都提供电子商务设施。随着时间的推移,越来越多的服务和设施通过电子商务产品方便地提供给银行客户。
{"title":"Digital Transformation of E-Commerce Services and Cybersecurity for Modernizing the Banking Sector of Pakistan","authors":"T. Rehman","doi":"10.4018/978-1-7998-6975-7.ch018","DOIUrl":"https://doi.org/10.4018/978-1-7998-6975-7.ch018","url":null,"abstract":"The practice of protecting computers, websites, mobile devices, electronic services, networks, and digital data from malicious attacks is known as cybersecurity. Since political, military, private, financial, and medical institutions collect, process, and maintain massive volumes of data on computers and other devices, cybersecurity is critical. Sensitive data, such as intellectual property, financial data, personal records, or other forms of data, can make up a large amount of the data. Improper access or disclosure to that data can have profound implications. Technology has undoubtedly made a significant change in every aspect of life in Pakistan, whether it is a financial or non-financial sphere. Technology's usage is thoroughly utilized by banks worldwide. They have started adopting it frequently because of the immense need to achieve goals and satisfy customer needs more efficiently. Almost all leading banks have now provided e-commerce facilities. Over time, more and more services and facilities are offered to bank customers conveniently via e-commerce products.","PeriodicalId":382999,"journal":{"name":"Handbook of Research on Advancing Cybersecurity for Digital Transformation","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130551484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital Transformation and Cybersecurity Challenges 数字化转型与网络安全挑战
Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-6975-7.ch011
Fatimah Al Obaidan, Saqib Saeed
Digital transformation has revolutionized human life but also brought many cybersecurity challenges for users and enterprises. The major threats that affect computers and communication systems by damaging devices and stealing sensitive information are malicious attacks. Traditional anti-virus software fails to detect advanced kind of malware. Current research focuses on developing machine learning techniques for malware detection to respond in a timely manner. Many systems have been evolved and improved to distinguish the malware based on analysis behavior. The analysis behavior is considered a robust technique to detect, analyze, and classify malware, categorized into two models: a static and dynamic analysis. Both types of previous analysis have advantages and limitations. Therefore, the hybrid method combines the strength of static and dynamic analyses. This chapter conducted a systematic literature review (SLR) to summarize and analyze the quality of published studies in malware detection using machine learning techniques and hybrid analysis that range from 2016 to 2021.
数字化转型给人类生活带来了革命性的变化,但也给用户和企业带来了许多网络安全挑战。通过破坏设备和窃取敏感信息来影响计算机和通信系统的主要威胁是恶意攻击。传统的杀毒软件无法检测出高级的恶意软件。目前的研究重点是开发用于恶意软件检测的机器学习技术,以便及时响应。许多系统已经发展和改进,以区分基于分析行为的恶意软件。分析行为被认为是一种检测、分析和分类恶意软件的健壮技术,分为两种模型:静态分析和动态分析。前面两种分析都有各自的优点和局限性。因此,混合方法结合了静态和动态分析的强度。本章进行了系统的文献综述(SLR),以总结和分析2016年至2021年期间使用机器学习技术和混合分析进行恶意软件检测的已发表研究的质量。
{"title":"Digital Transformation and Cybersecurity Challenges","authors":"Fatimah Al Obaidan, Saqib Saeed","doi":"10.4018/978-1-7998-6975-7.ch011","DOIUrl":"https://doi.org/10.4018/978-1-7998-6975-7.ch011","url":null,"abstract":"Digital transformation has revolutionized human life but also brought many cybersecurity challenges for users and enterprises. The major threats that affect computers and communication systems by damaging devices and stealing sensitive information are malicious attacks. Traditional anti-virus software fails to detect advanced kind of malware. Current research focuses on developing machine learning techniques for malware detection to respond in a timely manner. Many systems have been evolved and improved to distinguish the malware based on analysis behavior. The analysis behavior is considered a robust technique to detect, analyze, and classify malware, categorized into two models: a static and dynamic analysis. Both types of previous analysis have advantages and limitations. Therefore, the hybrid method combines the strength of static and dynamic analyses. This chapter conducted a systematic literature review (SLR) to summarize and analyze the quality of published studies in malware detection using machine learning techniques and hybrid analysis that range from 2016 to 2021.","PeriodicalId":382999,"journal":{"name":"Handbook of Research on Advancing Cybersecurity for Digital Transformation","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132326531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Advanced Cyber Security and Internet of Things for Digital Transformations of the Indian Healthcare Sector 印度医疗保健部门数字化转型的先进网络安全和物联网
Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-6975-7.ch017
Jonika Lamba, Esha Jain
Cybersecurity is not just about fortification of data. It has wide implications such as maintaining safety, privacy, integrity, and trust of the patients in the healthcare sector. This study methodically reviews the need for cybersecurity amid digital transformation with the help of emerging technologies and focuses on the application and incorporation of blockchain and the internet of things (IoT) to ensure cybersecurity in the well-being of the business. It was found in the study that worldwide, advanced technology has been used in managing the flow of data and information, India should focus on maintaining the same IT-enabled infrastructure to reduce causalities in the nation and on the other hand improve administration, privacy, and security in the hospital sector. Depending on the network system, resource allocation, and mobile devices, there is a need to prioritize the resources and efforts in the era of digitalization.
网络安全不仅仅是数据加固。它具有广泛的影响,例如维护医疗保健部门患者的安全、隐私、完整性和信任。本研究系统地回顾了在新兴技术的帮助下,数字化转型对网络安全的需求,并重点关注区块链和物联网(IoT)的应用和整合,以确保企业的网络安全。研究发现,在世界范围内,先进技术已被用于管理数据和信息流,印度应侧重于维护相同的信息技术基础设施,以减少国家的伤亡,另一方面改善医院部门的管理、隐私和安全。根据网络系统、资源分配和移动设备的不同,需要在数字化时代对资源和努力进行优先排序。
{"title":"Advanced Cyber Security and Internet of Things for Digital Transformations of the Indian Healthcare Sector","authors":"Jonika Lamba, Esha Jain","doi":"10.4018/978-1-7998-6975-7.ch017","DOIUrl":"https://doi.org/10.4018/978-1-7998-6975-7.ch017","url":null,"abstract":"Cybersecurity is not just about fortification of data. It has wide implications such as maintaining safety, privacy, integrity, and trust of the patients in the healthcare sector. This study methodically reviews the need for cybersecurity amid digital transformation with the help of emerging technologies and focuses on the application and incorporation of blockchain and the internet of things (IoT) to ensure cybersecurity in the well-being of the business. It was found in the study that worldwide, advanced technology has been used in managing the flow of data and information, India should focus on maintaining the same IT-enabled infrastructure to reduce causalities in the nation and on the other hand improve administration, privacy, and security in the hospital sector. Depending on the network system, resource allocation, and mobile devices, there is a need to prioritize the resources and efforts in the era of digitalization.","PeriodicalId":382999,"journal":{"name":"Handbook of Research on Advancing Cybersecurity for Digital Transformation","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114688457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cybersecurity in Europe 欧洲的网络安全
Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-6975-7.ch002
J. A. Amorim, José Macario de Siqueria Rocha, T. Magal-Royo
Information security is increasingly necessary between citizens and public services. In a nearby environment, such as cities, there are digital services and infrastructures that help improve our quality of life. Secure access to services must be regulated and offer trust to the user. Initiatives like the Regulation from European Union, (EU) N° 910/2014 of the European Parliament and the Council intend to favour solutions for problems like interoperability and cybersecurity. In this chapter, two European countries are considered so that implementations of the electronic identification, authentication, and trust services are presented and discussed. The main contribution is a description of relevant European projects, a first step necessary to propel further research on this topic. The chapter also presents the current challenges for the consolidation of the technology used and for the adaptation of the electronic services offered by public administration bodies to citizens.
信息安全在公民和公共服务之间变得越来越必要。在附近的环境中,比如城市,有数字服务和基础设施,有助于提高我们的生活质量。必须规范对服务的安全访问,并向用户提供信任。欧洲议会和理事会的欧盟法规(EU) N°910/2014等倡议旨在支持互操作性和网络安全等问题的解决方案。在本章中,将考虑两个欧洲国家,以便介绍和讨论电子识别、认证和信任服务的实现。主要贡献是对相关欧洲项目的描述,这是推动该主题进一步研究的必要的第一步。本章还介绍了目前在整合所使用的技术和调整公共行政机构向公民提供的电子服务方面所面临的挑战。
{"title":"Cybersecurity in Europe","authors":"J. A. Amorim, José Macario de Siqueria Rocha, T. Magal-Royo","doi":"10.4018/978-1-7998-6975-7.ch002","DOIUrl":"https://doi.org/10.4018/978-1-7998-6975-7.ch002","url":null,"abstract":"Information security is increasingly necessary between citizens and public services. In a nearby environment, such as cities, there are digital services and infrastructures that help improve our quality of life. Secure access to services must be regulated and offer trust to the user. Initiatives like the Regulation from European Union, (EU) N° 910/2014 of the European Parliament and the Council intend to favour solutions for problems like interoperability and cybersecurity. In this chapter, two European countries are considered so that implementations of the electronic identification, authentication, and trust services are presented and discussed. The main contribution is a description of relevant European projects, a first step necessary to propel further research on this topic. The chapter also presents the current challenges for the consolidation of the technology used and for the adaptation of the electronic services offered by public administration bodies to citizens.","PeriodicalId":382999,"journal":{"name":"Handbook of Research on Advancing Cybersecurity for Digital Transformation","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126135681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybersecurity for E-Banking and E-Commerce in Pakistan 巴基斯坦电子银行和电子商务的网络安全
Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-6975-7.ch009
Tansif ur Rehman
Digital banking allows banks to make their new products more readily available, as they can package them with their essential software that has implications for cybersecurity. Internet presence also allows banks to extend their geographical reach without overbearing costs. In Pakistan, most internet offerings currently used by banks are more based on information than transactions; therefore, the issues for cybersecurity have gained high interest. The offerings on the websites by banks generally seem like electronic brochures. As they mainly offer company events, product information, along with a list of services rendered. Pakistan has various barriers to e-commerce, such as relatively few internet users, inadequate infrastructure (i.e., frequent power failures, fewer phone lines), and lack of cybersecurity for online transactions being hacked. The Government of Pakistan is rigorously working on these areas to overcome respective problems and progress in this sphere. This research focuses on the challenges for e-banking and e-commerce in Pakistan and issues relating to cybersecurity.
数字银行可以让银行更容易地获得他们的新产品,因为他们可以将这些产品与对网络安全有影响的基本软件打包在一起。互联网的存在也使得银行可以在没有高昂成本的情况下扩展其地理覆盖范围。在巴基斯坦,银行目前使用的大多数互联网服务更多地是基于信息而不是交易;因此,网络安全问题引起了人们的高度关注。银行在网站上提供的服务通常看起来像电子小册子。因为它们主要提供公司活动、产品信息,以及提供的服务列表。巴基斯坦在电子商务方面存在各种障碍,例如互联网用户相对较少,基础设施不足(即频繁停电,电话线较少)以及缺乏网络安全,无法防止在线交易被黑客入侵。巴基斯坦政府正在这些领域积极努力,以克服各自的问题并在这一领域取得进展。本研究的重点是巴基斯坦电子银行和电子商务面临的挑战以及与网络安全相关的问题。
{"title":"Cybersecurity for E-Banking and E-Commerce in Pakistan","authors":"Tansif ur Rehman","doi":"10.4018/978-1-7998-6975-7.ch009","DOIUrl":"https://doi.org/10.4018/978-1-7998-6975-7.ch009","url":null,"abstract":"Digital banking allows banks to make their new products more readily available, as they can package them with their essential software that has implications for cybersecurity. Internet presence also allows banks to extend their geographical reach without overbearing costs. In Pakistan, most internet offerings currently used by banks are more based on information than transactions; therefore, the issues for cybersecurity have gained high interest. The offerings on the websites by banks generally seem like electronic brochures. As they mainly offer company events, product information, along with a list of services rendered. Pakistan has various barriers to e-commerce, such as relatively few internet users, inadequate infrastructure (i.e., frequent power failures, fewer phone lines), and lack of cybersecurity for online transactions being hacked. The Government of Pakistan is rigorously working on these areas to overcome respective problems and progress in this sphere. This research focuses on the challenges for e-banking and e-commerce in Pakistan and issues relating to cybersecurity.","PeriodicalId":382999,"journal":{"name":"Handbook of Research on Advancing Cybersecurity for Digital Transformation","volume":"169 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129865351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Advancing Cybersecurity for Business Transformation and Enterprise Architecture Projects 推进业务转型和企业架构项目的网络安全
Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-6975-7.ch015
A. Trad
In this chapter, the author bases his research project on his authentic mixed multidisciplinary applied mathematical model for transformation projects. His mathematical model, named the applied holistic mathematical model for projects (AHMM4P), is supported by a tree-based heuristics structure. The AHMM4P is similar to the human empirical decision-making process and is applicable to any type of project; it is aimed to support the evolution of organisational, national, or enterprise transformation initiatives. The AHMM4P can be used for the development of the cybersecurity subsystems, enterprise information systems, and their decision-making systems, based on artificial intelligence, data sciences, enterprise architecture, big data, deep learning, and machine learning. The author attempts to prove that an AHMM4P-based action research approach can unify the currently frequently-used siloed MLI4P and DLI4P trends.
在本章中,作者的研究项目建立在他的真实的多学科混合应用数学模型的基础上。他的数学模型被命名为项目应用整体数学模型(AHMM4P),由基于树的启发式结构支持。AHMM4P类似于人类的经验决策过程,适用于任何类型的项目;它旨在支持组织、国家或企业转换计划的演进。AHMM4P可用于基于人工智能、数据科学、企业架构、大数据、深度学习和机器学习的网络安全子系统、企业信息系统及其决策系统的开发。作者试图证明一种基于ahmm4p的行动研究方法可以统一目前常用的孤立的MLI4P和DLI4P趋势。
{"title":"Advancing Cybersecurity for Business Transformation and Enterprise Architecture Projects","authors":"A. Trad","doi":"10.4018/978-1-7998-6975-7.ch015","DOIUrl":"https://doi.org/10.4018/978-1-7998-6975-7.ch015","url":null,"abstract":"In this chapter, the author bases his research project on his authentic mixed multidisciplinary applied mathematical model for transformation projects. His mathematical model, named the applied holistic mathematical model for projects (AHMM4P), is supported by a tree-based heuristics structure. The AHMM4P is similar to the human empirical decision-making process and is applicable to any type of project; it is aimed to support the evolution of organisational, national, or enterprise transformation initiatives. The AHMM4P can be used for the development of the cybersecurity subsystems, enterprise information systems, and their decision-making systems, based on artificial intelligence, data sciences, enterprise architecture, big data, deep learning, and machine learning. The author attempts to prove that an AHMM4P-based action research approach can unify the currently frequently-used siloed MLI4P and DLI4P trends.","PeriodicalId":382999,"journal":{"name":"Handbook of Research on Advancing Cybersecurity for Digital Transformation","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124958067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study of Advancing E-Banking and Cybersecurity for Digital Enterprise Transformation in Pakistan 巴基斯坦数字化企业转型推进电子银行与网络安全研究
Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-6975-7.ch014
Tansif ur Rehman
In this technological era, almost all renowned banks have equipped themselves with the latest technology significantly pertinent to enhance their services and have provided e-banking facilities to their customers. Nevertheless, cybersecurity has been the focus of many organizations. Banks are offering more facilities to facilitate their customers with ease and convenience regarding e-banking. However, in Pakistan this is not the case. As people still refrain from using e-banking in Pakistan because of various issues, the e-banking sector has exponentially grown in the last decade. It has more chances of growth as enterprises such as banks still encourage clients to carry out e-transactions, like utility bill payments, access to account information, and money transfer. During this process, cybercriminals attempt to steal customer data and hack their online sessions. With regards to e-banking fraud, digitization has caused a revolution. Cybercriminals have employed various tools to steal crucial information through identity theft, trojans, viruses, and phishing.
在这个科技时代,几乎所有知名银行都配备了最新的科技,为客户提供电子银行设施,以提高服务水平。然而,网络安全一直是许多组织关注的焦点。银行正提供更多便利,方便客户使用电子银行。然而,在巴基斯坦,情况并非如此。由于各种问题,巴基斯坦人仍然不愿使用电子银行,电子银行部门在过去十年中呈指数级增长。由于银行等企业仍在鼓励客户进行电子交易,如水电费支付、获取账户信息和转账,因此它的增长机会更大。在此过程中,网络犯罪分子试图窃取客户数据并入侵他们的在线会话。在电子银行欺诈方面,数字化引发了一场革命。网络犯罪分子利用各种工具通过身份盗窃、木马、病毒和网络钓鱼来窃取关键信息。
{"title":"A Study of Advancing E-Banking and Cybersecurity for Digital Enterprise Transformation in Pakistan","authors":"Tansif ur Rehman","doi":"10.4018/978-1-7998-6975-7.ch014","DOIUrl":"https://doi.org/10.4018/978-1-7998-6975-7.ch014","url":null,"abstract":"In this technological era, almost all renowned banks have equipped themselves with the latest technology significantly pertinent to enhance their services and have provided e-banking facilities to their customers. Nevertheless, cybersecurity has been the focus of many organizations. Banks are offering more facilities to facilitate their customers with ease and convenience regarding e-banking. However, in Pakistan this is not the case. As people still refrain from using e-banking in Pakistan because of various issues, the e-banking sector has exponentially grown in the last decade. It has more chances of growth as enterprises such as banks still encourage clients to carry out e-transactions, like utility bill payments, access to account information, and money transfer. During this process, cybercriminals attempt to steal customer data and hack their online sessions. With regards to e-banking fraud, digitization has caused a revolution. Cybercriminals have employed various tools to steal crucial information through identity theft, trojans, viruses, and phishing.","PeriodicalId":382999,"journal":{"name":"Handbook of Research on Advancing Cybersecurity for Digital Transformation","volume":"187 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124747274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber Security and Cyber Resilience for the Australian E-Health Records 澳大利亚电子健康记录的网络安全和网络弹性
Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-6975-7.ch004
Nagarajan Venkatachalam, Peadar O'Connor, Shailesh Palekar
Cybersecurity is a critical consideration for all users of electronic health records (EHR), particularly for patients. With the advent of Healthcare 4.0, which is based on the internet of things (IoT) and sensors, cyber resilience has become a key requirement in ensuring the protection of patient data across devices. Blockchain offers crypto-enforced security, data immutability, and smart contracts-based business logic features to all the users in the network. This study explores how blockchain can be a single digital option that can address both the cybersecurity and cyber resilience needs of EHR. The effective use lens is adopted to analyze how blockchain can be leveraged to meet cybersecurity needs while the novel use lens is adopted to analyze how blockchain can be leveraged to address cyber resilience needs originating from IoT. Based on the analysis, this study proposes two Hyperledger-based security models that contribute to individual privacy and information security needs.
网络安全是所有电子健康记录(EHR)用户,特别是患者的关键考虑因素。随着基于物联网(IoT)和传感器的医疗保健4.0的出现,网络弹性已成为确保跨设备保护患者数据的关键要求。区块链为网络中的所有用户提供加密强制安全性、数据不变性和基于智能合约的业务逻辑功能。本研究探讨了区块链如何成为一个单一的数字选项,可以同时满足电子病历的网络安全和网络弹性需求。采用有效使用视角分析如何利用区块链满足网络安全需求,采用新颖使用视角分析如何利用区块链满足物联网产生的网络弹性需求。在此基础上,本研究提出了两种基于超级账本的安全模型,以满足个人隐私和信息安全需求。
{"title":"Cyber Security and Cyber Resilience for the Australian E-Health Records","authors":"Nagarajan Venkatachalam, Peadar O'Connor, Shailesh Palekar","doi":"10.4018/978-1-7998-6975-7.ch004","DOIUrl":"https://doi.org/10.4018/978-1-7998-6975-7.ch004","url":null,"abstract":"Cybersecurity is a critical consideration for all users of electronic health records (EHR), particularly for patients. With the advent of Healthcare 4.0, which is based on the internet of things (IoT) and sensors, cyber resilience has become a key requirement in ensuring the protection of patient data across devices. Blockchain offers crypto-enforced security, data immutability, and smart contracts-based business logic features to all the users in the network. This study explores how blockchain can be a single digital option that can address both the cybersecurity and cyber resilience needs of EHR. The effective use lens is adopted to analyze how blockchain can be leveraged to meet cybersecurity needs while the novel use lens is adopted to analyze how blockchain can be leveraged to address cyber resilience needs originating from IoT. Based on the analysis, this study proposes two Hyperledger-based security models that contribute to individual privacy and information security needs.","PeriodicalId":382999,"journal":{"name":"Handbook of Research on Advancing Cybersecurity for Digital Transformation","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133939874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Advancement of Cybersecurity and Information Security Awareness to Facilitate Digital Transformation 提高网络安全和信息安全意识,促进数字化转型
Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-6975-7.ch006
Hamed Taherdoost, Mitra Madanchian, Mona Ebrahimi
As the pace of changes in the digital world is increasing exponentially, the appeal to shift from traditional platforms to digital ones is increasing as well. Accomplishing digital transformation objectives is impossible without information security considerations. Business leaders should rethink information security challenges associated with digital transformation and consider solutions to seize existing opportunities. When it comes to information security, human beings play a critical role. Raising users' awareness is a meaningful approach to avoid or neutralize the likelihood of unwanted security consequences that may occur during transforming a system digitally. This chapter will discuss cybersecurity and information security awareness and examine how digital transformation will be affected by implementing information security awareness. This chapter will discuss the digital transformation advantages and serious challenges associated with cybersecurity, how to enhance cybersecurity, and the role of information security awareness to mitigate cybersecurity risks.
随着数字世界的变化速度呈指数级增长,从传统平台转向数字平台的呼声也在增加。没有信息安全方面的考虑,实现数字化转型目标是不可能的。企业领导者应该重新思考与数字化转型相关的信息安全挑战,并考虑抓住现有机遇的解决方案。在信息安全问题上,人类起着至关重要的作用。提高用户的意识是一种有意义的方法,可以避免或消除在系统数字化转换过程中可能出现的不希望出现的安全后果。本章将讨论网络安全和信息安全意识,并研究实施信息安全意识将如何影响数字化转型。本章将讨论数字化转型的优势和与网络安全相关的严峻挑战,如何加强网络安全,以及信息安全意识在降低网络安全风险中的作用。
{"title":"Advancement of Cybersecurity and Information Security Awareness to Facilitate Digital Transformation","authors":"Hamed Taherdoost, Mitra Madanchian, Mona Ebrahimi","doi":"10.4018/978-1-7998-6975-7.ch006","DOIUrl":"https://doi.org/10.4018/978-1-7998-6975-7.ch006","url":null,"abstract":"As the pace of changes in the digital world is increasing exponentially, the appeal to shift from traditional platforms to digital ones is increasing as well. Accomplishing digital transformation objectives is impossible without information security considerations. Business leaders should rethink information security challenges associated with digital transformation and consider solutions to seize existing opportunities. When it comes to information security, human beings play a critical role. Raising users' awareness is a meaningful approach to avoid or neutralize the likelihood of unwanted security consequences that may occur during transforming a system digitally. This chapter will discuss cybersecurity and information security awareness and examine how digital transformation will be affected by implementing information security awareness. This chapter will discuss the digital transformation advantages and serious challenges associated with cybersecurity, how to enhance cybersecurity, and the role of information security awareness to mitigate cybersecurity risks.","PeriodicalId":382999,"journal":{"name":"Handbook of Research on Advancing Cybersecurity for Digital Transformation","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127246485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cybersecurity and Electronic Services Oriented to E-Government in Europe 面向欧洲电子政务的网络安全和电子服务
Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-6975-7.ch016
T. Magal-Royo, José Macário de Siqueira Rocha, Cristina Santandreu Mascarell, Rebeca Diez Somavilla, Jose Luis Giménez López
Cybersecurity in Europe as the rest of the world has been legislated for only 20 years. Numerous governmental institutions such as councils offer electronic services through their recently created electronic offices. In all of them, the volume of citizens who register temporarily or permanently to request online services related to the processing of documents and services with the government has increased significantly since the pandemic. Confinement has forced users to request numerous online services where authentication is one of the most relevant aspects to access safely and securely. European Union through the Connecting Europe Mechanism, CEF projects of the European Health Executive Agency, and Digital HaDEA has allowed numerous institutions to connect through the eIDAS created to establish trust in electronic transactions between individuals, organizations, and government entities across European member states.
与世界其他地区一样,欧洲的网络安全立法只有20年的历史。许多政府机构,如理事会,通过其最近建立的电子办公室提供电子服务。在所有这些国家中,临时或永久登记的公民申请与处理文件和政府服务相关的在线服务的数量自大流行以来显着增加。限制迫使用户请求大量在线服务,其中身份验证是安全可靠访问的最相关方面之一。欧洲联盟通过连接欧洲机制、欧洲卫生执行机构的CEF项目和数字HaDEA使许多机构能够通过eIDAS建立联系,从而在欧洲成员国的个人、组织和政府实体之间建立电子交易的信任。
{"title":"Cybersecurity and Electronic Services Oriented to E-Government in Europe","authors":"T. Magal-Royo, José Macário de Siqueira Rocha, Cristina Santandreu Mascarell, Rebeca Diez Somavilla, Jose Luis Giménez López","doi":"10.4018/978-1-7998-6975-7.ch016","DOIUrl":"https://doi.org/10.4018/978-1-7998-6975-7.ch016","url":null,"abstract":"Cybersecurity in Europe as the rest of the world has been legislated for only 20 years. Numerous governmental institutions such as councils offer electronic services through their recently created electronic offices. In all of them, the volume of citizens who register temporarily or permanently to request online services related to the processing of documents and services with the government has increased significantly since the pandemic. Confinement has forced users to request numerous online services where authentication is one of the most relevant aspects to access safely and securely. European Union through the Connecting Europe Mechanism, CEF projects of the European Health Executive Agency, and Digital HaDEA has allowed numerous institutions to connect through the eIDAS created to establish trust in electronic transactions between individuals, organizations, and government entities across European member states.","PeriodicalId":382999,"journal":{"name":"Handbook of Research on Advancing Cybersecurity for Digital Transformation","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126229251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Handbook of Research on Advancing Cybersecurity for Digital Transformation
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1