Ballots and padlocks: Building digital trust and security in democracy through information governance strategies and blockchain technologies
OO Olaniyi - Available at SSRN 4759942, 2024 - papers.ssrn.com
This research explores the integration of Information Governance (IG) strategies and
Blockchain Technologies (BT) in enhancing digital trust and security within democratic …
Blockchain Technologies (BT) in enhancing digital trust and security within democratic …
Artificial Intelligence, Big Data, and Cloud Infrastructures: Policy Recommendations for Enhancing Women's Participation in the Tech-Driven Economy
FA Ezeugwa, OO Olaniyi… - Journal of …, 2024 - eprints.go2submission.com
This study investigates the underrepresentation of women in Artificial Intelligence (AI), Big
Data, and Cloud Infrastructures, exploring the barriers and challenges they face and …
Data, and Cloud Infrastructures, exploring the barriers and challenges they face and …
Towards sustainable it infrastructure: Integrating green computing with data warehouse and big data technologies to enhance efficiency and environmental …
JC Ugonnia, OO Olaniyi, FG Olaniyi… - Journal of …, 2024 - archive.pcbmb.org
This research examines the integration of green computing practices within data
warehousing and big data technologies, focusing on their effects on organizational …
warehousing and big data technologies, focusing on their effects on organizational …
Securing the Digital frontier: Strategies for cloud computing security, database protection, and comprehensive penetration testing
UTGI Igwenagu, AA Salami… - Journal of …, 2024 - eprints.go4mailburst.com
This research paper explores the effectiveness of integrated cybersecurity strategies,
focusing on the amalgamation of cloud computing security, database protection, and …
focusing on the amalgamation of cloud computing security, database protection, and …
Cyberfusion protocols: Strategic integration of enterprise risk management, ISO 27001, and mobile forensics for advanced digital security in the modern business …
OO Olaniyi, OO Omogoroye… - Journal of …, 2024 - research.sdpublishers.net
This research paper explores the integration of Enterprise Risk Management (ERM), the ISO
27001 standard, and mobile forensics methodologies as a comprehensive framework for …
27001 standard, and mobile forensics methodologies as a comprehensive framework for …
Beyond conventional threat defense: Implementing advanced threat modeling techniques, risk modeling frameworks and contingency planning in the healthcare …
AA Salami, UTGI Igwenagu… - Journal of …, 2024 - asian.go4sending.com
This research study explores the integration of advanced threat and risk modeling with
scenario and contingency planning to enhance security and resilience within healthcare …
scenario and contingency planning to enhance security and resilience within healthcare …
Bridging the digital divide: Exploring the role of artificial intelligence and automation in enhancing connectivity in developing nations
AD Samuel-Okon, OO Abejide - Journal of Engineering …, 2024 - public.paper4promo.com
This research paper explores the potential of artificial intelligence (AI) and automation to
reduce the digital divide in developing countries. The study investigates how these …
reduce the digital divide in developing countries. The study investigates how these …
Dynamics of the digital workforce: Assessing the interplay and impact of ai, automation, and employment policies
The rapid integration of artificial intelligence (AI) and automation within various sectors
poses challenges and opportunities for the global workforce. This study investigates the …
poses challenges and opportunities for the global workforce. This study investigates the …
Combating the Challenges of False Positives in AI-Driven Anomaly Detection Systems and Enhancing Data Security in the Cloud
OO Olateju, SU Okon, UTGI Igwenagu… - Asian Journal of …, 2024 - eprints.ditdo.in
Anomaly detection is critical for network security, fraud detection, and system health
monitoring applications. Traditional methods like statistical approaches and distance-based …
monitoring applications. Traditional methods like statistical approaches and distance-based …
From Theory to Practice: Implementing Effective Role-Based Access Control Strategies to Mitigate Insider Risks in Diverse Organizational Contexts
YA Marquis - Journal of Engineering Research and …, 2024 - article.publish4promo.com
This study investigates the effectiveness of Role-Based Access Control (RBAC) systems in
mitigating insider threats to database security within various organizational environments …
mitigating insider threats to database security within various organizational environments …