Syed Adnan Jawaid | University of Maryland, College Park (original) (raw)

Papers by Syed Adnan Jawaid

Research paper thumbnail of Topic: How Artificial Intelligence and Machine Learning Can Impact Market Design

Background: This research examines how market knowledge and artificial intelligence (AI) interact... more Background: This research examines how market knowledge and artificial intelligence (AI) interact in different market designs such as business-to-business (B2B) settings while taking emerging technologies and the changing digitalization landscape into account. Objective: The main goal is to understand how AI affects market knowledge in different market designs such as business-to-business (B2B) contexts, taking into account language barriers, practical difficulties, and the revolutionary effects on decision-making and customer interactions. Result: They underscore the transformative potential of artificial intelligence (AI) by highlighting how it shapes market knowledge, encourages customized approaches, and improves marketing efficacy in the business-to-business (B2B) space. Conclusion: In order to create a path for responsible AI integration in B2B marketing, the study concludes with recommendations for standardized terminology related to AI, practical insights into implementation challenges, and ethical issues.

Research paper thumbnail of How Artificial Intelligence Technology can be Used to Treat Diabetes

Background: The research is conducted against the backdrop of the rising incidence of diabetes an... more Background: The research is conducted against the backdrop of the rising incidence of diabetes and the demand for novel approaches to improve patient outcomes. With the goal of revolutionizing conventional methods and addressing the changing healthcare landscape, the study concentrated on the application of AI technology in diabetes treatment. Objective: Examining the various ways AI can be used in diabetes care and assessing how it can enhance automated screenings, tailored treatment recommendations, predictive modeling, and patient selfmanagement were the main goals of the study. Result: The findings demonstrated how well AI works to anticipate a patient's unique reaction to a therapy, assist medical personnel in making decisions, and give patients more control over their own care. Artificial intelligence (AI)-powered solutions showed promise in improving real-time monitoring and encouraging patient adherence, supporting a comprehensive strategy for managing diabetes. Conclusion: The research indicates that artificial intelligence (AI) has great potential to change the way diabetes is treated. However, it also highlights the need for more research, ethical issues, and validation of AI. The results advocate for joint efforts to ensure responsible and patient-centered technology innovation in diabetes care and encourage the integration of AI with new technologies.

Research paper thumbnail of Cyber Security; Etiology and Importance

Background: Cyber Security is to protect online data and software from cyber threats. These cyber... more Background: Cyber Security is to protect online data and software from cyber threats. These cyberattacks are typically intended to gain access to, change, or delete sensitive information; extort money from users; or disrupt regular corporate activities. It is difficult to keep up a regular follow up with new technologies so it is necessary to keep the important data safe from cyber threats. There are many types of cyber threats; malware, ransom-ware, social engineering, phishing etc. To prevent cyber-attacks one can use password manager tools like LastPass and others. People also use two factor authentication for double security on their accounts. Methods: Boards such as the National Institute of Standards and Technology (NIST) are developing frameworks to assist firms in understanding their security risks, improving cybersecurity procedures, and preventing cyber assaults. The fight against cybercrimes and attack, rganisations needed a strong base there are 5 types of cyber securities; Critical Infrastructure Security, application security, network security, cloud security and (IoT) Security. In the modern time US is highly based on computers and on different software so it is really important for US to be more conscious about the security as they get many threats almost everyday for hacking their data and accounts. Results and Conclusion: Nowadays, even small businesses rarely recover their loss from the cyber-attacks and many back-off from continuing their businesses after being target of hackers. The first cybercrime attack was recorded on 1988 by a graduate student. Now that large companies and even small businesses are aware of cyber-attacks so they try their best to take every precaution to prevent the hacking with double security and password manager tools.

Research paper thumbnail of Data Protection in Organization by the Implementation of Cyber Security

Background: Cyber security is used to save the important data from getting hacked, took by some u... more Background: Cyber security is used to save the important data from getting hacked, took by some unknown access. It makes our environment a safe place for us to work out or share our information and since privacy is almost everyone's top priority, there must be the surety of saving the private information. Methods: In today's world cyber security is really important as there are now many devices, websites, new technology which makes it a lot easier for hackers to get into anyone's files which stores crucial data. However, many steps can be reserved to protect the data such as; educating your employees with how to prevent your files or computers from getting hacked, avoid clicking on websites that don't seem safe, use firewalls, antimalware system and most importantly make sure to keep passwords that are hard to guess and try to go for a face recognition instead of pins and passcodes. Results and Conclusion: This all does not only makes using technology safe but also favors your business for the safety of employees working within the organization. The customers being assured about their data being safe, improves productivity since viruses can slow down computers which may trigger the focus of staff during the working hours. It could save your system from adware; the links of websites are also prevented from slow internet speeds. There is no denying at the fact that cyber security is a major requirement for everyone who is indulged with technology today.

Research paper thumbnail of Cyber Security; Etiology and Importance

Background: Cyber Security is to protect online data and software from cyber threats. These cyber... more Background: Cyber Security is to protect online data and software from cyber threats. These cyberattacks are typically intended to gain access to, change, or delete sensitive information; extort money from users; or disrupt regular corporate activities. It is difficult to keep up a regular follow up with new technologies so it is necessary to keep the important data safe from cyber threats. There are many types of cyber threats; malware, ransom-ware, social engineering, phishing etc. To prevent cyber-attacks one can use password manager tools like LastPass and others. People also use two factor authentication for double security on their accounts. Methods: Boards such as the National Institute of Standards and Technology (NIST) are developing frameworks to assist firms in understanding their security risks, improving cybersecurity procedures, and preventing cyber assaults. The fight against cybercrimes and attack, rganisations needed a strong base there are 5 types of cyber securiti...

Research paper thumbnail of Artificial Intelligence with Respect to Cyber Security

Artificial Intelligence has transformed the cyber security industry by enabling organizations to ... more Artificial Intelligence has transformed the cyber security industry by enabling organizations to systematize and enlarge outdated safety procedures. AI can provide more effective threat detection and response capabilities, enhance vulnerability management, and improve compliance and governance. AI technologies such as machine learning, natural language processing, behavioral analytics, and deep learning can enhance cyber security defenses and protect against a wide range of cyber threats, including malware, phishing attacks, and insider threats. Theoretical underpinnings of AI in cyber security, such as machine learning, natural language processing, behavioral analytics, and deep learning, are discussed. The advantages of using AI in cyber security are discussed including speed and accuracy, continuous learning and adaptation, and efficiency and scalability. It's important to note that AI is not a silver bullet for cyber security and should be used in conjunction with other security measures to provide a comprehensive defense strategy. AI has transformed the way cyber security operates in today's digital age. By analyzing vast amounts of data quickly and accurately it has become a valuable tool for organizations looking to protect their assets from cyber threats.

Research paper thumbnail of The transformative economic impact of Artificial Intelligence

Background: The swift assimilation of Artificial Intelligence (AI) across multiple industries is ... more Background: The swift assimilation of Artificial Intelligence (AI) across multiple industries is altering the worldwide economic terrain. Unprecedented opportunities and difficulties are brought about by this revolutionary technology, which has an impact on innovation, trade, labor markets, and security. Objective: The goal of this study is to thoroughly investigate the economic effects of AI by exploring how it may affect labor markets, innovation, trade internationally, and security. The goal is to offer insights that support strategic decision-making and policy formation by examining current trends, opportunities, and difficulties. Results: The research highlights the dual character of artificial intelligence's influence, highlighting both its potential to spur economic expansion and its drawbacks, including the loss of jobs, a lack of standards, and security issues. The study highlights how crucial cooperation is to overcoming these obstacles and realizing AI's full potential. Conclusion: The balancing opportunities and risks becomes critical as AI continues to change the economic landscape. The report promotes proactive steps including ethical AI design guidelines, ongoing worker retraining, and flexible regulatory strategies. As we shape an AI future that puts inclusion, creativity, and responsible governance first, collaboration emerges as a key theme.

Research paper thumbnail of Artificial Intelligence in Healthcare Delivery and Control Side Effects

Background: Artificial Intelligence (AI) in healthcare has ushered in a revolutionary era by tran... more Background: Artificial Intelligence (AI) in healthcare has ushered in a revolutionary era by transforming the way we provide care and reduce adverse consequences. This paper explores the field of AI applications in healthcare, including side effect management, streamlined administrative procedures, and customized treatment programs. Objective: The purpose of this study is to give a thorough review of how artificial intelligence (AI) is affecting healthcare delivery and how effective it is in reducing side effects. Results: This study highlights the applications of AI in healthcare delivery, AI has a lot of promise for the healthcare industry, from bettering patient care to diagnostics. Regarding side effect management, AIpowered programs such as Google's DeepMind and Tempus demonstrate the possibility of customized treatment regimens and early complication identification. Conclusion: A paradigm shift is shown by the significant effects of AI on side effect control and healthcare delivery. As it navigates ethical considerations and integration challenges, a resounding call to action emerges for sustained research, development, and interdisciplinary collaboration.

Research paper thumbnail of Artificial Intelligence with Respect to Cyber Security

PrePrints, 2023

Artificial Intelligence has transformed the cyber security industry by enabling organizations to ... more Artificial Intelligence has transformed the cyber security industry by enabling organizations to systematize and enlarge outdated safety procedures. AI can provide more effective threat detection and response capabilities, enhance vulnerability management, and improve compliance and governance. AI technologies such as machine learning, natural language processing, behavioral analytics, and deep learning can enhance cyber security defenses and protect against a wide range of cyber threats, including malware, phishing attacks, and insider threats. Theoretical underpinnings of AI in cyber security, such as machine learning, natural language processing, behavioral analytics, and deep learning, are discussed. The advantages of using AI in cyber security are discussed including speed and accuracy, continuous learning and adaptation, and efficiency and scalability. It's important to note that AI is not a silver bullet for cyber security and should be used in conjunction with other security measures to provide a comprehensive defense strategy. AI has transformed the way cyber security operates in today's digital age. By analyzing vast amounts of data quickly and accurately it has become a valuable tool for organizations looking to protect their assets from cyber threats.

Research paper thumbnail of Cyber security; Etiology and Importance

Background: Cyber Security is to protect online data and software from cyber threats. These cyber... more Background: Cyber Security is to protect online data and software from cyber threats. These cyberattacks are typically intended to gain access to, change, or delete sensitive information; extort money from users; or disrupt regular corporate activities. It is difficult to keep up a regular follow up with new technologies, so it is necessary to keep the important data safe from cyber threats. There are many types of cyber threats, malware, ransomware, social engineering,

Research paper thumbnail of Artificial Intelligence (AI) and its application on Human Health

Background: Artificial intelligence can help improve the quality of healthcare by analyzing vast ... more Background: Artificial intelligence can help improve the quality of healthcare by analyzing vast amounts of data and providing more effective and personalized treatment plans. Researchers are working on developing AI-powered solutions that can help improve the outcomes of patients. Objective: To explore the potential of AI in improving healthcare outcomes and patient experience. Results: The study suggests that AI can improve healthcare efficiency and patient outcomes but cannot fully replace human healthcare professionals. AI can assist healthcare professionals in their work, leading to better resource utilization and improved patient care. However, there is still a need for human healthcare professionals to oversee AI systems and provide empathy and personalized care to patients. Conclusion: While there is immense potential for AI in healthcare, it is not yet feasible to replace human healthcare workers. Instead, it should be viewed as a tool that can help improve the efficiency a...

Research paper thumbnail of Cyber Security Threats to Educational Institutes: A Growing Concern for the New Era of Cybersecurity

Background: The outbreak of the Covid-19 pandemic has significantly affected the operations of hi... more Background: The outbreak of the Covid-19 pandemic has significantly affected the operations of higher education institutions. Due to the limited use of video conferencing and cloud computing in these facilities, distance learning became the only option available to them. Objective: The study focused on identifying the most common types of attacks that can affect e-learning assets. Results: There was a lack of clear cybersecurity policies for educational institutes and universities in 2020, according to a report by Microsoft Security Intelligence. The report showed that the education industry was the most targeted sector for malware attacks in the last 30 days. Conclusion: The recommendations for improving the security of e-learning systems. Some of these include implementing policies that restrict access to the resources and applications, updating security patches, and using cryptographic protocols.

Research paper thumbnail of The Increase in Security Breaches through Remote Working

Background: The rise of cloud computing has led to the increasing number of organizations that re... more Background: The rise of cloud computing has led to the increasing number of organizations that rely on it for various tasks and services, such as education, healthcare, and e-commerce. Unfortunately, many security threats can be caused by the sudden use of cloud platforms. Objective: This paper aims to provide a comprehensive overview of these threats and how they can be mitigated. Many companies are moving toward cloud computing to sustain their business growth and provide their employees with the best possible work environment. Results: Due to the rise of cyber security threats and the unprecedented number of breaches of data, small and medium-sized enterprises are also starting to take a huge leap. The outbreak of COVID-19 has affected the lives of people all around the world. Conclusion: Due to the seriousness of the situation, the WHO has declared the COVID-19 pandemic a public health emergency. To minimize the spread of the virus, the entire world has started adopting social d...

Research paper thumbnail of Data Protection in Organization by the Implementation of Cyber Security

Background: Cyber security is used to save the important data from getting hacked, took by some u... more Background: Cyber security is used to save the important data from getting hacked, took by some unknown access. It makes our environment a safe place for us to work out or share our information and since privacy is almost everyone’s top priority, there must be the surety of saving the private information. Methods: In today’s world cyber security is really important as there are now many devices, websites, new technology which makes it a lot easier for hackers to get into anyone’s files which stores crucial data. However, many steps can be reserved to protect the data such as; educating your employees with how to prevent your files or computers from getting hacked, avoid clicking on websites that don’t seem safe, use firewalls, antimalware system and most importantly make sure to keep passwords that are hard to guess and try to go for a face recognition instead of pins and passcodes. Results and Conclusion: This all does not only makes using technology safe but also favors your busin...

Research paper thumbnail of Topic: How Artificial Intelligence and Machine Learning Can Impact Market Design

Background: This research examines how market knowledge and artificial intelligence (AI) interact... more Background: This research examines how market knowledge and artificial intelligence (AI) interact in different market designs such as business-to-business (B2B) settings while taking emerging technologies and the changing digitalization landscape into account. Objective: The main goal is to understand how AI affects market knowledge in different market designs such as business-to-business (B2B) contexts, taking into account language barriers, practical difficulties, and the revolutionary effects on decision-making and customer interactions. Result: They underscore the transformative potential of artificial intelligence (AI) by highlighting how it shapes market knowledge, encourages customized approaches, and improves marketing efficacy in the business-to-business (B2B) space. Conclusion: In order to create a path for responsible AI integration in B2B marketing, the study concludes with recommendations for standardized terminology related to AI, practical insights into implementation challenges, and ethical issues.

Research paper thumbnail of How Artificial Intelligence Technology can be Used to Treat Diabetes

Background: The research is conducted against the backdrop of the rising incidence of diabetes an... more Background: The research is conducted against the backdrop of the rising incidence of diabetes and the demand for novel approaches to improve patient outcomes. With the goal of revolutionizing conventional methods and addressing the changing healthcare landscape, the study concentrated on the application of AI technology in diabetes treatment. Objective: Examining the various ways AI can be used in diabetes care and assessing how it can enhance automated screenings, tailored treatment recommendations, predictive modeling, and patient selfmanagement were the main goals of the study. Result: The findings demonstrated how well AI works to anticipate a patient's unique reaction to a therapy, assist medical personnel in making decisions, and give patients more control over their own care. Artificial intelligence (AI)-powered solutions showed promise in improving real-time monitoring and encouraging patient adherence, supporting a comprehensive strategy for managing diabetes. Conclusion: The research indicates that artificial intelligence (AI) has great potential to change the way diabetes is treated. However, it also highlights the need for more research, ethical issues, and validation of AI. The results advocate for joint efforts to ensure responsible and patient-centered technology innovation in diabetes care and encourage the integration of AI with new technologies.

Research paper thumbnail of Cyber Security; Etiology and Importance

Background: Cyber Security is to protect online data and software from cyber threats. These cyber... more Background: Cyber Security is to protect online data and software from cyber threats. These cyberattacks are typically intended to gain access to, change, or delete sensitive information; extort money from users; or disrupt regular corporate activities. It is difficult to keep up a regular follow up with new technologies so it is necessary to keep the important data safe from cyber threats. There are many types of cyber threats; malware, ransom-ware, social engineering, phishing etc. To prevent cyber-attacks one can use password manager tools like LastPass and others. People also use two factor authentication for double security on their accounts. Methods: Boards such as the National Institute of Standards and Technology (NIST) are developing frameworks to assist firms in understanding their security risks, improving cybersecurity procedures, and preventing cyber assaults. The fight against cybercrimes and attack, rganisations needed a strong base there are 5 types of cyber securities; Critical Infrastructure Security, application security, network security, cloud security and (IoT) Security. In the modern time US is highly based on computers and on different software so it is really important for US to be more conscious about the security as they get many threats almost everyday for hacking their data and accounts. Results and Conclusion: Nowadays, even small businesses rarely recover their loss from the cyber-attacks and many back-off from continuing their businesses after being target of hackers. The first cybercrime attack was recorded on 1988 by a graduate student. Now that large companies and even small businesses are aware of cyber-attacks so they try their best to take every precaution to prevent the hacking with double security and password manager tools.

Research paper thumbnail of Data Protection in Organization by the Implementation of Cyber Security

Background: Cyber security is used to save the important data from getting hacked, took by some u... more Background: Cyber security is used to save the important data from getting hacked, took by some unknown access. It makes our environment a safe place for us to work out or share our information and since privacy is almost everyone's top priority, there must be the surety of saving the private information. Methods: In today's world cyber security is really important as there are now many devices, websites, new technology which makes it a lot easier for hackers to get into anyone's files which stores crucial data. However, many steps can be reserved to protect the data such as; educating your employees with how to prevent your files or computers from getting hacked, avoid clicking on websites that don't seem safe, use firewalls, antimalware system and most importantly make sure to keep passwords that are hard to guess and try to go for a face recognition instead of pins and passcodes. Results and Conclusion: This all does not only makes using technology safe but also favors your business for the safety of employees working within the organization. The customers being assured about their data being safe, improves productivity since viruses can slow down computers which may trigger the focus of staff during the working hours. It could save your system from adware; the links of websites are also prevented from slow internet speeds. There is no denying at the fact that cyber security is a major requirement for everyone who is indulged with technology today.

Research paper thumbnail of Cyber Security; Etiology and Importance

Background: Cyber Security is to protect online data and software from cyber threats. These cyber... more Background: Cyber Security is to protect online data and software from cyber threats. These cyberattacks are typically intended to gain access to, change, or delete sensitive information; extort money from users; or disrupt regular corporate activities. It is difficult to keep up a regular follow up with new technologies so it is necessary to keep the important data safe from cyber threats. There are many types of cyber threats; malware, ransom-ware, social engineering, phishing etc. To prevent cyber-attacks one can use password manager tools like LastPass and others. People also use two factor authentication for double security on their accounts. Methods: Boards such as the National Institute of Standards and Technology (NIST) are developing frameworks to assist firms in understanding their security risks, improving cybersecurity procedures, and preventing cyber assaults. The fight against cybercrimes and attack, rganisations needed a strong base there are 5 types of cyber securiti...

Research paper thumbnail of Artificial Intelligence with Respect to Cyber Security

Artificial Intelligence has transformed the cyber security industry by enabling organizations to ... more Artificial Intelligence has transformed the cyber security industry by enabling organizations to systematize and enlarge outdated safety procedures. AI can provide more effective threat detection and response capabilities, enhance vulnerability management, and improve compliance and governance. AI technologies such as machine learning, natural language processing, behavioral analytics, and deep learning can enhance cyber security defenses and protect against a wide range of cyber threats, including malware, phishing attacks, and insider threats. Theoretical underpinnings of AI in cyber security, such as machine learning, natural language processing, behavioral analytics, and deep learning, are discussed. The advantages of using AI in cyber security are discussed including speed and accuracy, continuous learning and adaptation, and efficiency and scalability. It's important to note that AI is not a silver bullet for cyber security and should be used in conjunction with other security measures to provide a comprehensive defense strategy. AI has transformed the way cyber security operates in today's digital age. By analyzing vast amounts of data quickly and accurately it has become a valuable tool for organizations looking to protect their assets from cyber threats.

Research paper thumbnail of The transformative economic impact of Artificial Intelligence

Background: The swift assimilation of Artificial Intelligence (AI) across multiple industries is ... more Background: The swift assimilation of Artificial Intelligence (AI) across multiple industries is altering the worldwide economic terrain. Unprecedented opportunities and difficulties are brought about by this revolutionary technology, which has an impact on innovation, trade, labor markets, and security. Objective: The goal of this study is to thoroughly investigate the economic effects of AI by exploring how it may affect labor markets, innovation, trade internationally, and security. The goal is to offer insights that support strategic decision-making and policy formation by examining current trends, opportunities, and difficulties. Results: The research highlights the dual character of artificial intelligence's influence, highlighting both its potential to spur economic expansion and its drawbacks, including the loss of jobs, a lack of standards, and security issues. The study highlights how crucial cooperation is to overcoming these obstacles and realizing AI's full potential. Conclusion: The balancing opportunities and risks becomes critical as AI continues to change the economic landscape. The report promotes proactive steps including ethical AI design guidelines, ongoing worker retraining, and flexible regulatory strategies. As we shape an AI future that puts inclusion, creativity, and responsible governance first, collaboration emerges as a key theme.

Research paper thumbnail of Artificial Intelligence in Healthcare Delivery and Control Side Effects

Background: Artificial Intelligence (AI) in healthcare has ushered in a revolutionary era by tran... more Background: Artificial Intelligence (AI) in healthcare has ushered in a revolutionary era by transforming the way we provide care and reduce adverse consequences. This paper explores the field of AI applications in healthcare, including side effect management, streamlined administrative procedures, and customized treatment programs. Objective: The purpose of this study is to give a thorough review of how artificial intelligence (AI) is affecting healthcare delivery and how effective it is in reducing side effects. Results: This study highlights the applications of AI in healthcare delivery, AI has a lot of promise for the healthcare industry, from bettering patient care to diagnostics. Regarding side effect management, AIpowered programs such as Google's DeepMind and Tempus demonstrate the possibility of customized treatment regimens and early complication identification. Conclusion: A paradigm shift is shown by the significant effects of AI on side effect control and healthcare delivery. As it navigates ethical considerations and integration challenges, a resounding call to action emerges for sustained research, development, and interdisciplinary collaboration.

Research paper thumbnail of Artificial Intelligence with Respect to Cyber Security

PrePrints, 2023

Artificial Intelligence has transformed the cyber security industry by enabling organizations to ... more Artificial Intelligence has transformed the cyber security industry by enabling organizations to systematize and enlarge outdated safety procedures. AI can provide more effective threat detection and response capabilities, enhance vulnerability management, and improve compliance and governance. AI technologies such as machine learning, natural language processing, behavioral analytics, and deep learning can enhance cyber security defenses and protect against a wide range of cyber threats, including malware, phishing attacks, and insider threats. Theoretical underpinnings of AI in cyber security, such as machine learning, natural language processing, behavioral analytics, and deep learning, are discussed. The advantages of using AI in cyber security are discussed including speed and accuracy, continuous learning and adaptation, and efficiency and scalability. It's important to note that AI is not a silver bullet for cyber security and should be used in conjunction with other security measures to provide a comprehensive defense strategy. AI has transformed the way cyber security operates in today's digital age. By analyzing vast amounts of data quickly and accurately it has become a valuable tool for organizations looking to protect their assets from cyber threats.

Research paper thumbnail of Cyber security; Etiology and Importance

Background: Cyber Security is to protect online data and software from cyber threats. These cyber... more Background: Cyber Security is to protect online data and software from cyber threats. These cyberattacks are typically intended to gain access to, change, or delete sensitive information; extort money from users; or disrupt regular corporate activities. It is difficult to keep up a regular follow up with new technologies, so it is necessary to keep the important data safe from cyber threats. There are many types of cyber threats, malware, ransomware, social engineering,

Research paper thumbnail of Artificial Intelligence (AI) and its application on Human Health

Background: Artificial intelligence can help improve the quality of healthcare by analyzing vast ... more Background: Artificial intelligence can help improve the quality of healthcare by analyzing vast amounts of data and providing more effective and personalized treatment plans. Researchers are working on developing AI-powered solutions that can help improve the outcomes of patients. Objective: To explore the potential of AI in improving healthcare outcomes and patient experience. Results: The study suggests that AI can improve healthcare efficiency and patient outcomes but cannot fully replace human healthcare professionals. AI can assist healthcare professionals in their work, leading to better resource utilization and improved patient care. However, there is still a need for human healthcare professionals to oversee AI systems and provide empathy and personalized care to patients. Conclusion: While there is immense potential for AI in healthcare, it is not yet feasible to replace human healthcare workers. Instead, it should be viewed as a tool that can help improve the efficiency a...

Research paper thumbnail of Cyber Security Threats to Educational Institutes: A Growing Concern for the New Era of Cybersecurity

Background: The outbreak of the Covid-19 pandemic has significantly affected the operations of hi... more Background: The outbreak of the Covid-19 pandemic has significantly affected the operations of higher education institutions. Due to the limited use of video conferencing and cloud computing in these facilities, distance learning became the only option available to them. Objective: The study focused on identifying the most common types of attacks that can affect e-learning assets. Results: There was a lack of clear cybersecurity policies for educational institutes and universities in 2020, according to a report by Microsoft Security Intelligence. The report showed that the education industry was the most targeted sector for malware attacks in the last 30 days. Conclusion: The recommendations for improving the security of e-learning systems. Some of these include implementing policies that restrict access to the resources and applications, updating security patches, and using cryptographic protocols.

Research paper thumbnail of The Increase in Security Breaches through Remote Working

Background: The rise of cloud computing has led to the increasing number of organizations that re... more Background: The rise of cloud computing has led to the increasing number of organizations that rely on it for various tasks and services, such as education, healthcare, and e-commerce. Unfortunately, many security threats can be caused by the sudden use of cloud platforms. Objective: This paper aims to provide a comprehensive overview of these threats and how they can be mitigated. Many companies are moving toward cloud computing to sustain their business growth and provide their employees with the best possible work environment. Results: Due to the rise of cyber security threats and the unprecedented number of breaches of data, small and medium-sized enterprises are also starting to take a huge leap. The outbreak of COVID-19 has affected the lives of people all around the world. Conclusion: Due to the seriousness of the situation, the WHO has declared the COVID-19 pandemic a public health emergency. To minimize the spread of the virus, the entire world has started adopting social d...

Research paper thumbnail of Data Protection in Organization by the Implementation of Cyber Security

Background: Cyber security is used to save the important data from getting hacked, took by some u... more Background: Cyber security is used to save the important data from getting hacked, took by some unknown access. It makes our environment a safe place for us to work out or share our information and since privacy is almost everyone’s top priority, there must be the surety of saving the private information. Methods: In today’s world cyber security is really important as there are now many devices, websites, new technology which makes it a lot easier for hackers to get into anyone’s files which stores crucial data. However, many steps can be reserved to protect the data such as; educating your employees with how to prevent your files or computers from getting hacked, avoid clicking on websites that don’t seem safe, use firewalls, antimalware system and most importantly make sure to keep passwords that are hard to guess and try to go for a face recognition instead of pins and passcodes. Results and Conclusion: This all does not only makes using technology safe but also favors your busin...