The technological infrastructure is the basis for the successful implementation and operation of information systems in small and medium enterprises. The study aimed to demonstrate the impact of cybersecurity on entrepreneurship strategies in small and medium enterprises. Through technological infrastructure in Balqa Governorate. The study population consisted of small and medium enterprises in Balqa Governorate in Jordan. The study followed the descriptive analytical approach and relied on the questionnaire to collect data. The sample size was 360 individuals were randomly select. The Statistical Package for Social Sciences (SPSS) was use to analyze the data. The study reached a set of results, including that the management of small and medium enterprises is committed to continuous supervision and control of customer information. Dealing with reliable parties to ensure the confidentiality of information, following strict standards for disclosure and circulation of customer data and information based on legal texts. Maintaining the privacy of customers’ financial data, in addition to supporting the successes of individuals based on the personal efforts of employees, providing a suitable work environment for employees, sustaining excellence and achievement, and working to increase awareness among its employees of the importance of innovation and creativity in work. The study recommended that customer data confidentiality should be consider a top priority for small and medium enterprises. The data should be stored in more than one place at the same time, that project websites should follow a privacy policy, and that the customer’s identity should be verify before submitting his data and documents, by involving employees in small and medium enterprises in specialized courses and workshops to demonstrate the importance of data and information confidentiality.
The rapid expansion of smart cities has led to the widespread deployment of Internet of Things (IoT) devices for real-time data collection and urban optimization. However, these interconnected systems face critical cybersecurity risks, including data tampering, unauthorized access, and privacy breaches. This paper proposes a blockchain-based framework designed to enhance the security, integrity, and resilience of IoT data in smart city environments. Leveraging a private blockchain, the system ensures decentralized, tamper-proof data storage, and transaction verification through digital signatures and a lightweight Proof of Work consensus mechanism. Smart contracts are employed to automate access control and respond to anomalies in real time. A Python-based simulation demonstrates the framework’s effectiveness in securing IoT communications. The system supports rapid transaction validation with minimal latency and enables timely detection of anomalous patterns through integrated machine learning. Evaluations show that the framework maintains consistent performance across diverse smart city components such as transportation, healthcare, and building security. These results highlight the potential of the proposed solution to enable secure, scalable, and real-time IoT ecosystems for modern urban infrastructures.
Distributed Energy Resources (DERs), such as solar photovoltaic (PV) systems, wind turbines, and energy storage systems, offer many benefits, including increased energy efficiency, sustainability, and grid reliability. However, their integration into the smart grid also introduces new vulnerabilities to cyber threats. The smart grid is becoming more digitalized, with advanced technologies like Internet of Things (IoT) devices, communication networks, and automation systems that enable the integration of DER systems. While this enhances grid efficiency and control, it creates more entry points for attackers and thus expands the attack surface for potential cyber threats. Protecting DERs from cyberattacks is crucial to maintaining the overall reliability, security, and privacy of the smart grid. The adopted cybersecurity strategies should not only address current threats but also anticipate future dangers. This requires ongoing risk assessments, staying updated on emerging threats, and being prepared to adapt cybersecurity measures accordingly. This paper highlights some critical points regarding the importance of cybersecurity for Distributed Energy Resources (DERs) and the evolving landscape of the smart grid. This research study shows that there is need for a proactive and adaptable cybersecurity approach that encompasses prevention, detection, response, and recovery to safeguard these critical energy systems against cyber threats, both today and in the future. This work serves as a valuable tool in enhancing the cybersecurity posture of utilities and grid-connected DER owners and operators. It allows them to make informed decisions, protect critical infrastructure, and ensure the reliability and security of grid-connected DER systems in an evolving energy landscape.
This study rigorously investigates the Starlink Project’s impact on Thailand’s legal frameworks, regulatory policies, and national security concerns. Utilising a well-structured online questionnaire, we collected responses from 1378 Thai participants, meticulously selected to represent diverse demographics, technology usage patterns, and social media interactions. Our analytical approach integrated binary regression analysis to dissect the intricate relationships between various predictor variables and the project’s potential effects. Notably, the study unveils critical insights into how factors such as age, gender, education level, income, as well as specific technology and social media usage (including laptop, smartphone, tablet, home and mobile Internet, and TikTok), influence perceptions of Starlink’s impact. Intriguingly, certain variables like Twitter and YouTube usage emerged as non-significant. These nuanced findings offer a robust empirical basis for stakeholders to forge targeted strategies and policies, ensuring that the advent of the Starlink Project aligns with Thailand’s national security, legal, and regulatory harmony.
The trilateral defense and security pact between Australia, the United Kingdom, and the United States has strong impact to the security dynamics in the Indo-Pacific area. This agreement entails a strengthened alliance between Australia and enhanced military collaboration with the United States and the United Kingdom resulting in regional volatility. This paper aims to examine the AUKUS (Australia–United Kingdom–United States Partnership) agreement and the resulting ensuing instability in the Indo-Pacific region, specifically from Indonesia’s perspective. The focus of the research is on the interplay between Indonesia’s diplomacy capability and the military functions of the Indonesian Navy as security policy. This study employs a qualitative approach to delve into in-depth insights into the evolution of AUKUS in the Indo-Pacific region, which triggered a series of responses from many countries subsequent to the announcement of the establishment of the AUKUS Defense Pact. The AUKUS establishment simply reinforces the notion that geopolitical tensions are pulling the area apart. The influence of the AUKUS-China war can jeopardize regional stability since the US and China continuously demonstrate the supremacy of their armaments in order to dissuade one another. The AUKUS-China contest has had a highly adverse impact on Indonesia. This article argues that the Indonesian Navy’s diplomatic prowess is crucial because it has the potential to play a big influence in the Indo-Pacific region’s international political dynamics concerning the South China Sea. Furthermore, the Indonesian Navy must proactively prepare for potential armed conflicts in Indonesian territorial seas by developing a comprehensive maritime policy during times of peace, leveraging its geographical advantages.
The ability to take advantage of new digital solutions and technology will give companies a competitive edge, and operational optimization remains a major concern. A significant area of risk is cyber security because software-based technologies are integral to ship operations. Particular emphasis has been placed on the vulnerabilities of the Global Navigation Satellite System (GNSS), since it is an essential part of many maritime facilities and hence a target for hackers. Presently, research has shown that increased integration of new enabling technologies, like the Internet of Things (IoT) and big data, is driving the dramatic proliferation of cybercrimes. However, most of the attacks are related to ransomware attacks and/or with direct attack to the information technology (IT) and infrastructure. Nevertheless, there is a strong trend toward increased systems integration, which will produce substantial business value by making it easier to operate autonomous vessels, utilizing smart ports more, reducing the need for labour, and improving economic stability and service efficiency. Cybersecurity is becoming more and more important as a result of the quick digital transformation of the offshore and maritime sectors, which has also brought new dangers and laws. The marine sector has started to take cybersecurity seriously in light of the multiple documented instances of cyberattacks that have exposed business or personal data, caused large financial losses, and caused other problems. However, the body of existing research on emerging threats in maritime cyberspace is either inadequate or ignores important variables. Based on the most recent developments in the maritime sector, the article presents a classification of the most serious cyberthreats as well as the risks to cybersecurity in maritime operations and possible mitigation strategies from an educational research perspective.
Copyright © by EnPress Publisher. All rights reserved.