The low-carbon economy is the major objective of China’s economy, and its goal is to achieve sustainable economic development. The study enriches the literature on the relationship between digital Chinese yuan (E-CNY), low-carbon economy, AI trust concerns, and security intrusion. The rapid growth of Artificial Intelligence (AI) offered more ways to achieve a low-carbon economy. The digital Chinese yuan (E-CNY), based on the AI technique, has shown its nature and valid low-carbon characteristics in pilot cities of China, it will assume important responsibilities and become the key link. However, trust concerns about AI techniques result in a limitation of the scope and extent of E-CNY usage. The study conducts in-depth research from the perspective of AI trust concerns, explores the influence of E-CNY on the low-carbon economy, and discusses the moderating and mediating mechanisms of AI trust concerns in this process. The empirical data results showed that E-CNY positively affects China’s low-carbon economy, and AI trust concerns moderate the positive impact. When consumers with higher AI trust concerns use E-CNY, their feeling of security intrusion is also higher. It affects the growth of trading volume and scope of E-CNY usage. Still, it reduces the utility of China’s low-carbon economy. This study provides valuable management inspiration for China’s low-carbon economy.
This study aims to identify key strategies and tactics necessary to effectively implement national social security in a democratic Indonesia. Indonesia established the Law on the National Social Security System in 2004. However, the national social security programs did not commence until 2014. The national social security implementation has faced significant obstacles. These challenges include recurring delays, legal disputes, appeals, judicial reviews, and deviations from the original policy objectives, all threatening the long-term viability of the national social security programs. This article applies a qualitative approach by critically analyzing regulations, government reports, and publicly available data and observing open public meetings and hearings concerning implementing national social security programs. Our findings indicate that implementing national social security policies in a democratic Indonesia depends on effectively managing the dynamic processes involved in policy formulation and adoption. We propose a risk-based decision-making model to assist policymakers in mitigating policy-related risks and enhance the effectiveness of future policy agendas in social security.
The technological infrastructure is the basis for the successful implementation and operation of information systems in small and medium enterprises. The study aimed to demonstrate the impact of cybersecurity on entrepreneurship strategies in small and medium enterprises. Through technological infrastructure in Balqa Governorate. The study population consisted of small and medium enterprises in Balqa Governorate in Jordan. The study followed the descriptive analytical approach and relied on the questionnaire to collect data. The sample size was 360 individuals were randomly select. The Statistical Package for Social Sciences (SPSS) was use to analyze the data. The study reached a set of results, including that the management of small and medium enterprises is committed to continuous supervision and control of customer information. Dealing with reliable parties to ensure the confidentiality of information, following strict standards for disclosure and circulation of customer data and information based on legal texts. Maintaining the privacy of customers’ financial data, in addition to supporting the successes of individuals based on the personal efforts of employees, providing a suitable work environment for employees, sustaining excellence and achievement, and working to increase awareness among its employees of the importance of innovation and creativity in work. The study recommended that customer data confidentiality should be consider a top priority for small and medium enterprises. The data should be stored in more than one place at the same time, that project websites should follow a privacy policy, and that the customer’s identity should be verify before submitting his data and documents, by involving employees in small and medium enterprises in specialized courses and workshops to demonstrate the importance of data and information confidentiality.
Since the external environment on a global level is very unstable, recovering from various unexpected shocks becomes a challenging question for all countries. Thus, for each country it is necessary to understand its weaknesses and threats. Further, the preparation for any level of uncertainty in various fields must be imperative. Even for the most unpredictable shocks such as pandemic, cyberthreat, or even war. The aim of the article is to evaluate the state resilience of the Baltic States by creating the national resilience index. A state’s resilience is based on four pillars: economic, social, good governance, and defence. The methodology is based the SAW method, data has been collected from NATO and Eurostat databases. As the result of the study, resilience index has been estimated for each year from 2015 to 2022. Results revealed vulnerability and problematic areas of each country.
Distributed Energy Resources (DERs), such as solar photovoltaic (PV) systems, wind turbines, and energy storage systems, offer many benefits, including increased energy efficiency, sustainability, and grid reliability. However, their integration into the smart grid also introduces new vulnerabilities to cyber threats. The smart grid is becoming more digitalized, with advanced technologies like Internet of Things (IoT) devices, communication networks, and automation systems that enable the integration of DER systems. While this enhances grid efficiency and control, it creates more entry points for attackers and thus expands the attack surface for potential cyber threats. Protecting DERs from cyberattacks is crucial to maintaining the overall reliability, security, and privacy of the smart grid. The adopted cybersecurity strategies should not only address current threats but also anticipate future dangers. This requires ongoing risk assessments, staying updated on emerging threats, and being prepared to adapt cybersecurity measures accordingly. This paper highlights some critical points regarding the importance of cybersecurity for Distributed Energy Resources (DERs) and the evolving landscape of the smart grid. This research study shows that there is need for a proactive and adaptable cybersecurity approach that encompasses prevention, detection, response, and recovery to safeguard these critical energy systems against cyber threats, both today and in the future. This work serves as a valuable tool in enhancing the cybersecurity posture of utilities and grid-connected DER owners and operators. It allows them to make informed decisions, protect critical infrastructure, and ensure the reliability and security of grid-connected DER systems in an evolving energy landscape.
The proposed research work encompasses implications for infrastructure particularly the cybersecurity as an essential in soft infrastructure, and policy making particularly on secure access management of infrastructure governance. In this study, we introduce a novel parameter focusing on the timestamp duration of password entry, enhancing the algorithm titled EPSBalgorithmv01 with seven parameters. The proposed parameter incorporates an analysis of the historical time spent by users entering their passwords, employing ARIMA for processing. To assess the efficacy of the updated algorithm, we developed a simulator and employed a multi-experimental approach. The evaluation utilized a test dataset comprising 617 authentic records from 111 individuals within a selected company spanning from 2017 to 2022. Our findings reveal significant advancements in EPSBalgorithmv01 compared to its predecessor namely EPSBalgorithmv00. While EPSBalgorithmv00 struggled with a recognition rate of 28.00% and a precision of 71.171, EPSBalgorithmv01 exhibited a recognition rate of 17% with a precision of 82.882%. Despite a decrease in recognition rate, EPSBalgorithmv01 demonstrates a notable improvement of approximately 14% over EPSBalgorithmv00.
Copyright © by EnPress Publisher. All rights reserved.