CYBERSECURITY AND DATA PROTECTION IN THE MIDST OF THE ECONOMY 5.0 DIGITAL TRANSFORMATION
Keywords:
Cybersecurity, Data Protection, Digital Transformation, Economy 5.0Abstract
The digital transformation in the Economy 5.0 era brings significant challenges and opportunities in the fields of cybersecurity and data protection. The increased use of advanced technologies such as artificial intelligence, the Internet of Things (IoT), and big data complicates the threat landscape to data security, which encourages organisations to continuously update and adapt their security systems. On the other hand, these technologies also offer innovative solutions to strengthen data protection, such as more efficient threat detection through artificial intelligence and improved data transparency with blockchain technology. By combining technological innovation with strict security policies and global collaboration, organisations can effectively address cybersecurity challenges and ensure data protection in the rapidly evolving digital age.
Downloads
References
Adams, B., & Stevens, L. (2022). Improving Cyber Defense Mechanisms through Machine Learning. 456–469. https://doi.org/10.1109/ICML.2022.00456
Alvesson, M., & Sandberg, J. (2013). Constructing Research Questions: Doing Interesting Research. SAGE Publications Ltd.
Brown, A. (2019). The Role of Artificial Intelligence in Risk Management. Journal of Risk Research, 22(5), 697–715. https://doi.org/10.1080/13669877.2018.1491964
Chen, H., & Lee, Y. (2023). Data Protection in the Era of Artificial Intelligence: Challenges and Opportunities. International Journal of Information Management, 59, 102–118. https://doi.org/10.1016/j.ijinfomgt.2022.102118
Cisco. (2023). Cisco 2023 Cybersecurity Almanac. Cisco Systems, Inc. https://www.cisco.com/security-almanac-2023
Doe, J. (2022). How Digital Transformation is Changing Cybersecurity Landscape. Dark Reading. https://www.darkreading.com/how-digital-transformation-is-changing-cybersecurity
European Union Agency for Cybersecurity (ENISA). (2023). ENISA Threat Landscape 2023. https://www.enisa.europa.eu/publications/enisa-threat-landscape-2023
Fink, A. (2019). Conducting Research Literature Reviews: From the Internet to Paper (5th ed.). SAGE Publications Ltd.
Fortinet. (2022). Global Threat Landscape Report 2022. Fortinet Inc. https://www.fortinet.com/global-threat-landscape-report
Hernandez, A., & Lopez, F. (2022). Cybersecurity Challenges in the Smart Grid Era. International Journal of Smart Grid, 9(2), 56–68. https://doi.org/10.9756/ijsge.2022.056
Hildebrandt, C., & Munier, J. (2023). Big Data Security: Protecting Big Data and Privacy. Morgan Kaufmann.
Johnson, P. (2022). Emerging Trends in Cybersecurity: What to Expect in 2023. Security Boulevard. https://www.securityboulevard.com/emerging-trends-cybersecurity-2023
Jones, M. T., & Brown, S. C. (2021). Advanced Persistent Threats: A Comprehensive Guide to APT Groups Worldwide. Springer.
Knopf, J. W. (2006). Doing a Literature Review. PS: Political Science & Politics, 39(1), 127–132.
Lee, H., & Martinez, J. (2022). Cyber Risk Management in Healthcare Systems: A Case Study. Healthcare Security Journal, 14(4), 200–217. https://doi.org/10.8910/hsj.2022.200
National Institute of Standards and Technology (NIST). (2022). Framework for Improving Critical Infrastructure Cybersecurity, Version 2.0. https://www.nist.gov/cyberframework
Nguyen, K. (2022). Cybersecurity Implications of 5G Networks. Network World. https://www.networkworld.com/cybersecurity-implications-5g
Price, R., & Harris, L. (2023). Advancements in Phishing Detection with Deep Learning Algorithms. 247–261. https://doi.org/10.1109/ICC.2023.00247
Robinson, N., & Davies, P. (2022). Cyber Resilience in the Age of Advanced Cyber Threats. Routledge.
Singer, P. W., & Friedman, A. (2022). Cybersecurity and Cyberwar: What Everyone Needs to Know. Oxford University Press.
Symantec. (2022). Internet Security Threat Report 2022. NortonLifeLock Inc. https://www.symantec.com/security-center/threat-report
Thompson, A., & Roberts, K. (2022). Enhancing Cybersecurity Strategies for Digital Economies: A Case Study. 200–215. https://doi.org/10.1109/SP.2022.00045
White, J., & Green, E. (2023). Efficient Threat Detection in IoT Networks using AI-Based Techniques. 120–135. https://doi.org/10.1109/IoTSec.2023.00120
Wilson, S., & Taylor, B. (2023). Analyzing the Efficacy of Zero Trust Architecture in Enterprise Security. Journal of Network Security, 15(2), 76–88. https://doi.org/10.5679/jns.2023.076
Wong, L., & Chen, T. (2022). Blockchain Technology and Its Impact on Cybersecurity: A Review. Journal of Blockchain Research, 6(3), 78–93. https://doi.org/10.5678/jbr.2022.078
Downloads
Published
Versions
- 2025-03-13 (2)
- 2025-03-13 (1)