2022
DOI: 10.3390/su142214915
|View full text |Cite
|
Sign up to set email alerts
|

Managing Security Threats through Touchless Security Technologies: An Overview of the Integration of Facial Recognition Technology in the UAE Oil and Gas Industry

Abstract: Throughout the past few years, the oil and gas industry in the United Arab Emirates has grown significantly, and is currently one of the top ten oil producers in the world. As a result, it is at risk of physical security threats, including theft, unauthorized access, vandalism, espionage, and other incidents which could disrupt its operation. Consequently, significant investments in the latest security technologies are necessary to protect this critical infrastructure and maintain its international standing. T… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 84 publications
0
1
0
Order By: Relevance
“…These infrastructures heavily rely on computerized systems and interconnected networks, making them vulnerable to malicious actors seeking to disrupt operations, steal sensitive data, or cause physical damage [1,2]. In the oil and gas industry, for example, cyber attacks can disrupt the production and distribution of energy resources, leading to significant economic and environmental consequences [3,4]. Similarly, transportation networks are susceptible to cyber attacks that can compromise the safety and efficiency of public transportation systems or disrupt the flow of goods and services [5].…”
Section: Introductionmentioning
confidence: 99%
“…These infrastructures heavily rely on computerized systems and interconnected networks, making them vulnerable to malicious actors seeking to disrupt operations, steal sensitive data, or cause physical damage [1,2]. In the oil and gas industry, for example, cyber attacks can disrupt the production and distribution of energy resources, leading to significant economic and environmental consequences [3,4]. Similarly, transportation networks are susceptible to cyber attacks that can compromise the safety and efficiency of public transportation systems or disrupt the flow of goods and services [5].…”
Section: Introductionmentioning
confidence: 99%