2022
DOI: 10.18034/ei.v10i2.689
|View full text |Cite
|
Sign up to set email alerts
|

Strategic Approaches to Safeguarding the Digital Future: Insights into Next-Generation Cybersecurity

Nur Mohammad Ali Chisty,
Parikshith Reddy Baddam,
Ruhul Amin

Abstract: This research investigates various strategic approaches to protecting the digital future and offers insights into the practices of the next generation of cybersecurity. The study's primary objectives are to identify key challenges and trends in the current cybersecurity landscape, evaluate the effectiveness of traditional cybersecurity approaches, investigate emerging technologies for enhancing cybersecurity resilience, examine human factors in cybersecurity resilience, and develop recommendations for future c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 22 publications
(21 reference statements)
0
3
0
Order By: Relevance
“…It is recommended that policymakers, industry professionals, and researchers collaborate to develop and implement secure smart grid solutions, ultimately contributing to the advancement of sustainable and reliable energy infrastructures. Chisty, Baddam, and Amin (2022) investigate strategic approaches to protecting the digital future, offering insights into next-generation cybersecurity practices. The study underscores the importance of incorporating new technologies, addressing human aspects, encouraging collaboration, and emphasizing risk management , Ikegwu, et.…”
Section: Strategic Recommendations For Enhancing Cybersecurity In Ren...mentioning
confidence: 99%
“…It is recommended that policymakers, industry professionals, and researchers collaborate to develop and implement secure smart grid solutions, ultimately contributing to the advancement of sustainable and reliable energy infrastructures. Chisty, Baddam, and Amin (2022) investigate strategic approaches to protecting the digital future, offering insights into next-generation cybersecurity practices. The study underscores the importance of incorporating new technologies, addressing human aspects, encouraging collaboration, and emphasizing risk management , Ikegwu, et.…”
Section: Strategic Recommendations For Enhancing Cybersecurity In Ren...mentioning
confidence: 99%
“…In addition to the TCT and CTDP methods, other dynamic programming approaches, such as the Resource-Constrained Project Scheduling Problem (RCPSP) with time and money limitations, can incorporate time and financial concerns into decisions regarding resource allocation. The formulation of mathematical models that reflect time and budget restrictions, as well as the optimization of resource allocations, are the approaches implemented to maximize project efficiency while simultaneously satisfying project objectives (Chisty et al, 2022). To successfully incorporate time and financial constraints into decisions regarding resource allocation, it is necessary to carefully consider the project's priorities, the stakeholders' requirements, and the organization's goals.…”
Section: Integrating Time and Budget Constraintsmentioning
confidence: 99%
“…The concept of customer experience encompasses every consumer interaction with a brand, from initial awareness to post-purchase support. In today's hyper-connected world, consumers expect seamless and personalized experiences across all touchpoints, whether online or offline (Chisty et al, 2022). As a result, companies are under increasing Volume 11, No 2/2022 | GDEB pressure to deliver exceptional customer experiences that differentiate their brand and foster loyalty.…”
Section: Introductionmentioning
confidence: 99%