{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T19:40:15Z","timestamp":1757619615409,"version":"3.44.0"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031952982"},{"type":"electronic","value":"9783031952999"}],"license":[{"start":{"date-parts":[[2025,7,27]],"date-time":"2025-07-27T00:00:00Z","timestamp":1753574400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,7,27]],"date-time":"2025-07-27T00:00:00Z","timestamp":1753574400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-031-95299-9_23","type":"book-chapter","created":{"date-parts":[[2025,7,26]],"date-time":"2025-07-26T06:43:50Z","timestamp":1753512230000},"page":"269-283","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Examining the Critical Role of Cybersecurity in the Digital Transformation Journey of Financial Institutions"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0536-1214","authenticated-orcid":false,"given":"Olim","family":"Astanakulov","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9924-777X","authenticated-orcid":false,"given":"Muhammad Eid","family":"Balbaa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,27]]},"reference":[{"key":"23_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-30258-9_40","volume-title":"Internet of Things, Smart Spaces, and Next Generation Networks and Systems. NEW2AN 2022","author":"O Astanakulov","year":"2023","unstructured":"Astanakulov, O., Balbaa, M.E.: The use of the internet of things to ensure the smooth operation of network functions in Fintech. In: Koucheryavy, Y., Aziz, A. (eds.) Internet of Things, Smart Spaces, and Next Generation Networks and Systems. NEW2AN 2022 Lecture Notes in Computer Science, vol. 13772. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-30258-9_40"},{"key":"23_CR2","doi-asserted-by":"publisher","first-page":"145","DOI":"10.54216\/FPA.130213","volume":"13","author":"MO Eid","year":"2023","unstructured":"Eid, M.O., A.: Fusion-based econometric analysis: assessing investment project efficacy and business decision making. Fus. Pract. Appl. 13, 145\u2013155 (2023). https:\/\/doi.org\/10.54216\/FPA.130213","journal-title":"Fus. Pract. Appl."},{"key":"23_CR3","doi-asserted-by":"publisher","first-page":"59","DOI":"10.54216\/FPA.150105","volume":"15","author":"M Eid","year":"2024","unstructured":"Eid, M., Olim, A.: Utilizing big data analysis for the fusion examination of labor market evolution within the gig economy. Fus. Pract. Appl. 15, 59\u201365 (2024). https:\/\/doi.org\/10.54216\/FPA.150105","journal-title":"Fus. Pract. Appl."},{"issue":"4","key":"23_CR4","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1142\/S2424862221400017","volume":"6","author":"G Muncinelli","year":"2021","unstructured":"Muncinelli, G., De Lima, E.P., Cestari, J.M.A.P., Deschamps, F., Da Costa, S.E.G.: Developing a conceptual model for process capability in the Brazilian data protection regulation context. J. Ind. Integr. Manag. 6(4), 407\u2013427 (2021). https:\/\/doi.org\/10.1142\/S2424862221400017","journal-title":"J. Ind. Integr. Manag."},{"key":"23_CR5","doi-asserted-by":"publisher","first-page":"175","DOI":"10.54216\/IJNS.230315","volume":"23","author":"A Olim","year":"2024","unstructured":"Olim, A., Eid, M., Ibrohimjon, F., Batirova, N.: Investigating the impact of artificial intelligence on digital marketing tactics strategies using neutrosophic set. Int. J. Neutrosop. Sci. 23, 175\u2013183 (2024). https:\/\/doi.org\/10.54216\/IJNS.230315","journal-title":"Int. J. Neutrosop. Sci."},{"issue":"6","key":"23_CR6","doi-asserted-by":"publisher","first-page":"763","DOI":"10.1016\/j.bushor.2021.07.012","volume":"64","author":"PN Petratos","year":"2021","unstructured":"Petratos, P.N.: Misinformation, disinformation, and fake news: cyber risks to business. Bus. Horiz. 64(6), 763\u2013774 (2021). https:\/\/doi.org\/10.1016\/j.bushor.2021.07.012","journal-title":"Bus. Horiz."},{"issue":"6","key":"23_CR7","doi-asserted-by":"publisher","first-page":"2055","DOI":"10.1109\/TSC.2019.2907247","volume":"14","author":"DB Rawat","year":"2021","unstructured":"Rawat, D.B., Doku, R., Garuba, M.: Cybersecurity in big data era: from securing big data to data-driven security. IEEE Trans. Serv. Comput. 14(6), 2055\u20132072 (2021). https:\/\/doi.org\/10.1109\/TSC.2019.2907247","journal-title":"IEEE Trans. Serv. Comput."},{"key":"23_CR8","doi-asserted-by":"publisher","first-page":"103006","DOI":"10.1016\/j.jisa.2021.103006","volume":"64","author":"AM Reina Quintero","year":"2022","unstructured":"Reina Quintero, A.M., P\u00e9rez, S.M., Varela-Vaca, \u00c1.J., L\u00f3pez, M.T.G., Cabot, J.: A domain-specific language for the specification of UCON policies. J. Inf. Secur. Appl. 64, 103006 (2022). https:\/\/doi.org\/10.1016\/j.jisa.2021.103006","journal-title":"J. Inf. Secur. Appl."},{"key":"23_CR9","doi-asserted-by":"publisher","first-page":"101616","DOI":"10.1016\/j.ribaf.2022.101616","volume":"60","author":"ARD Rodrigues","year":"2022","unstructured":"Rodrigues, A.R.D., Ferreira, F.A.F., Teixeira, F.J.C.S.N., Zopounidis, C.: Artificial intelligence, digital transformation and cybersecurity in the banking sector: a multi-stakeholder cognition-driven framework. Res. Int. Bus. Financ. 60, 101616 (2022). https:\/\/doi.org\/10.1016\/j.ribaf.2022.101616","journal-title":"Res. Int. Bus. Financ."},{"issue":"11","key":"23_CR10","doi-asserted-by":"publisher","first-page":"1742","DOI":"10.3390\/electronics11111742","volume":"11","author":"R Rudenko","year":"2022","unstructured":"Rudenko, R., Pires, I.M., Oliveira, P., Barroso, J., Reis, A.: A brief review on internet of things, industry 4.0 and cybersecurity. Electronics (Switzerland). 11(11), 1742 (2022). https:\/\/doi.org\/10.3390\/electronics11111742","journal-title":"Electronics (Switzerland)"},{"key":"23_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-60994-7_31","volume-title":"Internet of Things, Smart Spaces, and Next Generation Networks and Systems. NEW2AN ruSMART 2023 2023","author":"AO Tashtemirovich","year":"2024","unstructured":"Tashtemirovich, A.O., Balbaa, M.E.: The role of Blockchain in supply chain transparency for E-commerce. In: Koucheryavy, Y., Aziz, A. (eds.) Internet of Things, Smart Spaces, and Next Generation Networks and Systems. NEW2AN ruSMART 2023 2023 Lecture Notes in Computer Science, vol. 14542. Springer, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-60994-7_31"},{"issue":"2","key":"23_CR12","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/j.dcan.2019.01.005","volume":"6","author":"PJ Taylor","year":"2020","unstructured":"Taylor, P.J., Dargahi, T., Dehghantanha, A., Parizi, R.M., Choo, K.K.R.: A systematic literature review of blockchain cyber security. Digit Commun Netw. 6(2), 147\u2013156 (2020)","journal-title":"Digit Commun Netw"},{"key":"23_CR13","doi-asserted-by":"publisher","first-page":"101587","DOI":"10.1016\/j.irfa.2020.101587","volume":"72","author":"MHMH Uddin","year":"2020","unstructured":"Uddin, M.H.M.H., Mollah, S., Ali, M.H.M.H.: Does cyber tech spending matter for bank stability? Int. Rev. Financ. Anal. 72, 101587 (2020). https:\/\/doi.org\/10.1016\/j.irfa.2020.101587","journal-title":"Int. Rev. Financ. Anal."},{"issue":"4","key":"23_CR14","first-page":"761","volume":"25","author":"OO Vergara Villegas","year":"2021","unstructured":"Vergara Villegas, O.O., Nandayapa, M., Sossa Azuela, J.H., Cossio Franco, E.G., Rubin Linares, G.T.: Artificial intelligence for industry 4.0 in Iberoamerica. Computaci\u00f3n y Sistemas. 25(4), 761\u2013773 (2021)","journal-title":"Computaci\u00f3n y Sistemas"},{"issue":"3","key":"23_CR15","doi-asserted-by":"publisher","first-page":"3","DOI":"10.15407\/scine17.03.003","volume":"17","author":"AM Yerina","year":"2021","unstructured":"Yerina, A.M., Honchar, I.A., Zaiets, S.V.: Statistical indicators of cybersecurity development in the context of digital transformation of economy and society. Sci. Innovat. 17(3), 3\u201313 (2021). https:\/\/doi.org\/10.15407\/scine17.03.003","journal-title":"Sci. Innovat."},{"key":"23_CR16","doi-asserted-by":"publisher","unstructured":"Yuan, Q., Pi, Y., Kou, L., Zhang, F., Ye, B.: Quantitative method for security situation of the power information network based on the evolutionary neural network. Front. Energy Res. 10 (2022). https:\/\/doi.org\/10.3389\/fenrg.2022.885351","DOI":"10.3389\/fenrg.2022.885351"}],"container-title":["Lecture Notes in Computer Science","Internet of Things, Smart Spaces, and Next Generation Networks and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-95299-9_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T01:31:39Z","timestamp":1757295099000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-95299-9_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,27]]},"ISBN":["9783031952982","9783031952999"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-95299-9_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025,7,27]]},"assertion":[{"value":"27 July 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ruSMART","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Conference on Internet of Things and Smart Spaces","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Marrakesh","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Morocco","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"rusmart2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/new2an.info\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}