{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T23:41:08Z","timestamp":1767310868679,"version":"3.48.0"},"publisher-location":"Cham","reference-count":41,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032108265","type":"print"},{"value":"9783032108272","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-10827-2_25","type":"book-chapter","created":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T23:38:25Z","timestamp":1767310705000},"page":"313-324","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Integrating Cybersecurity into Sustainability: Emerging Trends and the Role of Artificial Intelligence"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-2385-5852","authenticated-orcid":false,"given":"Julija","family":"Saveljeva","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4915-6906","authenticated-orcid":false,"given":"Liga","family":"Peiseniece","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7599-8720","authenticated-orcid":false,"given":"Tatjana","family":"Volkova","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2403-3814","authenticated-orcid":false,"given":"Inga","family":"Uvarova","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0004-4743-6415","authenticated-orcid":false,"given":"Jekaterina","family":"Novicka","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0002-3234-5559","authenticated-orcid":false,"given":"Gatis","family":"Polis","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5150-8969","authenticated-orcid":false,"given":"Silvija","family":"Kristapsone","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9346-946X","authenticated-orcid":false,"given":"Aivars","family":"Vembris","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,2]]},"reference":[{"key":"25_CR1","doi-asserted-by":"publisher","unstructured":"Dede, G., et al.: Cybersecurity as a contributor toward resilient Internet of Things (IoT) infrastructure and sustainable economic growth. Information. 15 (2024). https:\/\/doi.org\/10.3390\/info15120798","DOI":"10.3390\/info15120798"},{"key":"25_CR2","doi-asserted-by":"publisher","first-page":"526","DOI":"10.1109\/CSR61664.2024.10679426","volume-title":"2024 IEEE International Conference on Cyber Security and Resilience (CSR)","author":"G Sargsyan","year":"2024","unstructured":"Sargsyan, G.: Cybersecurity as a backbone for sustainability. In: 2024 IEEE International Conference on Cyber Security and Resilience (CSR), pp. 526\u2013530. Institute of Electrical and Electronics Engineers, London (2024). https:\/\/doi.org\/10.1109\/CSR61664.2024.10679426"},{"key":"25_CR3","unstructured":"Entin, J.: Sustainability and ESG for business resilience in the life sciences, https:\/\/grcoutlook.com\/sustainability-and-esg-for-business-resilience-in-the-life-sciences\/, last accessed 2025\/05\/05."},{"key":"25_CR4","doi-asserted-by":"crossref","unstructured":"Nwankwo, C., Kanyangale, M., Anoke, A., Uchechukwu Eze, S.: Effect of cyber security on business sustainability of listed microfinance banks in Nigeria. Artha J. Soc. Sci. 22 (2023)","DOI":"10.12724\/ajss.64.4"},{"key":"25_CR5","doi-asserted-by":"crossref","unstructured":"Odumesi, J.O., Sanusi, B.S.: Achieving sustainable development goals from a cybersecurity perspective. In: Proceedings of the cyber secure Nigeria conference \u2013 2023 (2023)","DOI":"10.22624\/AIMS\/CSEAN-SMART2023P3"},{"key":"25_CR6","unstructured":"European Commission: Ecodesign for Sustainable Products Regulation, https:\/\/commission.europa.eu\/energy-climate-change-environment\/standards-tools-and-labels\/products-labelling-rules-and-requirements\/ecodesign-sustainable-products-regulation_en, last accessed 2025\/05\/09."},{"key":"25_CR7","unstructured":"European Parliament and Council: Regulation (EU) 2024\/1781 of the European Parliament and of the Council of 13 June 2024 establishing a framework for the setting of ecodesign requirements for sustainable products, amending Directive (EU) 2020\/1828 and Regulation (EU) 2023\/1542 and repealing Directive 2009\/125\/EC, https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=CELEX%3A32024R1781&qid=1719580391746 (2024)"},{"key":"25_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/computers9030074","volume":"9","author":"S Sadik","year":"2020","unstructured":"Sadik, S., Ahmed, M., Sikos, L.F., Najmul Islam, A.K.M.: Toward a sustainable cybersecurity ecosystem. Computers. 9, 1\u201317 (2020). https:\/\/doi.org\/10.3390\/computers9030074","journal-title":"Computers"},{"key":"25_CR9","doi-asserted-by":"publisher","first-page":"1714","DOI":"10.1109\/TEM.2023.3339578","volume":"71","author":"I Arpaci","year":"2024","unstructured":"Arpaci, I.: A multianalytical SEM-ANN approach to investigate the social sustainability of AI Chatbots based on cybersecurity and protection motivation theory. IEEE Trans. Eng. Manag. 71, 1714\u20131725 (2024). https:\/\/doi.org\/10.1109\/TEM.2023.3339578","journal-title":"IEEE Trans. Eng. Manag."},{"key":"25_CR10","doi-asserted-by":"publisher","first-page":"344","DOI":"10.30574\/gscarr.2024.19.3.0236","volume":"19","author":"AB Ige","year":"2024","unstructured":"Ige, A.B., Kupa, E., Ilori, O.: Aligning sustainable development goals with cybersecurity strategies: ensuring a secure and sustainable future. GSC Adv. Res. Rev. 19, 344\u2013360 (2024). https:\/\/doi.org\/10.30574\/gscarr.2024.19.3.0236","journal-title":"GSC Adv. Res. Rev."},{"key":"25_CR11","doi-asserted-by":"publisher","first-page":"1145","DOI":"10.51594\/csitrj.v5i5.1140","volume":"5","author":"SC Obasi","year":"2024","unstructured":"Obasi, S.C., Solomon, N.O., Adenekan, O.A., Simpa, P.: Cybersecurity\u2019s role in environmental protection and sustainable development: bridging technology and sustainability goals. Comput. Sci. IT Res. J. 5, 1145\u20131177 (2024). https:\/\/doi.org\/10.51594\/csitrj.v5i5.1140","journal-title":"Comput. Sci. IT Res. J."},{"key":"25_CR12","doi-asserted-by":"publisher","unstructured":"Achuthan, K., Sankaran, S., Roy, S., Raman, R.: Integrating sustainability into cybersecurity: insights from machine learning based topic modeling. Discov. Sustain. 6 (2025). https:\/\/doi.org\/10.1007\/s43621-024-00754-w","DOI":"10.1007\/s43621-024-00754-w"},{"key":"25_CR13","doi-asserted-by":"publisher","DOI":"10.1186\/s13643-021-01626-4","volume":"10","author":"MJ Page","year":"2021","unstructured":"Page, M.J., et al.: The PRISMA 2020 statement: an updated guideline for reporting systematic reviews. Syst. Rev. 10, 89 (2021). https:\/\/doi.org\/10.1186\/s13643-021-01626-4","journal-title":"Syst. Rev."},{"key":"25_CR14","unstructured":"Elsevier: Scopus, https:\/\/www.scopus.com, last accessed 2024\/11\/18."},{"key":"25_CR15","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1109\/WorldS4.2018.8611564","volume-title":"Proc. World Conf. Smart Trends in Syst., Secur. Sustain., WorldS4","author":"L Sharma","year":"2018","unstructured":"Sharma, L., Singh, V.: India towards digital revolution (security and sustainability). In: Yang, X.-S., Dey, N., Joshi, A. (eds.) Proc. World Conf. Smart Trends in Syst., Secur. Sustain., WorldS4, pp. 163\u2013171. Institute of Electrical and Electronics Engineers (2018). https:\/\/doi.org\/10.1109\/WorldS4.2018.8611564"},{"key":"25_CR16","first-page":"1995","volume":"2016","author":"SJ Shackelford","year":"2016","unstructured":"Shackelford, S.J., Fort, T.L., Charoen, D.: Sustainable cybersecurity: applying lessons from the green movement to managing cyber attacks. Univ. Ill. Law Rev. 2016, 1995\u20132032 (2016)","journal-title":"Univ. Ill. Law Rev."},{"key":"25_CR17","doi-asserted-by":"publisher","unstructured":"Rezaee, Z., Zhou, G., Bu, L.L.: Corporate social irresponsibility and the occurrence of data breaches: a stakeholder management perspective. Int. J. Account. Inf. Syst. 53 (2024). https:\/\/doi.org\/10.1016\/j.accinf.2024.100677","DOI":"10.1016\/j.accinf.2024.100677"},{"key":"25_CR18","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1016\/j.future.2021.05.033","volume":"124","author":"Z Rashid","year":"2021","unstructured":"Rashid, Z., Noor, U., Altmann, J.: Economic model for evaluating the value creation through information sharing within the cybersecurity information sharing ecosystem. Futur. Gener. Comput. Syst. 124, 436\u2013466 (2021). https:\/\/doi.org\/10.1016\/j.future.2021.05.033","journal-title":"Futur. Gener. Comput. Syst."},{"key":"25_CR19","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1016\/j.procs.2022.01.230","volume-title":"Procedia Computer Science","author":"C Medoh","year":"2022","unstructured":"Medoh, C., Telukdarie, A.: The future of cybersecurity: a system dynamics approach. In: Longo, F., Affenzeller, M., Padovano, A. (eds.) Procedia Computer Science, pp. 318\u2013326. Elsevier (2022). https:\/\/doi.org\/10.1016\/j.procs.2022.01.230"},{"key":"25_CR20","doi-asserted-by":"publisher","unstructured":"Boggini, C.: Reporting cybersecurity to stakeholders: a review of CSRD and the EU cyber legal framework. Comput. Law Secur. Rev. 53 (2024). https:\/\/doi.org\/10.1016\/j.clsr.2024.105987","DOI":"10.1016\/j.clsr.2024.105987"},{"key":"25_CR21","doi-asserted-by":"publisher","first-page":"783","DOI":"10.1108\/JAAR-02-2023-0047","volume":"25","author":"G Blue","year":"2024","unstructured":"Blue, G., Faraji, O., Khotanlou, M., Rezaee, Z.: A corporate risk assessment and reporting model in emerging economies. J. Appl. Account. Res. 25, 783\u2013811 (2024). https:\/\/doi.org\/10.1108\/JAAR-02-2023-0047","journal-title":"J. Appl. Account. Res."},{"key":"25_CR22","doi-asserted-by":"publisher","unstructured":"Baatwah, S.R., Asiri, M., Bajaher, M.S., Alyafai, A., Baajajah, S.: Thriving post-cyberattacks: the power of control, disclosure, and IT maturity. Electron. Commer. Res. (2025). https:\/\/doi.org\/10.1007\/s10660-025-09958-2","DOI":"10.1007\/s10660-025-09958-2"},{"key":"25_CR23","doi-asserted-by":"publisher","unstructured":"Abbas, H.S.M., Qaisar, Z.H., Ali, G., Alturise, F., Alkhalifah, T.: Impact of cybersecurity measures on improving institutional governance and digitalization for sustainable healthcare. PLoS One. 17 (2022). https:\/\/doi.org\/10.1371\/journal.pone.0274550","DOI":"10.1371\/journal.pone.0274550"},{"key":"25_CR24","doi-asserted-by":"publisher","first-page":"P11","DOI":"10.2308\/CIIA-2022-018","volume":"17","author":"ML Frank","year":"2023","unstructured":"Frank, M.L., Grenier, J.H., Pyzoha, J.S., Zielinski, N.B.: Implications of enhanced cybersecurity risk management reporting and independent assurance. Curr. Issues Audit. 17, P11\u2013P18 (2023). https:\/\/doi.org\/10.2308\/CIIA-2022-018","journal-title":"Curr. Issues Audit."},{"key":"25_CR25","doi-asserted-by":"publisher","unstructured":"Garcia-Perez, A., Cegarra-Navarro, J.G., Sallos, M.P., Martinez-Caro, E., Chinnaswamy, A.: Resilience in healthcare systems: cyber security and digital transformation. Technovation. 121 (2023). https:\/\/doi.org\/10.1016\/j.technovation.2022.102583","DOI":"10.1016\/j.technovation.2022.102583"},{"key":"25_CR26","doi-asserted-by":"publisher","unstructured":"Hossain, N.U.I., Rahman, S., Liza, S.A.: Cyber-susiliency index: a comprehensive resiliency-sustainability-cybersecurity index for healthcare supply chain networks. Decis. Anal. J. 9 (2023). https:\/\/doi.org\/10.1016\/j.dajour.2023.100319","DOI":"10.1016\/j.dajour.2023.100319"},{"key":"25_CR27","doi-asserted-by":"publisher","first-page":"754","DOI":"10.1108\/OIR-02-2021-0069","volume":"46","author":"HSM Abbas","year":"2022","unstructured":"Abbas, H.S.M., Qaisar, Z.H., Xu, X., Sun, C.: Nexus of E-government, cybersecurity and corruption on public service (PSS) sustainability in Asian economies using fixed-effect and random forest algorithm. Online Info. Rev. 46, 754\u2013770 (2022). https:\/\/doi.org\/10.1108\/OIR-02-2021-0069","journal-title":"Online Info. Rev."},{"key":"25_CR28","first-page":"829","volume":"9","author":"B Bisoyi","year":"2020","unstructured":"Bisoyi, B., Nayak, B., Das, B.: Secured and sustainable e-governance: hedging the risk by cybersecurity. Int. J. Sci. Technol. Res. 9, 829\u2013832 (2020)","journal-title":"Int. J. Sci. Technol. Res."},{"key":"25_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.18488\/journal.11.2020.91.1.10","volume":"9","author":"DN Burrell","year":"2020","unstructured":"Burrell, D.N., et al.: Supply chain and logistics management and an open door policy concerning cyber security introduction. Int. J. Manag. Sustain. 9, 1\u201310 (2020). https:\/\/doi.org\/10.18488\/journal.11.2020.91.1.10","journal-title":"Int. J. Manag. Sustain."},{"key":"25_CR30","doi-asserted-by":"publisher","first-page":"1885","DOI":"10.1108\/JEIM-12-2023-0635","volume":"37","author":"IJ Orji","year":"2024","unstructured":"Orji, I.J., U-Dominic, C.M.: Modelling the conundrums to cyber-risks management in logistics firms for supply chain social sustainability. J. Enterp. Inf. Manage. 37, 1885\u20131925 (2024). https:\/\/doi.org\/10.1108\/JEIM-12-2023-0635","journal-title":"J. Enterp. Inf. Manage."},{"key":"25_CR31","doi-asserted-by":"publisher","first-page":"766","DOI":"10.1080\/00207543.2021.1914356","volume":"60","author":"T Sawik","year":"2022","unstructured":"Sawik, T.: Balancing cybersecurity in a supply chain under direct and indirect cyber risks. Int. J. Prod. Res. 60, 766\u2013782 (2022). https:\/\/doi.org\/10.1080\/00207543.2021.1914356","journal-title":"Int. J. Prod. Res."},{"key":"25_CR32","doi-asserted-by":"publisher","first-page":"8413","DOI":"10.1002\/bse.3925","volume":"33","author":"A Singh","year":"2024","unstructured":"Singh, A., Dwivedi, A., Agrawal, D., Bag, S., Chauhan, A.: Can sustainable and digital objectives synchronize? A study of ESG activities for digital supply chains using multi-methods. Bus. Strateg. Environ. 33, 8413\u20138435 (2024). https:\/\/doi.org\/10.1002\/bse.3925","journal-title":"Bus. Strateg. Environ."},{"key":"25_CR33","doi-asserted-by":"publisher","unstructured":"Chun, S.-H.: E-commerce liability and security breaches in mobile payment for e-business sustainability. Sustainability. 11 (2019). https:\/\/doi.org\/10.3390\/su11030715","DOI":"10.3390\/su11030715"},{"key":"25_CR34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/su122410590","volume":"12","author":"A Pabian","year":"2020","unstructured":"Pabian, A., Pabian, B., Reformat, B.: E-customer security as a social value in the sphere of sustainability. Sustainability. 12, 1\u201314 (2020). https:\/\/doi.org\/10.3390\/su122410590","journal-title":"Sustainability"},{"key":"25_CR35","doi-asserted-by":"publisher","first-page":"1287","DOI":"10.1080\/15568318.2023.2171321","volume":"17","author":"K AL-Dosari","year":"2023","unstructured":"AL-Dosari, K., Fetais, N., Kucukvar, M.: A shift to green cybersecurity sustainability development: using triple bottom-line sustainability assessment in Qatar transportation sector. Int. J. Sustain. Transp. 17, 1287\u20131301 (2023). https:\/\/doi.org\/10.1080\/15568318.2023.2171321","journal-title":"Int. J. Sustain. Transp."},{"key":"25_CR36","doi-asserted-by":"publisher","unstructured":"Alqudhaibi, A., Krishna, A., Jagtap, S., Williams, N., Afy-Shararah, M., Salonitis, K.: Cybersecurity 4.0: safeguarding trust and production in the digital food industry era. Discov. Food. 4 (2024). https:\/\/doi.org\/10.1007\/s44187-023-00071-7","DOI":"10.1007\/s44187-023-00071-7"},{"key":"25_CR37","doi-asserted-by":"publisher","first-page":"222","DOI":"10.34190\/ictr.7.1.2159","volume-title":"Proc. Int. Conf. Tour. Res.","author":"T Gundu","year":"2024","unstructured":"Gundu, T., Mmango, N.: A Cybersecurity collaborative model: best practices sharing among South African tourism and hospitality businesses. In: Balkaran, R., Hattingh, C. (eds.) Proc. Int. Conf. Tour. Res., pp. 222\u2013231. Academic Conferences and Publishing International Limited (2024). https:\/\/doi.org\/10.34190\/ictr.7.1.2159"},{"key":"25_CR38","doi-asserted-by":"publisher","unstructured":"Leroy, I., Zolotaryova, I., Semenov, S.: Impact of critical infrastructure cyber security on the sustainable development of smart cities: insights from internal specialists and external information security auditors. Sustainability. 17 (2025). https:\/\/doi.org\/10.3390\/su17031188","DOI":"10.3390\/su17031188"},{"key":"25_CR39","volume":"27","author":"D Markopoulou","year":"2021","unstructured":"Markopoulou, D., Papakonstantinou, V.: Digitalisation of water services and the water sector cyber threat landscape: is the EU regulatory framework adequate? J. Water Law. 27, 117+119 (2021)","journal-title":"J. Water Law."},{"key":"25_CR40","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/14777622.2023.2195101","volume":"21","author":"A-S Martin","year":"2023","unstructured":"Martin, A.-S.: Outer space, the final frontier of cyberspace: regulating cybersecurity issues in two interwoven domains. Astropolitics. 21, 1\u201322 (2023). https:\/\/doi.org\/10.1080\/14777622.2023.2195101","journal-title":"Astropolitics"},{"key":"25_CR41","doi-asserted-by":"publisher","first-page":"112","DOI":"10.54648\/eelr2020035","volume":"29","author":"K Noussia","year":"2020","unstructured":"Noussia, K.: On modern threats to environmental sustainability in the Arctic: the cybersecurity factor and the provisions of insurance against environmental and cyber risks in oil and gas installations. Eur. Energy Environ. Law Rev. 29, 112\u2013126 (2020). https:\/\/doi.org\/10.54648\/eelr2020035","journal-title":"Eur. Energy Environ. Law Rev."}],"container-title":["Lecture Notes in Networks and Systems","Novel and Intelligent Digital Systems: Proceedings of the 5th International Conference (NiDS 2025)"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-10827-2_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T23:38:27Z","timestamp":1767310707000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-10827-2_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9783032108265","9783032108272"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-10827-2_25","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"value":"2367-3370","type":"print"},{"value":"2367-3389","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"2 January 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NiDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Novel & Intelligent Digital Systems Conferences","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Athens","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 September 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 September 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"nids2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/nids2025.uniwa.gr\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}