
5g, Cybersecurity and Privacy in Developing Countries
- Length: 228 pages
- Edition: 1
- Language: English
- Publisher: River Publishers
- Publication Date: 2023-02-10
- ISBN-10: 8770226474
- ISBN-13: 9788770226479
- Sales Rank: #0 (See Top 100 Books)
5G, the emerging technology in mobile communication, is expected to deliver an important and decisive impact on several of the UN’s Sustainable Development Goals where universal accessibility to ICTs remains a serious concern. However, cyber security has emerged as a serious challenge, not least because of the increased accessibility and broader usage with associated vulnerability. Developing countries have additional challenges associated with both the expected faster build-up of accessibility and lack of qualified competencies within cyber security. Discussion of these challenges is the overall theme and motivation for this book.
Technical topics discussed in the book include:
- 5G in rural networks
- Critical infrastructures
- Open RAN
- Protection of privacy
- Cybersecurity and machine learning
- Cybersecurity and disaster monitoring
Cover Half Title Series Page Title Page Copyright Page Table of Contents Foreword Preface List of Contributors List of Figures List of Tables List of Abbreviations Introduction Wireless Networks and Privacy in Developing Countries Background of the Book 5G, Cybersecurity, and Privacy in Developing Countries About the Book Part 1 Part 2 Part 3 Part 4 The Target Audience of the Book References Chapter 1: Expansion–Security Tradeoffs in the Pathway to Rural 5G Networks 1.1: Introduction 1.2: Rural Networks and the Expansion Paradox 1.3: International Benchmarks: Cybersecurity Indexes and Frameworks 1.4: Technical Foundations 1.5: Agribusiness and Smart Farming 1.6: Rural Healthcare 5G 1.7: A Vision of Expansion-Security Tradeoffs 1.8: User Privacy and Other Overlooked Issues 1.9: Conclusion References Chapter 2: Cybersecurity Threats to 5G’s Critical Infrastructure 2.1: Introduction 2.2: Related Studies 2.2.1: Cybersecurity issues in 5G 2.2.2: Challenges and technical aspects 2.3: Security of 5G in LDCs 2.4: 5G Security Strategies 2.5: Conclusion References Chapter 3: Critical Infrastructure Security: Issues, Challenges and 5G Solutions from an Indian Perspective 3.1: Introduction 3.2: What Is Critical Infrastructure (CI)? 3.3: Security Issues and Challenges in CI 3.3.1: Security issues in India 3.3.2: Security challenges in India 3.4: Analysis/Review of Techniques Used for Security of CI 3.4.1: CI security approaches 3.4.2: Common types of cyberattacks and solutions 3.4.3: Recommendations 3.5: Conclusion References Chapter 4: OpenRAN and Security in an Developing Country Context 4.1: Introduction 4.2: OpenRAN and Security 4.2.1: OpenRAN and reduced reliance on a single vendor 4.2.2: OpenRAN and Huawei 4.3: OpenRAN and Open Source 4.4: OpenRAN and Developing Countries 4.4.1: What is driving OpenRAN hype? 4.5: Conclusion References Chapter 5: Deployment of 5G in Emerging Economies: Cybersecurity Challenges and Potentials for Ghana 5.1: Introduction 5.2: 5G and How It Works 5.2.1: Technical capabilities of 5G 5.2.2: Advantages of 5G 5.2.3: Shortcomings of 5G 5.3: 5G Adoption and Potential Benefits to Ghana 5.4: Potential Security Threats of 5G Adoption in Ghana 5.4.1: Recommendations for security challenges for 5g in Ghana 5.5: Conclusion References Chapter 6: Mapping the Iranian Policy Network for Protecting Users’ Data on Platforms 6.1: Introduction 6.2: Literature Review 6.2.1: A review of media platforms regulatory 6.3: Background of Data Protection Policies 6.4: Methodology 6.5: Discussion and Conclusion References Chapter 7: Empirical Investigation of the Drivers of 5G and the Mediating Role of Users’ Attitudes to Achieving Word of Mouth and Willingness: A Case Study of the Microfinance Institutions of Zambia 7.1: Introduction 7.2: Literature Review and Variables 7.2.1: Technology acceptance model 7.2.2: Privacy risk 7.2.3: Speed 7.2.4: Ubiquity 7.2.5: Subjective constructs 7.2.6: Word of mouth (WoM) 7.2.7: Willingness to pay (WTP) 7.3: Research Framework 7.3.1: Measuring variables 7.3.2: Questionnaire design 7.4: Data Analysis and Interpretation 7.4.1: PLS measuring results 7.4.2: Model for measurement 7.4.3: Validation of hypotheses 7.5: Theoretical Implications 7.6: Limitations and Future Research 7.7: Conclusion References Chapter 8: Study of Cybersecurity in 5G using a Machine Learning Algorithm for Protecting Financial Transactions – A Case of the Developing World 8.1: Introduction 8.2: Relevance of Financial Security in 5G 8.3: Review of Literature 8.4: Research Problem 8.5: The Objective of the Chapter 8.6: Methodology 8.7: Result and Discussion 8.8: Conclusion References Chapter 9: Integrating InSAR, GNSS, IoT, 5G, and Cybersecurity for Earthquakes/Tremor Monitoring and Forecasting in Abuja, Nigeria 9.1: Introduction 9.2: Case Study 9.2.1: Background of the Abuja 2018 tremors 9.3: Research Methodology 9.3.1: InSAR 9.3.2: 5G and IoT Architecture 9.3: Results and Discussions 9.4: Conclusion References Index About the Authors About the Editors
1. Disable the AdBlock plugin. Otherwise, you may not get any links.
2. Solve the CAPTCHA.
3. Click download link.
4. Lead to download server to download.