Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (39)

Search Parameters:
Keywords = holistic cybersecurity

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
29 pages, 540 KiB  
Systematic Review
Digital Transformation in International Trade: Opportunities, Challenges, and Policy Implications
by Sina Mirzaye and Muhammad Mohiuddin
J. Risk Financial Manag. 2025, 18(8), 421; https://doi.org/10.3390/jrfm18080421 - 1 Aug 2025
Viewed by 370
Abstract
This study synthesizes the rapidly expanding evidence on how digital technologies reshape international trade, with a particular focus on small and medium-sized enterprises (SMEs). Guided by two research questions—(RQ1) How do digital tools influence the volume and composition of cross-border trade? and (RQ2) [...] Read more.
This study synthesizes the rapidly expanding evidence on how digital technologies reshape international trade, with a particular focus on small and medium-sized enterprises (SMEs). Guided by two research questions—(RQ1) How do digital tools influence the volume and composition of cross-border trade? and (RQ2) How do these effects vary by countries’ development level and firm size?—we conducted a PRISMA-compliant systematic literature review covering 2010–2024. Searches across eight major databases yielded 1857 records; after duplicate removal, title/abstract screening, full-text assessment, and Mixed Methods Appraisal Tool (MMAT 2018) quality checks, 86 peer-reviewed English-language studies were retained. Findings reveal three dominant technology clusters: (1) e-commerce platforms and cloud services, (2) IoT-enabled supply chain solutions, and (3) emerging AI analytics. E-commerce and cloud adoption consistently raise export intensity—doubling it for digitally mature SMEs—while AI applications are the fastest-growing research strand, particularly in East Asia and Northern Europe. However, benefits are uneven: firms in low-infrastructure settings face higher fixed digital costs, and cybersecurity and regulatory fragmentation remain pervasive obstacles. By integrating trade economics with development and SME internationalization studies, this review offers the first holistic framework that links national digital infrastructure and policy support to firm-level export performance. It shows that the trade-enhancing effects of digitalization are contingent on robust broadband penetration, affordable cloud access, and harmonized data-governance regimes. Policymakers should, therefore, prioritize inclusive digital-readiness programs, while business leaders should invest in complementary capabilities—data analytics, cyber-risk management, and cross-border e-logistics—to fully capture digital trade gains. This balanced perspective advances theory and practice on building resilient, equitable digital trade ecosystems. Full article
(This article belongs to the Special Issue Modern Enterprises/E-Commerce Logistics and Supply Chain Management)
Show Figures

Figure 1

28 pages, 2981 KiB  
Article
From Security Frameworks to Sustainable Municipal Cybersecurity Capabilities
by Arnstein Vestad and Bian Yang
J. Cybersecur. Priv. 2025, 5(2), 19; https://doi.org/10.3390/jcp5020019 - 28 Apr 2025
Viewed by 967
Abstract
While security frameworks like the NIST CSF and ISO 27001 provide organizations with standardized best practices for cybersecurity, these practices must be implemented in organizations by people with the necessary skills and knowledge and be supported by effective technological solutions. This article explores [...] Read more.
While security frameworks like the NIST CSF and ISO 27001 provide organizations with standardized best practices for cybersecurity, these practices must be implemented in organizations by people with the necessary skills and knowledge and be supported by effective technological solutions. This article explores the challenges and opportunities of building sustainable cybersecurity capabilities in resource-constrained organizations, specifically Norwegian municipalities. The research introduces the concept of sustainable cybersecurity capabilities, emphasizing the importance of a socio-technical approach that integrates technology, people, and organizational structure. A mixed-methods study was employed, combining document analysis of relevant cybersecurity frameworks with a modified Delphi study and semi-structured interviews with municipal cybersecurity practitioners. Findings highlight six core cybersecurity capabilities within municipalities, along with key challenges in implementing and sustaining these capabilities. These challenges include ambiguities in role formalization, skills gaps, difficulties in deploying advanced security technologies, and communication barriers between central IT and functional areas. Furthermore, the potential of artificial intelligence and cooperative strategies to enhance municipal cybersecurity is considered. Ultimately, the study highlights the need for a holistic perspective in developing sustainable cybersecurity capabilities, offering implications for both research and practice within municipalities and local government. Full article
Show Figures

Figure 1

12 pages, 498 KiB  
Article
Bridging Digital Divides: Validating Government ICT Investments Accelerating Sustainable Development Goals
by Thabit Atobishi and Hasan Mansur
Sustainability 2025, 17(5), 2191; https://doi.org/10.3390/su17052191 - 3 Mar 2025
Cited by 1 | Viewed by 1478
Abstract
Achieving the ambitious economic, social, and environmental goals of the UN Sustainable Development Goals (SDGs) requires strategic digital governance improvements that promote long-term and equitable participation in emerging technologies. However, research lacks clear confirmation regarding how governments’ varied policy investments in spheres, like [...] Read more.
Achieving the ambitious economic, social, and environmental goals of the UN Sustainable Development Goals (SDGs) requires strategic digital governance improvements that promote long-term and equitable participation in emerging technologies. However, research lacks clear confirmation regarding how governments’ varied policy investments in spheres, like infrastructure expansion, skills programming, and cybersecurity, specifically contribute to holistic sustainable development progress monitored across international benchmarks. Addressing persistent uncertainties, this study statistically modeled if national expenditures directed toward information and communications technology (ICT) access, digital literacy initiatives, and online privacy protections predict higher performances meeting SDGs longitudinally. Analyzing recent country-level data across 27 European nations, structural equation modeling uncovered positive relationships between all three complementary digital governance priority areas and national SDG Index achievement over time. Beyond theoretically validating the instrumental role of availability, capabilities, and security advancements for balanced digitization, findings offer policymakers vital empirical guidance to amplify social returns on ICT investments. The results also demonstrate practical tools to track implementation impacts amidst unrelenting technological shifts. Ultimately, equitably mainstreaming technologies’ vast problem-solving potential necessitates evidence-based digital governance carefully expanding equitable participation. This work aims to equip leaders to purposefully craft enabling, empowering ICT policy ecosystems advancing urgent development aims. Full article
Show Figures

Figure 1

44 pages, 642 KiB  
Review
Overview on Intrusion Detection Systems for Computers Networking Security
by Lorenzo Diana, Pierpaolo Dini and Davide Paolini
Computers 2025, 14(3), 87; https://doi.org/10.3390/computers14030087 - 3 Mar 2025
Cited by 11 | Viewed by 9567
Abstract
The rapid growth of digital communications and extensive data exchange have made computer networks integral to organizational operations. However, this increased connectivity has also expanded the attack surface, introducing significant security risks. This paper provides a comprehensive review of Intrusion Detection System (IDS) [...] Read more.
The rapid growth of digital communications and extensive data exchange have made computer networks integral to organizational operations. However, this increased connectivity has also expanded the attack surface, introducing significant security risks. This paper provides a comprehensive review of Intrusion Detection System (IDS) technologies for network security, examining both traditional methods and recent advancements. The review covers IDS architectures and types, key detection techniques, datasets and test environments, and implementations in modern network environments such as cloud computing, virtualized networks, Internet of Things (IoT), and industrial control systems. It also addresses current challenges, including scalability, performance, and the reduction of false positives and negatives. Special attention is given to the integration of advanced technologies like Artificial Intelligence (AI) and Machine Learning (ML), and the potential of distributed technologies such as blockchain. By maintaining a broad-spectrum analysis, this review aims to offer a holistic view of the state-of-the-art in IDSs, support a diverse audience, and identify future research and development directions in this critical area of cybersecurity. Full article
Show Figures

Figure 1

22 pages, 3755 KiB  
Review
Railroad Cybersecurity: A Systematic Bibliometric Review
by Ruhaimatu Abudu, Raj Bridgelall, Bright Parker Quayson, Denver Tolliver and Kwabena Dadson
Designs 2025, 9(1), 23; https://doi.org/10.3390/designs9010023 - 18 Feb 2025
Viewed by 1475
Abstract
Cybersecurity challenges are increasing in the rail industry because of constant technological evolution that includes the Internet of Things, blockchains, automation, and artificial intelligence. Consequently, many railroads and supply chain stakeholders have implemented strategies and practices to address these challenges. However, the pace [...] Read more.
Cybersecurity challenges are increasing in the rail industry because of constant technological evolution that includes the Internet of Things, blockchains, automation, and artificial intelligence. Consequently, many railroads and supply chain stakeholders have implemented strategies and practices to address these challenges. However, the pace of cybersecurity implementation in the railroad industry is slow even as cyberthreats escalate. This study uniquely integrates bibliometric analysis with a systematic literature review to provide a holistic view of cybersecurity trends in rail freight. The study analyzes 70 articles focusing on cybersecurity practices in the rail freight industry, structured around four research questions relating to: (1) challenges, (2) measures, (3) emerging trends, and (4) innovations. Key findings are that implementing cybersecurity practices in the rail freight industry comes with numerous challenges and risks. The study concludes that new threats will constantly emerge with technological advancements. Therefore, there is a need for continuous human training, collaboration, and coordination with stakeholders. This study also highlights research gaps and recommends how stakeholders can most appropriately execute cybersecurity strategies and best coordinate them with the various technological functions in the rail freight industry. Full article
Show Figures

Figure 1

30 pages, 2651 KiB  
Article
When Cybersecurity Meets Accessibility: A Holistic Development Architecture for Inclusive Cyber-Secure Web Applications and Websites
by George Alex Stelea, Livia Sangeorzan and Nicoleta Enache-David
Future Internet 2025, 17(2), 67; https://doi.org/10.3390/fi17020067 - 5 Feb 2025
Viewed by 1631
Abstract
In today’s technology-centric era, digital transformation has made accessibility and cybersecurity critical components for developing inclusive web applications that are essential in daily operations. However, current development models often treat accessibility and cybersecurity separately, leading to solutions that may excel in one area [...] Read more.
In today’s technology-centric era, digital transformation has made accessibility and cybersecurity critical components for developing inclusive web applications that are essential in daily operations. However, current development models often treat accessibility and cybersecurity separately, leading to solutions that may excel in one area while lacking in the other. This paper addresses this gap by proposing the Holistic Security and Accessibility Layered Architecture (HSALA), a novel architectural model that integrates accessibility and cybersecurity throughout the development process. HSALA consists of five interconnected layers, each paired with a corresponding security layer, ensuring that both accessibility and security are embedded at every level. We conduct a theoretical and analytical case study comparing HSALA with the traditional three-layered architecture, demonstrating HSALA’s superiority in addressing contemporary challenges related to accessibility, cybersecurity, scalability, and user experience. The findings indicate that HSALA provides a robust framework for developing secure and inclusive web applications, promoting a more equitable digital ecosystem. We outline a roadmap for future work, including empirical validation and practical implementation strategies. HSALA represents a significant advancement in web application development, fostering inclusivity and trust in an increasingly digital society. Full article
(This article belongs to the Section Cybersecurity)
Show Figures

Figure 1

24 pages, 349 KiB  
Article
Cybersecurity in Digital Accounting Systems: Challenges and Solutions in the Arab Gulf Region
by Amer Morshed and Laith T. Khrais
J. Risk Financial Manag. 2025, 18(1), 41; https://doi.org/10.3390/jrfm18010041 - 19 Jan 2025
Cited by 7 | Viewed by 4102
Abstract
The region of the Arab Gulf is marching ahead very fast toward digitalization in ways prompted by initiatives, such as Saudi Vision 2030 and the UAE’s strategy for Smart Government. Thus, both underscore the boundless movement toward the inclusion of advanced technologies into [...] Read more.
The region of the Arab Gulf is marching ahead very fast toward digitalization in ways prompted by initiatives, such as Saudi Vision 2030 and the UAE’s strategy for Smart Government. Thus, both underscore the boundless movement toward the inclusion of advanced technologies into accounting practices, such as Business Intelligence and Enterprise Resource Planning systems. While these technologies enhance efficiency and facilitate informed decision-making, they also render financial data vulnerable to cybersecurity threats, such as phishing, ransomware, and insider attacks. This paper investigates the impact of cybersecurity practices, ethical accountability, regulatory frameworks, and emerging technologies on the adoption of and trust in digital accounting systems in the GCC region. A quantitative research approach was followed, wherein the responses from a randomly selected sample of 324 professionals representing the GCC nations were collected. The empirical analysis was completed using Partial Least Squares Structural Equation Modeling. Strong cybersecurity measures, AI-driven threat detection mechanisms, and custom-fit employee training programs facilitate the adoption of and faith in digital accounting information systems considerably. Ethical accountability acts as the partial mediator of those effects, and supportive regulatory frameworks enhance cybersecurity strategy effectiveness. This study examines the development of integrated cybersecurity strategies with respect to technology, ethics, and regulations. It makes several major recommendations, calling for bringing the GCC countries’ regulatory frameworks into line with international standards; encouraging workforce training programs; and utilizing AI-powered technologies for proactive threat detection and management. These findings can arm stakeholders with a holistic pathway toward developing secure, resilient, and future-oriented digital accounting infrastructures across the region. Full article
(This article belongs to the Special Issue Innovations in Accounting Practices)
32 pages, 492 KiB  
Review
A Survey on Cybersecurity in IoT
by Elias Dritsas and Maria Trigka
Future Internet 2025, 17(1), 30; https://doi.org/10.3390/fi17010030 - 11 Jan 2025
Cited by 7 | Viewed by 5030
Abstract
The proliferation of the Internet of Things (IoT) has transformed the digital landscape, enabling a vast array of interconnected devices to communicate and share data seamlessly. However, the rapid expansion of IoT networks has also introduced significant cybersecurity challenges. This paper presents a [...] Read more.
The proliferation of the Internet of Things (IoT) has transformed the digital landscape, enabling a vast array of interconnected devices to communicate and share data seamlessly. However, the rapid expansion of IoT networks has also introduced significant cybersecurity challenges. This paper presents a comprehensive survey of cybersecurity in the IoT ecosystem, examining the current state of research, identifying critical security vulnerabilities, and exploring advanced strategies for mitigating threats. The survey covers various facets of IoT security, including device authentication, data integrity, privacy, network security, and the emerging role of artificial intelligence (AI) in bolstering cybersecurity defenses. By synthesizing existing research and highlighting ongoing challenges, this survey aims to provide a holistic understanding of IoT cybersecurity and to guide future research endeavors. Full article
(This article belongs to the Special Issue Cybersecurity in the IoT)
Show Figures

Figure 1

30 pages, 448 KiB  
Article
Cybersecurity and Privacy Challenges in Extended Reality: Threats, Solutions, and Risk Mitigation Strategies
by Mohammed El-Hajj
Virtual Worlds 2025, 4(1), 1; https://doi.org/10.3390/virtualworlds4010001 - 30 Dec 2024
Cited by 4 | Viewed by 4170
Abstract
Extended Reality (XR), encompassing Augmented Reality (AR), Virtual Reality (VR), and Mixed Reality (MR), enables immersive experiences across various fields, including entertainment, healthcare, and education. However, its data-intensive and interactive nature introduces significant cybersecurity and privacy challenges. This paper presents a detailed adversary [...] Read more.
Extended Reality (XR), encompassing Augmented Reality (AR), Virtual Reality (VR), and Mixed Reality (MR), enables immersive experiences across various fields, including entertainment, healthcare, and education. However, its data-intensive and interactive nature introduces significant cybersecurity and privacy challenges. This paper presents a detailed adversary model to identify threat actors and attack vectors in XR environments. We analyze key risks, including identity theft and behavioral data leakage, which can lead to profiling, manipulation, or invasive targeted advertising. To mitigate these risks, we explore technical solutions such as Advanced Encryption Standard (AES), Rivest–Shamir–Adleman (RSA), and Elliptic Curve Cryptography (ECC) for secure data transmission, multi-factor and biometric authentication, data anonymization techniques, and AI-driven anomaly detection for real-time threat monitoring. A comparative benchmark evaluates these solutions’ practicality, strengths, and limitations in XR applications. The findings emphasize the need for a holistic approach, combining robust technical measures with privacy-centric policies, to secure XR ecosystems and ensure user trust. Full article
Show Figures

Figure 1

20 pages, 2093 KiB  
Review
Global Trends and Practices of Industry 4.0 Applications in the Clothing Sector: A Systematic Literature Review
by Renan Albino Monteiro, Djalma Silva Guimarães Junior, Eryka Fernanda Miranda Sobral, Pedro Henrique de Barros Falcão, Fagner José Coutinho de Melo and Carmelo Bastos-Filho
Adm. Sci. 2024, 14(10), 258; https://doi.org/10.3390/admsci14100258 - 13 Oct 2024
Viewed by 3125
Abstract
The potential of Industry 4.0 enabling tools is emerging as a strategic factor for the adaptation and innovation of companies in the clothing sector. Thus, the aim is to identify global trends and practices in I4.0 applications in the clothing sector based on [...] Read more.
The potential of Industry 4.0 enabling tools is emerging as a strategic factor for the adaptation and innovation of companies in the clothing sector. Thus, the aim is to identify global trends and practices in I4.0 applications in the clothing sector based on a systematic literature review. From the systematic literature review, 11 articles were selected from the Scopus and Web of Science databases. The results showed global trends in the application of I4.0 enabling tools, such as the Internet of Things, Cybersecurity and Additive Manufacturing, in addition to the benefits that I4.0 can provide in manufacturing, such as the possibility of efficient processes with lower operating costs. When studying the perception of businesspeople, the most critical dimensions were: vertical integration, flexibility, data analysis, supply chain integration, traceability, remote production monitoring, strategy, organizational culture and people. The originality of the paper is highlighted by its specific sectoral focus, emerging applications of Industry 4.0 and holistic approach to the value chain. In addition to the academic contribution in terms of mapping key global trends, identifying challenges and opportunities and providing a basis for future research, the results can provide practical recommendations for companies in the apparel sector seeking to start or accelerate their digital transformation journey. Full article
Show Figures

Figure 1

31 pages, 1965 KiB  
Article
Holistic Information Security Management and Compliance Framework
by Šarūnas Grigaliūnas, Michael Schmidt, Rasa Brūzgienė, Panayiota Smyrli, Stephanos Andreou and Audrius Lopata
Electronics 2024, 13(19), 3955; https://doi.org/10.3390/electronics13193955 - 7 Oct 2024
Cited by 2 | Viewed by 3268
Abstract
The growing complexity of cybersecurity threats demands a robust framework that integrates various security domains, addressing the issue of disjointed security practices that fail to comply with evolving regulations. This paper introduces a novel information security management and compliance framework that integrates operational, [...] Read more.
The growing complexity of cybersecurity threats demands a robust framework that integrates various security domains, addressing the issue of disjointed security practices that fail to comply with evolving regulations. This paper introduces a novel information security management and compliance framework that integrates operational, technical, human, and physical security domains. The aim of this framework is to enable organizations to identify the requisite information security controls and legislative compliance needs effectively. Unlike traditional approaches, this framework systematically aligns with both current and emerging security legislation, including GDPR, NIS2 Directive, and the Artificial Intelligence Act, offering a unified approach to comprehensive security management. The experimental methodology involves evaluating the framework against five distinct risk scenarios to test its effectiveness and adaptability. Each scenario assesses the framework’s capability to manage and ensure compliance with specific security controls and regulations. The results demonstrate that the proposed framework not only meets compliance requirements across multiple security domains but also provides a scalable solution for adapting to new threats and regulations efficiently. These findings represent a significant step forward in holistic security management, indicating that organizations can enhance their security posture and legislative compliance simultaneously through this integrated framework. Full article
Show Figures

Figure 1

24 pages, 1272 KiB  
Article
Leveraging Digital Twins and Intrusion Detection Systems for Enhanced Security in IoT-Based Smart City Infrastructures
by Mohammed El-Hajj
Electronics 2024, 13(19), 3941; https://doi.org/10.3390/electronics13193941 - 6 Oct 2024
Cited by 7 | Viewed by 3064
Abstract
In this research, we investigate the integration of an Intrusion Detection System (IDS) with a Digital Twin (DT) to enhance the cybersecurity of physical devices in cyber–physical systems. Using Eclipse Ditto as the DT platform and Snort as the IDS, we developed a [...] Read more.
In this research, we investigate the integration of an Intrusion Detection System (IDS) with a Digital Twin (DT) to enhance the cybersecurity of physical devices in cyber–physical systems. Using Eclipse Ditto as the DT platform and Snort as the IDS, we developed a near-realistic test environment that included a Raspberry Pi as the physical device and a Kali Linux virtual machine to perform common cyberattacks such as Hping3 flood attacks and NMAP reconnaissance scans. The results demonstrated that the IDS effectively detected Hping3-based flood attacks but showed limitations in identifying NMAP scans, suggesting areas for IDS configuration improvements. Furthermore, the study uncovered significant system resource impacts, including high Central Processing Unit (CPU) usage during SYN and ACK flood attacks and persistent memory usage after Network Mapper (NMAP) scans, highlighting the need for enhanced recovery mechanisms. This research presents a novel approach by coupling a Digital Twin with an IDS, enabling real-time monitoring and providing a dual perspective on both system performance and security. The integration offers a holistic method for identifying vulnerabilities and understanding resource impacts during cyberattacks. The work contributes new insights into the use of Digital Twins for cybersecurity and paves the way for further research into automated defense mechanisms, real-world validation of the proposed model, and the incorporation of additional attack scenarios. The results suggest that this combined approach holds significant promise for enhancing the security and resilience of IoT devices and other cyber–physical systems. Full article
Show Figures

Figure 1

33 pages, 2714 KiB  
Review
Overview of AI-Models and Tools in Embedded IIoT Applications
by Pierpaolo Dini, Lorenzo Diana, Abdussalam Elhanashi and Sergio Saponara
Electronics 2024, 13(12), 2322; https://doi.org/10.3390/electronics13122322 - 13 Jun 2024
Cited by 14 | Viewed by 7733
Abstract
The integration of Artificial Intelligence (AI) models in Industrial Internet of Things (IIoT) systems has emerged as a pivotal area of research, offering unprecedented opportunities for optimizing industrial processes and enhancing operational efficiency. This article presents a comprehensive review of state-of-the-art AI models [...] Read more.
The integration of Artificial Intelligence (AI) models in Industrial Internet of Things (IIoT) systems has emerged as a pivotal area of research, offering unprecedented opportunities for optimizing industrial processes and enhancing operational efficiency. This article presents a comprehensive review of state-of-the-art AI models applied in IIoT contexts, with a focus on their utilization for fault prediction, process optimization, predictive maintenance, product quality control, cybersecurity, and machine control. Additionally, we examine the software and hardware tools available for integrating AI models into embedded platforms, encompassing solutions such as Vitis AI v3.5, TensorFlow Lite Micro v2.14, STM32Cube.AI v9.0, and others, along with their supported high-level frameworks and hardware devices. By delving into both AI model applications and the tools facilitating their deployment on low-power devices, this review provides a holistic understanding of AI-enabled IIoT systems and their practical implications in industrial settings. Full article
Show Figures

Figure 1

20 pages, 284 KiB  
Review
Exploring Innovative Approaches to Synthetic Tabular Data Generation
by Eugenia Papadaki, Aristidis G. Vrahatis and Sotiris Kotsiantis
Electronics 2024, 13(10), 1965; https://doi.org/10.3390/electronics13101965 - 17 May 2024
Cited by 3 | Viewed by 4416
Abstract
The rapid advancement of data generation techniques has spurred innovation across multiple domains. This comprehensive review delves into the realm of data generation methodologies, with a keen focus on statistical and machine learning-based approaches. Notably, novel strategies like the divide-and-conquer (DC) approach and [...] Read more.
The rapid advancement of data generation techniques has spurred innovation across multiple domains. This comprehensive review delves into the realm of data generation methodologies, with a keen focus on statistical and machine learning-based approaches. Notably, novel strategies like the divide-and-conquer (DC) approach and cutting-edge models such as GANBLR have emerged to tackle a spectrum of challenges, spanning from preserving intricate data relationships to enhancing interpretability. Furthermore, the integration of generative adversarial networks (GANs) has sparked a revolution in data generation across sectors like healthcare, cybersecurity, and retail. This review meticulously examines how these techniques mitigate issues such as class imbalance, data scarcity, and privacy concerns. Through a meticulous analysis of evaluation metrics and diverse applications, it underscores the efficacy and potential of synthetic data in refining predictive models and decision-making software. Concluding with insights into prospective research trajectories and the evolving role of synthetic data in propelling machine learning and data-driven solutions across disciplines, this work provides a holistic understanding of the transformative power of contemporary data generation methodologies. Full article
(This article belongs to the Special Issue Advances in Data Science and Machine Learning)
Show Figures

Figure 1

32 pages, 1759 KiB  
Review
The Future Design of Smart Energy Systems with Energy Flexumers: A Constructive Literature Review
by Jin-Li Hu and Nhi Ha Bao Bui
Energies 2024, 17(9), 2039; https://doi.org/10.3390/en17092039 - 25 Apr 2024
Cited by 7 | Viewed by 5102
Abstract
From powering our homes to driving our economies, energy lies at the heart of humanity’s complex challenges in the modern era. This paper reviews the evolution of smart energy systems, examining their technological advancements and societal implications while proposing a future design framework [...] Read more.
From powering our homes to driving our economies, energy lies at the heart of humanity’s complex challenges in the modern era. This paper reviews the evolution of smart energy systems, examining their technological advancements and societal implications while proposing a future design framework emphasizing four key pillars: holistic resource optimization, adaptive intelligence, environmental harmony, and human-centered design. While they offer numerous benefits, such as enhanced energy efficiency and reduced carbon emissions, smart energy systems also face challenges. These include cybersecurity risks, the complexity of integrating diverse energy sources seamlessly, high upfront costs, and potential compatibility issues arising from evolving technologies. Overcoming these challenges will be crucial for unleashing the full potential of smart energy systems and facilitating their global adoption. Abundant opportunities for further research and development exist in this domain, awaiting exploration and advancement. Full article
(This article belongs to the Section C: Energy Economics and Policy)
Show Figures

Figure 1

Back to TopTop