Journal of Cybersecurity and Information Management

Journal DOI

https://doi.org/10.54216/JCIM

Submit Your Paper

2690-6775ISSN (Online) 2769-7851ISSN (Print)

Volume 13 , Issue 2 , PP: 199-206, 2024 | Cite this article as | XML | Html | PDF | Full Length Article

Cybersecurity Approaches for Securing Digital Marketing Data

Mohammad Arif 1 , Anjali Goswami 2 , CH. M. H. Saibaba 3 , K. Sharada 4 , Tushar Kumar Pandey 5 * , Ankita Nigam 6

  • 1 School of Computer Science & Engineering, Vellore Institute of Technology, Vellore, India - (arif_mohd2k@yahoo.com)
  • 2 Department of Mathematics and Statistics, College of Science and Theoretical Studies, Saudi Electronic University, Riyadh-13323, Saudi Arabia - (a.goswami@seu.edu.sa)
  • 3 Asst. Professor, Dept. of CSE, Koneru Lakshmaiah Education Foundation, Vaddeswaram, AP, India - (saibaba.ch77@gmail.com)
  • 4 Associate Professor, Department of Computer Science and Engineering, Gitam (Deemed to be University), Visakhapatnam, AP, India - (k.Sharada48@gmail.com)
  • 5 Junior Engineer (Computer Science), Dr. Rajendra Prasad Central Agricultural University, Pusa, Samastipur, Bihar, India - (tusharkumarpandey@gmail.com)
  • 6 Professor CSE Department, Princeton Institute of Engineering and Technology for Women Hyderabad, India - (ankita270481@gmail.com)
  • Doi: https://doi.org/10.54216/JCIM.130216

    Received: January 27, 2024 Revised: March 25, 2024 Accepted: May 09, 2024 Corrected: August 21, 2024
    Abstract

    The Energy Internet was enabled by quick energy sector developments due to greater digital technologies and increased environmental concerns. Energy demand management is crucial in this changing environment, as rigid models give way to more flexible ones. This research examines "Demand Dynamics in the Energy Internet" and suggests consumer and prosumer response plans. This concept regarding energy consumption and management is novel. Our work revolves around several essential aims. First, it examines the Energy Internet's role in the energy transition. It emphasizes energy savings, carbon reduction, and energy system reliability. We emphasize the need to transition away from centralized energy generation to one that is more flexible and involves active consumers and prosumers. This research examines how digital technology, particularly the Internet of Things, enables adaptable demand-side tactics. Real-time data analytics and smart meters help consumers and prosumers utilize energy efficiently. A transition like this is difficult. Data protection, hacking, and behaviour must be addressed. Our study demonstrates that these issues can be addressed immediately. Since one-size-fits-all is not adequate in this changing environment, we emphasize the need for customization to satisfy the individual demands of multiple parties, including conventional customers and prosumers. It also discusses energy Internet-targeted response strategies and their possibilities. We can reduce energy usage and make energy more sustainable, efficient, and consumer-focused by switching from passive consumption to active involvement and control.

    Keywords :

    Energy , Internet: Management , Optimization , Prosumer , Responsive , Sustainability , Tailored

    References

    [1]       H. Hamidpour, S. Pirouzi, S. Safaee, M. Norouzi, and M. Lehtonen, "Multi-objective resilient-constrained generation and transmission expansion planning against natural disasters," International Journal of Electrical Power & Energy Systems, vol. 132, Article ID 107193, 2021.

    [2]       Hosny. H. Abo Emira, Authenticating IoT Devices issues based on Blockchain, Journal of Cybersecurity and Information Management, Vol. 1 , No. 2 , (2020) : 35-40 (Doi   :  https://doi.org/10.54216/JCIM.010202)

    [3]       Hossam M. Moftah , Taha M. Mohamed, A Novel Fuzzy Bat Based Ambulance Detection and Traffic Counting Approach, Journal of Cybersecurity and Information Management, Vol. 1 , No. 2 , (2020) : 41-54 (Doi   :  https://doi.org/10.54216/JCIM.010203)

    [4]       Ajay G , Abhishek Kumar , Venkatesan R, Query-Based Image Retrieval using Support Vector Machine (SVM), Journal of Cognitive Human-Computer Interaction, Vol. 1 , No. 1 , (2021) : 28-36 (Doi   :  https://doi.org/10.54216/JCHCI.010104)

    [5]       Ajith Krishna R , Ankit Kumar , Vijay K, An Automated Optimize Utilization of Water and Crop Monitoring in Agriculture Using IoT, Journal of Cognitive Human-Computer Interaction, Vol. 1 , No. 1 , (2021) : 37-45 (Doi   :  https://doi.org/10.54216/JCHCI.010105)

    [6]       S. R. Nandanwar, M. L. Kolhe, S. B. Warkad, N. P. Patidar, and V. K. Singh, "Voltage security assessment by using PFDT and CBR methods in emerging power system," Energy Procedia, vol. 144, pp. 170–181, 2018.

    [7]       K. Shankar, Recent Advances in Sensing Technologies for Smart Cities, International Journal of Wireless and Ad Hoc Communication, Vol. 1 , No. 1 , (2020) : 05-15 (Doi   :  https://doi.org/10.54216/IJWAC.010101)

    [8]       A. Sariga , J. Uthayakumar, Type 2 Fuzzy Logic based Unequal Clustering algorithm for multi-hop wireless sensor networks, International Journal of Wireless and Ad Hoc Communication, Vol. 1 , No. 1 , (2020) : 33-46 (Doi   :  https://doi.org/10.54216/IJWAC.010102)

    [9]       M. Shivaie, M. Kiani-Moghaddam, and P. D. Weinsier, "A vulnerability-constrained quad-level model for coordination of generation and transmission expansion planning under seismic- and terrorist-induced events," International Journal of Electrical Power & Energy Systems, vol. 120, Article ID 105958, 2020.

    [10]    D. A. Tejada-Arango, G. Morales-Espana, S. Wogrin, and E. Centeno, "Power-based generation expansion planning for flexibility requirements," IEEE Transactions on Power Systems, vol. 35, no. 3, pp. 2012–2023, 2020.

    [11]    P. M. Shafi, "Artificial Driving based EfficientNet for Automatic Plant Leaf Disease Classification," Multimed Tools Appl, 2023. [Online]. Available: https://doi.org/10.1007/s11042-023-16882-w

    [12]    M. Zeinaddini-Meymand, M. Rashidinejad, A. Abdollahi, M. Pourakbari-Kasmaei, and M. Lehtonen, "A demand-side management-based model for G&TEP problem considering FSC allocation," IEEE Systems Journal, vol. 13, no. 3, pp. 3242–3253, 2019.

    [13]    Vishal Dubey , Bhavya Takkar , Puneet Singh Lamba, Micro-Expression Recognition using 3D - CNN, Fusion: Practice and Applications, Vol. 1 , No. 1 , (2020) : 5-13 (Doi   :  https://doi.org/10.54216/FPA.010101)

    [14]    Surinder Kaur , Diksha Kumari , Vandana Kumari, Control of Enviornmental Parametrs in A Greenhouse, Fusion: Practice and Applications, Vol. 1 , No. 1 , (2020) : 14-21 (Doi   :  https://doi.org/10.54216/FPA.010102)

    [15]    H. Kiani, K. Hesami, A. Azarhooshang, S. Pirouzi, and S. Safaee, "Adaptive robust operation of the active distribution network including renewable and flexible sources," Sustainable Energy, Grids and Networks, vol. 26, Article ID 100476, 2021.

    [16]    V. Roy, P. K. Shukla, A. K. Gupta, V. Goel, P. K. Shukla, & S. Shukla, “Taxonomy on EEG Artifacts Removal Methods, Issues, and Healthcare Applications”, Journal of Organizational and End User Computing (JOEUC), 33(1), pp.19-46, 2021. http://doi.org/10.4018/JOEUC.2021010102.

    [17]    PB Bobba, MH Anwar, HP Bhupathi, P Shirisha, L Hamza, “Simultaneous Wireless Power and Data Transfer in Different Applications”, E3S Web of Conferences vol. 552, page 01147, 2024.

    [18]    S. Stalin, V. Roy, P. K. Shukla, A. Zaguia, M.  M.  Khan, P. K. Shukla, A. Jain, "A Machine Learning-Based Big EEG Data Artifact Detection and Wavelet-Based Removal: An Empirical Approach", Mathematical Problems in Engineering, vol. 2021, Article ID 2942808, 11 pages, 2021. https://doi.org/10.1155/2021/2942808

    [19]    HP Bhupathi, BP Bobba, U Niharika, S Akshitha, K Sardina, B Lingam, “Investigation of WBG based Power Converters used in E-Transportation”, E3S Web of Conferences, vol. 552, page 01145, 2024.

    [20]    VK Pandraka, RR Tinnavelli, RA Kumar, HP Bhupathi, SL Gundebommu, “Effect of Inverter Voltage Levels on Torque Ripples of PMSM Drive”, E3S Web of Conferences, vol. 547, page. 02016, 2024.

    [21]    A. A. Khan, K. K. Almuzaini, V. D. J. Macedo, S. Ojo, V. K. Minchula, V. Roy, MaReSPS for energy efficient spectral precoding technique in large scale MIMO-OFDM, Physical Communication, Volume 58, 2023, 102057, ISSN 1874-4907, https://doi.org/10.1016/j.phycom.2023.102057.

    [22]    V. Roy. "An Improved Image Encryption Consuming Fusion Transmutation and Edge Operator." Journal of Cybersecurity and Information Management, Vol. 8, No. 1, 2021 ,PP. 42-52.

    [23]    P. Kumar, A. Baliyan, K. R. Prasad, N. Sreekanth, P. Jawarkar, V. Roy, E. T. Amoatey, "Machine Learning Enabled Techniques for Protecting Wireless Sensor Networks by Estimating Attack Prevalence and Device Deployment Strategy for 5G Networks", Wireless Communications and Mobile Computing, vol. 2022, Article ID 5713092, 15 pages, 2022. https://doi.org/10.1155/2022/5713092

    Cite This Article As :
    Arif, Mohammad. , Goswami, Anjali. , M., CH.. , Sharada, K.. , Kumar, Tushar. , Nigam, Ankita. Cybersecurity Approaches for Securing Digital Marketing Data. Journal of Cybersecurity and Information Management, vol. , no. , 2024, pp. 199-206. DOI: https://doi.org/10.54216/JCIM.130216
    Arif, M. Goswami, A. M., C. Sharada, K. Kumar, T. Nigam, A. (2024). Cybersecurity Approaches for Securing Digital Marketing Data. Journal of Cybersecurity and Information Management, (), 199-206. DOI: https://doi.org/10.54216/JCIM.130216
    Arif, Mohammad. Goswami, Anjali. M., CH.. Sharada, K.. Kumar, Tushar. Nigam, Ankita. Cybersecurity Approaches for Securing Digital Marketing Data. Journal of Cybersecurity and Information Management , no. (2024): 199-206. DOI: https://doi.org/10.54216/JCIM.130216
    Arif, M. , Goswami, A. , M., C. , Sharada, K. , Kumar, T. , Nigam, A. (2024) . Cybersecurity Approaches for Securing Digital Marketing Data. Journal of Cybersecurity and Information Management , () , 199-206 . DOI: https://doi.org/10.54216/JCIM.130216
    Arif M. , Goswami A. , M. C. , Sharada K. , Kumar T. , Nigam A. [2024]. Cybersecurity Approaches for Securing Digital Marketing Data. Journal of Cybersecurity and Information Management. (): 199-206. DOI: https://doi.org/10.54216/JCIM.130216
    Arif, M. Goswami, A. M., C. Sharada, K. Kumar, T. Nigam, A. "Cybersecurity Approaches for Securing Digital Marketing Data," Journal of Cybersecurity and Information Management, vol. , no. , pp. 199-206, 2024. DOI: https://doi.org/10.54216/JCIM.130216