Loading…
10th International Congress on Information and Communication Technology in concurrent with ICT Excellence Awards (ICICT 2025) will be held at London, United Kingdom | February 18 - 21 2025.
or to bookmark your favorites and sync them to your phone or calendar.
Type: Virtual Room_10D clear filter
Thursday, February 20
 

1:58pm GMT

Opening Remarks
Thursday February 20, 2025 1:58pm - 2:00pm GMT
Thursday February 20, 2025 1:58pm - 2:00pm GMT
Virtual Room D London, United Kingdom

2:00pm GMT

Deterministic Framework for Ethical AI in Automated Lending Services: Addressing Risk, Governance, and Equity
Thursday February 20, 2025 2:00pm - 3:30pm GMT
Authors - Vikas Shah, Travis Rice, Aarav Shah, Aarush Shah
Abstract - Artificial intelligence (AI) empowered the transformation of decision-making processes for lending services, delivering improved efficiency, scalability, and precision. However, the adoption of AI in loan origination and application processing has introduced significant ethical challenges, including recognizing biases, fairness, transparency, reliability, and accountability. The paper identifies primary challenges in automated lending services (ALS), AI-enabled decision-making, and the deriving of AI governance practices. This paper proposes a deterministic framework (DF) designed to systematically identify and address the ethical dimensions of AI in lending services. The DF spans comprehensive mechanisms encompassing data collection, preprocessing, model development, deployment, monitoring, and governance. Core ethical dimensions of explainability, transparency, and equitable outcomes are recognized within the governance lifecycle stages. The DF continuously integrates novel industry regulatory standards and governance methodologies to identify, measure, and mitigate ethical risks, ensuring operational efficiency and adherence to ethical principles. This research provides a structured approach grounded in deterministic methods, enabling measurable, repeatable, and auditable business processes to enable trust and accountability in AI-driven ALS. An empirical case study focusing on ALS for students and their families is presented to evaluate the DF's applicability and effectiveness. The findings provide actionable insights for financial institutions, policymakers, and technologists seeking to implement ethical AI practices, strengthen risk management, and deliver equitable and accountable lending services to diverse populations.
Paper Presenters
avatar for Vikas Shah

Vikas Shah

United States of America
Thursday February 20, 2025 2:00pm - 3:30pm GMT
Virtual Room D London, United Kingdom

2:00pm GMT

IMOK: A compact connector for non-prohibition proofs to privacy-preserving applications
Thursday February 20, 2025 2:00pm - 3:30pm GMT
Authors - Oleksandr Kurbatov, Lasha Antadze, Ameen Soleimani, Kyrylo Riabov, Artem Sdobnov
Abstract - This article proposes an extension for privacy-preserving applications to introduce sanctions or prohibition lists. When initiating a particular action, the user can prove, in addition to the application logic, that they are not part of the sanctions lists (one or more) without compromising sensitive data. We will show how this solution can be integrated into applications, using the example of extending Freedom Tool (a voting solution based on biometric passports). We will also consider ways to manage these lists, versioning principles, configuring the filter data set, combining different lists, and using the described method in other privacy-preserving applications.
Paper Presenters
Thursday February 20, 2025 2:00pm - 3:30pm GMT
Virtual Room D London, United Kingdom

2:00pm GMT

Systematic Mapping Study of Wireless Communication Technologies in In-Vehicle Network
Thursday February 20, 2025 2:00pm - 3:30pm GMT
Authors - Asmaa Berdigh, Kenza Oufaska, Khalid El Yassini
Abstract - The inclusion of wireless communication technologies in the car industry has drastically reshaped it over the last two decades. This evolution began with the integration of Bluetooth and Smart Key technology in 1998 and has since progressed to the application of wireless communication in the cell monitoring controller of battery management systems. The objective of this study is to conduct an SMS to evaluate the research investigating wireless communication technologies used in the in-vehicle network. We adopt the Systematic Mapping Study (SMS) approach, a rigorously defined research methodology with roots in the medical and software engineering, using defined criteria to filter out the research contributions stored in both Scopus and GoogleScholar databases over the last twenty years. We synthesize the resulting data and produce this article. This work aims to organize information from studies published within this disciplinary field over the past two decades, presenting them in a systematic map form, and discussing the results and their implications for future research, concluding by a visual display of which automotive domains have the largest wireless communication. The SMS provides a clear and comprehensive picture drawn from precise questions. The derived outcomes could hold significance for both researchers and industry professionals considering the integration of wireless communication technologies within in-vehicle networks. Despite the substantial body of research identified over the past 20 years on wireless technologies, only a limited number of studies have specifically focused on the In-Vehicle Networks.
Paper Presenters
Thursday February 20, 2025 2:00pm - 3:30pm GMT
Virtual Room D London, United Kingdom

2:00pm GMT

Towards a Cybersecurity Culture Framework: A Literature Review of Awareness and Behavioral Transformation in Telecommunications Organizations
Thursday February 20, 2025 2:00pm - 3:30pm GMT
Authors - Esther Endjala, Hanifa Abdullah, Mathias Mujinga
Abstract - This paper explores the theoretical and strategic foundations for cultivating a cybersecurity culture within telecommunications institutions. Drawing on established behavioral theories Social Cognitive Theory (SCT), Protection Motivation Theory (PMT), Theory of Planned Behavior (TPB), and Technology Acceptance Model (TAM) it examines the opportunities for enhancing cybersecurity awareness and transforming employee behaviors into a resilient human firewall. The paper synthesizes existing literature to highlight the role of leadership, employee engagement, training, collaboration, and recognition in fostering a cybersecurity culture. The review further identifies gaps and limitations in the current approaches, proposing a conceptual foundation for developing an effective cybersecurity culture framework tailored to telecommunications institutions. Appropriate cybersecurity culture is essential in developing the entity and helps protect organizational assets such as data, networks, and systems when technical defenses are quite significant. The section takes into consideration the theoretical aspect of cybersecurity culture and comes out with a derived underlying framework that incorporates aspects like the Social Cognitive Theory, Protection Motivation Theory, Theory of Planned Behavior, and Technology Acceptance Model. Creating a strong cybersecurity culture faces several significant challenges, including resistance to change, limited resources, and regulatory hurdles. The proposed framework emphasizes the importance of top management commitment, employee involvement, ongoing training, and interdepartmental collaboration as vital components for cultivating this culture. Organizations should address these challenges to successfully establish an effective cybersecurity culture. By integrating these elements, cybersecurity can become a fundamental organizational value, enhancing awareness, compliance, and employee engagement. This paper establishes the groundwork for further research on cybersecurity culture and outlines key steps to strengthen organizational resilience and ensure a safe digital environment.
Paper Presenters
Thursday February 20, 2025 2:00pm - 3:30pm GMT
Virtual Room D London, United Kingdom

2:00pm GMT

Train-the-Trainer: Empowering Educators with Practical AI and Robotics Skills through the CDIO Framework
Thursday February 20, 2025 2:00pm - 3:30pm GMT
Authors - Amna Altaf, Zeashan Khan, Adeel Mehmood, Jamshed Iqbal
Abstract - Advancements in Artificial intelligence (AI) and robotics call for prioritising research in education and pedagogy in these domains including teachers’ training to practice emerging learning and teaching strategies. This paper explores the model of teachers’ training by using CDIO (Conceiving, Designing, Implementing and Operation) framework as a guide and a robotic platform as an example in AI education. In the pilot study, nine workshop sessions were designed and organised for a group of five teachers introducing them to robotics-led delivery of AI content using a mobile robot ‘Duckiebot’. The prominent workshop contents include robot vision, object detection, state estimation and localisation, task planning and reinforcement learning. Preliminary results in the form of feedback from the workshop participants demonstrated that the teaching model presented in this study made a promising contribution in terms of improving teachers’ intellectual and pedagogical skills as well as their confidence in achieving learning outcomes. The presented CDI-based robotics-led AI teaching model adds to the dialogue on innovative AI and engineering education methods. It is anticipated that wider dissemination of the findings in this research will lay the groundwork for a larger educational impact.
Paper Presenters
avatar for Amna Altaf

Amna Altaf

United Kingdom
Thursday February 20, 2025 2:00pm - 3:30pm GMT
Virtual Room D London, United Kingdom

3:30pm GMT

Session Chair Remarks
Thursday February 20, 2025 3:30pm - 3:33pm GMT
Thursday February 20, 2025 3:30pm - 3:33pm GMT
Virtual Room D London, United Kingdom

3:33pm GMT

Closing Remarks
Thursday February 20, 2025 3:33pm - 3:35pm GMT
Thursday February 20, 2025 3:33pm - 3:35pm GMT
Virtual Room D London, United Kingdom
 

Share Modal

Share this link via

Or copy link

Filter sessions
Apply filters to sessions.
  • Inaugural Session
  • Physical Technical Session 1
  • Physical Technical Session 2
  • Virtual Room 4A
  • Virtual Room 4B
  • Virtual Room 4C
  • Virtual Room 4D
  • Virtual Room 4E
  • Virtual Room 5A
  • Virtual Room 5B
  • Virtual Room 5C
  • Virtual Room 5D
  • Virtual Room 5E
  • Virtual Room 6A
  • Virtual Room 6B
  • Virtual Room 6C
  • Virtual Room 6D
  • Virtual Room 7A
  • Virtual Room 7B
  • Virtual Room 7C
  • Virtual Room 7D
  • Virtual Room 8A
  • Virtual Room 8B
  • Virtual Room 8C
  • Virtual Room 8D
  • Virtual Room 8E
  • Virtual Room 9A
  • Virtual Room 9B
  • Virtual Room 9C
  • Virtual Room 9D
  • Virtual Room 9E
  • Virtual Room_10A
  • Virtual Room_10B
  • Virtual Room_10C
  • Virtual Room_10D
  • Virtual Room_11A
  • Virtual Room_11B
  • Virtual Room_11C
  • Virtual Room_11D
  • Virtual Room_12A
  • Virtual Room_12B
  • Virtual Room_12C
  • Virtual Room_12D
  • Virtual Room_12E
  • Virtual Room_13A
  • Virtual Room_13B
  • Virtual Room_13C
  • Virtual Room_13D
  • Virtual Room_14A
  • Virtual Room_14B
  • Virtual Room_14C
  • Virtual Room_14D
  • Virtual Room_15A
  • Virtual Room_15B
  • Virtual Room_15C
  • Virtual Room_15D