10th International Congress on Information and Communication Technology in concurrent with ICT Excellence Awards (ICICT 2025) will be held at London, United Kingdom | February 18 - 21 2025.
Sign up or log in to bookmark your favorites and sync them to your phone or calendar.
Authors - Vikas Shah, Travis Rice, Aarav Shah, Aarush Shah Abstract - Artificial intelligence (AI) empowered the transformation of decision-making processes for lending services, delivering improved efficiency, scalability, and precision. However, the adoption of AI in loan origination and application processing has introduced significant ethical challenges, including recognizing biases, fairness, transparency, reliability, and accountability. The paper identifies primary challenges in automated lending services (ALS), AI-enabled decision-making, and the deriving of AI governance practices. This paper proposes a deterministic framework (DF) designed to systematically identify and address the ethical dimensions of AI in lending services. The DF spans comprehensive mechanisms encompassing data collection, preprocessing, model development, deployment, monitoring, and governance. Core ethical dimensions of explainability, transparency, and equitable outcomes are recognized within the governance lifecycle stages. The DF continuously integrates novel industry regulatory standards and governance methodologies to identify, measure, and mitigate ethical risks, ensuring operational efficiency and adherence to ethical principles. This research provides a structured approach grounded in deterministic methods, enabling measurable, repeatable, and auditable business processes to enable trust and accountability in AI-driven ALS. An empirical case study focusing on ALS for students and their families is presented to evaluate the DF's applicability and effectiveness. The findings provide actionable insights for financial institutions, policymakers, and technologists seeking to implement ethical AI practices, strengthen risk management, and deliver equitable and accountable lending services to diverse populations.
Authors - Oleksandr Kurbatov, Lasha Antadze, Ameen Soleimani, Kyrylo Riabov, Artem Sdobnov Abstract - This article proposes an extension for privacy-preserving applications to introduce sanctions or prohibition lists. When initiating a particular action, the user can prove, in addition to the application logic, that they are not part of the sanctions lists (one or more) without compromising sensitive data. We will show how this solution can be integrated into applications, using the example of extending Freedom Tool (a voting solution based on biometric passports). We will also consider ways to manage these lists, versioning principles, configuring the filter data set, combining different lists, and using the described method in other privacy-preserving applications.
Authors - Asmaa Berdigh, Kenza Oufaska, Khalid El Yassini Abstract - The inclusion of wireless communication technologies in the car industry has drastically reshaped it over the last two decades. This evolution began with the integration of Bluetooth and Smart Key technology in 1998 and has since progressed to the application of wireless communication in the cell monitoring controller of battery management systems. The objective of this study is to conduct an SMS to evaluate the research investigating wireless communication technologies used in the in-vehicle network. We adopt the Systematic Mapping Study (SMS) approach, a rigorously defined research methodology with roots in the medical and software engineering, using defined criteria to filter out the research contributions stored in both Scopus and GoogleScholar databases over the last twenty years. We synthesize the resulting data and produce this article. This work aims to organize information from studies published within this disciplinary field over the past two decades, presenting them in a systematic map form, and discussing the results and their implications for future research, concluding by a visual display of which automotive domains have the largest wireless communication. The SMS provides a clear and comprehensive picture drawn from precise questions. The derived outcomes could hold significance for both researchers and industry professionals considering the integration of wireless communication technologies within in-vehicle networks. Despite the substantial body of research identified over the past 20 years on wireless technologies, only a limited number of studies have specifically focused on the In-Vehicle Networks.
Authors - Esther Endjala, Hanifa Abdullah, Mathias Mujinga Abstract - This paper explores the theoretical and strategic foundations for cultivating a cybersecurity culture within telecommunications institutions. Drawing on established behavioral theories Social Cognitive Theory (SCT), Protection Motivation Theory (PMT), Theory of Planned Behavior (TPB), and Technology Acceptance Model (TAM) it examines the opportunities for enhancing cybersecurity awareness and transforming employee behaviors into a resilient human firewall. The paper synthesizes existing literature to highlight the role of leadership, employee engagement, training, collaboration, and recognition in fostering a cybersecurity culture. The review further identifies gaps and limitations in the current approaches, proposing a conceptual foundation for developing an effective cybersecurity culture framework tailored to telecommunications institutions. Appropriate cybersecurity culture is essential in developing the entity and helps protect organizational assets such as data, networks, and systems when technical defenses are quite significant. The section takes into consideration the theoretical aspect of cybersecurity culture and comes out with a derived underlying framework that incorporates aspects like the Social Cognitive Theory, Protection Motivation Theory, Theory of Planned Behavior, and Technology Acceptance Model. Creating a strong cybersecurity culture faces several significant challenges, including resistance to change, limited resources, and regulatory hurdles. The proposed framework emphasizes the importance of top management commitment, employee involvement, ongoing training, and interdepartmental collaboration as vital components for cultivating this culture. Organizations should address these challenges to successfully establish an effective cybersecurity culture. By integrating these elements, cybersecurity can become a fundamental organizational value, enhancing awareness, compliance, and employee engagement. This paper establishes the groundwork for further research on cybersecurity culture and outlines key steps to strengthen organizational resilience and ensure a safe digital environment.
Authors - Amna Altaf, Zeashan Khan, Adeel Mehmood, Jamshed Iqbal Abstract - Advancements in Artificial intelligence (AI) and robotics call for prioritising research in education and pedagogy in these domains including teachers’ training to practice emerging learning and teaching strategies. This paper explores the model of teachers’ training by using CDIO (Conceiving, Designing, Implementing and Operation) framework as a guide and a robotic platform as an example in AI education. In the pilot study, nine workshop sessions were designed and organised for a group of five teachers introducing them to robotics-led delivery of AI content using a mobile robot ‘Duckiebot’. The prominent workshop contents include robot vision, object detection, state estimation and localisation, task planning and reinforcement learning. Preliminary results in the form of feedback from the workshop participants demonstrated that the teaching model presented in this study made a promising contribution in terms of improving teachers’ intellectual and pedagogical skills as well as their confidence in achieving learning outcomes. The presented CDI-based robotics-led AI teaching model adds to the dialogue on innovative AI and engineering education methods. It is anticipated that wider dissemination of the findings in this research will lay the groundwork for a larger educational impact.