ARIS2 - Advanced Research on Information Systems Security <p>Welcome, fellow colleague</p> <p>The <em><strong>ARIS<sup>2</sup> - Advanced Research on Information Systems Security, an</strong></em><em><strong> International Journal,</strong> </em>focuses on the original research and practice-driven applications with relevance to Information Security and Data Protection, sponsored by <strong>IPGT - Polytechnic Institute of Management and Technology</strong>, published by <strong>LAPI2S<sup> </sup>- Laboratory of Privacy and Information Systems Security and </strong>based in Porto, Portugal, owned and edited by Professor Nuno Mateus-Coelho.</p> <p><strong><em>ARIS<sup>2</sup></em></strong> provides a common linkage between a vibrant scientific and research community and industry professionals by offering a clear view of modern problems and challenges in information security, as well as identifying promising scientific and "best-practice" solutions.</p> <p><strong><em>ARIS<sup>2</sup></em></strong> issues offer a balance between original research work and innovative industrial approaches by internationally renowned information security experts and researchers.</p> <p>We have the pleasure to extend a warm welcome to everyone planning to submit to <strong>ARIS<sup>2</sup> – Advanced Research on Information Systems Security.</strong></p> <p><strong>Online ISSN: 2795-4560</strong></p> <p><strong>Print ISSN: </strong><strong>2795-4609</strong></p> <p>Best Regards,</p> <p>Editorial Team</p> en-US (Prof. Dr. Nuno Mateus-Coelho) (Dr. André Costa) Tue, 14 Jun 2022 00:00:00 +0100 OJS 60 The Editorial of ARIS2 - Advanced Research on Information Systems Security, an International Journal <p>As the year 2022 enters its middle range, the world is assisting an abnormal event with a heavy impact on cyber security, the Russian-Ukraine conflict. Since the beginning of this conflict that two immense groups have been created and explore security flaws within each side and to do so with success, they resort to vulnerabilities, coercion, or social engineering techniques. Protecting information, actors, and their frameworks has emerged as a critical struggle and science has an immense role in performing and maintaining security actors one step forward in this scenario.</p> Nuno Mateus-Coelho Copyright (c) 2022 Nuno Mateus-Coelho Thu, 18 Aug 2022 00:00:00 +0100 Artificial Intelligence as a Support Tool to Cybersecurity Activities <p>The present study is based on the analysis of the concepts of Cybersecurity and Artificial Intelligence, focusing on how both relate to each other. The COVID-19 pandemic and the fact that the world was forced into confinement had a huge impact on the increase of cyber-attacks and the birth of new threats. Currently, Cybersecurity is becoming an extremely complicated task, as we can no longer think of blocking an attack only by resorting to humans. The advanced and automated ways in which attacks have been developing mean that the task of defence must also be automated. Artificial Intelligence, due to its particularities, meets this need. This technology has been playing an increasingly important role in Cybersecurity, even though we may still consider it to be at an early stage</p> José Arnaud, Paulo Matos Copyright (c) 2022 José Aurnauth, Paulo Matos Tue, 14 Jun 2022 00:00:00 +0100 Analysis of Infrastructural Challenges, Cybercrime, and the Cashless Policy in Nigeria <p><strong>Abstract</strong></p> <p><em>This study makes an analysis of infrastructural challenges and the cashless policy in Kaduna state, Nigeria. A survey was conducted to collect the primary data through a structured questionnaire and interviews with bank customers, bank officials, and security personnel to obtain information on infrastructural challenges since the introduction of the Cashless policy by the Central Bank of Nigeria in 2012. Frequency distribution and simple percentage methods are used to analyze the data.&nbsp; Findings show that infrastructural challenges include network failure and infrastructural deficiency, </em><em>debiting by Automated Teller Machine (ATM) without disbursing cash to beneficiaries, problems not rectified quickly by the banks, and charging by banks for using electronic banking methods.</em><em> This leads to fraud, cybercrimes, and reduced confidence in the banking system. It is recommended that banks should be made to provide the minimum</em> <em>infrastructure required for cashless policy to succeed. In addition, there should be adequate cyber security measures implemented by banks and the government.</em></p> Hassan Abdulazeez, Sule Magaji, Ibrahim Musa Copyright (c) 2022 Hassan Abdulazeez Thu, 11 Aug 2022 00:00:00 +0100