European Journal of Computer Science and Information Technology (EJCSIT)

Identity

Between Man and Machine: Rethinking Identity in Martha Wells’ Artificial Condition and Fugitive Telemetry (Published)

This paper expatiates on the human-machine interaction in the AI era through the prism of Wells’ Artificial Condition and Fugitive Telemetry. It questions the human ability to cope with bots which assume such roles as human saviors and murder investigators. It is theoretically inscribed within the precincts of posthumanism, as these bots are posthumans with super-exceptional capacities. This study highlights that humans and their intelligence are at risk as they can be surpassed. Human intelligence is under erasure[1]. Also, the boundaries between the real and artificial are blurred and human identity is steeped in ambivalence in different artificial conditions that pose security-related issues among both scrupulous and rogue machines.

 

Keywords: Artificial Intelligence, Identity, artificial conditions, replacement, subversion

Enhancing Healthcare Data Security with Cloud Identity Solutions (Published)

Healthcare organizations face unprecedented challenges in securing patient data while maintaining operational efficiency in an increasingly digital landscape. Cloud-based identity and access management solutions have emerged as critical infrastructure components for protecting sensitive medical information across distributed healthcare environments. These platforms address the complex requirements of modern healthcare delivery by implementing sophisticated authentication mechanisms, granular access controls, and comprehensive audit capabilities that align with stringent regulatory frameworks including HIPAA and GDPR. The technical architecture incorporates industry-standard protocols such as SAML, OAuth, and OpenID Connect while supporting healthcare-specific standards like HL7 FHIR for seamless interoperability. Advanced features including multi-factor authentication, risk-based access controls, and identity federation enable healthcare providers to secure access across multiple applications and organizational boundaries without impeding clinical workflows. Implementation strategies emphasize phased deployment approaches, automated lifecycle management, and continuous monitoring to ensure robust security postures while reducing administrative overhead. Real-world deployments demonstrate significant improvements in security metrics, operational efficiency, and regulatory compliance, positioning cloud identity solutions as foundational elements for future healthcare digital transformation initiatives.

Keywords: Authentication, Compliance, Healthcare, Identity, Security

Scroll to Top

Don't miss any Call For Paper update from EA Journals

Fill up the form below and get notified everytime we call for new submissions for our journals.