Open Access

Business Intelligence and GPS Spoofing: Navigating Cybersecurity Challenges in Digital Surveillance Systems

  
Jun 25, 2025

Cite
Download Cover

Anderson, M. (2025). GPS Spoofing Attacks Are Dangerously Misleading Airliners. IEEE Spectrum. https://areios.ca/gps-spoofing-attacks-are-dangerously-misleading-airliners/ Search in Google Scholar

Anil, A. M. (2025, January 13). Technology Convergence is Leading Us to the Fifth Industrial Revolution. World Economic Forum. https://www.weforum.org/stories/2025/01/technology-convergence-is-leading-theway-for-accelerated-innovation-in-emerging-technology-areas/ Search in Google Scholar

Burbank, J., Greene, T., & Kaabouch, N. (2024). Detecting and mitigating attacks on GPS devices. Sensors, 24(17), 5529. https://doi.org/10.3390/s24175529 Search in Google Scholar

Burton, S. L. (2024). Advancements in AI-Driven Education: Transforming Learning and Training withIntelligent Technologies. World Journal of Business Research, 4(1). World Journal of Business Research, 4(1), 9. Search in Google Scholar

Cyber Protection Magazine. (2024, July 16). The crucial role of regulatory frameworks in ensuring robust cyber security. Cyber Protection Magazine. https://cyberprotection-magazine.com/the-crucial-role-of-regulatory-frameworks-in-ensuring-robust-cyber-security Search in Google Scholar

Dey, N. S., Deepika, R., Tekuri, K., & Sanjana, U. (2024). Advancements in machine learning for anomaly detection in cyber security. In: Patil, M., Vyawahare, V., Birajdar, G. (eds) Intelligent Computing and Big Data Analytics. ICICBDA 2024. Communications in Computer and Information Science, 2234. Springer, Cham. https://doi.org/10.1007/978-3-031-74682-6_11 Search in Google Scholar

Dodla, T. R., & Jones, L. A. (2023). Mitigating Knowledge Management Internal and External Risk Factors: A Literature Review of Best Practices. Scientific Bulletin, 28(1), 44-54. Search in Google Scholar

Durbha, S.S., Sanyal, J., Yang, L., S Chaudhari, S., Bhangale, U., Bharambe, U., & Kurte, K. (2023). Advances in scalable and intelligent geospatial analytics: Challenges and applications (1st ed.). CRC Press. https://doi.org/10.1201/978100327092 Search in Google Scholar

Easterly, J. (2025, January 25). Strengthening America’s Resilience Against the PRC Cyber Threats. Cybersecurity and Infrastructure Security Agency (CISA). https://www.cisa.gov/news-events/news/strengthening-americas-resilience-against-prc-cyber-threats Search in Google Scholar

ElMarady, A. A., & Rahouma, K. (2022). High Accuracy Next Generation Air Traffic Surveillance System with Potential Cyber-Attacks. Journal of Aerospace Engineering and Technology. doi:10.21608/jaet.2022.137284.1162. Search in Google Scholar

Insider. (2025, March/April). GPS spoofing: Should operators be concerned? Insider. https://nbaa.org/news/business-aviation-insider/2024-03/gps-spoofing-should-operators-be-concerned/ Search in Google Scholar

Fox, J. (2023, December 8). Top cybersecurity statistics for 2024. Cobalt. https://www.cobalt.io/blog/cybersecurity-statistics-2024 Search in Google Scholar

GPS Spoofing WorkGroup. (2024, September 6). GPS spoofing: Final report of the GSP spoofing Workgroup. GPS Spoofing WorkGroup. https://ops.group/dashboard/wp-content/uploads/2024/09/GPS-Spoofing-Final-Report-OPSGROUP-WG-OG24.pdf Search in Google Scholar

Gartner. (2021, January 5). Predicts 2021: Analytics, BI and data science solutions — Pervasive, democratized and composable. Gartner. https://www.gartner.com/en/documents/3995129 Search in Google Scholar

Ghanbarzadeh, A., Soleimani, M., & Soleimani, H. (2025). GNSS/GPS spoofing and jamming identification using machine learning and deep learning. Cornell University. arXiv. Search in Google Scholar

Imkampe, J. J. (2023). Maritime navigation under threat: GNSS spoofing raises security concerns. RiskIntelligence. https://www.riskintelligence.eu/analyst-briefings/maritime-navigation-under-threat Search in Google Scholar

Jones, L. A. (2020). Reputation risk and potential profitability: Best practices to predict and mitigate risk through amalgamated factors. Capitol Technology University. Search in Google Scholar

Jones, L. A., & McAndrew, I. (2024). Investigating a Marginalized Business Asset: Opportunity Risk. In Innovations, Securities, and Case Studies Across Healthcare, Business, and Technology (pp. 26-49). IGI Global. Search in Google Scholar

Kerdvibulvech, C. (2024). Big data and AI-driven evidence analysis: a global perspective on citation trends, accessibility, and future research in legal applications. Journal of Big Data, 11, 180. https://doi.org/10.1186/s40537-024-01046-w Search in Google Scholar

Mebert, L., Barnes, R., Dalley, J., Gawarecki, L., Ghazi-Nezami, F., Shafer, G., Slater, J., & Yezbick, E. (2020). Fostering student engagement through a real-world, collaborative project across disciplines and institutions. Higher Education Pedagogies, 5(1), 30-51, DOI: 10.1080/23752696.2020.1750306 Search in Google Scholar

Military Sphere. (2024). Safeguarding GPS systems: The intersection of GPS and cybersecurity. Military Sphere. https://militarysphere.com/gps-and-cybersecurity/ Search in Google Scholar

Nazarzadeh Zare, M. and Parvin, E. (2024). The reasons for the gap between academic education and the required skills of the labor market in Iran, Journal of Applied Research in Higher Education, 16(3), pp. 831-842. https://doi.org/10.1108/JARHE-02-2023-0052 Search in Google Scholar

National Institute of Standards and Technology (NIST). (2019). Economic benefits of the global positioning system (GPS). NIST. https://www.gps.gov/governance/advisory/recommendations/2024-01-ESG-response-to-PNTAB.pdf Search in Google Scholar

Nobles, C., Burrell, D. N., Burton, S. L., & Waller, T. (2023). Driving into cybersecurity trouble with autonomous vehicles. In Handbook of Research on Cybersecurity Risk in Contemporary Business Systems (pp. 255-273). IGI Global. DOI: 10.4018/978-1-6684-7207-1.ch005 Search in Google Scholar

Novikara, A. (2024, December 9). Cybersecurity statistics 2024: Key insights and numbers. Nordlayer. https://nordlayer.com/blog/cybersecurity-statistics-of-2024/ Search in Google Scholar

Ogborigbo, J. C., Sobowale, O. S., Amienwalen, E. I., Owoade, Y., Samson, A. T., & Egerson, J. (2024). Strategic integration of cyber security in business intelligence systems for data protection and competitive advantage. World Journal of Advanced Research and Reviews, 23(1), 081-096. https://wjarr.com/ Search in Google Scholar

OpsGroup. (2023, October 9). The serious threat of GPS spoofing: an analysis. Aviation Week. https://aviationweek.com/business-aviation/safety-ops-regulation/serious-threat-gps-spoofing-analysis Search in Google Scholar

Pearson, A., & Deters, J. (2023). Questioning Implicit Assumptions–Proactively fostering inclusion in engineering activity design. The University of Melbourne. https://findanexpert.unimelb.edu.au/profile/991019-ashlee-pearson Search in Google Scholar

Rothenberger, L. (2023). Perspective description and delimitation of object and knowledge range. In Terrorism as Communication: Stocktaking, Explanations and Challenges (pp. 11-62). Wiesbaden: Springer Fachmedien Wiesbaden. Search in Google Scholar

Tariq, U., & Tariq, B. (2025). Signal characteristic analysis and anomaly detection for GPS spoofing mitigation. Ubiquitous Technology Journal, 1(1), 10-22. DOI: https://doi.org/10.71346/utj.v1i1.7 Search in Google Scholar

Updyke, E. (2025, January 8). How GPS spoofing endangers flights worldwide. Forbes. https://www.forbes.com/councils/forbestechcouncil/2025/01/08/aviations-hidden-threat-how-gps-spoofing-endangers-flights-worldwide/ Search in Google Scholar

Umer, M., Ashraf, I., & Park, Y. (2024). Enhanced Machine Learning Ensemble Approach for Securing Small Unmanned Aerial Vehicles from GPS Spoofing Attacks. IEEE Access. 10.1109/ACCESS.2024.3359700 Search in Google Scholar

Westbrook, T. (2024). Aircraft vulnerability to politically motivated Radio Frequency Interference (RFI) in Eastern Europe. Security and Defence Quarterly, 46(2), 104–117. doi:10.35467/sdq/178249. Search in Google Scholar

Zhou, T., Zhao, X., Xu, X., & Ren, S. (2024, October 29). Bileve: Securing text provenance in large language models against spoofing with bi-level signature. Cornell University. https://arxiv.org/abs/2406.01946 Search in Google Scholar