Skip to main navigation menu Skip to main content Skip to site footer

special issue

Vol. 2 No. 3 (2026): International Journal of Multidisciplinary Research

AI-Powered Closed-Loop Fusion: Demand-Technology-Implementation Synergy Across Business, Finance, and Cybersecurity (2022-2026)

  • Mei Wang
Submitted
March 25, 2026
Published
2026-04-02

Abstract

The cross-domain integration of artificial intelligence (AI) has formed a dynamic closed-loop ecosystem among digital commerce, finance, and cybersecurity—driven by mutually reinforcing demand pull, technical spillover, and implementation feedback. This review synthesizes 7 key studies (2022-2026) to unpack the "demand-technology-implementation" (DTI) closed-loop logic: digital commerce’s demand for inclusive growth and privacy protection spurs AI technical innovation; financial sector’s need for resource optimization and ESG compliance adopts and refines these technologies; cybersecurity’s requirement for risk balance provides safeguards for technical 落地;and implementation outcomes from all three domains feed back to refine AI solutions. Findings reveal that: privacy-enhancing technologies (PETs) and modular AI architectures are the core technical bridges; SMEs act as the key link for inclusive value diffusion; and risk-cost balance is the common optimization target. This closed-loop framework explains how AI enables seamless fusion across business, finance, and cybersecurity, offering guidance for researchers designing cross-domain AI and practitioners building integrated ecosystems.

References

  1. Yi, X. (2026). A Federated and Differentially Private Incentive–Marketing Framework for Privacy-Preserving Cross-Channel Measurement in AI-Powered Digital Commerce.
  2. Yi, X. (2026). Trusted AI Commercialization Infrastructure for SMBs: A Unified Multi-Tenant Architecture Integrating Incentive Systems, Content Governance, and Standardized Recommendation APIs.
  3. Liu, T. (2022, December). Financial Constraint’Impact on Firms’ ESG Rating Based on Chinese Stock Market. In 2022 4th International Conference on Economic Management and Cultural Industry (ICEMCI 2022) (pp. 1085-1095). Atlantis Press.
  4. Zhou, D. (2026). AI-Driven Hybrid SAST–DAST–SCA–IAST Framework for Risk-Based Vulnerability Prioritization in Microservice Architectures.
  5. Zhou, D. (2025, December). M-VP2: Microservice-Oriented Vulnerability Patch Planning-A Cost-Aware Approach using Multi-Agent Reinforcement Learning. In 2025 5th International Conference on Computer, Internet of Things and Control Engineering (CITCE) (pp. 248-254). IEEE.
  6. Li, H., & Liu, T. (2023). Portfolio optimization based on the LSTM forecasting model. In Proceedings of the 2nd International Conference on Financial Technology and Business Analysis (Vol. 48, No. 1, pp. 97-106).
  7. Yi, X. (2026). Privacy-Enhanced Ad Targeting for Social E-Commerce: A Federated Learning Framework with Zero-Knowledge Verification for Creator Monetization. Frontiers in Business and Finance, 3(1), 102-113.