scholarly journals Quantum Internet and Security of Military Communications

2021 ◽  
Vol 26 (4) ◽  
pp. 293-298
Author(s):  
Florin Popescu ◽  
George Bucăţa ◽  
Sorin Pistol

Abstract In general, the Internet relies on complex codes to protect information, but hackers are becoming more adept at defeating such systems. These cyberattacks lead to privacy breaches of government officials, as well as large corporations, costing billions of euros per year in total and compromising customer data. According to ENISA reports, these numbers are set to rise. Quantum technology is seen by scientists as a revolutionary replacement for standard encryption techniques.

2021 ◽  
Vol 11 (1) ◽  
pp. 81-95
Author(s):  
T Pradita ◽  
A Mubarok

The development of services has developed into the internet media, to make it easier for customers and employees in managing a job. In the problem of Lucky Photo, which covers services including printing, sales, stock of goods, purchases, and reports are not effective properly. The researcher aims to develop a service system entitled Service Information Systems at Lucky Photo. By building a web-based application, a waterfall method is needed to become a benchmark for the creation of a service information system, so the results will be obtained on a web-based application system to demand progress in a company, including services that become easier, easier customer service in conduct transactions, generate reports, and process customer data. So it can be concluded that with the construction of a new Service Information System it will be easier to make transactions, make it easier for customers, create reports, and process customer data that is embedded in the Mysql database which will become a well-systemized report.


2020 ◽  
pp. 1672-1685
Author(s):  
Timo Kiravuo ◽  
Seppo Tiilikainen ◽  
Mikko Särelä ◽  
Jukka Manner

The developed society depends on many critical infrastructure processes, such as power generation, water treatment, many types of manufacturing, and smart buildings. These processes need control and the automation industry has embraced the Internet to connect all these controls. However, the controlling devices thus opened to the world do not always have adequate safeguards to withstand malicious users. Many automation systems have default passwords or known and unknown backdoors. Also, often those systems are not updated to close security weaknesses found after original installation. The authors argue that while the industry is familiar with the notion of safety of equipment and processes, it has not focused enough on IT security. Several years ago the Shodan search engine showed how easy it is to find these control devices on the Internet. The authors followed this research line further by targeting one nation's IP address space with Shodan and found thousands of control systems, many of which represent models and versions with known vulnerabilities. Their first contribution is presenting these findings and analyzing their significance. Their study started in 2012 and the most recent results are from the end of 2015. To gain further knowledge, they have built a prototype scanner capable of finding industrial control systems. This lets the authors evaluate the possibility of performing routine scans to gauge the vulnerability of a nation. Their second contribution is to present a template for a national Internet scanning program. The authors discuss the technology, performance, and legality of such a program. Based on their findings and analysis they argue that nations should continuously monitor their own Internet address space for vulnerabilities. The authors' findings indicate that the current level of vulnerabilities is significant and unacceptable. Scanning a nation's critical infrastructure can be done in minutes, allowing them to keep a tight control of vulnerabilities. Yet, in addition, the authors need to extend current legislation and the rights of government officials to bring more security in national critical infrastructures; this discussion is their third contribution. The cyber-space has become a playing field for criminals, terrorists and nation states, all of which may have a motive to disrupt the daily life of a nation, and currently causing such disruptions is too easy.


Author(s):  
M. Holzer ◽  
R. W. Schwester

Cynicism toward government is largely a function of trust and social capital (Berman 1997; Putnam 2000). The relationship between government and its citizens has been strained. First, some citizens cynically feel as though government officials abuse their powers in the interest of self-aggrandizement; second, citizens often feel disconnected from government; third, government service delivery is frequently portrayed as inadequate. Administrative strategies to reverse these perceptions typically emphasize the benefits of government and improved service delivery. Some go further, offering individuals a means of influencing public policy and government decision-making, as opposed to traditional structures and cultures of policymaking that minimize citizen input. The Internet is a potentially powerful means for citizen consultation, and may help cultivate a governmental landscape in which information is more accessible, people feel more connected to government, and citizens are better able to participate in political and decision-making processes. This article examines the Internet as a consultative medium, whereby emphasis is placed on government efforts to use Web-based applications as a means of promoting meaningful citizen participation.


2017 ◽  
Vol 7 (2) ◽  
pp. 197-213 ◽  
Author(s):  
Jennifer Pan

The Chinese regime has launched a number of online government transparency initiatives to increase the volume of publicly available information about the activities of lower-level governments. By analyzing online content produced by local government officials to fulfill these transparency requirements—a random sample of 1.92 million county-level government web pages—this paper shows how websites are commandeered by local-level officials to construct their public image. The majority of content on government websites emphasizes either the competence or benevolence of county executives, depending on where leaders are in the political tenure cycle. Early tenure county executives project images of benevolence by emphasizing their attentiveness and concern toward citizens. Late tenure executives project images of competence by highlighting their achievements. These findings shift the nature of debates concerning the role of the Internet in authoritarian regimes from a focus on regime–society interactions to an examination of dynamics among regime insiders. By focusing on communication and the flow of information between upper-level leaders and lower-level regime agents, this paper reveals how the Internet becomes a vehicle of self-promotion for local politicians.


2019 ◽  
Vol 6 (1) ◽  
pp. 54
Author(s):  
Azharuddin Azharuddin

The presence of the Internet Banking service has offered a number of convenience and flexibility in conducting transactions, both between the bank and its customers, the bank and merchant, bank with the bank and the customer with the customer. However, this simplicity does not mean no risk. In addition to the Internet Banking service provides convenience, also in fact have some risks. The risk of a new character and is a challenge for practitioners and experts in the field of Internet Banking service to handle it, so it becomes important to discuss the legal efforts to protect customers' personal data in the operation of Internet Banking service after changes in legislation and elektronic information transaction. Forms of protection against customer data in Internet Banking in Indonesia are from several types of regulations that have regulated internet banking, namely Bank Indonesia Regulation Number 9/15 / PBI / 2007 concerning Application of Risk Management in the Use of Information Technology by Commercial Banks and Act No. 19 of 2016 concerning Amendments to Act No. 8 of 2011 concerning Electronic Information and Transactions along with the Financial Services Authority Act in the section on consumer protection


SISFORMA ◽  
2021 ◽  
Vol 8 (1) ◽  
pp. 37
Author(s):  
Ahmad Habib ◽  
Ardy Januantoro ◽  
Okky Candra Srimarsono

In the information age, technology has become one of the things that are growing more rapidly, one of the technologies is the internet. From the use of the internet, it can also be used by sales that have Android mobile-based bread ordering information systems. By only using a cell phone, system users can order bread. This can be a tool in the special community in ordering bread. As with computers, mobile phones can also install a variety of software or software that they want. Besides, android phones can also be used for transactions. Like making a bread order transactions through an android phone. The stages that will be carried out by the author for the application development process include analysis and needs, application design, and application interface design, so that the application is made easy to use. The ordering system designed can make it easier for admin to view order details, check stock, manage customer data by using a database as a storage medium, and can also provide customers to buy stock of bakery goods available at these outlets to provide accurate information. The SMART method has been proven to be implemented in searches based on user preferences, and gives different results if the value of the criteria entered is different. However, conventional search methods are still provided in addition to searching for goods using the SMART Method.


Author(s):  
Pravin S. Rotkar ◽  
Gayatri Butey

Cloud computing is one of the newest developments in the area of information technology. Cloud computing has developed in recent years from a theoretical term into practical implementations in various industries, such as Healthcare and telecommunications. In order to manage customer data and software, Cloud Computing uses the Internet and remote servers. It offers consumers and companies permission to use software without download to access their personal accounts, data and information with the aid of the internet in every corner of the globe. There are numerous types of software programs operating in cloud computing environments. One of the main cloud computing offerings is e-Commerce. In small and medium-sized businesses, e-commerce needs better facilities to accommodate them. In this study, we examined how cloud computing influences e-commerce businesses. Except that, in the cloud computing era, it studied the driving factors that contributed to improvements in e-commerce. In this article, the cloud computing-based e-commerce application model manages the issue of e-commerce and resource scarcity by developing the cloud computing-based e-commerce application paradigm and how cloud computing affects e-commerce services and applications.


2019 ◽  
Vol 16 (2) ◽  
Author(s):  
Dian Alan Setiawan

The development of technology and the internet does not always produce positive things. Negative things that are side effects include the crime of skimming (theft of customer data) which is one type of crime in cyberspace. Lately Indonesia is enlivened with breaking ATM news that occurred in various regions in Indonesia. The customers suddenly lose their account balance due to being burglarized by irresponsible people. ATM piercing technique is known as ATM Skimmer Scan technique. ATM machine piercing (Automated Teller Machine) using Skimmer, which is a customer data thieves. The modus operandi of bank breakers is installing skimmer in ATM mouth. After the customer data obtained, the perpetrator just insert into the ATM card. burglars will freely drain the customer's money. Problems that arise is the development of modus operandi crime skimming in the case of bank burglary bank as a form of cybercrime (cybercrime) And Efforts / Legal Steps in Tackling Crime Use of Information Systems and Electronic Transactions. This research is legal research using conceptual approach and statue approach which will review Law Number 11 Year 2008 regarding Information and Electronic Transaction. Based on the method used, it is known that the modus operandi of criminal skimming in ATM bankruptcy as a form of cyber crime and the application of article in Law Number 11 Year 2008 regarding Information and Electronic Transaction as an effort / step in tackling the crime of Information System Use and Electronic Transactions.


1999 ◽  
Vol 14 (4) ◽  
pp. 347-360 ◽  
Author(s):  
Mireille S. Threlkel ◽  
C. Bruce Kavan

Traditional EDI/VAN technology has been used for almost three decades and has brought its users significant advantages resulting in increased productivity and efficiency. However, implementation constraints have restricted the technology to predominantly large corporations, thus limiting EDI's reach to a broader base of small suppliers and customers. Internet-based EDI, with significantly fewer implementation constraints, can play an important role in extending EDI benefits to a wider spectrum of businesses. Recently published articles reflect a reluctance on the part of traditional EDI users to adopt this new communication modality. The reasons for this reluctance include the newness of the Internet technology, potential Internet legislation and lack of Internet standards plus the reliability and security of data transmission within the Internet environment. This paper examines these management issues and describes existing and potential solutions available to both new and traditional EDI users. Since few companies have embraced Internet-based EDI, this paper concludes with some successful Internet EDI-based cases. Along with these cases, the authors present a very broad description of the nature of the products and services currently available in the market today to support Internet-based EDI.


2011 ◽  
pp. 2867-2874
Author(s):  
Mark Holzer ◽  
Richard W. Schwester

Cynicism toward government is largely a function of trust and social capital (Berman 1997; Putnam 2000). The relationship between government and its citizens has been strained. First, some citizens cynically feel as though government officials abuse their powers in the interest of self-aggrandizement; second, citizens often feel disconnected from government; third, government service delivery is frequently portrayed as inadequate. Administrative strategies to reverse these perceptions typically emphasize the benefits of government and improved service delivery. Some go further, offering individuals a means of influencing public policy and government decision-making, as opposed to traditional structures and cultures of policymaking that minimize citizen input. The Internet is a potentially powerful means for citizen consultation, and may help cultivate a governmental landscape in which information is more accessible, people feel more connected to government, and citizens are better able to participate in political and decision-making processes. This article examines the Internet as a consultative medium, whereby emphasis is placed on government efforts to use Web-based applications as a means of promoting meaningful citizen participation.


Sign in / Sign up

Export Citation Format

Share Document