scholarly journals Avoidance of Cybersecurity Threats with the Deployment of a Web-Based Blockchain-Enabled Cybersecurity Awareness System

2021 ◽  
Vol 11 (17) ◽  
pp. 7880
Author(s):  
Abdul Razaque ◽  
Abrar Al Ajlan ◽  
Noussaiba Melaoune ◽  
Munif Alotaibi ◽  
Bandar Alotaibi ◽  
...  

Modern information technology (IT) is well developed, and almost everyone uses the features of IT and services within the Internet. However, people are being affected due to cybersecurity threats. People can adhere to the recommended cybersecurity guidelines, rules, adopted standards, and cybercrime preventive measures to largely mitigate these threats. The ignorance of or lack of cybersecurity knowledge also causes a critical problem regarding confidentiality and privacy. It is not possible to fully avoid cybercrimes that often lead to sufficient business losses and spread forbidden themes (disgust, extremism, child porn, etc.). Therefore, to reduce the risk of cybercrimes, a web-based Blockchain-enabled cybersecurity awareness program (WBCA) process is introduced in this paper. The proposed WBCA trains users to improve their security skills. The proposed program helps with understanding the common behaviors of cybercriminals and improves user knowledge of cybersecurity hygiene, best cybersecurity practices, modern cybersecurity vulnerabilities, and trends. Furthermore, the proposed WBCA uses Blockchain technology to protect the program from potential threats. The proposed program is validated and tested using real-world cybersecurity topics with real users and cybersecurity experts. We anticipate that the proposed program can be extended to other domains, such as national or corporate courses, to increase the cybersecurity awareness level of users. A CentOS-based virtual private server is deployed for testing the proposed WBCA to determine its effectiveness. Finally, WBCA is also compared with other state-of-the-art web-based programs designed for cybersecurity awareness.

Author(s):  
Abdul Razaque ◽  
Abrar M Alajlan ◽  
Noussaiba Melaoune ◽  
Munif Alotaibi ◽  
Bandar Alotaibi ◽  
...  

The ignorance of or lack of knowledge about cybersecurity aspects causes a critical problem regarding confidentiality and privacy. This security problem will continue to exist even if the user possesses less expertise in information security. The modern IT technologies are well developed, and almost everyone uses the features of IT technologies and services within the Internet. However, people are being affected due to cybersecurity threats. People can adhere to the recommended cybersecurity guidelines, rules, adopted standards, and cybercrime preventive measures. However, it is not possible to entirely avoid cybercrimes. Cybercrimes often lead to sufficient business losses and spread forbidden themes (hatred, terrorism, child porn, etc.). Therefore, to reduce the risk of cybercrimes, a web-based Blockchain-enabled cybersecurity awareness program (WBCA) process is introduced in this paper. The proposed web-based cybersecurity awareness program trains users to improve their security skills. The proposed program helps with understanding the common behaviors of cybercriminals and improves user knowledge of cybersecurity hygiene, best cybersecurity practices, modern cybersecurity vulnerabilities, and trends. Furthermore, the proposed WBCA uses the Blockchain technology to protect the model from the potential threats. The proposed model is validated and tested using real-world cybersecurity topics with real users and cybersecurity experts. We anticipate that the proposed program can be extended to other domains, such as national or corporate courses, to increase the cybersecurity awareness level of users.


2020 ◽  
Vol 11 (SPL1) ◽  
pp. 1144-1150
Author(s):  
Muralidharan V A ◽  
Gheena S

Covid -19 is an infectious disease caused by the newly discovered strain of coronavirus. As there is no vaccine discovered, the only way to prevent the spread is through following the practice of social isolation. But prolonged isolation may also lead to psychological stress and problems. The objective of the survey was to assess the knowledge and awareness of preventive measures against Covid 19 amongst small shop owners. A web-based cross-sectional study was conducted amongst the small shop owners.  A structured questionnaire comprising 15-17 questions had been put forth to assess the Covid 19 related knowledge and perception. The shopkeepers were contacted telephonically and responses recorded. The data analysis was performed using IBM SPSS statistics. Although the majority of the population had a positive perception about the preventive measures against the Covid spread, 36% of the shopkeepers were not aware of the preventive measures against the Covid spread. This study found optimal knowledge and perception of the preventive measures against Covid spread among the shopkeepers but misinformation and misunderstanding still prevailing. The shopkeepers are crucial in the prevention of the spread of Covid 19 and educating them might aid us in the fight against Covid- 19. 


2021 ◽  
Vol 54 (7) ◽  
pp. 1-39
Author(s):  
Ankur Lohachab ◽  
Saurabh Garg ◽  
Byeong Kang ◽  
Muhammad Bilal Amin ◽  
Junmin Lee ◽  
...  

Unprecedented attention towards blockchain technology is serving as a game-changer in fostering the development of blockchain-enabled distinctive frameworks. However, fragmentation unleashed by its underlying concepts hinders different stakeholders from effectively utilizing blockchain-supported services, resulting in the obstruction of its wide-scale adoption. To explore synergies among the isolated frameworks requires comprehensively studying inter-blockchain communication approaches. These approaches broadly come under the umbrella of Blockchain Interoperability (BI) notion, as it can facilitate a novel paradigm of an integrated blockchain ecosystem that connects state-of-the-art disparate blockchains. Currently, there is a lack of studies that comprehensively review BI, which works as a stumbling block in its development. Therefore, this article aims to articulate potential of BI by reviewing it from diverse perspectives. Beginning with a glance of blockchain architecture fundamentals, this article discusses its associated platforms, taxonomy, and consensus mechanisms. Subsequently, it argues about BI’s requirement by exemplifying its potential opportunities and application areas. Concerning BI, an architecture seems to be a missing link. Hence, this article introduces a layered architecture for the effective development of protocols and methods for interoperable blockchains. Furthermore, this article proposes an in-depth BI research taxonomy and provides an insight into the state-of-the-art projects. Finally, it determines possible open challenges and future research in the domain.


Author(s):  
yifan yang ◽  
Lorenz S Cederbaum

The low-lying electronic states of neutral X@C60(X=Li, Na, K, Rb) have been computed and analyzed by employing state-of-the-art high level many-electron methods. Apart from the common charge-separated states, well known...


Clean Energy ◽  
2021 ◽  
Vol 5 (1) ◽  
pp. 104-123
Author(s):  
Manish Kumar Thukral

Abstract Renewable-energy resources require overwhelming adoption by the common masses for safeguarding the environment from pollution. In this context, the prosumer is an important emerging concept. A prosumer in simple terms is the one who consumes as well as produces electricity and sells it either to the grid or to a neighbour. In the present scenario, peer-to-peer (P2P) energy trading is gaining momentum as a new vista of research that is viewed as a possible way for prosumers to sell energy to neighbours. Enabling P2P energy trading is the only method of making renewable-energy sources popular among the common masses. For making P2P energy trading successful, blockchain technology is sparking considerable interest among researchers. Combined with smart contracts, a blockchain provides secure tamper-proof records of transactions that are recorded in distributed ledgers that are immutable. This paper explores, using a thorough review of recently published research work, how the existing power sector is reshaping in the direction of P2P energy trading with the application of blockchain technology. Various challenges that are being faced by researchers in the implementation of blockchain technology in the energy sector are discussed. Further, this paper presents different start-ups that have emerged in the energy-sector domain that are using blockchain technology. To give insight into the application of blockchain technology in the energy sector, a case of the application of blockchain technology in P2P trading in electrical-vehicle charging is discussed. At the end, some possible areas of research in the application of blockchain technology in the energy sector are discussed.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Christoph Wronka

Purpose The aim of this paper is to assess the relevance of cryptocurrencies with regard to the money laundering risk on the market and to present widespread money laundering techniques and recognizable patterns of abuse. In addition, this paper aims to find an answer to the question to what extent the measures of the fifth EU Anti-Money Laundering Directive (AMLD) as well as other appropriate preventive measures are sufficient to reduce the money laundering risk in the area of virtual currencies (VC). Design/methodology/approach Firstly, the analysis requires a consideration of the theoretical foundations of money laundering methods, as well as a presentation of the technical foundations of cryptocurrencies and their ecosystem. Secondly, it is discussed to what extent VC are suitable for money laundering, which characteristics enable them to launder money and which new money laundering techniques result from this. In addition, a comparison of different money laundering risk classification is done in relation to VC from the perspective of different actors in the financial market. Findings Owing to their simple electronic storage and transferability, crypto assets pose a concrete risk of money laundering. Their inclusion in the fifth AMLD was therefore a necessary step by the European legislator. However, the question arises to whether the directive and the further preventive measures presented in this paper sufficiently fulfil the objective of reducing the money laundering risk in relation to VC. One positive aspect is the inclusion of the crypto custody business as a financial service in the German Banking Act. According to the definition in Section 1 (1a) sentence 2 no. 6, the offering of wallets is subject to authorization and the offering party becomes an obligated party within the meaning of the Germany Money Laundering Act. From a supervisory point of view, the new licensing requirement is very much welcomed, as the custody of private cryptographic keys entails considerable risks. However, non-custodian wallet providers who do not store the private keys of their users, are not covered. A closer analysis of the amending directive to the fourth EU AMLD reveals that other relevant players in the crypto market, such as mixer and tumbler services, are also not covered. Originality/value It is quite clear that cryptocurrencies and the blockchain technology will continue to accompany one in the coming years. Further credit institutions arising in the market exposed to the described risks will be seen. The paper will therefore present and evaluate possible risk reduction/options for anti-money laundering for new and existing financial institutions.


2014 ◽  
Vol 12 (1) ◽  
pp. 35-52 ◽  
Author(s):  
Mariana Curado Malta ◽  
Ana Alice Baptista ◽  
Cristina Parente

This paper presents the state of the art on interoperability developments for the social and solidarity economy (SSE) community web based information systems (WIS); it also presents a framework of interoperability for the SSE' WIS and the developments made in a research-in-progress PhD project in the last 3 years. A search on the bibliographic databases showed that so far there are no papers on interoperability initiatives on the SSE, so it was necessary to have other sources of information: a preliminary analysis of the WIS that support SSE activities; and interviews with the representatives of some of the world's most important SSE organisations. The study showed that the WIS are still not interoperable yet. In order to become interoperable a group of the SSE community has been developing a Dublin Corre Application Profile to be used by the SSE community as reference and binding to describe their resources. This paper also describes this on-going process.


Sensors ◽  
2021 ◽  
Vol 21 (20) ◽  
pp. 6780
Author(s):  
Zhitong Lai ◽  
Rui Tian ◽  
Zhiguo Wu ◽  
Nannan Ding ◽  
Linjian Sun ◽  
...  

Pyramid architecture is a useful strategy to fuse multi-scale features in deep monocular depth estimation approaches. However, most pyramid networks fuse features only within the adjacent stages in a pyramid structure. To take full advantage of the pyramid structure, inspired by the success of DenseNet, this paper presents DCPNet, a densely connected pyramid network that fuses multi-scale features from multiple stages of the pyramid structure. DCPNet not only performs feature fusion between the adjacent stages, but also non-adjacent stages. To fuse these features, we design a simple and effective dense connection module (DCM). In addition, we offer a new consideration of the common upscale operation in our approach. We believe DCPNet offers a more efficient way to fuse features from multiple scales in a pyramid-like network. We perform extensive experiments using both outdoor and indoor benchmark datasets (i.e., the KITTI and the NYU Depth V2 datasets) and DCPNet achieves the state-of-the-art results.


2018 ◽  
Vol 11 (2) ◽  
pp. 137-156 ◽  
Author(s):  
Zaheer Allam

AbstractAs the Blockchain technology is gaining momentum in popular culture through Cryptocurrencies, its full implication and application to businesses, on a concrete and factual level, is still seen to be in its infancy stage. While the technology provides numerous advantages regarding stability, trust, speed and others, the robustness of the technology is not widely disseminated. This is further coupled by the common notion of resistance to change in business management processes. This paper explores the concept of Smart Contracts through the blockchain technology and its relevance to the business sector and further outlines the advantages and limitations of its applicability as of date.


Author(s):  
Yunhong Gong ◽  
Yanan Sun ◽  
Dezhong Peng ◽  
Peng Chen ◽  
Zhongtai Yan ◽  
...  

AbstractThe COVID-19 pandemic has caused a global alarm. With the advances in artificial intelligence, the COVID-19 testing capabilities have been greatly expanded, and hospital resources are significantly alleviated. Over the past years, computer vision researches have focused on convolutional neural networks (CNNs), which can significantly improve image analysis ability. However, CNN architectures are usually manually designed with rich expertise that is scarce in practice. Evolutionary algorithms (EAs) can automatically search for the proper CNN architectures and voluntarily optimize the related hyperparameters. The networks searched by EAs can be used to effectively process COVID-19 computed tomography images without expert knowledge and manual setup. In this paper, we propose a novel EA-based algorithm with a dynamic searching space to design the optimal CNN architectures for diagnosing COVID-19 before the pathogenic test. The experiments are performed on the COVID-CT data set against a series of state-of-the-art CNN models. The experiments demonstrate that the architecture searched by the proposed EA-based algorithm achieves the best performance yet without any preprocessing operations. Furthermore, we found through experimentation that the intensive use of batch normalization may deteriorate the performance. This contrasts with the common sense approach of manually designing CNN architectures and will help the related experts in handcrafting CNN models to achieve the best performance without any preprocessing operations


Sign in / Sign up

Export Citation Format

Share Document