Cyber Attacks, Contributing Factors, and Tackling Strategies

2019 ◽  
pp. 60-77
Author(s):  
Samantha Bordoff ◽  
Quan Chen ◽  
Zheng Yan

This article describes how as access to the Internet has increased, cybersecurity has become important, with businesses and the government spending much time and resources to combat cyber attacks. The purpose of this article was to review the existing literature related to cybersecurity. Specifically, the review synthesizes the empirical research in (1) various types of cyber attacks, (2) contributing factors related to cybersecurity behavior, and (3) strategi to improve cybersecurity behavior. The most developed line of research in this area has been focusing on the strategies to improve cybersecurity behavior, showing a questionable trend of quickly creating solutions before fully conceptualizing the problem.

Author(s):  
Samantha Bordoff ◽  
Quan Chen ◽  
Zheng Yan

This article describes how as access to the Internet has increased, cybersecurity has become important, with businesses and the government spending much time and resources to combat cyber attacks. The purpose of this article was to review the existing literature related to cybersecurity. Specifically, the review synthesizes the empirical research in (1) various types of cyber attacks, (2) contributing factors related to cybersecurity behavior, and (3) strategi to improve cybersecurity behavior. The most developed line of research in this area has been focusing on the strategies to improve cybersecurity behavior, showing a questionable trend of quickly creating solutions before fully conceptualizing the problem.


Author(s):  
Samantha Bordoff ◽  
Quan Chen ◽  
Zheng Yan

This article describes how as access to the Internet has increased, cybersecurity has become important, with businesses and the government spending much time and resources to combat cyber attacks. The purpose of this article was to review the existing literature related to cybersecurity. Specifically, the review synthesizes the empirical research in (1) various types of cyber attacks, (2) contributing factors related to cybersecurity behavior, and (3) strategies to improve cybersecurity behavior. The most developed line of research in this area has been focusing on the strategies to improve cybersecurity behavior, showing a questionable trend of quickly creating solutions before fully conceptualizing the problem.


Author(s):  
Samantha Bordoff ◽  
Quan Chen ◽  
Zheng Yan

This article describes how as access to the Internet has increased, cybersecurity has become important, with businesses and the government spending much time and resources to combat cyber attacks. The purpose of this article was to review the existing literature related to cybersecurity. Specifically, the review synthesizes the empirical research in (1) various types of cyber attacks, (2) contributing factors related to cybersecurity behavior, and (3) strategy to improve cybersecurity behavior. The most developed line of research in this area has been focusing on the strategies to improve cybersecurity behavior, showing a questionable trend of quickly creating solutions before fully conceptualizing the problem.


Yuridika ◽  
2014 ◽  
Vol 29 (3) ◽  
Author(s):  
Masitoh Indriani ◽  
Adhy Riadhy Arafah ◽  
Fitri Nuril Islamy

The development of Information Technology (IT) changes the patterns of community’s behavior. The presence of the Internet as the main platform of online activities including electronic transaction is vulnerable to the presence of cyber attacks by irresponsible parties. Criminal acts in cyberspace (cybercrime) pose a major threat in the governance of online activities and other electronic transactions. One of the efforts of the Government of Republic of Indonesia to face those challenges is by authorising the Government Regulations Number 82 Year 2012 concerning the Implementation of Electronic Transaction Systems in order to govern the electronic transaction activities. This article will discuss about how the Government of Republic of Indonesia copes the issue of the threat on electronic transactions.Keywords: cybercrime, electronic transactions system, goverment regulation No. 82/ 2012


2020 ◽  
Author(s):  
Ashis Acharya ◽  
Nabaraj Poudyal ◽  
Ganesh Lamichhane ◽  
Babita Aryal ◽  
Bibek Raj Bhattarai ◽  
...  

The COVID-19 global pandemic has affected all aspects of human life, with education, not an exception. In an attempt to stop the SARS-CoV-2 spreading like wildfire, the Government of Nepal has implemented nationwide lockdowns since March 24, 2020, that have enforced schools and universities to shut down. As a consequence, more than four hundred thousand students of various levels in higher education institutions (HEIs) are in a dilemma about restoring the situation. Several HEIs, nationwide, have leaped forward from the traditional concept of learning—limited within the boundary of the classroom—to choosing digital platforms as an alternative means of teaching because of the pandemic. For this research, the descriptive and inferential analysis was carried out to investigate the effects and challenges of learning via digital platforms during this pandemic. Data were collected from students and faculty at various levels of higher education and analyzed statistically with different factors using t-test and ANOVA, and variables were found to be approximately normally distributed. The study revealed that 70% of the respondents had access to the Internet, but 36% of the Internet accessed did not continue online classes due to unexpected disturbance in Internet and electrical connectivity. Likewise, 65% of students did not feel comfortable with online classes, and among attendees of online classes, 78% of students want to meet the instructor for a better understanding of course matters. According to the analytic hierarchy process (AHP) model, three factors, such as institutional policy, internet access, and poverty, are found to be significant factors affecting the online higher education systems in Nepal. On the brighter side, this outbreak has brought ample opportunities to reform the conventional teaching-learning paradigm in Nepal.


2021 ◽  
Vol 21 (3) ◽  
pp. 1-22
Author(s):  
Celestine Iwendi ◽  
Saif Ur Rehman ◽  
Abdul Rehman Javed ◽  
Suleman Khan ◽  
Gautam Srivastava

In this digital age, human dependency on technology in various fields has been increasing tremendously. Torrential amounts of different electronic products are being manufactured daily for everyday use. With this advancement in the world of Internet technology, cybersecurity of software and hardware systems are now prerequisites for major business’ operations. Every technology on the market has multiple vulnerabilities that are exploited by hackers and cyber-criminals daily to manipulate data sometimes for malicious purposes. In any system, the Intrusion Detection System (IDS) is a fundamental component for ensuring the security of devices from digital attacks. Recognition of new developing digital threats is getting harder for existing IDS. Furthermore, advanced frameworks are required for IDS to function both efficiently and effectively. The commonly observed cyber-attacks in the business domain include minor attacks used for stealing private data. This article presents a deep learning methodology for detecting cyber-attacks on the Internet of Things using a Long Short Term Networks classifier. Our extensive experimental testing show an Accuracy of 99.09%, F1-score of 99.46%, and Recall of 99.51%, respectively. A detailed metric representing our results in tabular form was used to compare how our model was better than other state-of-the-art models in detecting cyber-attacks with proficiency.


2018 ◽  
Vol 5 (1) ◽  
pp. 60
Author(s):  
Nelson Obinna Omenugha

The National Bureau of Statistics recently announced that the entertainment and media (E&M) industry in Nigeria recorded growth of 1.86% to 12.81%; contributing N54bn to the country’s GDP. The industry’s revenue is projected to reach an estimated $8.5bn in 2018, from $4bn in 2013, with internet as one of the key drivers (PwC report, 2016, p.14). This comes at a time when Nigeria’s economy has shrunk by 2.24% since 2015 and receded by 0.18% from the previous quarter. Therefore, this study unpacks the possibilities and challenges of the impact of e-marketing tools on the growth of the Nigerian E&M industry. E-marketing tools provide “a unique combination of powerful capabilities for marketers” (Parsons et al., 2015). E-marketing suitability for the E&M industry lies in its lower capital demand, and a convenient and online means of disseminating marketing messages across a heterogeneous population at an unlimited geographical space. E-marketing is a reality in Nigeria as a study by Mathew, Ogedebe & Ogedebe (2013, p. 549) shows that “Many Nigerians who used (sic) the internet as one form of communication or another are bombarded daily with advertisements of products and services from industries in the country.” This reality has brought a shift from mechanical to electronic and from analogue to digital; ultimately impacting the marketing realms. The internet enables these electronic/digital platforms; which marketers (E&M industry) and customers (content consumers) rely on to effectively reach and receive communication content and feedback respectively.  However, this study examined the challenges that have possibly hindered the full realization of the e-marketing tools of the Nigerian E&M industry and noted among others; poor power supply and unreliable network infrastructure in the country. There is also an increased customer expectation, security, content copyright and privacy issues as well as the challenge of compliance demand in the industry as influenced by ever dynamic digital boundaries. There is a huge economic need for the Nigerian government to live up to its obligation and enhance power supply and boost network infrastructure. The Nigerian E&M industry needs to continually integrate different digital platforms to reach targets and attract more content consumers. Both the government and industry should increasingly learn and bring a global perspective that can help the nation adapt to the constantly changing digital environment.


1988 ◽  
Vol 16 (2) ◽  
pp. 45-48
Author(s):  
Pauline H. Baker

An underlying assumption that ocurs in both conventional wisdom and in many academic analyses of political behavior is the notion that a critical linkage exists between political change and economic performance. The assumption is that economic growth is either a precondition or a correlate of democracy and political stability. Little empirical research has been done to test the validity of this widely held assumption as it applies to multicultural societies. Moreover, in the African environment, the assumption seems to operate only in selected cases or in ways that defy categorization. Jerry Rawlings, for example, said he led his first coup d’etat in Ghana because the government was going to devalue the currency; he led his second coup, in part, because the next government was going to devalue; and, during his own tenure in office, he has presided over a 1000 percent devaluation.


Sign in / Sign up

Export Citation Format

Share Document