Plugging Security Holes in Online Environment

Author(s):  
Sushil K. Sharma ◽  
Jatinder N.D. Gupta ◽  
Ajay K. Gupta

The ability to perform E-Commerce over the Internet has become the driver of the new digital economy. As it has opened up opportunities for businesses and consumers to conduct online transactions on a 24/7 basis, at the same time, it has also opened new opportunities for hackers to exploit the medium for nefarious cyber attacks. This paper discusses various potential security holes that exists in the e-commerce environment and suggests a framework to protect organizations from security breaches.

2021 ◽  
Vol 11 (04) ◽  
pp. 01-10
Author(s):  
James Jin ◽  
Gayatri S ◽  
Yu Sun

With more than seven billion people actively using the Internet, the number of cyber attacks has increased, and personal data breaches have become a concern among the general public. The COVID-19 pandemic has only increased the use of online platforms and services for work and leisure activities, which opens the door to more scams, viruses, and other cyber security breaches. Guided by SEO techniques and research regarding dangerous website and domain patterns, we have designed and implemented a visual system that tracks suspicious links on an active webpage and marks them in order to alert users to proceed with caution. Our AI utilizes linear regression to best detect trends in URL parsing, comparing them with registered unsafe links to see if they pose similar threats. The results reveal that AI isn’t entirely accurate since some trends are hard to decipher; however, it can reliably flag certain redirects and out-of-domain links that would otherwise remain hidden to users.


2018 ◽  
Vol 35 (2) ◽  
pp. 40-47
Author(s):  
S. M. Doguchaeva

The era of digital transformation provides the opportunity for leading companies to change priorities - to begin to take care of the support environment using innovative technologies and become a leading creative platform open for innovation. The successful development of the digital world, the blockchain technology, the Internet of things – the mechanism which will change the financial world. 


2020 ◽  
Vol 93 (4) ◽  
pp. 16-23
Author(s):  
Song Linlin ◽  

Since the establishment of the China (Heilongjiang) pilot free trade zone, the development of cross-border e-commerce with Russia has continued to increase speed and quality. With its geographical advantages and its comparative advantages in the Internet field, Heilongjiang Province promoted the rapid development of the Internet economy in Russia, fostered a new digital trade format represented by cross-border e-commerce, and promoted online and offline collaborative promotion of customs clearance logistics and financial services. The paper expounds foundation and development status of Heilongjiang Province’s cross-border e-commerce, analyzes in integrated development of digital economy with the Heilongjiang Province’s cross-border e-commerce with Russia, and further puts forward prospects and recommendations.


2021 ◽  
Vol 21 (3) ◽  
pp. 1-22
Author(s):  
Celestine Iwendi ◽  
Saif Ur Rehman ◽  
Abdul Rehman Javed ◽  
Suleman Khan ◽  
Gautam Srivastava

In this digital age, human dependency on technology in various fields has been increasing tremendously. Torrential amounts of different electronic products are being manufactured daily for everyday use. With this advancement in the world of Internet technology, cybersecurity of software and hardware systems are now prerequisites for major business’ operations. Every technology on the market has multiple vulnerabilities that are exploited by hackers and cyber-criminals daily to manipulate data sometimes for malicious purposes. In any system, the Intrusion Detection System (IDS) is a fundamental component for ensuring the security of devices from digital attacks. Recognition of new developing digital threats is getting harder for existing IDS. Furthermore, advanced frameworks are required for IDS to function both efficiently and effectively. The commonly observed cyber-attacks in the business domain include minor attacks used for stealing private data. This article presents a deep learning methodology for detecting cyber-attacks on the Internet of Things using a Long Short Term Networks classifier. Our extensive experimental testing show an Accuracy of 99.09%, F1-score of 99.46%, and Recall of 99.51%, respectively. A detailed metric representing our results in tabular form was used to compare how our model was better than other state-of-the-art models in detecting cyber-attacks with proficiency.


Author(s):  
Meenu Sethu ◽  
Dan Nathan-Roberts

Traditional banks and financial institutions have witnessed a profound transformation to electronic banking with the rise of the internet over the last two decades. However, most digital banking customers do not feel that the activity of managing their money and making online transactions is exciting or enjoyable. The gamification of e-banking systems is a novel approach for promoting customer engagement that is gaining popularity. This work reviews the factors influencing the adoption of e-banking and how gamification can be used to improve customer engagement, loyalty, and financial wellbeing. An exploration of the most extensively used game design elements in gamified e-banking applications suggests that the use of certain game mechanics and characteristics can be effective in creating enjoyable banking experiences. Based on this research, a set of guidelines is provided for designers and practitioners for introducing game principles in e-banking applications.


2021 ◽  
Vol 32 (1) ◽  
pp. 93-128
Author(s):  
Ronald Kakungulu-Mayambala ◽  
Rukundo Solomon ◽  
Victor Phillip Makmot ◽  
Diana Rutabingwa

The distribution of sexually graphic or intimate images of individuals on the internet without their consent is on the rise in Uganda. Several female celebrities and lesser-known individuals have fallen victim to this phenomenon in recent years. This article examines the civil and criminal remedies currently available to the victims. The article argues that these remedies are insufficient to deal with the challenge posed by the non-consensual distribution of these intimate images in the online environment and argues for the creation of a new law that specifically addresses this issue.


Author(s):  
Liudmyla Kurylo ◽  
◽  
Yaroslav Kozchenko ◽  

The author conducted a study of the role and actual functions of Internet marketing nowadays, analyzed the latest publications and studies of domestic and foreign scientists relating to Internet marketing. The definitions of Internet marketing by various scientists were considered. It was determined by the problematic that exists in the field of internet marketing at the moment. A review of modern tools we identified the main tools of Internet marketing, by which the communication occurs on the Internet: SEO (Search Engine Optimisation), search (paid) advertising, Media advertising, SMM (Social Media Marketing) social media marketing, content marketing, E-mail marketing; Hootsuit's company research analysis determined the number of Internet users and purchasing power in the online environment, which averaged 500 USD per year. The number of Internet users in the online environment averaged 500 USD per year. And also to prioritise specific types of products. We have also identified that search engines are the main source of learning new information for consumers. Having analysed the dynamics of internet penetration in Ukraine, it appears that the number of internet users increased by 8% in 2019, with 22.96 million Ukrainians using the internet at the end of 2019. The article examines the possibilities of Internet marketing tools that become available when using such a tool as web analytics, including: personalised offers to customers, building relationships with customers, after a purchase is made and increasing their retention rate. A study of advertising costs on the social network Facebook, during the presidential elections in Ukraine in 2019 and during the presidential race in the USA in 2020 was conducted. And also defined the role played by social networks in building relationships with the target audience. During the research, recommendations for the use of the main tools of Internet marketing were made and it was determined which business areas are not suitable for each of the tools. Based on the research and statistical data was predicted directions of development of Internet marketing.


Author(s):  
Wendy Smith

The Internet, particularly through the application of World Wide Web (WWW) technology, has proved to be a very attractive medium for publishing. However, the difficulties of finding appropriate information online and then of ensuring its long term accessibility have created problems for libraries. Practices that work for books and other printed materials do not always translate directly to online materials. The National Library of Australia's PANDORA project has been set up to develop policies and procedures for ensuring long term access to significant Australian publications which are accessible only in an online environment, and to establish and maintain a permanent archive ofthat material.


Sign in / Sign up

Export Citation Format

Share Document