Use-Case of Blockchain in Cybercrime and Cyberattack

Author(s):  
Karthika Veeramani ◽  
Suresh Jaganathan

Cybercrime involves unlawful activities done by the individual in cyberspace using the internet. It is cyberbullying, financial theft, code-hack, cryptojacking, hacking, etc. The main difference between cybercrime and cyberattack is that cybercrime victims are humans. The crime associated with the latter is that of a computer network, hardware or software. Cyberattack activities include ransomware, viruses, worms, SQL injection, DDoS attacks, and government and corporate are potential targets. Cyber security provides a specialised approach to the protection of computer systems from cybercrimes and cyberattacks. As of now, no cyber defence is 100% safe. What is considered safe today may not be secure tomorrow. Blockchain enables a new way of recording transactions or any other digital interaction within the network with security, transparency, integrity, confidentiality, availability, and traceability. This chapter explains in detail about cyber risks and how blockchain can be used to avoid risks in financial and insurance frauds.

Author(s):  
Brij B. Gupta ◽  
Amrita Dahiya ◽  
Chivesh Upneja ◽  
Aditi Garg ◽  
Ruby Choudhary

DDoS attack always takes advantage of structure of Internet and imbalance of resources between defender and attacker. DDoS attacks are driven by factors like interdependency of Internet's security, limited resources, fewer incentives for home users and local ISPs, flexibility of handlers to control multiple compromised systems at the same time, untraceable nature of malicious packets and unfair distribution of resources all over the Internet. This survey chapter gives a comprehensive view on DDoS attacks and its defense mechanisms. Defense mechanisms are categorized according to the deployment position and nature of defense. Comprehensive study of DDoS attacks will definitely help researchers to understand the important issues related to cyber security.


Think India ◽  
2019 ◽  
Vol 22 (2) ◽  
pp. 315-328
Author(s):  
Vishal Patel ◽  
Pravin H. Bhathawala

Anti Virus are nasty software’s. It is designed to damage computer systems without the knowledge of the owner using the system and technique advancements are posing big challenges for researchers in both academia and the industry. The purpose of this study is to examine the available literatures on Anti Virus analysis and to determine how research has evolved and advanced in terms of quantity, content and publication outlets. Most Anti Virus programs are large and complex and one can’t possibly understand every detail. Educating the internet users about Anti Virus attack, as well as the implementation and proper application of anti-Anti Virus tools, are critical steps in protecting the identities of online consumers against Anti Virus attacks.


2019 ◽  
Author(s):  
Francesco Brigo ◽  
Simona Lattanzi ◽  
Giorgia Giussani ◽  
Laura Tassi ◽  
Nicola Pietrafusa ◽  
...  

BACKGROUND The Internet has become one of the most important sources of health information, accessed daily by an ever-growing number of both patients and physicians, seeking medical advice and clinical guidance. A deeper insight into the current use of the Web as source of information on epilepsy would help in clarifying the individual attitude towards this medium by Internet users. OBJECTIVE We investigated views towards the Internet in a sample of Italian healthcare specialists involved in epilepsy field, to explore factors which explained the influence of information found on the internet. METHODS This study was a self-administered survey conducted in a group of members of the Italian Chapter of the International League Against Epilepsy (ILAE) in January 2018. RESULTS 184 questionnaires were analyzed. 97.8% of responders reported to seek online information on epilepsy. The Internet was most frequently searched to obtain new information (69.9%) or to confirm a diagnostic or therapeutic decision (37.3%). The influence of consulting the Internet on clinical practice was associated with registration to social network(s) (OR: 2.94; 95%CI: 1.28-6.76; p=0.011), higher frequency of Internet use (OR: 3.66; 95%CI: 1.56-9.21; p=0.006) and higher confidence in reliability of online information (OR: 2.61; 95%CI: 1.09-6.26; p=0.031). No association was found with age, sex, years in epilepsy practice or easiness to find online information. CONCLUSIONS Internet is frequently used among healthcare professionals involved in the epilepsy to obtain information about this disease. The attitude of being influenced by the Internet for diagnostic and/or therapeutic decisions in epilepsy is independent on age and years of experience in epilepsy, and probably reflects an individual approach towards the Web.


Author(s):  
Dan Jerker B. Svantesson

Internet jurisdiction has emerged as one of the greatest and most urgent challenges online, severely affecting areas as diverse as e-commerce, data privacy, law enforcement, content take-downs, cloud computing, e-health, Cyber security, intellectual property, freedom of speech, and Cyberwar. In this innovative book, Professor Svantesson presents a vision for a new approach to Internet jurisdiction––for both private international law and public international law––based on sixteen years of research dedicated specifically to the topic. The book demonstrates that our current paradigm remains attached to a territorial thinking that is out of sync with our modern world, especially, but not only, online. Having made the claim that our adherence to the territoriality principle is based more on habit than on any clear and universally accepted legal principles, Professor Svantesson advances a new jurisprudential framework for how we approach jurisdiction. He also proposes several other reform initiatives such as the concept of ‘investigative jurisdiction’ and an approach to geo-blocking, aimed at equipping us to solve the Internet jurisdiction puzzle. In addition, the book provides a history of Internet jurisdiction, and challenges our traditional categorisation of different types of jurisdiction. It places Internet jurisdiction in a broader context and outlines methods for how properly to understand and work with rules of Internet jurisdiction. While Solving the Internet Puzzle paints a clear picture of the concerns involved and the problems that needs to be overcome, this book is distinctly aimed at finding practical solutions anchored in a solid theoretical framework.


Author(s):  
Alessandro Pollini ◽  
Tiziana C. Callari ◽  
Alessandra Tedeschi ◽  
Daniele Ruscio ◽  
Luca Save ◽  
...  

AbstractComputer and Information Security (CIS) is usually approached adopting a technology-centric viewpoint, where the human components of sociotechnical systems are generally considered as their weakest part, with little consideration for the end users’ cognitive characteristics, needs and motivations. This paper presents a holistic/Human Factors (HF) approach, where the individual, organisational and technological factors are investigated in pilot healthcare organisations to show how HF vulnerabilities may impact on cybersecurity risks. An overview of current challenges in relation to cybersecurity is first provided, followed by the presentation of an integrated top–down and bottom–up methodology using qualitative and quantitative research methods to assess the level of maturity of the pilot organisations with respect to their capability to face and tackle cyber threats and attacks. This approach adopts a user-centred perspective, involving both the organisations’ management and employees, The results show that a better cyber-security culture does not always correspond with more rule compliant behaviour. In addition, conflicts among cybersecurity rules and procedures may trigger human vulnerabilities. In conclusion, the integration of traditional technical solutions with guidelines to enhance CIS systems by leveraging HF in cybersecurity may lead to the adoption of non-technical countermeasures (such as user awareness) for a comprehensive and holistic way to manage cyber security in organisations.


2004 ◽  
Vol 23 (4) ◽  
pp. 245-256
Author(s):  
Shun-Hsing Chen ◽  
Ching-Chow Yang

Quality function deployment (QFD) is an essential tool in implementing total quality management (TQM). This study applies a Web-QFD approach using group decision-making analysis in the Web environment to reduce the complicated data collection, aggregation and analysis processes. A Web-based questionnaire is designed by using an active service pages (ASP) involving the Internet relay chat (IRC) technique and the Delphi method with Internet (E-Delphi) to determine the importance degree of the customers' requirements. However, the traditional Delphi method is time-consuming mission. This study applies the proposed Web-QFD approach to efficiently gather the individual opinions of each team member, the requirements that are critical for customers, and then enables decision makers to accurately assess the priorities of these requirements. An empirical example of an education system in Taiwan is employed to demonstrate the practicability of the proposed Web-QFD model. This real world example involves team members communicating easily and quickly with other experts in the team through the Internet to accelerate the reaching of a consensus among multiple decision makers regardless of where their location. Customers' requirements can be rapidly prioritized based on the assessment results.


Author(s):  
Dennis Paulino

Crowdsourcing is a paradigm of outsourcing work that is done using human capabilities through the Internet. Given the various possibilities of overcoming cultural and social barriers, crowdsourcing provides an opportunity for people with disabilities to have a financial compensation and help them feel realised. In crowdsourcing, people with disabilities face problems related with the lack of task description or usability. This article it is presented the main threads for my PhD thesis which main goal is to prove, that it is possible to map crowdsourcing tasks effectively to each individual, focusing particularly on the cognitive abilities.


Author(s):  
Bojan Ljuijić

Beside the fact that the Internet was not primarily educational network (it didn’t emerge from the intention to be systematically used in the field of education), shortly after it emerged, possibilities of its application in education were recognised. This paper is dedicated to analysis of the most important chronological moments (technological and social in the first place) that were crucial in sense of comprehensive application of the Internet in service of education in general, but also in service of adult education. Having all mentioned in focus, in more details, we analysed emergence and development of the Internet observed as educational computer network in frame of general development of information and communication technologies. While realising mentioned analysis, our focus was on four historical periods of educational computer technologies. We also intended to emphasize the activities of international institutions that followed, encouraged and supported the development of the Internet use and the use of other information and communication technologies in the field of education. According to that, we distinguished the main moments referring activities of these organisations which describe in the best manner their contributions to growing application of the Internet in education in general, but also in adult education.


Author(s):  
Rakhimova I.I. ◽  
◽  
Mukhiddinova U.A. ◽  
Bеrdiqulоvа G.N. ◽  
Suleymanova D.I. ◽  
...  

In today's age of the Internet, computers and mobile phones for people of all ages are available in almost every home. In addition, in today’s world-wide pandemic, the use of the Internet for education and all aspects of cultural, socio-economic life as well as games such as games is growing rapidly. This, in turn, has a psychological effect on the individual, both positively and negatively on our society and national values. In this article, I have tried to highlight the positive and negative aspects of the internet world that affect the individual. In the article we will focus on the role of the virtual world in human life, the need not to depend on it, to use it for useful purposes.


Sign in / Sign up

Export Citation Format

Share Document