scholarly journals Future Crime in Cyber Security

Author(s):  
Pratik Shah ◽  
Vansh Damania ◽  
Hitansh Kadakia

As we all know nowadays everything is connected to the internet. Bits and bytes flow freely from one country to another country without any border guards. Technology progress has helped our world in many ways, but there are always two sides to everything. where there are good things. there are bad things also. In today’s society, we spend the majority of our time online, be it doing business, paying bills, making friends, selling cars, or purchasing a home, from applying to college to finding a life partner. Today’s criminals are taking the advantage of technology for crimes. The most often asked question is “What is the next big crime?” the answer in this paper. We covered some worst scenarios/cybercrimes you’ve never thought of. Before you begin with this paper, let us first tell you what this paper is not. It is not a guide on how to hack someone’s social media accounts, mobile devices, etc., or how to prevent yourself from hackers or cybercriminals. Yes, we covered some prevention techniques but, in the end, it all depends on you. This paper isn’t just what was going on yesterday or even what Is happening today. It is about where we are going tomorrow. This research paper throws light on the field of cybercrimes which are usually people don’t know.

Author(s):  
Maurice Dawson ◽  
Marwan Omar ◽  
Jonathan Abramson ◽  
Brian Leonard ◽  
Dustin Bessette

The threat of cyber terrorism has become a reality with recent attacks such as Stuxtnet, Flame, Sony Pictures, and North Korea's websites. As the Internet of Things (IoT) continues to become more hyperconnected it will be imperative that cyber security experts to develop new security architectures for multiple platforms such as mobile devices, laptops, embedded systems, and even wearable displays. The futures of national and international security rely on complex countermeasures to ensure that a proper security posture is maintained during this state of hyperconnectivity. To protect these systems from exploitation of vulnerabilities it is essential to understand current and future threats to include the laws that drive their need to be secured. Examined within this chapter are the potential security related threats with the use of social media, mobile devices, virtual worlds, augmented reality, and mixed reality.


2018 ◽  
pp. 1553-1584
Author(s):  
Maurice Dawson ◽  
Marwan Omar ◽  
Jonathan Abramson ◽  
Brian Leonard ◽  
Dustin Bessette

The threat of cyber terrorism has become a reality with recent attacks such as Stuxtnet, Flame, Sony Pictures, and North Korea's websites. As the Internet of Things (IoT) continues to become more hyperconnected it will be imperative that cyber security experts to develop new security architectures for multiple platforms such as mobile devices, laptops, embedded systems, and even wearable displays. The futures of national and international security rely on complex countermeasures to ensure that a proper security posture is maintained during this state of hyperconnectivity. To protect these systems from exploitation of vulnerabilities it is essential to understand current and future threats to include the laws that drive their need to be secured. Examined within this chapter are the potential security related threats with the use of social media, mobile devices, virtual worlds, augmented reality, and mixed reality.


Author(s):  
S. Mahalingam ◽  
B. Ashokkumar

The most popular businesses adopt the Internet, not simply as another advertisement tool or marketing instrument. It is seen as a mechanism for transforming the companies and changing everything about the way computers and mobile devices function to serve their customer better and to connect with their suppliers. In short, digital marketing has sparked a business world revolution by pushing out some old established players and rising new leaders. The winners discover new market possibilities, enhanced ways to develop work and better ways to manage and run their companies. Despite this, the digital marketing entrepreneurs still have to take care of their clients and earn a profit to remain in the business. Web-based business success requires the entrepreneur to strike a balance between creating a digital marketing strategy that utilizes the strength of the Internet and meeting customer expectations of convenience and service. Consumer's present use of mobile devices, social media and search engines have led to developing integrated social –local-mobile strategies (SOLOMO). Entrepreneurs may use the SOLOMO strategy effectively as customers enhance their online activities by extensively using these three methods.


2016 ◽  
Vol 2 (1) ◽  
Author(s):  
Hawik Ervina Indoworo

Abstract - Now the development of entrepreneurship is able to expand new employment opportunities and sustain the economy of the State. The need for information and personal development is increasing along with advances in telecommunications technology over the internet. The development of the internet makes the number of the users taking advantage of this as a profitable business opportunity like online businesses. The euphoria of the use of social media (facebook, twitter, instagram, etc.) over the internet has become a trend in society. Of course it affects the behavior change in the way the community communicate and interact with others. This condition is driven by two fundamentals which are the new behavior of the citizen and the technological revolution. The growth of social media users should certainly benefit companies in reaching consumers with a way to innovate in doing business, marketing and communication. Keywords: entrepreneurship, social media


Chapter 11 serves as another expository to readers. In this chapter, readers are enlightened on the digital and virtual age as they relate to the educational trend and online education. In addition, the chapter provides some insights to social media as they relate to education at higher educational institutions and how connecting to the world in terms of education and doing business is at the fingertips with the aid of mobile computing and social media. While social media and mobile devices create an ease of reaching information and networking, their careless usage and lack of monitoring in the classroom exacerbate and defeat their intended good purpose of enhancing the learning process, failing to render the desired results.


2019 ◽  
pp. 1666-1696
Author(s):  
Maurice Dawson ◽  
Marwan Omar ◽  
Jonathan Abramson ◽  
Dustin Bessette

Hyperconnectivity is a growing trend that is driving cyber security experts to develop new security architectures for multiple platforms such as mobile devices, laptops, and even wearable displays. The futures of national and international security rely on complex countermeasures to ensure that a proper security posture is maintained during this state of hyperconnectivity. To protect these systems from exploitation of vulnerabilities it is essential to understand current and future threats to include the laws that drive their need to be secured. Examined within this chapter are the potential security-related threats with the use of social media, mobile devices, virtual worlds, augmented reality, and mixed reality. Further reviewed are some examples of the complex attacks that could interrupt human-robot interaction, children-computer interaction, mobile computing, social networks, and human-centered issues in security design.


2021 ◽  
Author(s):  
Nebojša Zarkovic ◽  

Th anks to today’s digital age, insurance is the one industry that has particularly benefi ted from the advancements in technology. Every customer an insurance broker or agent serves has a diff erent communication want or need. Some customers crave Улога савремене технологије у општењу посредника и заступника са осигураницима 34 personal attention and want to be able to speak with their insurance agents or brokers. Others simply want easy access to information and a way to deliver information that is not stressful or disruptive. For that reason, insurance brokers or agents should use modern technology to off er multiple communication channels. Th is can include websites, mobile devices, social media, remote communication and business process automation as it is pointed out in this article. More people are accessing the Internet on mobile devices than on desktop computers. Insurance agents and brokers should make sure their websites are compatible with most (if not all) mobile devices. Another solution is to create a mobile app to make it easy for consumers to access their sites on the go. Social media for insurance agents and brokers has challenges. However, social media is now critical to the insurance business. Th e rewards they can reap on social media far outweigh the obstacles. Insurance sales and consultations have always been about connection. Brokers and agents make a connection with clients. Th ey discuss catastrophic situations, potential life problems and issues of daily living, making connections in real life. Th e world now requires those connections to be maintained online, especially during the coronavirus crisis. Remote communication is a way of communicating with others online. Meetings, information, and training materials are shared over the Internet. Advanced insurance brokers and agents create virtual teams. Th ey icommunicate and collaborate online and not in a shared offi ce space. Business process automation is the technology-enabled automation of complex business i.e. insurance processes utilized by agents and brokers. It can streamline an insurance business for simplicity, achieve digital transformation, increase service quality to the insureds, improve service delivery or contain costs. Insurance brokers and agents should spend more time interacting with potential customers. Th is includes answering questions and informing them of the important benefi ts of the insurance off ered. Th ey should turn to in-offi ce soft ware that helps them automate these workfl ows.


2021 ◽  
Vol 1 (2) ◽  
pp. 105-110
Author(s):  
Eko Suharyanto ◽  
Chrisantus Tristianto ◽  
Imam Hidayat ◽  
Yunus Yunus

Today's technological advances can take advantage of the internet and their mobile devices to develop online businesses so that they can drive a wider market. The implementation of this PKM is carried out, with 1) The purpose of training for the Baitul Karim Foundation community. 2) Train the Baitul Karim Foundation community to use this social media by selling online. One of the platforms is the Tokopedia seller, one of the features found in the Tokopedia company that functions as a supporter of business actors to facilitate product marketing throughout the archipelago. As for how to register our account on Tokopedia, Tokopedia has advantages in the components of reviews and complaints (UK), certification and security (SK), product prices (HP), product descriptions (DP), and transportation (TR). This gives enthusiasm to provide workshops to several sellers or sellers by selling online through social media and several platforms such as Facebook, Instagram at the Baitul Karim Foundation.


Author(s):  
César Sahelices Pinto

<p>El consumidor actual de productos alimenticios está cada vez más concienciado con su dieta, su estilo de vida y su presupuesto, y por tanto, está más informado y es más exigente. De ello es testigo internet y los <em>social media, </em>cuyo<em> </em>potencial es enorme. En estas plataformas se relacionan millones de individuos formando redes por las que fluye comunicación ‘boca-oreja’ electrónica de gran repercusión para las empresas. Analizar estas redes sociales y mantener el contacto con ellas permite obtener un valioso <em>feedback</em> para la organización. En este de trabajo de investigación se realiza una exploración de la ‘blogosfera’ relacionada con alimentación, su capacidad de prescripción y su posicionamiento ante la publicidad. Finalmente se consideran diferentes aspectos que dan pie a posibles líneas de investigación futura.</p><p>Today’s consumer is becoming increasingly aware of his/her diet, lifestyle and budget, and is therefore more informed and more demanding. The Internet and social media, whose potential is huge, are faithful witnesses of it. Millions of individuals interact on these platforms, creating networks through which ‘electronic word-of-mouth’ of great impact for companies flows. By analyzing and maintaining direct contact with these social networks, researchers can obtain valuable feedback for the organization. This research paper presents an exploration of the food-related ‘blogosphere’, its prescriptive capacity and positioning towards advertising. Finally, some possible lines of further research are considered.</p>


Author(s):  
Maurice Dawson ◽  
Marwan Omar ◽  
Jonathan Abramson ◽  
Dustin Bessette

Hyperconnectivity is a growing trend that is driving cyber security experts to develop new security architectures for multiple platforms such as mobile devices, laptops, and even wearable displays. The futures of national and international security rely on complex countermeasures to ensure that a proper security posture is maintained during this state of hyperconnectivity. To protect these systems from exploitation of vulnerabilities it is essential to understand current and future threats to include the laws that drive their need to be secured. Examined within this chapter are the potential security-related threats with the use of social media, mobile devices, virtual worlds, augmented reality, and mixed reality. Further reviewed are some examples of the complex attacks that could interrupt human-robot interaction, children-computer interaction, mobile computing, social networks, and human-centered issues in security design.


Sign in / Sign up

Export Citation Format

Share Document